- 31 Oct, 2018 1 commit
-
-
Vladimír Čunát authored
It fired also when the name didn't contain the final dot.
-
- 04 Oct, 2018 1 commit
-
-
Vladimír Čunát authored
I believe that's what most users want; practical motivation: https://forum.turris.cz/t/kresd-responds-to-hints-with-nxdomain-for-aaaa-requests/8353
-
- 14 Sep, 2018 1 commit
-
-
Vladimír Čunát authored
When suspect SIGBUS happens, print helpful error and try to remove the cache, so that the service might work again if auto-restarted. Theoretically we could longjmp() out of the SIGBUS handler, but that would be rather messy, so let the process die.
-
- 17 Aug, 2018 4 commits
-
-
Tomas Krizek authored
-
Petr Špaček authored
-
Vladimír Čunát authored
We need to think about the API carefully.
-
Vladimír Čunát authored
- fix some edge cases and nitpicks - static storage -> stack (for temporaries of a few kilobytes) - sync docs, including caveats of the implementation
-
- 14 Aug, 2018 8 commits
-
-
Vladimír Čunát authored
i.e. those not managed via RFC 5011. The verbose log format is changed a bit, consequently.
-
Petr Špaček authored
Let's see if it helps against confusion with "Knot DNS" authoritative server or not.
-
Petr Špaček authored
-
Grigorii Demidov authored
-
Vladimír Čunát authored
I intentionally didn't mark the function names as code or similar, as changing formatting every other word seemed too visually distracting.
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
... thanks to new API in libknot-2.7. Apart from being simpler, it now rotates even uncached answers.
-
- 03 Aug, 2018 1 commit
-
-
Vladimír Čunát authored
The catch is that during configuration file processing, no cache is open (yet), as kresd can't know if the config does open it in some later part (with non-default path or size). Now we just throw an error. Exceptions: - cache.open() and cache.backends(), of course :-) - cache.ns_tout() - not required, it's not really inside cache - cache.close() - it sounds reasonable to allow "closing a closed cache" This immediately caught a typo in cache metatable.
-
- 02 Aug, 2018 1 commit
-
-
Tomas Krizek authored
(cherry picked from commit 54797e88)
-
- 31 Jul, 2018 1 commit
-
-
Petr Špaček authored
-
- 27 Jul, 2018 1 commit
-
-
Vladimír Čunát authored
-
- 24 Jul, 2018 1 commit
-
-
Vladimír Čunát authored
This should fix #385: possible floods with > scheduling rotation check in 0 ms
-
- 03 Jul, 2018 1 commit
-
-
Tomas Krizek authored
-
- 02 Jul, 2018 4 commits
-
-
Tomas Krizek authored
Starting multiple systemd units with a target is conceptually cleaner than using globbing expression. Related https://github.com/systemd/systemd/issues/9080
-
Grigorii Demidov authored
-
Petr Špaček authored
-
Vladimír Čunát authored
- don't synthesize if +CD - bound synthesized TTL by SOA's TTL - set AD flag if synthesizing from secure NODATA and A. - review the RFC for properties that the module is missing
-
- 29 Jun, 2018 1 commit
-
-
Vladimír Čunát authored
-
- 26 Jun, 2018 1 commit
-
-
Petr Špaček authored
Closes: #320
-
- 25 Jun, 2018 1 commit
-
-
Vladimír Čunát authored
Also minor fixes and speed enhancement (not measured).
-
- 21 Jun, 2018 1 commit
-
-
Marek Vavruša authored
The validation fails in current implementation when queried directly for the wildcard. In that case the count of the common labels with the NSEC record is the same, and not shorter by 1 (to accomodate wildcard expansion).
-
- 15 Jun, 2018 1 commit
-
-
Vladimír Čunát authored
-
- 13 Jun, 2018 1 commit
-
-
Vladimír Čunát authored
-
- 01 Jun, 2018 1 commit
-
-
Petr Špaček authored
Fixes: #337
-
- 16 May, 2018 2 commits
-
-
Vladimír Čunát authored
Thanks to @ spakka for discovering this and authoring an earlier version of this commit.
-
Vladimír Čunát authored
In case of referrals the authoritative server might add also another NS record(s), and this might lead to downgrading the corresponding zones. Regressed probably in f0da0a35 !505.
-
- 23 Apr, 2018 2 commits
-
-
Vladimír Čunát authored
- TLS errors were mentioned twice - the option mode wasn't changed, just a static function name
-
Tomas Krizek authored
-
- 12 Apr, 2018 1 commit
-
-
Marek Vavruša authored
The root DS exists outside of DNS hierarchy, so its NSEC proving non-existence always contains the SOA, as that's the root of DNS and there's nothing above it.
-
- 03 Apr, 2018 1 commit
-
-
Vladimír Čunát authored
Real example: cname.nohats.ca This case was handled for forwarding only, presumably because it happened more often (no need to be withing single zone to be within single answer); now the approach is the same.
-
- 28 Mar, 2018 1 commit
-
-
Tomas Krizek authored
-
- 19 Mar, 2018 1 commit
-
-
Vladimír Čunát authored
This is just annoying for development. You want -O0 or -Og, and consequently you get lots of warnings that are difficult to disable. I believe hardening options are more of a responsibility/choice of the caller, typically distributions have some general policies and pass the flags (almost) uniformly to all packages. I can't see any part of kresd being so specific to warrant explicit hardening.
-