]> git.ipfire.org Git - thirdparty/knot-resolver.git/log
thirdparty/knot-resolver.git
8 years agodns64-cname: correct order of CNAME and AAAA in answer
Vítězslav Kříž [Mon, 19 Jun 2017 11:17:57 +0000 (13:17 +0200)] 
dns64-cname: correct order of CNAME and AAAA in answer

If CNAME chain occurs CNAME is placed before AAAA.

8 years agoMerge !323: contrib/lmdb: 0.9.18 -> 0.9.21
Vladimír Čunát [Mon, 3 Jul 2017 10:21:43 +0000 (12:21 +0200)] 
Merge !323: contrib/lmdb: 0.9.18 -> 0.9.21

8 years agocontrib/lmdb: 0.9.18 -> 0.9.21
Vladimír Čunát [Mon, 3 Jul 2017 08:39:35 +0000 (10:39 +0200)] 
contrib/lmdb: 0.9.18 -> 0.9.21

Maybe some coverity issues will get fixed, even though
they had seemed not to be affecting our use cases in kresd.

Tests+Deckard look OK and I've been using my system and kresd with
system-wide 0.9.21 for some time already.

8 years agoMerge !318: lib/resolve: use RTT tracking to choose forwarders
Vladimír Čunát [Fri, 30 Jun 2017 15:17:40 +0000 (17:17 +0200)] 
Merge !318: lib/resolve: use RTT tracking to choose forwarders

Closes #125 and #208.

8 years agolib/resolve: even better support for forwarder choice
Vladimír Čunát [Fri, 30 Jun 2017 11:52:21 +0000 (13:52 +0200)] 
lib/resolve: even better support for forwarder choice

- sort the list instead of just picking the best one
- prefer unknown RTTs to probe them
- verbose output of the choice

Fixes https://gitlab.labs.nic.cz/knot/resolver/issues/125
Fixes https://gitlab.labs.nic.cz/knot/resolver/issues/208

8 years agonsrep: eradicate kr_nsrep_inaddr*
Vladimír Čunát [Fri, 30 Jun 2017 12:41:00 +0000 (14:41 +0200)] 
nsrep: eradicate kr_nsrep_inaddr*

They're just useless when we have kr_inaddr*.

8 years agolib/resolve: better support for forwarder choice
Grigorii Demidov [Mon, 26 Jun 2017 10:20:39 +0000 (12:20 +0200)] 
lib/resolve: better support for forwarder choice

8 years agoMerge !322: coverity fixes (nothing important)
Vladimír Čunát [Fri, 30 Jun 2017 07:13:02 +0000 (09:13 +0200)] 
Merge !322: coverity fixes (nothing important)

8 years agoutils: shut up a coverity warning (CID 155456)
Vladimír Čunát [Fri, 30 Jun 2017 06:57:06 +0000 (08:57 +0200)] 
utils: shut up a coverity warning (CID 155456)

8 years agorplan: fix a coverity warning (CID 164834)
Vladimír Čunát [Fri, 30 Jun 2017 06:48:59 +0000 (08:48 +0200)] 
rplan: fix a coverity warning (CID 164834)

There would be no real resource leak, as the memory is on a mempool,
so the lifetime is limited by kr_request finishing.  Also, it's only
on an unlikely error branch, but still...

8 years agoMerge !321: bootstrap-depends nitpick: warn about ~/.local
Vladimír Čunát [Fri, 30 Jun 2017 06:27:54 +0000 (08:27 +0200)] 
Merge !321: bootstrap-depends nitpick: warn about ~/.local

8 years agobootstrap-depends nitpick: warn about rm -rf ~/.local
Vladimír Čunát [Mon, 19 Jun 2017 16:01:46 +0000 (18:01 +0200)] 
bootstrap-depends nitpick: warn about rm -rf ~/.local

Some people might get surprised, as it's the default location for quite
some data nowadays ($XDG_DATA_HOME).

