- Jul 26, 2017
-
-
Vladimír Čunát authored
Closes #154.
-
Vladimír Čunát authored
Fixes https://gitlab.labs.nic.cz/knot/knot-resolver/issues/154 I'm sorry I broke the module in 06b0d3d4. Thaks Vita!
-
Vladimír Čunát authored
... to allow NEWS update
-
Vladimír Čunát authored
The epoch indices are from [1..period].
-
- Jul 24, 2017
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
i.e. downgrade a zone to insecure when *all* DNSKEYs of the apex are unverifiable due to unimplemented DNSKEY or DS algorithms. Fixes https://gitlab.labs.nic.cz/knot/resolver/issues/210
-
Vladimír Čunát authored
-
Vladimír Čunát authored
Closes #204.
-
Vladimír Čunát authored
... to fix conflict in NEWS.
-
Vladimír Čunát authored
-
- Jul 17, 2017
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
Which semantically reverses part of fbe88ccd. I would personally prefer not to, but I guess it would be less consistent. Also make the error messages a little better.
-
Vladimír Čunát authored
Almost all of them were getting redirected correctly, but why keep the old ones. Also update a couple nitpicks directly around.
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
I broke this in 3da1535e when changing stuff around addr2reverse; now it should be OK, after partially reversing that commit. I'm sorry. Thanks to Vita for noticing the breakage.
-
Vladimír Čunát authored
-
Vladimír Čunát authored
At least it seems so...
-
- Jul 14, 2017
-
-
-
Vladimír Čunát authored
(so that NEWS can get updated)
-
Vladimír Čunát authored
In reverse (PTR) records, now the last definition wins, and non-canonical names don't get (shadowed) records.
-
- Jul 13, 2017
-
-
Vitezslav Kriz authored
* changed stype to type * fix enquening queries from predict log * keep heuristic in function generate to predict upcoming epoch
-
- Jul 12, 2017
-
-
Vladimír Čunát authored
... data from cache as keys for validation
-
Vladimír Čunát authored
... data from cache as keys for validation
-
Grigorii Demidov authored
-
- Jul 11, 2017
-
-
Vitezslav Kriz authored
Issue #127. Answer is mangled first and then copied to cache.
-
- Jul 07, 2017
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
Noticed after removal of its lua binding in commit 3be76db7.
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
Clearing the query flags lead to kresd iterating over authoritative servers. Related: https://gitlab.labs.nic.cz/knot/resolver/issues/217 Note that validation of synthesised AAAA behind a CNAME doesn't work when policy.FORWARD + dns64. Example: www.regiojet.cz. policy.STUB + dns64 seems not to work at all.
-
Vladimír Čunát authored
-
Vitezslav Kriz authored
If CNAME chain occurs CNAME is placed before AAAA.
-
- Jul 03, 2017
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
Maybe some coverity issues will get fixed, even though they had seemed not to be affecting our use cases in kresd. Tests+Deckard look OK and I've been using my system and kresd with system-wide 0.9.21 for some time already.
-
- Jun 30, 2017
-
-
Vladimír Čunát authored
Closes #125 and #208.
-
Vladimír Čunát authored
- sort the list instead of just picking the best one - prefer unknown RTTs to probe them - verbose output of the choice Fixes https://gitlab.labs.nic.cz/knot/resolver/issues/125 Fixes https://gitlab.labs.nic.cz/knot/resolver/issues/208
-