- Mar 14, 2022
-
-
Vladimír Čunát authored
We're still run into people who thought that the example config is a suitable default. Example where it caused practical issues: https://lists.nic.cz/hyperkitty/list/knot-resolver-users@lists.nic.cz/thread/WQDJJ3LLEIZ5U3VVSCITW6DZPICW4L7U/
-
Vladimír Čunát authored
-
- Feb 28, 2022
-
-
Vladimír Čunát authored
The main thing is the "failed to open socket" message. But let's also elevate other fatal one-off logs to ERROR level.
-
Vladimír Čunát authored
Usually in configuration the module is loaded in a separate command from passing configuration to it. For dnstap this loading would immediately lead to opening the default socket path, even if the configuration actually specifies (a different) path later. Users can still force using the default by passing an empty table: `dnstap.config({})` or `modules = { dnstap = {}}` (though I doubt the utility of the default /tmp/dnstap.sock anyway)
-
- Jan 13, 2022
-
-
Tomas Krizek authored
-
- Jan 11, 2022
- Dec 22, 2021
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
The approach of the code was rather hacky, simulating some packets arriving from upstream and making the module stack CONSUME that. Instead we take a direct approach now: use the simplified validator API and then insert into cache directly. One effect is improved performance, and consequently roughly halving the lag which happens when prefill module invokes this. (With root zone the lag goes down to 0.1 s from over 0.2 s, on my relatively fast CPU. Fortunately it's just once a day.)
-
- Dec 21, 2021
-
-
Tomas Krizek authored
-
Tomas Krizek authored
The following actions will now be logged in debug level (or request tracing): ANSWER, DENY, DENY_MSG, DROP, REFUSE, TC This can be useful for RPZ and other policy debugging. Purposefully ommitted actions: PASS - since it's the same as normal processing REROUTE - the action itself comes from renumber module STUB,FORWARD,TLS_FORWARD - this could be more confusing than useful (e.g. when response comes from cache)
-
Tomas Krizek authored
To allow for easier debugging, each origin of an extended DNS error has a unique 4-byte identifier that is included in the extra_text message. The identifiers are random 4-letter base32 strings, generated with: base32 /dev/random | head -c 4
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
- Dec 20, 2021
-
-
Oto Šťáva authored
-
- Nov 25, 2021
-
-
Tomas Krizek authored
-
- Nov 24, 2021
-
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
Unspecified mask is already returned as full bitlen by kr_straddr_subnet().
-
- Nov 23, 2021
-
-
Answers to EDNS requests from certain lua policies that use the answer_clear() function would lack OPT RR and thus violate the MUST condition in RFC6891.6.1.1.
-
Tomas Krizek authored
-
Tomas Krizek authored
On some platforms in CI, even 8s doesn't seem sufficient enough to guarantee stability. Hopefully this improves the situation.
-
- Nov 19, 2021
-
-
Oto Šťáva authored
-
Overriding records makes more sense on a particular name than in a whole sub-tree.
-
Oto Šťáva authored
-
Oto Šťáva authored
-
Oto Šťáva authored
-
Oto Šťáva authored
-
Oto Šťáva authored
-
Due to the typo in the EDNS keepalive init funcion name, the module wouldn't be properly initialized after loading and wouldn't be functional. Signed-off-by:
Josh Soref <jsoref@users.noreply.github.com>
-
Signed-off-by:
Josh Soref <jsoref@users.noreply.github.com>
-
- Nov 08, 2021
-
-
Tomas Krizek authored
-
- Nov 03, 2021
-
-
Previously we primed for A/AAAA addresses of root servers even when the respective IP version was disabled from configuration.
-