8 years agoMerge !320: dnssec/nsec: add a precaution for DS nodata
Vladimír Čunát [Wed, 28 Jun 2017 08:07:26 +0000 (10:07 +0200)] 
Merge !320: dnssec/nsec: add a precaution for DS nodata

8 years agodnssec/nsec: add a precaution when checking DS nodata
Vladimír Čunát [Wed, 28 Jun 2017 06:48:40 +0000 (08:48 +0200)] 
dnssec/nsec: add a precaution when checking DS nodata

I just found it by accident when studying RFCs again.
Hmm, I'd like an operator for logical implication; I'm spoiled by Maths.

8 years agoMerge branch 'check-config' into 'master'
Vladimír Čunát [Tue, 27 Jun 2017 13:33:17 +0000 (15:33 +0200)] 
Merge branch 'check-config' into 'master'

daemon: check existence of config file

See merge request !317

8 years agoMerge !319: Dockerfile: add missing curl dependency
Vladimír Čunát [Tue, 27 Jun 2017 12:48:38 +0000 (14:48 +0200)] 
Merge !319: Dockerfile: add missing curl dependency

8 years agoDockerfile: add missing curl dependency
Vladimír Čunát [Tue, 27 Jun 2017 12:43:24 +0000 (14:43 +0200)] 
Dockerfile: add missing curl dependency

Without it we were failing to download fstrm tarball,
and the shown errors were very confusing.
Tested building an image locally.

8 years agodaemon: check existence of config file
Vladimír Čunát [Mon, 26 Jun 2017 08:26:33 +0000 (10:26 +0200)] 
daemon: check existence of config file

... even if rundir isn't specified.  No other changes in semantics.
Before this a typo in config path would pass silently.

8 years agoMerge !315: doc/build.rst updates
Vladimír Čunát [Fri, 23 Jun 2017 15:37:21 +0000 (17:37 +0200)] 
Merge !315: doc/build.rst updates

8 years agoMerge !316: release 1.3.1 v1.3.1
Vladimír Čunát [Fri, 23 Jun 2017 12:10:44 +0000 (14:10 +0200)] 
Merge !316: release 1.3.1

8 years agorelease 1.3.1
Vladimír Čunát [Wed, 21 Jun 2017 07:46:51 +0000 (09:46 +0200)] 
release 1.3.1

8 years agolib/resolve: bugfixes for forwarding mode
Grigorii Demidov [Thu, 22 Jun 2017 12:56:52 +0000 (14:56 +0200)] 
lib/resolve: bugfixes for forwarding mode

unecessary queries in some circumstances; some minor bugfixes

8 years agolayer/pktcache: don't cache CNAME'ed negative answer when forwarding
Grigorii Demidov [Thu, 22 Jun 2017 09:21:01 +0000 (11:21 +0200)] 
layer/pktcache: don't cache CNAME'ed negative answer when forwarding

it can contain records which have not been validated by validator

8 years agolayer/validate: forwarding mode, another CNAME fix
Grigorii Demidov [Wed, 21 Jun 2017 08:02:13 +0000 (10:02 +0200)] 
layer/validate: forwarding mode, another CNAME fix

Don't check proof of nonexistance in NODATA or NAME ERROR answers
which contains a CNAME.

8 years agodoc/build.rst: quick pass to fix/update the info
Vladimír Čunát [Mon, 19 Jun 2017 15:11:01 +0000 (17:11 +0200)] 
doc/build.rst: quick pass to fix/update the info

In particular, don't mention things that probably don't work (well):
Windows, amalgamation, very old OpenSUSE package.

8 years agoMerge !314: policy.FORWARD: fix some CNAME problems
Vladimír Čunát [Mon, 19 Jun 2017 14:21:49 +0000 (16:21 +0200)] 
Merge !314: policy.FORWARD: fix some CNAME problems

8 years agoNEWS: update with for this branch
Vladimír Čunát [Mon, 19 Jun 2017 14:15:44 +0000 (16:15 +0200)] 
NEWS: update with for this branch

8 years agolayer/iterate: forwarding mode - treat CNAME'ed NS&DS answers as proof of zonecut...
Grigorii Demidov [Thu, 15 Jun 2017 11:11:30 +0000 (13:11 +0200)] 
layer/iterate: forwarding mode - treat CNAME'ed NS&DS answers as proof of zonecut nonexistance

