]> git.ipfire.org Git - thirdparty/knot-resolver.git/log
thirdparty/knot-resolver.git
8 years agohints: fix reverse IPv6 hints
Vladimír Čunát [Thu, 15 Jun 2017 13:23:37 +0000 (15:23 +0200)] 
hints: fix reverse IPv6 hints

The length was halved, mixed ">" vs. ">>", etc.

8 years agohints: remove unused code
Vladimír Čunát [Thu, 15 Jun 2017 07:48:21 +0000 (09:48 +0200)] 
hints: remove unused code

8 years agohints: reverse lookup keep name ordering from host file
Vítězslav Kříž [Mon, 12 Jun 2017 13:27:42 +0000 (15:27 +0200)] 
hints: reverse lookup keep name ordering from host file

If one line contains multiple names for the address, the first
name should be the canonical one (i.e. used for reverse lookups).
In the current implementation wins top level domain according to
domain tree.

This change saves PTR records to separate tree. Names are
oredered according to order in host file.

8 years agoMerge !306: version 1.3.0
Vladimír Čunát [Mon, 12 Jun 2017 08:52:23 +0000 (10:52 +0200)] 
Merge !306: version 1.3.0

8 years agoversion 1.3.0
Vladimír Čunát [Mon, 12 Jun 2017 08:46:18 +0000 (10:46 +0200)] 
version 1.3.0

8 years agoMerge !305: validate: work around some SERVFAILs (iterating mode)
Vladimír Čunát [Fri, 9 Jun 2017 09:04:30 +0000 (11:04 +0200)] 
Merge !305: validate: work around some SERVFAILs (iterating mode)

8 years agovalidate: work around some SERVFAILs (iterating mode)
Vladimír Čunát [Thu, 8 Jun 2017 15:03:22 +0000 (17:03 +0200)] 
validate: work around some SERVFAILs (iterating mode)

- This affects the iterating mode only (except for a verbose message).
- The problem was introduced when implementing forwarding in 651c5aad.
- Example that was affected: *.org.ru.

When the same server is authoritative for multiple consecutive zones,
with a higher one being signed and a lower one being unsigned, we may
get an unsigned answer even in case we *think* we're currently in a
signed zone.

In particular, DS (sub-)queries are important because of being used to
prove the insecurity of zones - in that case the iterator can correctly
determine the (unexpected) zone name from which the answer came, due to
seeing the SOA record, but that is too late for zone_cut_check() to try
getting a trust chain to it, so we need to YIELD for it to do it.

8 years agoMerge !304: workarounds: add avTs.mcafee.com
Vladimír Čunát [Thu, 8 Jun 2017 18:06:38 +0000 (20:06 +0200)] 
Merge !304: workarounds: add avTs.mcafee.com

8 years agoworkarounds: add avTs.mcafee.com
Vladimír Čunát [Thu, 8 Jun 2017 18:02:15 +0000 (20:02 +0200)] 
workarounds: add avTs.mcafee.com

8 years agoMerge !303: policy: add forwarding with validation (by default)
Vladimír Čunát [Wed, 7 Jun 2017 11:13:19 +0000 (13:13 +0200)] 
Merge !303: policy: add forwarding with validation (by default)

8 years agoMerge branch !301: fix incorrectly set AD flag for CNAME chains
Vladimír Čunát [Wed, 7 Jun 2017 11:04:13 +0000 (13:04 +0200)] 
Merge branch !301: fix incorrectly set AD flag for CNAME chains

8 years agolib/resolve: clear AD flag if there are CNAMEs synthesized from wildcard covered...
Grigorii Demidov [Wed, 7 Jun 2017 10:31:39 +0000 (12:31 +0200)] 
lib/resolve: clear AD flag if there are CNAMEs synthesized from wildcard covered by optouted NSEC3

8 years agolib/validate: cleanup (commented code block was deleted)
Grigorii Demidov [Mon, 5 Jun 2017 11:06:05 +0000 (13:06 +0200)] 
lib/validate: cleanup (commented code block was deleted)

8 years agolib/validate: validation of NXDOMAIN answers for DS queries was fixed
Grigorii Demidov [Mon, 5 Jun 2017 11:03:50 +0000 (13:03 +0200)] 
lib/validate: validation of NXDOMAIN answers for DS queries was fixed

8 years agofix incorrectly set AD flag for CNAME chains
Vladimír Čunát [Mon, 5 Jun 2017 09:48:58 +0000 (11:48 +0200)] 
fix incorrectly set AD flag for CNAME chains

Valid CNAME chains that ended in NODATA had AD flag set.

