- Dec 20, 2019
-
-
- Dec 02, 2019
-
-
Running the full special-domain checks is relatively expensive.
-
- Nov 28, 2019
-
-
Vladimír Čunát authored
I've never seen anyone use postrules.
-
- Sep 20, 2019
-
-
- home.arpa.: 4. from https://tools.ietf.org/html/rfc8375#section-4 - local.: 4. from https://tools.ietf.org/html/rfc6762#section-22.1 Well, it's just an approximation... if the user specifies a forwarding policy, any special names will also get forwarded, even though the RFC says not to. And this code will also reply NXDOMAIN to home.arpa. DS. Some of these DENY rules are perhaps unnecessary, but for now we keep the same approach. For arguments see the MR 855 thread and linked ML.
-
- Aug 05, 2019
-
-
Tomas Krizek authored
-
- Jun 13, 2019
-
-
Vladimír Čunát authored
Thanks to changes in this branch the functions are called with correctly typed parameters already, so these weird casts can be deleted.
-
- Apr 11, 2019
-
-
"Unfortunately", for FFI-bound C functions there it doesn't hold that missing parameters would be converted to nil/NULL. Still, this function seems unlikely to have been used outside the repo.
-
- Mar 12, 2019
-
-
Tomas Krizek authored
-
Tomas Krizek authored
-
- Mar 05, 2019
-
-
Vladimír Čunát authored
-
- Feb 25, 2019
-
-
Vladimír Čunát authored
and deduplicate the parsing logic.
-
Petr Špaček authored
-
- Feb 22, 2019
-
-
It's mainly about the way we parse and validate them. Almost all of the parts of validation that were being done in modules/policy/policy.lua and daemon/tls.c got moved to daemon/bindings/net.c, so it's easier to follow that. Also more checks are being done now, e.g. contents of .pin_sha256 and .hostname strings.
-
In https world it's standard to do that, and it's relied on. Real-life example: 8.8.8.8#853 over TLSv1.3 won't send a certificate if we don't send SNI (no idea why; also they do send it with TLSv1.2). As a consequence, we no longer allow multiple hostnames per address-port tuple, but that didn't seem useful.
-
- Feb 06, 2019
-
-
Vladimír Čunát authored
- logging - watch by default - in Fedora we need to depend on the version for lua 5.1
-
vcunat squashed this, rebased, etc.
-
- Dec 13, 2018
-
-
Not all actions are destructive, but it seems generally expected that if an earlier module or other code already transitioned the request into a FAIL or DONE state, we don't want to apply rules anymore. In particular, later rule actions would "overwrite" what previous actions did.
-
- Dec 04, 2018
-
-
Petr Špaček authored
-
- Dec 03, 2018
-
-
Vladimír Čunát authored
Continuation of the parent commit. In particular, kr_nsrep_set() can't be used to create NS list "with holes".
-
-
- Aug 14, 2018
-
-
Vladimír Čunát authored
-
- Jun 07, 2018
-
-
Grigorii Demidov authored
-
- Jun 06, 2018
-
-
daemon/tls: system CA's are used by default with TLS_FORWARD policy when ca_file parameter is omitted
-
- Jun 01, 2018
-
-
Fixes: #337
-
- Feb 15, 2018
- Jan 25, 2018
-
-
Petr Špaček authored
RFC 6303 section 3 explains that The SOA RR is needed to support negative caching [RFC2308] of name error responses and to point clients to the primary master for DNS dynamic updates. Now SOA RR owner name matches query name so it can be cached. Using zone name as owner would be more difficult so it is left for further optimizations. I've verified that nsupdate correctly determines that master name does not exist and stops update process.
-
Petr Špaček authored
-
Petr Špaček authored
I've removed couple layers of indirection to make it easier to follow. This should make it easier to extend the policy module.
-
- Jan 18, 2018
-
-
Petr Špaček authored
The pin parameter contains SHA-256 encoded using Base64, but this is not the only option. Explicit name allows us to add alternative formats later on, and is consistent with GnuTLS naming.
-
Petr Špaček authored
Policy handling was split into smaller functions to allow easier checking. The code needs further refactoring, it seems that net_tls_client is just a thin wrapper around tls_client_params_set in C, which is unnecessary and error prone.
-
Petr Špaček authored
-
- Jan 08, 2018
-
-
Petr Špaček authored
-
-
-
It should be enough to update the table once per TLS_FORWARD rule, without re-doing that every time the policy is triggered.
-
-
-
- Nov 24, 2017
-
-
Marek Vavruša authored
there are two modules that couldn't work before: * graphite * ketcd
-
- Aug 01, 2017
-
-
Vladimír Čunát authored
It was rather low-level anyway.
-
Vladimír Čunát authored
-