8 years agolayer/validate: bugfix; in some circumstances KR_RANK_OMIT rank was not processed...
Grigorii Demidov [Wed, 14 Jun 2017 10:05:28 +0000 (12:05 +0200)] 
layer/validate: bugfix; in some circumstances KR_RANK_OMIT rank was not processed properly

8 years agolib/resolve: special processing for cname'ed DS answers in forward mode (*.vutbr...
Grigorii Demidov [Tue, 13 Jun 2017 09:42:08 +0000 (11:42 +0200)] 
lib/resolve: special processing for cname'ed DS answers in forward mode (*.vutbr.cz DS)

8 years agoMerge !313: modules/http: fix finding the static files
Vladimír Čunát [Fri, 16 Jun 2017 07:27:26 +0000 (09:27 +0200)] 
Merge !313: modules/http: fix finding the static files

8 years agomodules/http: fix finding the static files
Vladimír Čunát [Fri, 16 Jun 2017 07:09:22 +0000 (09:09 +0200)] 
modules/http: fix finding the static files

I also verified there's no other usage of the `moduledir` symbol from
lua.  Bug introduced in 2f81b1118430 (within !298).

8 years agodoc/build.rst: add info about installing on FreeBSD
unicycle2 [Thu, 15 Jun 2017 09:17:12 +0000 (11:17 +0200)] 
doc/build.rst: add info about installing on FreeBSD

(the port will soon be 1.3.0 also)
Close https://github.com/CZ-NIC/knot-resolver/pull/43.

8 years agoMerge !312: utils.h: add a missing include
Vladimír Čunát [Thu, 15 Jun 2017 09:45:05 +0000 (11:45 +0200)] 
Merge !312: utils.h: add a missing include

8 years agoutils.h: add a missing include
unicycle2 [Thu, 15 Jun 2017 09:22:05 +0000 (11:22 +0200)] 
utils.h: add a missing include

This tiny addition was needed to be able to install on FreeBSD.
Close https://github.com/CZ-NIC/knot-resolver/pull/44

8 years agoMerge branch 'kres-gen-guide' into 'master'
Petr Špaček [Thu, 15 Jun 2017 07:25:51 +0000 (09:25 +0200)] 
Merge branch 'kres-gen-guide' into 'master'

lua kres-gen: add a guide to re-generating

See merge request !310

8 years agoMerge !311: root-hints: B server changed its AAAA
Vladimír Čunát [Wed, 14 Jun 2017 16:29:32 +0000 (18:29 +0200)] 
Merge !311: root-hints: B server changed its AAAA

8 years agoroot-hints: B server changed its AAAA
Vladimír Čunát [Wed, 14 Jun 2017 16:26:53 +0000 (18:26 +0200)] 
root-hints: B server changed its AAAA

http://www.root-servers.org/news/b-root-begins-anycast-in-may.txt

8 years agolua kres-gen: add a guide to re-generating
Vladimír Čunát [Tue, 13 Jun 2017 14:16:16 +0000 (16:16 +0200)] 
lua kres-gen: add a guide to re-generating

8 years agoMerge branch 'NEWS-final-date' into 'master' v1.3.0
Ondřej Surý [Tue, 13 Jun 2017 07:02:22 +0000 (09:02 +0200)] 
Merge branch 'NEWS-final-date' into 'master'

Update the final date for 1.3.0 release

See merge request !308

8 years agoUpdate the final date for 1.3.0 release
Ondřej Surý [Tue, 13 Jun 2017 07:00:56 +0000 (09:00 +0200)] 
Update the final date for 1.3.0 release

8 years agoMerge branch 'cname-loop' into 'master'
Petr Špaček [Tue, 13 Jun 2017 06:48:14 +0000 (08:48 +0200)] 
Merge branch 'cname-loop' into 'master'

iterate: be more precise when detecting CNAME loops

See merge request !307

8 years agoiterate: be more precise when detecting CNAME loops
Vladimír Čunát [Mon, 12 Jun 2017 13:40:02 +0000 (15:40 +0200)] 
iterate: be more precise when detecting CNAME loops

Iterating over sibling sub-queries isn't precise enough,
and in particular in forwarding mode it reported non-existing loops.