8 years agocall it 1.3.0-rc1 1.3.0-rc1
Vladimír Čunát [Thu, 1 Jun 2017 16:09:23 +0000 (18:09 +0200)] 
call it 1.3.0-rc1

8 years agodoc+NEWS: changes related to full-forward
Vladimír Čunát [Thu, 1 Jun 2017 16:04:16 +0000 (18:04 +0200)] 
doc+NEWS: changes related to full-forward

8 years agonitpicks from doxygen parser
Vladimír Čunát [Thu, 1 Jun 2017 15:14:52 +0000 (17:14 +0200)] 
nitpicks from doxygen parser

8 years agolayer/validate: improvement in processing answers containing CNAME
Grigorii Demidov [Thu, 1 Jun 2017 12:13:47 +0000 (14:13 +0200)] 
layer/validate: improvement in processing answers containing CNAME

8 years agolib: forwarding, some improvements in zone cut detection algorythm
Grigorii Demidov [Wed, 31 May 2017 11:57:34 +0000 (13:57 +0200)] 
lib: forwarding, some improvements in zone cut detection algorythm

8 years agolib/resolve: forwarding; special processing for explicit DS queries
Grigorii Demidov [Tue, 30 May 2017 10:56:04 +0000 (12:56 +0200)] 
lib/resolve: forwarding; special processing for explicit DS queries

8 years agolib: forwarding, cleanup & simplification; reuse existing code, delete unnecessary...
Grigorii Demidov [Tue, 30 May 2017 07:30:56 +0000 (09:30 +0200)] 
lib: forwarding, cleanup & simplification; reuse existing code, delete unnecessary code blocks

8 years agolib: WIP, forwarding mode, some improvements in SERVFAIL & NXDOMAIN processing
Grigorii Demidov [Fri, 26 May 2017 11:51:55 +0000 (13:51 +0200)] 
lib: WIP, forwarding mode, some improvements in SERVFAIL & NXDOMAIN processing

8 years agolib/resolve: special processing for deferred answers
Grigorii Demidov [Mon, 22 May 2017 13:06:06 +0000 (15:06 +0200)] 
lib/resolve: special processing for deferred answers

8 years agolib/resolve: special processing for deferred answers
Grigorii Demidov [Mon, 22 May 2017 11:58:29 +0000 (13:58 +0200)] 
lib/resolve: special processing for deferred answers

8 years agoresolve: remove an incorrectly added condition
Vladimír Čunát [Wed, 17 May 2017 17:58:13 +0000 (19:58 +0200)] 
resolve: remove an incorrectly added condition

This part of code is NOT reachable when forwarding, because
ns.name is . (the root) and retry is true.
kr_nsrep_elect* would ruin forwarding anyway, as they're written ATM.

8 years agolayer/validate: when CD bit is set, kresd doesn't insert wildcard expansion in answer...
Grigorii Demidov [Wed, 17 May 2017 12:07:25 +0000 (14:07 +0200)] 
layer/validate: when CD bit is set, kresd doesn't insert wildcard expansion in answer; fixed

8 years agolayer/iterate: cleanup
Grigorii Demidov [Tue, 16 May 2017 10:42:11 +0000 (12:42 +0200)] 
layer/iterate: cleanup

8 years agolib/resolve: use TA with longest eligible name in forwarding mode
Grigorii Demidov [Mon, 15 May 2017 11:54:29 +0000 (13:54 +0200)] 
lib/resolve: use TA with longest eligible name in forwarding mode

8 years agolib/resolve: cleanup
Grigorii Demidov [Fri, 12 May 2017 08:22:45 +0000 (10:22 +0200)] 
lib/resolve: cleanup

