]> git.ipfire.org Git - thirdparty/knot-resolver.git/log
thirdparty/knot-resolver.git
8 years agopktcache: put more info into --verbose messages
Vladimír Čunát [Mon, 10 Apr 2017 17:21:37 +0000 (19:21 +0200)] 
pktcache: put more info into --verbose messages

8 years agoiterator: improve get_initial_rank
Vladimír Čunát [Mon, 10 Apr 2017 13:32:15 +0000 (15:32 +0200)] 
iterator: improve get_initial_rank

If a server puts NS into the authority section that refers to itself,
accept it as autoritative and validate it (if applicable).  This fixes
the val_nsec3_cnametocnamewctoposwc test, as unvalidated NS in the
final answer would prevent adding the AD flag.  The iter_pcname test is
broken by this, but the team's consensus is to prefer this solution.

Nitpicks: cleaner style in the function, and don't force inlining anymore.
(It's no longer a trivial function and compilers should be good at
determining whether to inline static functions or not.)

8 years agorrcache: put more info into --verbose messages
Vladimír Čunát [Mon, 10 Apr 2017 11:14:05 +0000 (13:14 +0200)] 
rrcache: put more info into --verbose messages

Especially when stashing into the cache, it was unclear which RRset
was being referred to.  Let's add type and owner name.

8 years agoAD flag: the ranks from cache should be safe now
Vladimír Čunát [Fri, 7 Apr 2017 16:23:11 +0000 (18:23 +0200)] 
AD flag: the ranks from cache should be safe now

8 years agomove a decision from validator to iterator
Vladimír Čunát [Fri, 7 Apr 2017 13:56:25 +0000 (15:56 +0200)] 
move a decision from validator to iterator

NS records from AUTHORITY aren't validated.  The iterator seems a
better place, as that's where delegations are handled, etc.

8 years agovalidate: fix bad usage of KR_RANK_INSECURE
Vladimír Čunát [Fri, 7 Apr 2017 13:41:41 +0000 (15:41 +0200)] 
validate: fix bad usage of KR_RANK_INSECURE

It's supposed to mean that we have a proof from configured TAs that
the RR isn't secure (typically proof of missing DS at some point).
This case was just failure to find a fitting RRSIG; new KR_RANK_MISSING
is introduced for that purpose, for simplicity.

Also, make the validator more thorough about what ranks are safe to skip.

8 years agorrcache verbose: print rank information
Vladimír Čunát [Fri, 7 Apr 2017 13:40:50 +0000 (15:40 +0200)] 
rrcache verbose: print rank information

8 years agoiterator: don't retry if REFUSED
Vladimír Čunát [Fri, 7 Apr 2017 12:05:41 +0000 (14:05 +0200)] 
iterator: don't retry if REFUSED

It's unlikely to be a temporary condition, unless the reply was spoofed
or something.  Fixes val_cname_to_unsigned_fake_rrsig test.

(cherry picked from commit bc2a26702e6460aee65fe170671336d670ba3eb9)

8 years agorrcache, pktcache: check security only if under a TA
Vladimír Čunát [Fri, 7 Apr 2017 10:42:01 +0000 (12:42 +0200)] 
rrcache, pktcache: check security only if under a TA

Tests: iter_minmaxttl and iter_soamin get fixed, probably because
they're without a root TA but have some lower TA(s).

8 years agokr_ta_covers_qry: add this wrapper function
Vladimír Čunát [Fri, 7 Apr 2017 10:34:46 +0000 (12:34 +0200)] 
kr_ta_covers_qry: add this wrapper function

8 years agokr_rank: improve the API to manipulate ranks
Vladimír Čunát [Fri, 7 Apr 2017 08:43:08 +0000 (10:43 +0200)] 
kr_rank: improve the API to manipulate ranks

_SECURE and _INSECURE weren't real flags, as their setting was
logically exclusive of the "values".  That made changing ranks rather
cumbersome.

Tests: val_cname_to_unsigned_fake_rrsig gets broken, but I hope this
change just uncovered a hidden bug.

