- Jun 12, 2023
-
-
Vladimír Čunát authored
Example: assert(require('ffi').C.kr_view_insert_action( '127.0.0.0/24', 'policy.DENY_MSG("message")' ) == 0)
-
Vladimír Čunát authored
Also switch the localhost rule there, finishing migration of all special names from the policy module.
-
Vladimír Čunát authored
-
Vladimír Čunát authored
Picked up old work, rebase-squashed after many months; then fixed up a little as needed in this newer version. (and later many minor fixes got squashed in)
-
- Dec 05, 2022
-
-
Vladimír Čunát authored
I broke this in 54ab3f78 or closely around, so this never worked well since 5.4.1, and maybe structured logging (5.4.0) had related issues.
-
- Aug 08, 2022
- Feb 28, 2022
- Dec 21, 2021
-
-
Tomas Krizek authored
The following actions will now be logged in debug level (or request tracing): ANSWER, DENY, DENY_MSG, DROP, REFUSE, TC This can be useful for RPZ and other policy debugging. Purposefully ommitted actions: PASS - since it's the same as normal processing REROUTE - the action itself comes from renumber module STUB,FORWARD,TLS_FORWARD - this could be more confusing than useful (e.g. when response comes from cache)
-
Tomas Krizek authored
To allow for easier debugging, each origin of an extended DNS error has a unique 4-byte identifier that is included in the extra_text message. The identifiers are random 4-letter base32 strings, generated with: base32 /dev/random | head -c 4
-
Tomas Krizek authored
- Nov 24, 2021
-
-
Tomas Krizek authored
-
- Nov 23, 2021
-
-
Answers to EDNS requests from certain lua policies that use the answer_clear() function would lack OPT RR and thus violate the MUST condition in RFC6891.6.1.1.
-
- Nov 19, 2021
-
-
Oto Šťáva authored
-
Oto Šťáva authored
-
Oto Šťáva authored
-
Signed-off-by:
Josh Soref <jsoref@users.noreply.github.com>
-
- Oct 20, 2021
- Aug 10, 2021
-
-
The logs can be triggered from policy actions, in per-request fashion: - they're on LOG_DEBUG level but always sent, regardless of log config - those messages will show double group tags: "[reqdbg][foo ]" (but they lack proper meta-data - about location of the log's origin) - reqdbg is *in addition* to normal logs, so the lines may be duplicated if that's how the logging was configured
-
- Jul 29, 2021
- Jun 23, 2021
-
-
Perhaps this bug was now more pronounced since 5.3.0 changes. Example problem was disabling minimization or 0x20 (globally or for some problematic requests); without this change they would get re-enabled during some fallback actions... which might be exactly the wrong moment wrt. the motivation to setting these. https://gitter.im/CZ-NIC/knot-resolver?at=60a221e86a950f3d46ed1cd9
-
- Feb 08, 2021
-
-
Vladimír Čunát authored
- return SOA in NODATA answers and allow customizing it - only call ensure_answer() if really generating an answer (otherwise we might e.g. deplete XDP buffers, in extreme cases)
-
- Dec 31, 2020
- Nov 10, 2020
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
This amends commit 99e014ac.
-
- Oct 21, 2020
-
-
Vladimír Čunát authored
For now I was too afraid to use "multi-flag" kr_request::state, so I kept it at _FAIL; anyone can recognize it by NULL answer anyway. Lua wrapper: using exception was considered but didn't seem good. I utilized the fact that modules can return nil meaning no state change.
-
Vladimír Čunát authored
FIXME: see FIXMEs in diff, document the API change, re-review.
-
- Jun 30, 2020
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
... by allowing .rdata to be a table. Larger RRsets seem useful.
-
Vladimír Čunát authored
- use parser-detected $ORIGIN instead of looking at SOA owner - skip records outside $ORIGIN (and warn) instead of nesting them - simplify a bit, and tweak warnings
-
Vladimír Čunát authored
Also utilize table indexing. This was a "regression" from extending RPZ support in 5.1.0. NS and SOA are even mandatory, as RPZ is supposed to be a valid zone: https://tools.ietf.org/html/draft-ietf-dnsop-dns-rpz-00#section-2
-
- Apr 14, 2020