8 years agolib/resove: WIP some improvements in zone cut detection in forward mode
Grigorii Demidov [Thu, 11 May 2017 08:28:17 +0000 (10:28 +0200)] 
lib/resove: WIP some improvements in zone cut detection in forward mode

8 years agopolicy: purge pointer-casting where not necessary
Vladimír Čunát [Wed, 26 Apr 2017 12:53:49 +0000 (14:53 +0200)] 
policy: purge pointer-casting where not necessary

Casting is dangerous, e.g. it's easy to misconfigure policy with
  policy.add(policy.FORWARD('some address'))
which lead to segfault without showing any indication of the cause.
Now this case will show as
  .../policy.lua:98: 'struct kr_query' has no member named 'current'
and only abort the policy module instead of the whole process.

8 years agolib/resove: cleanup
Grigorii Demidov [Wed, 26 Apr 2017 10:52:45 +0000 (12:52 +0200)] 
lib/resove: cleanup

8 years agolib: full forwarding mode support
Grigorii Demidov [Wed, 26 Apr 2017 10:09:00 +0000 (12:09 +0200)] 
lib: full forwarding mode support

8 years agoMerge !300: kr_ranked_rrarray*: avoid duplicate RRsets on wire
Vladimír Čunát [Thu, 1 Jun 2017 14:24:04 +0000 (16:24 +0200)] 
Merge !300: kr_ranked_rrarray*: avoid duplicate RRsets on wire

Closes #198.

8 years agokr_ranked_rrarray*: avoid duplicate RRsets on wire
Vladimír Čunát [Tue, 30 May 2017 16:31:10 +0000 (18:31 +0200)] 
kr_ranked_rrarray*: avoid duplicate RRsets on wire

Fixes https://gitlab.labs.nic.cz/knot/resolver/issues/198.
We can't let multiple "matching RRsets" to the wire, and we can't just
merge the sets from multiple queries either.  The only way is to choose
either of the sets and put it on the wire.  ATM the last one wins.

Common ocurrence of the bug: if www.example.cz was a CNAME for example.cz
and we ask for a non-existent type, we would get the SOA record twice
in the final answer.

A few related changes:
 - don't just assert, also return error code if -DNDEBUG
 - kr_ranked_rrarray_set_wire: don't do full-content comparison anymore;
   see the first paragraph in this commit message for the reasons
 - minor refactoring of that code, more comments, etc.

8 years agoMerge !295: validate: avoid keeping KR_RANK_MISSING
Vladimír Čunát [Thu, 1 Jun 2017 12:42:02 +0000 (14:42 +0200)] 
Merge !295: validate: avoid keeping KR_RANK_MISSING

8 years agoMerge branch 'configurable-modulesdir' into 'master'
Ondřej Surý [Fri, 26 May 2017 12:18:03 +0000 (14:18 +0200)] 
Merge branch 'configurable-modulesdir' into 'master'

Make the modulesdir configurable at the runtime

See merge request !298

8 years agoman page: do maintenance
Vladimír Čunát [Fri, 26 May 2017 08:32:16 +0000 (10:32 +0200)] 
man page: do maintenance

- add missing CLI options
- keep consistent order of options (also with --help output)

8 years agoNEWS: mention module changes
Vladimír Čunát [Thu, 25 May 2017 16:31:14 +0000 (18:31 +0200)] 
NEWS: mention module changes

8 years agomodule.c: don't fall back to MODULEDIR if overridden
Vladimír Čunát [Thu, 25 May 2017 17:38:58 +0000 (19:38 +0200)] 
module.c: don't fall back to MODULEDIR if overridden

8 years agomodule.c: cleanup unused code
Vladimír Čunát [Thu, 25 May 2017 15:30:24 +0000 (17:30 +0200)] 
module.c: cleanup unused code

Searching the default library path for modules wasn't a good idea anyway.