8 years agoutils: fix KEY_* defines
Vladimír Čunát [Thu, 6 Apr 2017 15:44:36 +0000 (17:44 +0200)] 
utils: fix KEY_* defines

The argument to KEY_FLAG_RANK was (signed) char*, so for secure rank
the shift was setting the highest two bits (which are unused).
Let me end that rubbish.

8 years agolayer/validate: mark all selected records as insecure is case of insecured query...
Grigorii Demidov [Thu, 6 Apr 2017 12:09:47 +0000 (14:09 +0200)] 
layer/validate: mark all selected records as insecure is case of insecured query detection

8 years agoextend NONAUTH even to non-validated records
Vladimír Čunát [Wed, 5 Apr 2017 16:41:16 +0000 (18:41 +0200)] 
extend NONAUTH even to non-validated records

Also rename NOAUTH->NONAUTH.

8 years agoOK to use non-authoritative sources for NS addresses
Vladimír Čunát [Wed, 5 Apr 2017 16:03:50 +0000 (18:03 +0200)] 
OK to use non-authoritative sources for NS addresses

... *if* we only want to ask the NSs, i.e. not to be put into answer.
This fixes iter_cname_cache test.

8 years agodon't attempt to reuse cached nonvalidated records
Vladimír Čunát [Wed, 5 Apr 2017 11:33:15 +0000 (13:33 +0200)] 
don't attempt to reuse cached nonvalidated records

at least for now (for queries without +cd).
It wasn't complete, and it turned out to need more changes,
and the benefits would be rather limited.

8 years agokr_rank: use functions to manipulate the non-flag part
Vladimír Čunát [Wed, 5 Apr 2017 09:05:12 +0000 (11:05 +0200)] 
kr_rank: use functions to manipulate the non-flag part

Also fix a related bug in pktcache.

8 years agorrcache: harden against spoofing, again
Vladimír Čunát [Tue, 4 Apr 2017 11:54:55 +0000 (13:54 +0200)] 
rrcache: harden against spoofing, again

This fixes the iter_ns_spoof test.

8 years agoMerge branch 'master' into ad-refactor
Vladimír Čunát [Tue, 4 Apr 2017 09:51:47 +0000 (11:51 +0200)] 
Merge branch 'master' into ad-refactor

8 years agoMerge !251: improve referral detection and process_answer
Vladimír Čunát [Tue, 4 Apr 2017 09:08:06 +0000 (11:08 +0200)] 
Merge !251: improve referral detection and process_answer

8 years agolayer/iterate: name comparison has been missed; comment
Grigorii Demidov [Tue, 4 Apr 2017 09:02:44 +0000 (11:02 +0200)] 
layer/iterate:  name comparison has been missed; comment

8 years agolayer/iterate: During packet classification (answer\referral) don't analyze AUTHORITY...
Grigorii Demidov [Tue, 4 Apr 2017 08:10:12 +0000 (10:10 +0200)] 
layer/iterate: During packet classification (answer\referral) don't analyze AUTHORITY section in authoritative answer if ANSWER section contains records which have been requested.

8 years agocache: bump cache version
Vladimír Čunát [Mon, 3 Apr 2017 15:57:20 +0000 (17:57 +0200)] 
cache: bump cache version

The ranks stored within are changing their meaning.

8 years agoiterate: improve get_initial_rank
Vladimír Čunát [Mon, 3 Apr 2017 13:05:16 +0000 (15:05 +0200)] 
iterate: improve get_initial_rank

This fixes tests for hints, in particular.

8 years agorrcache, pktcache: better explain passing of ranks
Vladimír Čunát [Mon, 3 Apr 2017 12:07:22 +0000 (14:07 +0200)] 
rrcache, pktcache: better explain passing of ranks

8 years agolayer/validate: fix broken rank_test_flag()
Grigorii Demidov [Mon, 3 Apr 2017 11:57:37 +0000 (13:57 +0200)] 
layer/validate: fix broken rank_test_flag()

8 years agorrcache: fix code that was missed by mistake
Vladimír Čunát [Mon, 3 Apr 2017 11:50:39 +0000 (13:50 +0200)] 
rrcache: fix code that was missed by mistake

8 years agolayer/iterate: treat rrset->additional as pointer to uint8_t instead of uintptr_t
Grigorii Demidov [Mon, 3 Apr 2017 11:19:15 +0000 (13:19 +0200)] 
layer/iterate: treat rrset->additional as pointer to uint8_t instead of uintptr_t