Example ATM: www.dpo.cz - there forwarding spawns multiple sub-queries,
and one of those is a CNAME to another of them.  Due to them being siblings,
the old code misdetected that as a CNAME loop.  Now that we have these
cname_parent pointers, we can do a precise detection.

8 years agoMerge !306: version 1.3.0
Vladimír Čunát [Mon, 12 Jun 2017 08:52:23 +0000 (10:52 +0200)] 
Merge !306: version 1.3.0

8 years agoversion 1.3.0
Vladimír Čunát [Mon, 12 Jun 2017 08:46:18 +0000 (10:46 +0200)] 
version 1.3.0

8 years agoMerge !305: validate: work around some SERVFAILs (iterating mode)
Vladimír Čunát [Fri, 9 Jun 2017 09:04:30 +0000 (11:04 +0200)] 
Merge !305: validate: work around some SERVFAILs (iterating mode)

8 years agovalidate: work around some SERVFAILs (iterating mode)
Vladimír Čunát [Thu, 8 Jun 2017 15:03:22 +0000 (17:03 +0200)] 
validate: work around some SERVFAILs (iterating mode)

- This affects the iterating mode only (except for a verbose message).
- The problem was introduced when implementing forwarding in 651c5aad.
- Example that was affected: *.org.ru.

When the same server is authoritative for multiple consecutive zones,
with a higher one being signed and a lower one being unsigned, we may
get an unsigned answer even in case we *think* we're currently in a
signed zone.

In particular, DS (sub-)queries are important because of being used to
prove the insecurity of zones - in that case the iterator can correctly
determine the (unexpected) zone name from which the answer came, due to
seeing the SOA record, but that is too late for zone_cut_check() to try
getting a trust chain to it, so we need to YIELD for it to do it.

8 years agoMerge !304: workarounds: add avTs.mcafee.com
Vladimír Čunát [Thu, 8 Jun 2017 18:06:38 +0000 (20:06 +0200)] 
Merge !304: workarounds: add avTs.mcafee.com

8 years agoworkarounds: add avTs.mcafee.com
Vladimír Čunát [Thu, 8 Jun 2017 18:02:15 +0000 (20:02 +0200)] 
workarounds: add avTs.mcafee.com

8 years agoMerge !303: policy: add forwarding with validation (by default)
Vladimír Čunát [Wed, 7 Jun 2017 11:13:19 +0000 (13:13 +0200)] 
Merge !303: policy: add forwarding with validation (by default)

8 years agoMerge branch !301: fix incorrectly set AD flag for CNAME chains
Vladimír Čunát [Wed, 7 Jun 2017 11:04:13 +0000 (13:04 +0200)] 
Merge branch !301: fix incorrectly set AD flag for CNAME chains

8 years agolib/resolve: clear AD flag if there are CNAMEs synthesized from wildcard covered...
Grigorii Demidov [Wed, 7 Jun 2017 10:31:39 +0000 (12:31 +0200)] 
lib/resolve: clear AD flag if there are CNAMEs synthesized from wildcard covered by optouted NSEC3

8 years agolib/validate: cleanup (commented code block was deleted)
Grigorii Demidov [Mon, 5 Jun 2017 11:06:05 +0000 (13:06 +0200)] 
lib/validate: cleanup (commented code block was deleted)

8 years agolib/validate: validation of NXDOMAIN answers for DS queries was fixed
Grigorii Demidov [Mon, 5 Jun 2017 11:03:50 +0000 (13:03 +0200)] 
lib/validate: validation of NXDOMAIN answers for DS queries was fixed

8 years agofix incorrectly set AD flag for CNAME chains
Vladimír Čunát [Mon, 5 Jun 2017 09:48:58 +0000 (11:48 +0200)] 
fix incorrectly set AD flag for CNAME chains

Valid CNAME chains that ended in NODATA had AD flag set.

