1047. [bug] When a request was refused due to being signed with
a TSIG key derived from an unsigned TKEY negotiation,
the response could have an rcode of SUCCESS rather
than REFUSED. [RT #1886]
+1047. [bug] When a request was refused due to being signed with
+ a TSIG key derived from an unsigned TKEY negotiation,
+ the response could have an rcode of SUCCESS rather
+ than REFUSED. [RT #1886]
+
1041. [bug] Dig/host/nslookup could catch an assertion failure
on SIGINT due to an uninitialized variable. [RT #1867]
* WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
-/* $Id: client.c,v 1.136.2.7 2001/09/19 02:46:55 marka Exp $ */
+/* $Id: client.c,v 1.136.2.8 2001/10/12 01:08:20 marka Exp $ */
#include <config.h>
ns_client_log(client, DNS_LOGCATEGORY_SECURITY,
NS_LOGMODULE_CLIENT, ISC_LOG_DEBUG(3),
"request is signed by a nonauthoritative key");
+ sigresult = DNS_R_REFUSED;
/*
* Accept update messages signed by unknown keys so that
* update forwarding works transparently through slaves