]> git.ipfire.org Git - thirdparty/knot-resolver.git/log
thirdparty/knot-resolver.git
9 years agoMerge branch 'master' into ad-refactor
Vladimír Čunát [Fri, 31 Mar 2017 11:02:23 +0000 (13:02 +0200)] 
Merge branch 'master' into ad-refactor

9 years agoMerge !250: lib/nsrep: fix ip6 cycle
Vladimír Čunát [Fri, 31 Mar 2017 10:47:02 +0000 (12:47 +0200)] 
Merge !250: lib/nsrep: fix ip6 cycle

kresd doesn't try all NS during resolving www.fastly.com when operates
in ipv6-only network.  This fix changes reputation cache behavior
in order to avoid NS address resolving retry in the case the first
attempt is failed both for ip4 & ip6.

9 years agolib/nsrep: don't treat servers with NOIP4 + NOIP6 flags as timeouted
Grigorii Demidov [Thu, 30 Mar 2017 11:38:40 +0000 (13:38 +0200)] 
lib/nsrep: don't treat servers with NOIP4 + NOIP6 flags as timeouted

9 years agoWIP: drafting rank refactoring
Vladimír Čunát [Wed, 29 Mar 2017 14:24:01 +0000 (16:24 +0200)] 
WIP: drafting rank refactoring

9 years agoMerge !240: trust anchors: support non-root TAs, one domain per file
Vladimír Čunát [Wed, 29 Mar 2017 11:16:10 +0000 (13:16 +0200)] 
Merge !240: trust anchors: support non-root TAs, one domain per file

9 years agouse a different mechanism for AD flag
Vladimír Čunát [Fri, 3 Mar 2017 10:56:19 +0000 (11:56 +0100)] 
use a different mechanism for AD flag

To make this work, do not use KR_VLDRANK_SECURE as the default value.
It's just too dangerous, and here it complicated determining the
appropriate value for the AD flag.

9 years agoMerge !241: policy.DENY: set AA flag and clear AD flag
Vladimír Čunát [Mon, 27 Mar 2017 12:43:32 +0000 (14:43 +0200)] 
Merge !241: policy.DENY: set AA flag and clear AD flag

9 years agoMerge branch 'mode-examples' into 'master'
Petr Špaček [Mon, 27 Mar 2017 12:38:05 +0000 (14:38 +0200)] 
Merge branch 'mode-examples' into 'master'

config docs: add examples to mode()

See merge request !245

9 years agoMerge branch 'master' and update deckard
Vladimír Čunát [Mon, 27 Mar 2017 12:23:09 +0000 (14:23 +0200)] 
Merge branch 'master' and update deckard

We need this to fix the tests.

9 years agoresolve answer_finalize(): check knot_pkt_put errors
Vladimír Čunát [Fri, 3 Mar 2017 09:14:55 +0000 (10:14 +0100)] 
resolve answer_finalize(): check knot_pkt_put errors

9 years agoconfig docs: add examples to mode()
Vladimír Čunát [Fri, 24 Mar 2017 10:42:30 +0000 (11:42 +0100)] 
config docs: add examples to mode()

Improved by comments from Petr.

9 years agoMerge branch 'better-help-text' into 'master'
Ondřej Surý [Sun, 26 Mar 2017 18:22:23 +0000 (20:22 +0200)] 
Merge branch 'better-help-text' into 'master'

Auto-generate numeric limits and defaults in help text.

See merge request !248

9 years agoAuto-generate numeric limits and defaults in help text.
Daniel Kahn Gillmor [Sun, 26 Mar 2017 15:28:31 +0000 (10:28 -0500)] 
Auto-generate numeric limits and defaults in help text.

9 years agoMerge branch 'better-padding-default' into 'master'
Ondřej Surý [Sun, 26 Mar 2017 18:19:44 +0000 (20:19 +0200)] 
Merge branch 'better-padding-default' into 'master'

Improve default padding of responses.

See merge request !247

9 years agoImprove default padding of responses.
Daniel Kahn Gillmor [Sat, 25 Mar 2017 22:00:53 +0000 (17:00 -0500)] 
Improve default padding of responses.

At NDSS 2017's DNS privacy workshop, I presented an empirical study of
DNS padding policies:

https://www.internetsociety.org/events/ndss-symposium/ndss-symposium-2017/dns-privacy-workshop-2017-programme#session3

The slide deck is here:
https://dns.cmrg.net/ndss2017-dprive-empirical-DNS-traffic-size.pdf

The resulting recommendation from the research is that a simple
padding policy is relatively cheap and still protective of metadata
when DNS traffic is encrypted:

 * queries should be padded to a multiple of 128 octets
 * responses should be padded to a multiple of 468 octets

This change adjusts the default policy to match these recommendations.

