- Apr 30, 2020
-
-
Libor Peltan authored
-
- Apr 29, 2020
-
-
-
White spaces and #'s are now possible. Fixes "runtests.py -n xxx" for the test "contrib/include".
-
-
-
-
-
Daniel Salzman authored
xfr: secret option to send XFR w/o EDNS See merge request !1125
-
-
Daniel Salzman authored
bugfix: proper handling of nsec3 tree created during incremental update See merge request !1124
-
- Apr 28, 2020
-
-
Libor Peltan authored
-
Daniel Salzman authored
This reverts commit 588e384d. The mode really is used!
-
Daniel Salzman authored
-
Daniel Salzman authored
-
-
-
- Apr 25, 2020
-
-
Daniel Salzman authored
geoip: trigger CNAME chain resolution See merge request !1122
-
Daniel Salzman authored
When a control client reaches its timeout or is interrupted, the connection isn't closed by the server immediately. So another connection attempts can be forbiden with the error "OS lacked necessary resources". By increasing the listen backlog such a situation is less probable to happen.
-
- Apr 23, 2020
-
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Conrad Hoffmann authored
Currently, when the geoip module returns a CNAME, knot will not resolve it any further, even if it is within its authority. This forces clients or recursors to issue an additional request to resolve the CNAME. This commit enables the module to take advantage of knot's chain resolution by updating the query data with the returned CNAME and returning KNOT_IN_STATE_FOLLOW instead of KNOT_IN_STATE_HIT, which will let knot to continue with the processing as it would for regular CNAME results.
-
Conrad Hoffmann authored
The geoip module does not validate the semantic validity of views, such as that a CNAME cannot occur along with any other record. It will take care to only return the right type in any given response, but this can still lead to inconsistent results. Furthermore, one can supply two CNAMEs in a view, and the module will write both of them into a response. This adds some input validation to tighten the rules of what the module will accept as valid configuration, specifically that a CNAME cannot occur along any other record in a view. This prevents ambiguities that might otherwise arise in the query processing. The additional storing of the domain name in case of a CNAME was chosen in anticipation of using it for enabling CNAME chaing resolution, implemented seperately.
-
Daniel Salzman authored
-
Daniel Salzman authored
-
- Apr 22, 2020
-
-
Daniel Salzman authored
-
Daniel Salzman authored
-
- Apr 21, 2020
-
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-