- Aug 27, 2020
-
-
Tomas Krizek authored
lib/generic/queue: fix a bug + minor changes See merge request !1050
-
Vladimír Čunát authored
... and most importantly, review all the code. Detail: queue_{head,tail}_impl() no longer "safely return" NULL on an empty queue, as the API always dereferences the returned pointer anyway.
-
Vladimír Čunát authored
It... feels better that way.
-
Vladimír Čunát authored
Emptying the queue and using it again... didn't work :-( Fortunately, no use case in kresd so far could trigger this, I believe: - struct session::waiting is a list of tasks waiting while connection is being established - the temporary queue in session_tasklist_finalize_expired() is also only once filled and emptied
-
- Aug 25, 2020
-
-
Vladimír Čunát authored
-
Tomas Krizek authored
The trailing _t implies the type is a typedef like: typedef struct tls_ctx { ... } tls_ctx_t; But it is a plain struct - so remove it to avoid confusion.
-
Vladimír Čunát authored
-
It was rather confusing: - event.after(0, ...) executed function immediatelly - event.recurrent(0, ...) executed function immediatelly (seemingly worked) but stoped after the first execution, i.e. no recurrence took place.
-
- Aug 24, 2020
-
-
Tomas Krizek authored
config test improvements See merge request !1045
-
In theory there should be no background task but we need cleanup in case kresd gets into infinite loop or something like that.
-
- Aug 21, 2020
-
-
Vladimír Čunát authored
Fixes #596.
-
-
- Aug 18, 2020
-
-
Tomas Krizek authored
distro/tests: fix file permissions set by ansible See merge request !1044
-
- Aug 17, 2020
-
-
Tomas Krizek authored
Ansible switched default file perm to 600 from more permissive 666. Add file mode explicitly to avoid issues.
-
Petr Špaček authored
docs: clarify policy.ANSWER See merge request !1037
-
-
-
Petr Špaček authored
-
Petr Špaček authored
script to gather data from systemd journal See merge request !1040
-
- Aug 14, 2020
-
-
Tomas Krizek authored
-
-
- Aug 13, 2020
-
-
Štěpán Balážik authored
ci: check whether Deckard submodule commit is present on master See merge request !1038
-
Štěpán Balážik authored
This is to prevent issues like !1036
-
Petr Špaček authored
Fix RFC5011 rollover See merge request !1035
-
-
-
- Aug 12, 2020
-
-
Lukas Jezek authored
-
- Aug 11, 2020
-
-
Štěpán Balážik authored
ci: fix divergent commit in Deckard submodule See merge request !1036
-
Štěpán Balážik authored
Branch on Deckard tree tracked in this repository was left unmerged in Deckard. The two trees therefore diverged and broke CI in knot-resolver repo on a few commits retroactively.
-
- Aug 10, 2020
-
-
Petr Špaček authored
validator: new approach to missing RRSIG(s) Closes #390 See merge request !1020
-
Petr Špaček authored
-
- Aug 07, 2020
-
-
Petr Špaček authored
-
Petr Špaček authored
It is very useful when debugging. This code gets executed only with special DEBUG policy so we do not need to worry about maximum performance.
-
The line was being logged a bit prematurely when the validator isn't really going insecure yet. This solves (some of?) those cases.
-
Petr Špaček authored
The original approach was using SOA owner in negative answers to optimize number of DS queries. This approarch is less realiable with weird "servers", including pre-DNSSEC servers which reply to DS query with an SOA owner pointing to the child zone instead of parent zone. We now walk the tree from root down to find the missing DS or proof of its non-existance.
-
This is about situations when validator *thinks* it's in a signed zone but an unsigned answer comes in. The assumption was that RRSIGs didn't make it through some middle-boxes and it retried with explicit QTYPE=RRSIG. There were two issues with that. 1. It seems that in most cases the cause of the situation is that we skipped over a zone cut that transitioned to insecure state, so the signatures correctly don't exist. 2. An explicit RRSIG query appears to be more trouble than worth; it seems reasonable for servers not to answer it (fully); see RFC 8482 sect. 7. The new approach simply tries to find a proof that the name is insecure, by spawning a QTYPE=DS sub-query on that name. That fixes some real-life cases; usually this happens in iteration mode where one IP address serves zones on both sides of a cut that transitions to insecure. For details see new comments in that rrsig_not_found() function. The change resulted in the iterator fallback not making sense anymore so it was removed.
-
- Aug 06, 2020
-
-
Petr Špaček authored
cache: add number of entries to cache.stats() Closes #510 See merge request !1028
-
-
Petr Špaček authored
daemon/lua: get rid of __engine symbol in lua See merge request !1033
-
Vladimír Čunát authored
-