8 years agoengine: free hostname and moduledir (nitpick)
Vladimír Čunát [Thu, 25 May 2017 15:23:50 +0000 (17:23 +0200)] 
engine: free hostname and moduledir (nitpick)

8 years agoUpdate the moduledir documentation
Ondřej Surý [Thu, 25 May 2017 10:23:59 +0000 (12:23 +0200)] 
Update the moduledir documentation

8 years agoMake the moduledir configurable at the runtime
Ondřej Surý [Tue, 23 May 2017 15:23:14 +0000 (17:23 +0200)] 
Make the moduledir configurable at the runtime

8 years agoMerge !249: use default padding policy for responses
Vladimír Čunát [Wed, 24 May 2017 14:29:50 +0000 (16:29 +0200)] 
Merge !249: use default padding policy for responses

8 years agoMerge !287: get more out of TLS logging when --verbose
Vladimír Čunát [Wed, 24 May 2017 13:17:01 +0000 (15:17 +0200)] 
Merge !287: get more out of TLS logging when --verbose

8 years agoMerge !296: validate: fix DS query under a CNAME
Vladimír Čunát [Wed, 24 May 2017 10:05:51 +0000 (12:05 +0200)] 
Merge !296: validate: fix DS query under a CNAME

8 years agoMerge !297: revert "iterator: don't retry if REFUSED"
Vladimír Čunát [Wed, 24 May 2017 07:51:03 +0000 (09:51 +0200)] 
Merge !297: revert "iterator: don't retry if REFUSED"

8 years agoRevert "iterator: don't retry if REFUSED"
Vladimír Čunát [Tue, 23 May 2017 19:30:54 +0000 (21:30 +0200)] 
Revert "iterator: don't retry if REFUSED"

This reverts commit bc2a26702e6460aee65fe170671336d670ba3eb9 (almost).
It would be best to avoid retrying with the same NS and keep trying with
others (if any), but that would require larger changes if it should work
well, so let's err on the side of sending more queries.

8 years agolayer/validate: don't try to find proof of DS non-existence in CNAME'ed answer for...
Grigorii Demidov [Tue, 23 May 2017 09:15:39 +0000 (11:15 +0200)] 
layer/validate: don't try to find proof of DS non-existence in CNAME'ed answer for DS query

8 years agovalidate: avoid keeping KR_RANK_MISSING
Vladimír Čunát [Mon, 22 May 2017 13:13:19 +0000 (15:13 +0200)] 
validate: avoid keeping KR_RANK_MISSING

If a sub-query transitions the state to QUERY_DNSSEC_INSECURE,
we didn't set correct rank.  This lead to caching with _MISSING rank
which is too low to be utilized on re-queries.  Example: nix.mx query.

8 years agoMerge !294: iterate: tweak ranks of rrsigs
Vladimír Čunát [Fri, 19 May 2017 15:39:46 +0000 (17:39 +0200)] 
Merge !294: iterate: tweak ranks of rrsigs

8 years agoranked rrarray: don't merge RRSIGs of different types
Vladimír Čunát [Fri, 19 May 2017 12:59:39 +0000 (14:59 +0200)] 
ranked rrarray: don't merge RRSIGs of different types

For example, kr_rrmap_add has been relying on sets covering just a
single type (for years).  It's used by cache and there it's required to
store types separately.

It seems all other parts of code should be just OK with this.

8 years agoiterate: tweak ranks of rrsigs
Vladimír Čunát [Fri, 19 May 2017 10:40:56 +0000 (12:40 +0200)] 
iterate: tweak ranks of rrsigs

The bit about RRSIG coming from an authoritative source is still used
and possibly useful.  The inconsistency was causing rrcache to fetch
a record without its signature under some circumstances, depending on
the record type and how it was obtained.

8 years agoMerge !293: policy: add missing local range 100.64.0.0/10
Vladimír Čunát [Thu, 18 May 2017 17:17:47 +0000 (19:17 +0200)] 
Merge !293: policy: add missing local range 100.64.0.0/10

8 years agopolicy: add missing local range 100.64.0.0/10
Vladimír Čunát [Thu, 18 May 2017 17:13:28 +0000 (19:13 +0200)] 
policy: add missing local range 100.64.0.0/10

Thanks to Petr for finding this issue.

8 years agoMerge !292: nitpicks (misc)
Vladimír Čunát [Wed, 17 May 2017 14:57:25 +0000 (16:57 +0200)] 
Merge !292: nitpicks (misc)

8 years agoQRVERBOSE: const parameter
Vladimír Čunát [Wed, 17 May 2017 14:52:36 +0000 (16:52 +0200)] 
QRVERBOSE: const parameter

8 years agodocs: policy:add -> policy.add
Vladimír Čunát [Wed, 17 May 2017 14:44:47 +0000 (16:44 +0200)] 
docs: policy:add -> policy.add

The old API was deprecated long time ago.