8 years agolayer/{iterate,validate}: adapt to new rank style
Grigorii Demidov [Mon, 3 Apr 2017 11:03:22 +0000 (13:03 +0200)] 
layer/{iterate,validate}: adapt to new rank style

8 years agozonecut.c: restrict ranks when fetching TA+key for cut
Vladimír Čunát [Mon, 3 Apr 2017 10:11:29 +0000 (12:11 +0200)] 
zonecut.c: restrict ranks when fetching TA+key for cut

This is mainly to avoid bad entries, e.g. cached for +cd.

8 years agozonecut.c: remove indirection that didn't seem useful
Vladimír Čunát [Mon, 3 Apr 2017 09:50:43 +0000 (11:50 +0200)] 
zonecut.c: remove indirection that didn't seem useful

8 years agopktcache: also send ranks in the additional field
Vladimír Čunát [Mon, 3 Apr 2017 09:13:45 +0000 (11:13 +0200)] 
pktcache: also send ranks in the additional field

It will be better to have a more consistent interface with rrcache.

8 years agopktcache: adapt to the new rank style
Vladimír Čunát [Fri, 31 Mar 2017 16:36:11 +0000 (18:36 +0200)] 
pktcache: adapt to the new rank style

TODO: check CD in the iterator if CACHED.

8 years agolib/{resolve,zonecut}: review & fix RANK ocurrences
Vladimír Čunát [Fri, 31 Mar 2017 16:21:29 +0000 (18:21 +0200)] 
lib/{resolve,zonecut}: review & fix RANK ocurrences

8 years agorrcache: adapt stashing to the new rank style
Vladimír Čunát [Fri, 31 Mar 2017 16:15:38 +0000 (18:15 +0200)] 
rrcache: adapt stashing to the new rank style

Note that the stash_ds call wasn't useful anymore, as it was only
re-stashing DS that were already stashed anyway (from auth_selected).

8 years agoMerge: util: add kr_rrset_type_maysig(knot_rrset_t *)
Vladimír Čunát [Fri, 31 Mar 2017 15:48:24 +0000 (17:48 +0200)] 
Merge: util: add kr_rrset_type_maysig(knot_rrset_t *)

8 years agoutil: add kr_rrset_type_maysig(knot_rrset_t *)
Vladimír Čunát [Fri, 31 Mar 2017 15:46:56 +0000 (17:46 +0200)] 
util: add kr_rrset_type_maysig(knot_rrset_t *)

Also correct a tiny bug where iterator didn't skip RRSIGs that covered
non-interesting types of the name we desired.

8 years agorrcache: adapt looting to the new rank style
Vladimír Čunát [Fri, 31 Mar 2017 14:54:43 +0000 (16:54 +0200)] 
rrcache: adapt looting to the new rank style

8 years agoMerge rrcache changes into ad-refactor
Vladimír Čunát [Fri, 31 Mar 2017 14:30:30 +0000 (16:30 +0200)] 
Merge rrcache changes into ad-refactor

8 years agorrcache: avoid knot_pkt_put
Vladimír Čunát [Fri, 31 Mar 2017 14:18:56 +0000 (16:18 +0200)] 
rrcache: avoid knot_pkt_put

Constructing the wire format in rrcache was useless and it took 2-4 %
of time in the resperf profile.  Let's also pass the rank (used soon).

8 years agoMerge branch 'master' into ad-refactor
Vladimír Čunát [Fri, 31 Mar 2017 11:02:23 +0000 (13:02 +0200)] 
Merge branch 'master' into ad-refactor

8 years agoMerge !250: lib/nsrep: fix ip6 cycle
Vladimír Čunát [Fri, 31 Mar 2017 10:47:02 +0000 (12:47 +0200)] 
Merge !250: lib/nsrep: fix ip6 cycle

kresd doesn't try all NS during resolving www.fastly.com when operates
in ipv6-only network.  This fix changes reputation cache behavior
in order to avoid NS address resolving retry in the case the first
attempt is failed both for ip4 & ip6.

