- Jan 11, 2017
-
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
Grigorii Demidov authored
layer/iterate: change the order of records in the answer when CNAME refers to the record that we already have
-
Grigorii Demidov authored
-
On standard 64-bit: 24 -> 16 bytes per element.
-
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
-
Grigorii Demidov authored
-
Ondřej Surý authored
TCP: free buffer when cancelling connection Closes #76 See merge request !114
-
- Jan 09, 2017
-
-
Vladimír Čunát authored
Fixes https://gitlab.labs.nic.cz/knot/resolver/issues/76
-
Vladimír Čunát authored
-
- Jan 06, 2017
-
-
Ondřej Surý authored
iterate: answer NOTIMPL to other classes than IN See merge request !110
-
Ondřej Surý authored
Generate RSA certificates with GnuTLS < 3.5.0 See merge request !113
-
Ondřej Surý authored
-
Ondřej Surý authored
Create and use ephemeral TLS credentials if none are explicitly configured See merge request !112
-
Ondřej Surý authored
-
Ondřej Surý authored
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
If the ephemeral X.509 certificate is due for renewal in less than a week, regenerate it automatically.
-
Daniel Kahn Gillmor authored
If kresd is configured to listen using TLS, but it has no credentials, it should fall back to generating ephemeral credentials and using them. It stores the ephemerally-generated secret key in the same directory as the cache, using the name "ephemeral_key.pem". If the cache persists, then the key will too, even if the daemon dies. This means that any set of daemons that share a cache will also share an ephemeral secret key. The ephemeral X.509 certificate that corresponds to the key will be automatically generated (self-signed), will have a lifetime of about 90 days (matching Let's Encrypt policy). The ephemeral cert is never written to disk; it is always dynamically-generated by kresd. This should make it very easy to get DNS-over-TLS working in opportunistic mode.
-
Daniel Kahn Gillmor authored
This can be useful for scheduling checks in the future, for logging when we're using an expired cert, requesting a new cert, refreshing an ephemeral cert, etc.
-
- Jan 03, 2017
-
-
Vladimír Čunát authored
hints: don't crash if no file got loaded See merge request !111
-
Vladimír Čunát authored
At least until we implement them properly.
-
- Dec 28, 2016
-
-
Vladimír Čunát authored
There was (always) a bug in the "normal mode", which complicated difficult cases like zive.cz in default setting.
-
- Dec 27, 2016
-
-
Grigorii Demidov authored
-
- Dec 26, 2016
-
-
Ondřej Surý authored
Make the build verbose when launching test instance See merge request !108
-
Ondřej Surý authored
-
- Dec 22, 2016
-
-
Ondřej Surý authored
Add script to launch separate testing instance See merge request !107
-
Ondřej Surý authored
-
Vladimír Čunát authored
Before C11, repeating a typedef is forbidden, if taken strictly, and some compiler versions even reject it. On the other hand lru.h was missing it, which wasn't noticed due to glibc's <sys/types.h> defining it. Fixes https://gitlab.labs.nic.cz/knot/resolver/issues/114.
-
Vladimír Čunát authored
Before C11, repeating a typedef is forbidden, if taken strictly, and some compiler versions even reject it. On the other hand lru.h was missing it, which wasn't noticed due to glibc's <sys/types.h> defining it. Fixes https://gitlab.labs.nic.cz/knot/resolver/issues/114.
-
Vladimír Čunát authored
The problem was missed in !102 d6f79261. Submitted as: https://github.com/CZ-NIC/knot-resolver/pull/38
-