- Jun 15, 2017
-
-
(the port will soon be 1.3.0 also) Close https://github.com/CZ-NIC/knot-resolver/pull/43.
-
Petr Špaček authored
lua kres-gen: add a guide to re-generating See merge request !310
-
- Jun 14, 2017
-
-
Vladimír Čunát authored
-
- Jun 13, 2017
-
-
Vladimír Čunát authored
-
Ondřej Surý authored
Update the final date for 1.3.0 release See merge request !308
-
Ondřej Surý authored
-
Petr Špaček authored
iterate: be more precise when detecting CNAME loops See merge request !307
-
- Jun 12, 2017
-
-
Vladimír Čunát authored
Iterating over sibling sub-queries isn't precise enough, and in particular in forwarding mode it reported non-existing loops. Example ATM: www.dpo.cz - there forwarding spawns multiple sub-queries, and one of those is a CNAME to another of them. Due to them being siblings, the old code misdetected that as a CNAME loop. Now that we have these cname_parent pointers, we can do a precise detection.
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
- Jun 09, 2017
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
- This affects the iterating mode only (except for a verbose message). - The problem was introduced when implementing forwarding in 651c5aad. - Example that was affected: *.org.ru. When the same server is authoritative for multiple consecutive zones, with a higher one being signed and a lower one being unsigned, we may get an unsigned answer even in case we *think* we're currently in a signed zone. In particular, DS (sub-)queries are important because of being used to prove the insecurity of zones - in that case the iterator can correctly determine the (unexpected) zone name from which the answer came, due to seeing the SOA record, but that is too late for zone_cut_check() to try getting a trust chain to it, so we need to YIELD for it to do it.
-
- Jun 08, 2017
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
- Jun 07, 2017
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Grigorii Demidov authored
-
- Jun 05, 2017
-
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
Vladimír Čunát authored
Valid CNAME chains that ended in NODATA had AD flag set.
-
- Jun 01, 2017
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
-
-
-
-
-
-
-
Vladimír Čunát authored
This part of code is NOT reachable when forwarding, because ns.name is . (the root) and retry is true. kr_nsrep_elect* would ruin forwarding anyway, as they're written ATM.
-
-
-
-
-
-
Vladimír Čunát authored
Casting is dangerous, e.g. it's easy to misconfigure policy with policy.add(policy.FORWARD('some address')) which lead to segfault without showing any indication of the cause. Now this case will show as .../policy.lua:98: 'struct kr_query' has no member named 'current' and only abort the policy module instead of the whole process.
-
-
-