8 years agolib/nsrep: don't treat servers with NOIP4 + NOIP6 flags as timeouted
Grigorii Demidov [Thu, 30 Mar 2017 11:38:40 +0000 (13:38 +0200)] 
lib/nsrep: don't treat servers with NOIP4 + NOIP6 flags as timeouted

8 years agoWIP: drafting rank refactoring
Vladimír Čunát [Wed, 29 Mar 2017 14:24:01 +0000 (16:24 +0200)] 
WIP: drafting rank refactoring

8 years agoMerge !240: trust anchors: support non-root TAs, one domain per file
Vladimír Čunát [Wed, 29 Mar 2017 11:16:10 +0000 (13:16 +0200)] 
Merge !240: trust anchors: support non-root TAs, one domain per file

8 years agouse a different mechanism for AD flag
Vladimír Čunát [Fri, 3 Mar 2017 10:56:19 +0000 (11:56 +0100)] 
use a different mechanism for AD flag

To make this work, do not use KR_VLDRANK_SECURE as the default value.
It's just too dangerous, and here it complicated determining the
appropriate value for the AD flag.

8 years agoMerge !241: policy.DENY: set AA flag and clear AD flag
Vladimír Čunát [Mon, 27 Mar 2017 12:43:32 +0000 (14:43 +0200)] 
Merge !241: policy.DENY: set AA flag and clear AD flag

8 years agoMerge branch 'mode-examples' into 'master'
Petr Špaček [Mon, 27 Mar 2017 12:38:05 +0000 (14:38 +0200)] 
Merge branch 'mode-examples' into 'master'

config docs: add examples to mode()

See merge request !245

8 years agoMerge branch 'master' and update deckard
Vladimír Čunát [Mon, 27 Mar 2017 12:23:09 +0000 (14:23 +0200)] 
Merge branch 'master' and update deckard

We need this to fix the tests.

8 years agoresolve answer_finalize(): check knot_pkt_put errors
Vladimír Čunát [Fri, 3 Mar 2017 09:14:55 +0000 (10:14 +0100)] 
resolve answer_finalize(): check knot_pkt_put errors

8 years agoconfig docs: add examples to mode()
Vladimír Čunát [Fri, 24 Mar 2017 10:42:30 +0000 (11:42 +0100)] 
config docs: add examples to mode()

Improved by comments from Petr.

8 years agoMerge branch 'better-help-text' into 'master'
Ondřej Surý [Sun, 26 Mar 2017 18:22:23 +0000 (20:22 +0200)] 
Merge branch 'better-help-text' into 'master'

Auto-generate numeric limits and defaults in help text.

See merge request !248

8 years agoAuto-generate numeric limits and defaults in help text.
Daniel Kahn Gillmor [Sun, 26 Mar 2017 15:28:31 +0000 (10:28 -0500)] 
Auto-generate numeric limits and defaults in help text.

8 years agoMerge branch 'better-padding-default' into 'master'
Ondřej Surý [Sun, 26 Mar 2017 18:19:44 +0000 (20:19 +0200)] 
Merge branch 'better-padding-default' into 'master'

Improve default padding of responses.

See merge request !247

8 years agoImprove default padding of responses.
Daniel Kahn Gillmor [Sat, 25 Mar 2017 22:00:53 +0000 (17:00 -0500)] 
Improve default padding of responses.

At NDSS 2017's DNS privacy workshop, I presented an empirical study of
DNS padding policies:

https://www.internetsociety.org/events/ndss-symposium/ndss-symposium-2017/dns-privacy-workshop-2017-programme#session3

The slide deck is here:
https://dns.cmrg.net/ndss2017-dprive-empirical-DNS-traffic-size.pdf

The resulting recommendation from the research is that a simple
padding policy is relatively cheap and still protective of metadata
when DNS traffic is encrypted:

 * queries should be padded to a multiple of 128 octets
 * responses should be padded to a multiple of 468 octets

This change adjusts the default policy to match these recommendations.

I recently proposed a similar change to libknot to define a standard
policy in a centralized place:

https://gitlab.labs.nic.cz/labs/knot/merge_requests/692

I'll submit a followup request to make use of that centralized policy
(once kresd is willing to depend on a newer version of libknot), but
please consider this proposed change first.