8 years agopktcache: add a comment about wildcard expansions
Vladimír Čunát [Wed, 17 May 2017 11:46:40 +0000 (13:46 +0200)] 
pktcache: add a comment about wildcard expansions

8 years agoMerge !291: command line: specify ports via @ but remain compatible
Vladimír Čunát [Wed, 17 May 2017 14:42:47 +0000 (16:42 +0200)] 
Merge !291: command line: specify ports via @ but remain compatible

8 years agocommand line: specify ports via @ but remain compatible
Vladimír Čunát [Wed, 17 May 2017 14:17:32 +0000 (16:17 +0200)] 
command line: specify ports via @ but remain compatible

8 years agoMerge !290: validate: fix a typo leading to lower rank
Vladimír Čunát [Wed, 17 May 2017 11:08:11 +0000 (13:08 +0200)] 
Merge !290: validate: fix a typo leading to lower rank

8 years agovalidate: fix a typo leading to lower rank
Vladimír Čunát [Wed, 17 May 2017 11:00:33 +0000 (13:00 +0200)] 
validate: fix a typo leading to lower rank

The authority records weren't marked with _INSECURE rank and remained
with a *lower* one.  That could lead to them not being cached,
effectively.

8 years agoMerge !285: caches: improve, especially in STUB and future FORWARD modes
Vladimír Čunát [Fri, 12 May 2017 11:19:42 +0000 (13:19 +0200)] 
Merge !285: caches: improve, especially in STUB and future FORWARD modes

Fixes #122 (mostly).

8 years agorrcache: improve verbose message
Vladimír Čunát [Thu, 11 May 2017 08:56:46 +0000 (10:56 +0200)] 
rrcache: improve verbose message

... for reading RRSIGs

8 years agoREADME.md: update.
Vladimír Čunát [Wed, 10 May 2017 10:17:08 +0000 (12:17 +0200)] 
README.md: update.

8 years agokr_rplan_next: remove prototype
Vladimír Čunát [Thu, 4 May 2017 08:48:55 +0000 (10:48 +0200)] 
kr_rplan_next: remove prototype

It had no implementation for years - since 456e5446ad4.

8 years agoMerge !289: fix compiling with luajit-2.1.0-beta3
Vladimír Čunát [Tue, 2 May 2017 09:58:58 +0000 (11:58 +0200)] 
Merge !289: fix compiling with luajit-2.1.0-beta3

Upstream released the bump yesterday.
Tested with 2.0.4, 2.1.0-beta{2,3}.

8 years agofix compiling with luajit-2.1.0-beta3
Vladimír Čunát [Tue, 2 May 2017 09:52:31 +0000 (11:52 +0200)] 
fix compiling with luajit-2.1.0-beta3

It added a function from lua > 5.1, without bumping the language
version.  The changelog seems safe and Deckard still passes.

8 years agoUse default padding policy for responses.
Daniel Kahn Gillmor [Sun, 26 Mar 2017 15:42:02 +0000 (10:42 -0500)] 
Use default padding policy for responses.

net.tls_padding() can now take a boolean in addition to a numeric
value.  true means "use sensible default padding policy", false means
"never pad".

In the struct kr_context, we change tls_padding from a uint32_t to an
int32_t so that we can explicitly represent the default value (-1).
This should be a safe ABI/API change, since no one had ever set a
padding > 4096 anyway.

This depends on libknot having adopted the changes from
2dd9f406e333a1cedfa2380ffad57913cecf8efb which is first included in
2.4.3.  In the event that knot-resolver is compiled against an older
version of libknot, it just uses a baked-in default of 468 as before.

See https://gitlab.labs.nic.cz/knot/resolver/merge_requests/249 for
further discussion.