8 years agocall it 1.3.0-rc1 1.3.0-rc1
Vladimír Čunát [Thu, 1 Jun 2017 16:09:23 +0000 (18:09 +0200)] 
call it 1.3.0-rc1

8 years agodoc+NEWS: changes related to full-forward
Vladimír Čunát [Thu, 1 Jun 2017 16:04:16 +0000 (18:04 +0200)] 
doc+NEWS: changes related to full-forward

8 years agonitpicks from doxygen parser
Vladimír Čunát [Thu, 1 Jun 2017 15:14:52 +0000 (17:14 +0200)] 
nitpicks from doxygen parser

8 years agolayer/validate: improvement in processing answers containing CNAME
Grigorii Demidov [Thu, 1 Jun 2017 12:13:47 +0000 (14:13 +0200)] 
layer/validate: improvement in processing answers containing CNAME

8 years agolib: forwarding, some improvements in zone cut detection algorythm
Grigorii Demidov [Wed, 31 May 2017 11:57:34 +0000 (13:57 +0200)] 
lib: forwarding, some improvements in zone cut detection algorythm

8 years agolib/resolve: forwarding; special processing for explicit DS queries
Grigorii Demidov [Tue, 30 May 2017 10:56:04 +0000 (12:56 +0200)] 
lib/resolve: forwarding; special processing for explicit DS queries

8 years agolib: forwarding, cleanup & simplification; reuse existing code, delete unnecessary...
Grigorii Demidov [Tue, 30 May 2017 07:30:56 +0000 (09:30 +0200)] 
lib: forwarding, cleanup & simplification; reuse existing code, delete unnecessary code blocks

8 years agolib: WIP, forwarding mode, some improvements in SERVFAIL & NXDOMAIN processing
Grigorii Demidov [Fri, 26 May 2017 11:51:55 +0000 (13:51 +0200)] 
lib: WIP, forwarding mode, some improvements in SERVFAIL & NXDOMAIN processing

8 years agolib/resolve: special processing for deferred answers
Grigorii Demidov [Mon, 22 May 2017 13:06:06 +0000 (15:06 +0200)] 
lib/resolve: special processing for deferred answers

8 years agolib/resolve: special processing for deferred answers
Grigorii Demidov [Mon, 22 May 2017 11:58:29 +0000 (13:58 +0200)] 
lib/resolve: special processing for deferred answers

8 years agoresolve: remove an incorrectly added condition
Vladimír Čunát [Wed, 17 May 2017 17:58:13 +0000 (19:58 +0200)] 
resolve: remove an incorrectly added condition

This part of code is NOT reachable when forwarding, because
ns.name is . (the root) and retry is true.
kr_nsrep_elect* would ruin forwarding anyway, as they're written ATM.

8 years agolayer/validate: when CD bit is set, kresd doesn't insert wildcard expansion in answer...
Grigorii Demidov [Wed, 17 May 2017 12:07:25 +0000 (14:07 +0200)] 
layer/validate: when CD bit is set, kresd doesn't insert wildcard expansion in answer; fixed

8 years agolayer/iterate: cleanup
Grigorii Demidov [Tue, 16 May 2017 10:42:11 +0000 (12:42 +0200)] 
layer/iterate: cleanup

8 years agolib/resolve: use TA with longest eligible name in forwarding mode
Grigorii Demidov [Mon, 15 May 2017 11:54:29 +0000 (13:54 +0200)] 
lib/resolve: use TA with longest eligible name in forwarding mode

8 years agolib/resolve: cleanup
Grigorii Demidov [Fri, 12 May 2017 08:22:45 +0000 (10:22 +0200)] 
lib/resolve: cleanup

8 years agolib/resove: WIP some improvements in zone cut detection in forward mode
Grigorii Demidov [Thu, 11 May 2017 08:28:17 +0000 (10:28 +0200)] 
lib/resove: WIP some improvements in zone cut detection in forward mode

8 years agopolicy: purge pointer-casting where not necessary
Vladimír Čunát [Wed, 26 Apr 2017 12:53:49 +0000 (14:53 +0200)] 
policy: purge pointer-casting where not necessary

Casting is dangerous, e.g. it's easy to misconfigure policy with
  policy.add(policy.FORWARD('some address'))
which lead to segfault without showing any indication of the cause.
Now this case will show as
  .../policy.lua:98: 'struct kr_query' has no member named 'current'
and only abort the policy module instead of the whole process.