8 years agoMerge branch !246: lib/resolve: avoid unnecessary DS queries
Vladimír Čunát [Fri, 24 Mar 2017 14:16:33 +0000 (15:16 +0100)] 
Merge branch !246: lib/resolve: avoid unnecessary DS queries

8 years agoMerge !244: dnssec/nsec: validate wildcard no-data answers
Vladimír Čunát [Fri, 24 Mar 2017 13:38:22 +0000 (14:38 +0100)] 
Merge !244: dnssec/nsec: validate wildcard no-data answers

8 years agoMerge !243: don't set AD flag for opt-out wildcard answers
Vladimír Čunát [Fri, 24 Mar 2017 12:23:48 +0000 (13:23 +0100)] 
Merge !243: don't set AD flag for opt-out wildcard answers

8 years agolib/resolve: avoid unnecessary DS queries
Grigorii Demidov [Fri, 24 Mar 2017 11:51:36 +0000 (12:51 +0100)] 
lib/resolve: avoid unnecessary DS queries

8 years agodnssec/nsec: missed wildcard no-data answers validation has been implemented
Grigorii Demidov [Thu, 23 Mar 2017 13:42:12 +0000 (14:42 +0100)] 
dnssec/nsec: missed wildcard no-data answers validation has been implemented

8 years agotest/deckard: update to actual version
Grigorii Demidov [Wed, 22 Mar 2017 13:37:36 +0000 (14:37 +0100)] 
test/deckard: update to actual version

8 years agoMerge !242: kr_bitcmp: shut up a warning
Vladimír Čunát [Wed, 22 Mar 2017 12:20:47 +0000 (13:20 +0100)] 
Merge !242: kr_bitcmp: shut up a warning

8 years agolayer/validate: check if NSEC3 records in wildcard expansion proof has an optout
Grigorii Demidov [Wed, 22 Mar 2017 12:18:06 +0000 (13:18 +0100)] 
layer/validate: check if NSEC3 records in wildcard expansion proof has an optout

8 years agokr_bitcmp: shut up a warning
Vladimír Čunát [Wed, 22 Mar 2017 12:15:30 +0000 (13:15 +0100)] 
kr_bitcmp: shut up a warning

8 years agoMerge !239: check if iterator has not selected any records
Vladimír Čunát [Wed, 22 Mar 2017 10:13:28 +0000 (11:13 +0100)] 
Merge !239: check if iterator has not selected any records

8 years agolayer/iterate: nitpick - better variable name
Grigorii Demidov [Wed, 22 Mar 2017 08:50:19 +0000 (09:50 +0100)] 
layer/iterate: nitpick - better variable name

8 years agopolicy.DENY: set AA flag and clear AD flag
Vladimír Čunát [Tue, 21 Mar 2017 16:35:58 +0000 (17:35 +0100)] 
policy.DENY: set AA flag and clear AD flag

I see no sane way to set the flags from lua, so I made a C function.

8 years agolua bindings: regenerate query flags
Vladimír Čunát [Tue, 21 Mar 2017 16:35:14 +0000 (17:35 +0100)] 
lua bindings: regenerate query flags

8 years agoMerge !234: kr_bitcmp: adjust semantics -> memcmp
Vladimír Čunát [Tue, 21 Mar 2017 14:57:41 +0000 (15:57 +0100)] 
Merge !234: kr_bitcmp: adjust semantics -> memcmp

8 years agoview docs: add example matching all addresses
Vladimír Čunát [Fri, 17 Mar 2017 12:03:55 +0000 (13:03 +0100)] 
view docs: add example matching all addresses

This started working since the grandparent commit.  Suggested at
https://gitter.im/CZ-NIC/knot-resolver?at=58ca5a03f7f7d48104212607

8 years agokr_bitcmp: add meaning to NULL inputs
Vladimír Čunát [Fri, 17 Mar 2017 11:51:42 +0000 (12:51 +0100)] 
kr_bitcmp: add meaning to NULL inputs

Reasoning: we currently only use the function from lua modules and nil
values are very common there; I want to pick these changes to a bugfix
update without extensive checking whether the modules might pass
invalid input if user passes invalid config and thus introduce new
crashes.  The checks also seem cheap performance-wise.