8 years agoMerge branch 'fix-dnssec' into 'master'
Grigorii Demidov [Fri, 28 Apr 2017 11:59:33 +0000 (13:59 +0200)] 
Merge branch 'fix-dnssec' into 'master'

lib/dnssec: bugfix; libdnssec data structure was prematurely released after unsu…

See merge request !288

8 years agolib/dnssec: bugfix; libdnssec data structure was prematurely released after unsuccess...
Grigorii Demidov [Fri, 28 Apr 2017 10:37:26 +0000 (12:37 +0200)] 
lib/dnssec: bugfix; libdnssec data structure was prematurely released after unsuccessful attempt of signature validation

8 years agokresd: get more out of TLS logging when --verbose
Daniel Kahn Gillmor [Thu, 27 Apr 2017 20:18:34 +0000 (13:18 -0700)] 
kresd: get more out of TLS logging when --verbose

GnuTLS doesn't actually log very much at log level 1.

It currently logs things at the following levels:

level 3: asserts
level 4: handshake information
level 5: record-layer information
level 9: session keys, IVs, and internal secrets
level 10: raw network read and buffering information

level 5 seems like the right layer for "verbose", without leaking too
much sensitive stuff.

8 years agocaches: improvements to STUB and future FORWARD modes
Vladimír Čunát [Wed, 26 Apr 2017 15:39:05 +0000 (17:39 +0200)] 
caches: improvements to STUB and future FORWARD modes

Fixes #122, mostly.  CNAME chains aren't answered from cache in STUB
mode so far, because the current iterator would be unable to follow them.

Previously the caches avoided repeated lookups by checking if it has
a NS address for the query, which disabled any lookup in forwarding modes.
Now it sets the QUERY_NO_CACHE flag instead to stop repeating.

Also those more expensive kr_ta_covers_qry checks are deferred, so that
they're not done when not needed, e.g. in STUB or +cd mode.

8 years agoMerge !283: NEWS: entry about ad-refactor merge
Vladimír Čunát [Wed, 26 Apr 2017 12:51:48 +0000 (14:51 +0200)] 
Merge !283: NEWS: entry about ad-refactor merge

8 years agoNEWS: entry about ad-refactor merge
Vladimír Čunát [Wed, 26 Apr 2017 10:53:41 +0000 (12:53 +0200)] 
NEWS: entry about ad-refactor merge

I'd like to add NEWS entries already in the merge requests,
but I often forget.
Also mark version with -dev.

8 years agoMerge !269: refactoring: RR ranks and AD flag ('ad-refactor' branch)
Vladimír Čunát [Tue, 25 Apr 2017 08:32:42 +0000 (10:32 +0200)] 
Merge !269: refactoring: RR ranks and AD flag ('ad-refactor' branch)

8 years agomisc nitpicks, not really changing anything
Vladimír Čunát [Thu, 13 Apr 2017 14:09:39 +0000 (16:09 +0200)] 
misc nitpicks, not really changing anything

8 years agorrcache: always stash authority records
Vladimír Čunát [Mon, 24 Apr 2017 17:07:18 +0000 (19:07 +0200)] 
rrcache: always stash authority records

It's up to iterator to pick the interesting cases to auth_selected.

8 years agoMerge branch 'master' into ad-refactor
Vladimír Čunát [Mon, 24 Apr 2017 17:31:53 +0000 (19:31 +0200)] 
Merge branch 'master' into ad-refactor

8 years agoMerge !282: bootstrap-depends: update fstrm
Vladimír Čunát [Mon, 24 Apr 2017 15:07:06 +0000 (17:07 +0200)] 
Merge !282: bootstrap-depends: update fstrm

8 years agobootstrap-depends: update fstrm
Vladimír Čunát [Mon, 24 Apr 2017 14:10:09 +0000 (16:10 +0200)] 
bootstrap-depends: update fstrm

Hopefully this will fix the ./configure problem on Jenkins.
Also, an incorrect flag was passed.