8 years agolib/resove: cleanup
Grigorii Demidov [Wed, 26 Apr 2017 10:52:45 +0000 (12:52 +0200)] 
lib/resove: cleanup

8 years agolib: full forwarding mode support
Grigorii Demidov [Wed, 26 Apr 2017 10:09:00 +0000 (12:09 +0200)] 
lib: full forwarding mode support

8 years agoMerge !300: kr_ranked_rrarray*: avoid duplicate RRsets on wire
Vladimír Čunát [Thu, 1 Jun 2017 14:24:04 +0000 (16:24 +0200)] 
Merge !300: kr_ranked_rrarray*: avoid duplicate RRsets on wire

Closes #198.

8 years agokr_ranked_rrarray*: avoid duplicate RRsets on wire
Vladimír Čunát [Tue, 30 May 2017 16:31:10 +0000 (18:31 +0200)] 
kr_ranked_rrarray*: avoid duplicate RRsets on wire

Fixes https://gitlab.labs.nic.cz/knot/resolver/issues/198.
We can't let multiple "matching RRsets" to the wire, and we can't just
merge the sets from multiple queries either.  The only way is to choose
either of the sets and put it on the wire.  ATM the last one wins.

Common ocurrence of the bug: if www.example.cz was a CNAME for example.cz
and we ask for a non-existent type, we would get the SOA record twice
in the final answer.

A few related changes:
 - don't just assert, also return error code if -DNDEBUG
 - kr_ranked_rrarray_set_wire: don't do full-content comparison anymore;
   see the first paragraph in this commit message for the reasons
 - minor refactoring of that code, more comments, etc.

8 years agoMerge !295: validate: avoid keeping KR_RANK_MISSING
Vladimír Čunát [Thu, 1 Jun 2017 12:42:02 +0000 (14:42 +0200)] 
Merge !295: validate: avoid keeping KR_RANK_MISSING

8 years agoMerge branch 'configurable-modulesdir' into 'master'
Ondřej Surý [Fri, 26 May 2017 12:18:03 +0000 (14:18 +0200)] 
Merge branch 'configurable-modulesdir' into 'master'

Make the modulesdir configurable at the runtime

See merge request !298

8 years agoman page: do maintenance
Vladimír Čunát [Fri, 26 May 2017 08:32:16 +0000 (10:32 +0200)] 
man page: do maintenance

- add missing CLI options
- keep consistent order of options (also with --help output)

8 years agoNEWS: mention module changes
Vladimír Čunát [Thu, 25 May 2017 16:31:14 +0000 (18:31 +0200)] 
NEWS: mention module changes

8 years agomodule.c: don't fall back to MODULEDIR if overridden
Vladimír Čunát [Thu, 25 May 2017 17:38:58 +0000 (19:38 +0200)] 
module.c: don't fall back to MODULEDIR if overridden

8 years agomodule.c: cleanup unused code
Vladimír Čunát [Thu, 25 May 2017 15:30:24 +0000 (17:30 +0200)] 
module.c: cleanup unused code

Searching the default library path for modules wasn't a good idea anyway.

8 years agoengine: free hostname and moduledir (nitpick)
Vladimír Čunát [Thu, 25 May 2017 15:23:50 +0000 (17:23 +0200)] 
engine: free hostname and moduledir (nitpick)

8 years agoUpdate the moduledir documentation
Ondřej Surý [Thu, 25 May 2017 10:23:59 +0000 (12:23 +0200)] 
Update the moduledir documentation

8 years agoMake the moduledir configurable at the runtime
Ondřej Surý [Tue, 23 May 2017 15:23:14 +0000 (17:23 +0200)] 
Make the moduledir configurable at the runtime

8 years agoMerge !249: use default padding policy for responses
Vladimír Čunát [Wed, 24 May 2017 14:29:50 +0000 (16:29 +0200)] 
Merge !249: use default padding policy for responses