8 years agokr_bitcmp: adjust semantics -> memcmp
Vladimír Čunát [Wed, 15 Mar 2017 13:55:39 +0000 (14:55 +0100)] 
kr_bitcmp: adjust semantics -> memcmp

Motivation: allow bits=0 and consequently 0.0.0.0/0 matches in view
and renumber modules.
https://gitter.im/CZ-NIC/knot-resolver?at=58c940c721d548df2cdfda5e

We shouldn't mix up error codes with valid results from memcmp;
let's just segfault if someone passes a NULL, just as memcmp() itself.

8 years agolayer/validate: better debug message
Grigorii Demidov [Tue, 21 Mar 2017 13:21:37 +0000 (14:21 +0100)] 
layer/validate: better debug message

8 years agotrust anchors: support non-root TAs, one domain per file
Vladimír Čunát [Fri, 17 Mar 2017 12:33:54 +0000 (13:33 +0100)] 
trust anchors: support non-root TAs, one domain per file

function `add_file` is added as an alias to `config`,
but otherwise the interface is almost identical.

8 years agotrust anchors: just move the code around
Vladimír Čunát [Fri, 17 Mar 2017 10:40:32 +0000 (11:40 +0100)] 
trust anchors: just move the code around

- update() had nothing to do in the public interface
- config() implementation moved out of the definition of the main table

8 years agoresolve.c trust_chain_check: fix nested trust anchors
Vladimír Čunát [Mon, 20 Mar 2017 18:14:03 +0000 (19:14 +0100)] 
resolve.c trust_chain_check: fix nested trust anchors

We have to update the RR with the TA even when transitioning from one
(positive) TA to another, e.g. if one adds both root and non-root TA(s).

8 years agoMerge !233: trust anchors: store in prettier format
Vladimír Čunát [Tue, 21 Mar 2017 12:06:45 +0000 (13:06 +0100)] 
Merge !233: trust anchors: store in prettier format

Closes #167.

8 years agoMerge !236: worker_resolve: truly honor the options parameter
Vladimír Čunát [Tue, 21 Mar 2017 12:05:20 +0000 (13:05 +0100)] 
Merge !236: worker_resolve: truly honor the options parameter

8 years agolayer/iterate: imprevements in unhelpfull referral processing
Grigorii Demidov [Tue, 21 Mar 2017 11:48:07 +0000 (12:48 +0100)] 
layer/iterate: imprevements in unhelpfull referral processing

8 years agolayer/validate: check if iterator has not selected any records for validating from...
Grigorii Demidov [Tue, 21 Mar 2017 10:22:13 +0000 (11:22 +0100)] 
layer/validate: check if iterator has not selected any records for validating from non-empty authoritative answer

8 years agoMerge !237: layer/validate: clear AD with optout NSEC3
Vladimír Čunát [Mon, 20 Mar 2017 11:50:29 +0000 (12:50 +0100)] 
Merge !237: layer/validate: clear AD with optout NSEC3

Fixes #169.

8 years agolayer/validate: clear AD if closest encloser proof has optouted NSEC3
Grigorii Demidov [Fri, 17 Mar 2017 08:20:17 +0000 (09:20 +0100)] 
layer/validate: clear AD if closest encloser proof has optouted NSEC3

8 years agoMerge !238: fix logging of glue addresses
Vladimír Čunát [Mon, 20 Mar 2017 08:34:22 +0000 (09:34 +0100)] 
Merge !238: fix logging of glue addresses

8 years agolayer/iterate: fix logging of glue addresses
Petr Špaček [Sun, 19 Mar 2017 10:39:08 +0000 (11:39 +0100)] 
layer/iterate: fix logging of glue addresses

Previously even loopback glue addresses were logged using message
'<= using glue ...' which was very confusing. From now the loopback
addresses are logged using '<= ignoring invalid glue ...'.

Logging was moved into the function update_nsaddr() to avoid changing
return codes. As far as I can tell it does not produce any confusing
messages.

