- Feb 07, 2022
-
-
Oto Šťáva authored
-
- Feb 04, 2022
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
We're a bit late with this ad-hoc rule; I think it was most useful when SHA256 support in DS algorithms wasn't wide-spread yet. (Note that DNSKEY algos have standardized no similar rule.) Usage of SHA1 as DS algorithm is highly discouraged, but even at this point it does *not* seem unsafe, in the sense of anyone publishing an attack that would come anywhere close to breaking *this* usage of SHA1.
-
- Jan 31, 2022
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
Fixes #80
-
Oto Šťáva authored
-
- Jan 13, 2022
-
-
Tomas Krizek authored
ci: various test updates See merge request !1243
-
Tomas Krizek authored
-
Tomas Krizek authored
Due to missing support on some of the regular runners, let's migrate these tests to our special LXC runners. This should hopefully make the results more reliable and stable. The downside is that we have to keep an additional image (and recipe) for LXC, since it' slightly different. However, it's probably worth it, since we'll likely migrate some other tests there in the future (for better stability).
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
-
- Jan 11, 2022
-
-
Tomas Krizek authored
policy docs: warn about filters and forwarding See merge request !1241
-
We've been notified about possibility of "cache poisoning" this way, so let's document this drawback to make the expectations clearer.
-
Tomas Krizek authored
hints docs: better explain shadowing by policies See merge request !1244
-
Tomas Krizek authored
doc: fix links to our mailing lists See merge request !1247
-
Their implementation was changed. Fortunately I was able to find the message in Google's cache and thus discover easily which one it is in the new archive.
-
Tomas Krizek authored
doh2: fix CORS by adding `access-control-allow-origin: *` See merge request !1246
-
- Jan 10, 2022
-
-
Vladimír Čunát authored
I didn't feel like adding it to every test, so I picked a mix. I confirmed this would fail before the parent commit.
-
Vladimír Čunát authored
For old doh we added this in commit a34aa1ee; with the new implementation we somehow forgot.
-
- Jan 05, 2022
-
-
Tomas Krizek authored
release 5.4.4 Closes #692 See merge request !1245
-
Tomas Krizek authored
# Conflicts: # NEWS
-
Tomas Krizek authored
-
- Dec 23, 2021
-
-
Vladimír Čunát authored
-
- Dec 22, 2021
-
-
Vladimír Čunát authored
The typical DNSSEC problems should happen already when trying to validate the DNSKEY set, so it's better to be more verbose there. In the end I gave up on deduplicating with log_bogus_rrsig() code, as it's different logging group, logging level, no kr_query, etc.
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
We can always easily add groups when needed.
-
Vladimír Čunát authored
The approach of the code was rather hacky, simulating some packets arriving from upstream and making the module stack CONSUME that. Instead we take a direct approach now: use the simplified validator API and then insert into cache directly. One effect is improved performance, and consequently roughly halving the lag which happens when prefill module invokes this. (With root zone the lag goes down to 0.1 s from over 0.2 s, on my relatively fast CPU. Fortunately it's just once a day.)
-
Vladimír Čunát authored
Closes #689
-
- Dec 21, 2021
-
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
The following actions will now be logged in debug level (or request tracing): ANSWER, DENY, DENY_MSG, DROP, REFUSE, TC This can be useful for RPZ and other policy debugging. Purposefully ommitted actions: PASS - since it's the same as normal processing REROUTE - the action itself comes from renumber module STUB,FORWARD,TLS_FORWARD - this could be more confusing than useful (e.g. when response comes from cache)