8 years agoMerge !287: get more out of TLS logging when --verbose
Vladimír Čunát [Wed, 24 May 2017 13:17:01 +0000 (15:17 +0200)] 
Merge !287: get more out of TLS logging when --verbose

8 years agoMerge !296: validate: fix DS query under a CNAME
Vladimír Čunát [Wed, 24 May 2017 10:05:51 +0000 (12:05 +0200)] 
Merge !296: validate: fix DS query under a CNAME

8 years agoMerge !297: revert "iterator: don't retry if REFUSED"
Vladimír Čunát [Wed, 24 May 2017 07:51:03 +0000 (09:51 +0200)] 
Merge !297: revert "iterator: don't retry if REFUSED"

8 years agoRevert "iterator: don't retry if REFUSED"
Vladimír Čunát [Tue, 23 May 2017 19:30:54 +0000 (21:30 +0200)] 
Revert "iterator: don't retry if REFUSED"

This reverts commit bc2a26702e6460aee65fe170671336d670ba3eb9 (almost).
It would be best to avoid retrying with the same NS and keep trying with
others (if any), but that would require larger changes if it should work
well, so let's err on the side of sending more queries.

8 years agolayer/validate: don't try to find proof of DS non-existence in CNAME'ed answer for...
Grigorii Demidov [Tue, 23 May 2017 09:15:39 +0000 (11:15 +0200)] 
layer/validate: don't try to find proof of DS non-existence in CNAME'ed answer for DS query

8 years agovalidate: avoid keeping KR_RANK_MISSING
Vladimír Čunát [Mon, 22 May 2017 13:13:19 +0000 (15:13 +0200)] 
validate: avoid keeping KR_RANK_MISSING

If a sub-query transitions the state to QUERY_DNSSEC_INSECURE,
we didn't set correct rank.  This lead to caching with _MISSING rank
which is too low to be utilized on re-queries.  Example: nix.mx query.

8 years agoMerge !294: iterate: tweak ranks of rrsigs
Vladimír Čunát [Fri, 19 May 2017 15:39:46 +0000 (17:39 +0200)] 
Merge !294: iterate: tweak ranks of rrsigs

8 years agoranked rrarray: don't merge RRSIGs of different types
Vladimír Čunát [Fri, 19 May 2017 12:59:39 +0000 (14:59 +0200)] 
ranked rrarray: don't merge RRSIGs of different types

For example, kr_rrmap_add has been relying on sets covering just a
single type (for years).  It's used by cache and there it's required to
store types separately.

It seems all other parts of code should be just OK with this.

8 years agoiterate: tweak ranks of rrsigs
Vladimír Čunát [Fri, 19 May 2017 10:40:56 +0000 (12:40 +0200)] 
iterate: tweak ranks of rrsigs

The bit about RRSIG coming from an authoritative source is still used
and possibly useful.  The inconsistency was causing rrcache to fetch
a record without its signature under some circumstances, depending on
the record type and how it was obtained.

8 years agoMerge !293: policy: add missing local range 100.64.0.0/10
Vladimír Čunát [Thu, 18 May 2017 17:17:47 +0000 (19:17 +0200)] 
Merge !293: policy: add missing local range 100.64.0.0/10

8 years agopolicy: add missing local range 100.64.0.0/10
Vladimír Čunát [Thu, 18 May 2017 17:13:28 +0000 (19:13 +0200)] 
policy: add missing local range 100.64.0.0/10

Thanks to Petr for finding this issue.

8 years agoMerge !292: nitpicks (misc)
Vladimír Čunát [Wed, 17 May 2017 14:57:25 +0000 (16:57 +0200)] 
Merge !292: nitpicks (misc)

8 years agoQRVERBOSE: const parameter
Vladimír Čunát [Wed, 17 May 2017 14:52:36 +0000 (16:52 +0200)] 
QRVERBOSE: const parameter

8 years agodocs: policy:add -> policy.add
Vladimír Čunát [Wed, 17 May 2017 14:44:47 +0000 (16:44 +0200)] 
docs: policy:add -> policy.add

The old API was deprecated long time ago.