Commits on Source (75)
-
Daniel Salzman authorede699fea1
-
Daniel Salzman authoredef2ab2a8
-
9849ef23
-
Daniel Salzman authoredeef93d3c
-
Daniel Salzman authoredbac486d4
-
Ondřej Surý authored6435b0fd
-
Ondřej Surý authoredb8f8784c
-
Daniel Salzman authoredf86ec769
-
Daniel Salzman authoredc533e77a
-
4c7c1a44
-
Daniel Salzman authoredcc855eca
-
Daniel Salzman authoreda97521f5
-
Daniel Salzman authored1f776b6a
-
Daniel Salzman authored1c5fbdb2
-
Daniel Salzman authoredc6fc1f09
-
Daniel Salzman authoredd3d13d90
-
bc1dfe8c
-
Previously, the too-long-check for synthetized cname was only regarding number of labels, but not overall length.
c56da61c -
950a3271
-
287c83e2
-
Daniel Salzman authoreddf4b78fb
-
ddd47f31
-
6792f80e
-
...to display either real Knot running version, numbers of workers, or configure options
fd5acc3e -
Daniel Salzman authored760ad715
-
9b070a5e
-
instead of hard-changing msgID in packet wire, which breaks msgID for the response, we just set the original msgID when computing the tsig hash to check against
5d53f990 -
Daniel Salzman authored79583faf
-
Daniel Salzman authored6701a9b8
-
Daniel Salzman authored447ae975
-
dfde5335
-
157d3794
-
2473ba81
-
80a3588b
-
fb60ac8e
-
5383d6ce
-
Daniel Salzman authoredbb9c56a6
-
Daniel Salzman authoredac561b6e
-
Daniel Salzman authored9ba4d4bf
-
At NDSS 2017's DNS privacy workshop, I presented an empirical study of DNS padding policies: https://www.internetsociety.org/events/ndss-symposium/ndss-symposium-2017/dns-privacy-workshop-2017-programme#session3 The slide deck is here: https://dns.cmrg.net/ndss2017-dprive-empirical-DNS-traffic-size.pdf The resulting recommendation from the research is that a simple padding policy is relatively cheap and still protective of metadata when DNS traffic is encrypted: * queries should be padded to a multiple of 128 octets * responses should be padded to a multiple of 468 octets Since future research could propose even better policies, and future DNS traffic characteristics might evolve, I've implemented this recommendation as a new function in libknot: knot_edns_default_padding_size() This changeset also modifies kdig to use this padding policy by default when doing queries over TLS, and defines +padding (with no argument) as a kdig option that forces the use of the default padding policy. With this changeset, any libknot user who wants to use "a sensible DNS padding policy" can just rely on the library; this means that if a better padding policy is determined in the future, it can be distributed to all users by upgrading libknot.
9e0346b7 -
Libor Peltan authored5348d930
-
Libor Peltan authored01e21004
-
Libor Peltan authored90149fbb
-
Libor Peltan authoreda4cdeb87
-
Libor Peltan authored
...because the merged changes had been pushed to insert queue and inserted after drop_journal!!
46cdb5d2 -
3dd88d61
-
b5fd1a61
-
5c8493f5
-
2c1b0e2b
-
Daniel Salzman authored57ea1fa3
-
Ondřej Surý authored157a934b
-
46e982f8
-
Daniel Salzman authored
Thanks to Mark Warren!
6a06b9b2 -
by removing test.stop(), because it is called from test.server_remove() and the check if servers running in server.listening() takes 20+secs if already stopped
d906a061 -
Daniel Salzman authored428d236a
-
Daniel Salzman authored09db214b
-
4eed42bb
-
8c65eb19
-
a326b9f5
-
3f087ad0
-
6af4199f
-
Daniel Salzman authored84028313
-
Ondřej Surý authored3daa32d0
-
Daniel Salzman authored
Remove excessive tags from job definitions See merge request !713
a98c3444 -
Ondřej Surý authoreddd60d222
-
Daniel Salzman authored
Stop leaking embedded lmdb include path to libknot.pc (closes #517) See merge request !714
34eae16a -
Daniel Salzman authored2d20fdfe
-
Daniel Salzman authored
When the signature validity period check returned KNOT_TSIG_EBADTIME, the itself signature validity check was omitted and the response TSIG contained a non-empty signature, based on the unverified data. Thanks to Synacktiv!
3dfbb674 -
07e6af6c
-
53f90344
-
dff3063f
-
f5b43322
-
7d196e21
-
72844f29
-
Daniel Salzman authoreda018f99f
Showing
- .gitlab-ci.yml 10 additions, 11 deletions.gitlab-ci.yml
- NEWS 87 additions, 0 deletionsNEWS
- configure.ac 40 additions, 22 deletionsconfigure.ac
- doc/man/kdig.1in 7 additions, 3 deletionsdoc/man/kdig.1in
- doc/man/knot.conf.5in 25 additions, 0 deletionsdoc/man/knot.conf.5in
- doc/man/knotc.8in 5 additions, 1 deletiondoc/man/knotc.8in
- doc/man/knsupdate.1in 1 addition, 1 deletiondoc/man/knsupdate.1in
- doc/man_kdig.rst 7 additions, 3 deletionsdoc/man_kdig.rst
- doc/man_knotc.rst 5 additions, 1 deletiondoc/man_knotc.rst
- doc/man_knsupdate.rst 1 addition, 1 deletiondoc/man_knsupdate.rst
- doc/reference.rst 22 additions, 0 deletionsdoc/reference.rst
- python/libknot/control.py 1 addition, 1 deletionpython/libknot/control.py
- src/contrib/ucw/lists.c 14 additions, 0 deletionssrc/contrib/ucw/lists.c
- src/contrib/ucw/lists.h 1 addition, 0 deletionssrc/contrib/ucw/lists.h
- src/knot/common/stats.c 35 additions, 20 deletionssrc/knot/common/stats.c
- src/knot/conf/base.c 1 addition, 1 deletionsrc/knot/conf/base.c
- src/knot/conf/confio.c 33 additions, 25 deletionssrc/knot/conf/confio.c
- src/knot/conf/scheme.c 8 additions, 0 deletionssrc/knot/conf/scheme.c
- src/knot/conf/scheme.h 1 addition, 0 deletionssrc/knot/conf/scheme.h
- src/knot/conf/tools.c 1 addition, 0 deletionssrc/knot/conf/tools.c