8 years agoCI: always use commited Deckard version
Petr Špaček [Fri, 17 Mar 2017 10:04:37 +0000 (11:04 +0100)] 
CI: always use commited Deckard version

8 years agocheck-integration: Warn if Deckard does not match commited version
Petr Špaček [Fri, 17 Mar 2017 10:03:31 +0000 (11:03 +0100)] 
check-integration: Warn if Deckard does not match commited version

8 years agoworker_resolve: truly honor the options parameter
Vladimír Čunát [Wed, 15 Mar 2017 15:37:36 +0000 (16:37 +0100)] 
worker_resolve: truly honor the options parameter

It was being overwritten by options from struct kr_context;
now the flags are combined (by set union).

For example, the NO_CACHE flag is important for the prefetch module and
for trust anchor updates.

8 years agotrust anchors: add KeyTag into comments
Vladimír Čunát [Tue, 14 Mar 2017 17:21:50 +0000 (18:21 +0100)] 
trust anchors: add KeyTag into comments

Fixes #167.

8 years agotrust anchors: store in prettier format (#167)
Vladimír Čunát [Mon, 13 Mar 2017 19:38:58 +0000 (20:38 +0100)] 
trust anchors: store in prettier format (#167)

The output is only better if built with libknot >= 2.4.0.
As a side-effect, add lua method knot_rrset_t::txt_dump;
it's a light wrapper around knot_rrset_txt_dump.

Re-tested rolling with a.moot-servers.net, to be sure.

8 years agodaemon/lua/kres.lua -> *.in
Vladimír Čunát [Mon, 13 Mar 2017 19:26:46 +0000 (20:26 +0100)] 
daemon/lua/kres.lua -> *.in

8 years agoversion: don't depend on rr2str output style
Vladimír Čunát [Mon, 13 Mar 2017 18:08:29 +0000 (19:08 +0100)] 
version: don't depend on rr2str output style

It would break after making rr2str pretty-print the data.

8 years agoMerge !235: dnstap.mk: fix race around dnstap.pb-c.h
Vladimír Čunát [Wed, 15 Mar 2017 14:30:48 +0000 (15:30 +0100)] 
Merge !235: dnstap.mk: fix race around dnstap.pb-c.h

8 years agodnstap.mk: fix race around dnstap.pb-c.h
Vladimír Čunát [Tue, 14 Mar 2017 18:14:13 +0000 (19:14 +0100)] 
dnstap.mk: fix race around dnstap.pb-c.h

Probably.  The problem sometimes appeared on osx Travis.

8 years agoMerge !232: nitpick in kresd(8) man page
Vladimír Čunát [Mon, 13 Mar 2017 22:11:44 +0000 (23:11 +0100)] 
Merge !232: nitpick in kresd(8) man page

8 years agokresd(8) should refer to the resolver as "kresd", not as "unbound"
Daniel Kahn Gillmor [Mon, 13 Mar 2017 22:00:53 +0000 (18:00 -0400)] 
kresd(8) should refer to the resolver as "kresd", not as "unbound"

8 years agoMerge branch 'fix-auth-qname' into 'master'
Ondřej Surý [Wed, 8 Mar 2017 10:58:14 +0000 (11:58 +0100)] 
Merge branch 'fix-auth-qname' into 'master'

layer\iterate: when processing delegations, check if qname is at\below new authority

See merge request !229

8 years agolayer\iterate: when proccessing delegations, check if qname is at\below new authority
Grigorii Demidov [Wed, 8 Mar 2017 10:14:00 +0000 (11:14 +0100)] 
layer\iterate: when proccessing delegations, check if qname is at\below new authority

8 years agoMerge branch 'update-gitignore-zonefile.lua' into 'master'
Ondřej Surý [Mon, 6 Mar 2017 12:32:11 +0000 (13:32 +0100)] 
Merge branch 'update-gitignore-zonefile.lua' into 'master'

Add daemon/lua/zonefile.lua to git ignore list

See merge request !228

8 years agoAdd daemon/lua/zonefile.lua to git ignore list
Ondřej Surý [Mon, 6 Mar 2017 12:29:17 +0000 (13:29 +0100)] 
Add daemon/lua/zonefile.lua to git ignore list

8 years agoMerge branch 'dnstap' into 'master'
Ondřej Surý [Mon, 6 Mar 2017 12:08:03 +0000 (13:08 +0100)] 
Merge branch 'dnstap' into 'master'

add dnstap module

See merge request !213