8 years agoMerge branch 'release-1.2.6' into 'master' v1.2.6
Ondřej Surý [Mon, 24 Apr 2017 14:13:02 +0000 (16:13 +0200)] 
Merge branch 'release-1.2.6' into 'master'

NEWS: prepare for 1.2.6

See merge request !280

8 years agoNEWS: prepare for 1.2.6
Vladimír Čunát [Mon, 24 Apr 2017 12:54:46 +0000 (14:54 +0200)] 
NEWS: prepare for 1.2.6

8 years agoMerge branch 'deckard-update' into 'master'
Ondřej Surý [Mon, 24 Apr 2017 13:21:08 +0000 (15:21 +0200)] 
Merge branch 'deckard-update' into 'master'

Update deckard to latest master

See merge request !279

8 years agoUpdate deckard to latest master
Ondřej Surý [Mon, 24 Apr 2017 12:32:15 +0000 (14:32 +0200)] 
Update deckard to latest master

8 years agoMerge branch 'respdiff-allow-failure' into 'master'
Ondřej Surý [Mon, 24 Apr 2017 13:19:23 +0000 (15:19 +0200)] 
Merge branch 'respdiff-allow-failure' into 'master'

Allow canceling respdiff without penalty

See merge request !281

8 years agoAllow canceling respdiff without penalty
Ondřej Surý [Mon, 24 Apr 2017 13:17:55 +0000 (15:17 +0200)] 
Allow canceling respdiff without penalty

8 years agoMerge !278: lib/nsrep: revert some changes from commit 5581cf9b
Vladimír Čunát [Mon, 24 Apr 2017 12:25:50 +0000 (14:25 +0200)] 
Merge !278: lib/nsrep: revert some changes from commit 5581cf9b

Closes #179 and #178.

8 years agoMerge !277: dnssec/nsec: fix wildcards directly under the root
Vladimír Čunát [Mon, 24 Apr 2017 12:13:32 +0000 (14:13 +0200)] 
Merge !277: dnssec/nsec: fix wildcards directly under the root

8 years agolib/nsrep: revert some changes from commit 5581cf9b
Grigorii Demidov [Fri, 21 Apr 2017 12:30:05 +0000 (14:30 +0200)] 
lib/nsrep: revert some changes from commit 5581cf9b

8 years agodnssec/nsec: fix wildcard_match_check() to allow processing of *. wildcard
Grigorii Demidov [Wed, 19 Apr 2017 11:17:45 +0000 (13:17 +0200)] 
dnssec/nsec: fix wildcard_match_check() to allow processing of *. wildcard

8 years agoMerge branch 'ci-respdiff' into 'master'
Petr Špaček [Wed, 19 Apr 2017 07:53:29 +0000 (09:53 +0200)] 
Merge branch 'ci-respdiff' into 'master'

CI: run respdiff using docker image in Gitlab CI

See merge request !275

8 years agoMerge branch 'rrcache-pkt-clobber' into 'master'
Petr Špaček [Tue, 18 Apr 2017 14:07:48 +0000 (16:07 +0200)] 
Merge branch 'rrcache-pkt-clobber' into 'master'

rrcache: don't clobber pkt if failing the second step

See merge request !274

8 years agorrcache: don't clobber pkt if failing the second step
Vladimír Čunát [Tue, 18 Apr 2017 10:24:04 +0000 (12:24 +0200)] 
rrcache: don't clobber pkt if failing the second step

I hope fixing this bug should diminish the recent experiences of Google
domains failing to resolve on Turris Omnia.

8 years agoMerge branch 'fix-oo-wc-nodata' into 'master'
Vladimír Čunát [Tue, 18 Apr 2017 13:51:10 +0000 (15:51 +0200)] 
Merge branch 'fix-oo-wc-nodata' into 'master'

dnssec/nsec3: don't set AD flag in properly signed wildcard nodata answers

See merge request !273

8 years agoiterate: don't inherit _INSECURE on CNAME jumps
Vladimír Čunát [Thu, 13 Apr 2017 12:40:29 +0000 (14:40 +0200)] 
iterate: don't inherit _INSECURE on CNAME jumps

The jump may lead to secure zone, so let the sub-query find out by
itself.  Otherwise we might cache those RRs with INSECURE rank even
though they are secure.  This shouldn't harm AD flags anymore.

8 years agoCI: run respdiff using docker image in Gitlab CI
Jan Holusa [Thu, 13 Apr 2017 12:03:24 +0000 (14:03 +0200)] 
CI: run respdiff using docker image in Gitlab CI