- Feb 25, 2019
-
-
Petr Špaček authored
-
- Feb 22, 2019
-
-
It's mainly about the way we parse and validate them. Almost all of the parts of validation that were being done in modules/policy/policy.lua and daemon/tls.c got moved to daemon/bindings/net.c, so it's easier to follow that. Also more checks are being done now, e.g. contents of .pin_sha256 and .hostname strings.
-
In https world it's standard to do that, and it's relied on. Real-life example: 8.8.8.8#853 over TLSv1.3 won't send a certificate if we don't send SNI (no idea why; also they do send it with TLSv1.2). As a consequence, we no longer allow multiple hostnames per address-port tuple, but that didn't seem useful.
-
- Feb 06, 2019
-
-
Vladimír Čunát authored
- logging - watch by default - in Fedora we need to depend on the version for lua 5.1
-
vcunat squashed this, rebased, etc.
-
- Dec 13, 2018
-
-
Not all actions are destructive, but it seems generally expected that if an earlier module or other code already transitioned the request into a FAIL or DONE state, we don't want to apply rules anymore. In particular, later rule actions would "overwrite" what previous actions did.
-
- Dec 04, 2018
-
-
Petr Špaček authored
-
- Dec 03, 2018
-
-
Vladimír Čunát authored
Continuation of the parent commit. In particular, kr_nsrep_set() can't be used to create NS list "with holes".
-
- Aug 14, 2018
-
-
Vladimír Čunát authored
-
- Jun 07, 2018
-
-
Grigorii Demidov authored
-
- Jun 06, 2018
-
-
daemon/tls: system CA's are used by default with TLS_FORWARD policy when ca_file parameter is omitted
-
- Jun 01, 2018
-
-
Fixes: #337
-
- Feb 15, 2018
- Jan 25, 2018
-
-
Petr Špaček authored
RFC 6303 section 3 explains that The SOA RR is needed to support negative caching [RFC2308] of name error responses and to point clients to the primary master for DNS dynamic updates. Now SOA RR owner name matches query name so it can be cached. Using zone name as owner would be more difficult so it is left for further optimizations. I've verified that nsupdate correctly determines that master name does not exist and stops update process.
-
Petr Špaček authored
-
Petr Špaček authored
I've removed couple layers of indirection to make it easier to follow. This should make it easier to extend the policy module.
-
- Jan 18, 2018
-
-
Petr Špaček authored
The pin parameter contains SHA-256 encoded using Base64, but this is not the only option. Explicit name allows us to add alternative formats later on, and is consistent with GnuTLS naming.
-
Petr Špaček authored
Policy handling was split into smaller functions to allow easier checking. The code needs further refactoring, it seems that net_tls_client is just a thin wrapper around tls_client_params_set in C, which is unnecessary and error prone.
-
Petr Špaček authored
-
- Jan 08, 2018
- Nov 24, 2017
-
-
Marek Vavruša authored
there are two modules that couldn't work before: * graphite * ketcd
-
- Aug 01, 2017
-
-
Vladimír Čunát authored
It was rather low-level anyway.
-
Vladimír Čunát authored
-
- Jul 20, 2017
-
-
Vitezslav Kriz authored
Library lua-aho-corasick is provided as git submodule. Library build is triggered with kresd build. ahocorasick.so is copied into modules directory.
-
- Jul 11, 2017
-
-
Vladimír Čunát authored
The RFC seems to read that resolvers should reply with address records even for foo.bar.localhost. Note: Unbound-1.6.4 does NOT do that. https://tools.ietf.org/html/rfc6761#section-6.3
-
Vladimír Čunát authored
-
Vladimír Čunát authored
In particular, try to make the locally-served zones valid, including SOA and NS in apex, empty non-terminal vs. NXDOMAIN, etc. I might've missed something, but it should certainly be closer to ideal.
-
- Jul 10, 2017
-
-
Vitezslav Kriz authored
-
- Jun 27, 2017
-
-
Vitezslav Kriz authored
According to RFC6761 query to localhost domain should generate immediate response with loopback ip address.
-
Vitezslav Kriz authored
-
Vitezslav Kriz authored
This allows to disable specific deny rules on zone-by-zone basis as it should be according to RFC6303 sec.3. Disable can be done by policy rule PASS. Also any FORWARD rule for such zone will be evaluated before DENY that query.
-
- Jun 01, 2017
-
-
-
Vladimír Čunát authored
Casting is dangerous, e.g. it's easy to misconfigure policy with policy.add(policy.FORWARD('some address')) which lead to segfault without showing any indication of the cause. Now this case will show as .../policy.lua:98: 'struct kr_query' has no member named 'current' and only abort the policy module instead of the whole process.
-
-