I recently proposed a similar change to libknot to define a standard
policy in a centralized place:

https://gitlab.labs.nic.cz/labs/knot/merge_requests/692

I'll submit a followup request to make use of that centralized policy
(once kresd is willing to depend on a newer version of libknot), but
please consider this proposed change first.

9 years agoMerge branch !246: lib/resolve: avoid unnecessary DS queries
Vladimír Čunát [Fri, 24 Mar 2017 14:16:33 +0000 (15:16 +0100)] 
Merge branch !246: lib/resolve: avoid unnecessary DS queries

9 years agoMerge !244: dnssec/nsec: validate wildcard no-data answers
Vladimír Čunát [Fri, 24 Mar 2017 13:38:22 +0000 (14:38 +0100)] 
Merge !244: dnssec/nsec: validate wildcard no-data answers

9 years agoMerge !243: don't set AD flag for opt-out wildcard answers
Vladimír Čunát [Fri, 24 Mar 2017 12:23:48 +0000 (13:23 +0100)] 
Merge !243: don't set AD flag for opt-out wildcard answers

9 years agolib/resolve: avoid unnecessary DS queries
Grigorii Demidov [Fri, 24 Mar 2017 11:51:36 +0000 (12:51 +0100)] 
lib/resolve: avoid unnecessary DS queries

9 years agodnssec/nsec: missed wildcard no-data answers validation has been implemented
Grigorii Demidov [Thu, 23 Mar 2017 13:42:12 +0000 (14:42 +0100)] 
dnssec/nsec: missed wildcard no-data answers validation has been implemented

9 years agotest/deckard: update to actual version
Grigorii Demidov [Wed, 22 Mar 2017 13:37:36 +0000 (14:37 +0100)] 
test/deckard: update to actual version

9 years agoMerge !242: kr_bitcmp: shut up a warning
Vladimír Čunát [Wed, 22 Mar 2017 12:20:47 +0000 (13:20 +0100)] 
Merge !242: kr_bitcmp: shut up a warning

9 years agolayer/validate: check if NSEC3 records in wildcard expansion proof has an optout
Grigorii Demidov [Wed, 22 Mar 2017 12:18:06 +0000 (13:18 +0100)] 
layer/validate: check if NSEC3 records in wildcard expansion proof has an optout

9 years agokr_bitcmp: shut up a warning
Vladimír Čunát [Wed, 22 Mar 2017 12:15:30 +0000 (13:15 +0100)] 
kr_bitcmp: shut up a warning

9 years agoMerge !239: check if iterator has not selected any records
Vladimír Čunát [Wed, 22 Mar 2017 10:13:28 +0000 (11:13 +0100)] 
Merge !239: check if iterator has not selected any records

9 years agolayer/iterate: nitpick - better variable name
Grigorii Demidov [Wed, 22 Mar 2017 08:50:19 +0000 (09:50 +0100)] 
layer/iterate: nitpick - better variable name

9 years agopolicy.DENY: set AA flag and clear AD flag
Vladimír Čunát [Tue, 21 Mar 2017 16:35:58 +0000 (17:35 +0100)] 
policy.DENY: set AA flag and clear AD flag

I see no sane way to set the flags from lua, so I made a C function.

9 years agolua bindings: regenerate query flags
Vladimír Čunát [Tue, 21 Mar 2017 16:35:14 +0000 (17:35 +0100)] 
lua bindings: regenerate query flags

9 years agoMerge !234: kr_bitcmp: adjust semantics -> memcmp
Vladimír Čunát [Tue, 21 Mar 2017 14:57:41 +0000 (15:57 +0100)] 
Merge !234: kr_bitcmp: adjust semantics -> memcmp

9 years agoview docs: add example matching all addresses
Vladimír Čunát [Fri, 17 Mar 2017 12:03:55 +0000 (13:03 +0100)] 
view docs: add example matching all addresses

This started working since the grandparent commit.  Suggested at
https://gitter.im/CZ-NIC/knot-resolver?at=58ca5a03f7f7d48104212607

9 years agokr_bitcmp: add meaning to NULL inputs
Vladimír Čunát [Fri, 17 Mar 2017 11:51:42 +0000 (12:51 +0100)] 
kr_bitcmp: add meaning to NULL inputs

Reasoning: we currently only use the function from lua modules and nil
values are very common there; I want to pick these changes to a bugfix
update without extensive checking whether the modules might pass
invalid input if user passes invalid config and thus introduce new
crashes.  The checks also seem cheap performance-wise.

9 years agokr_bitcmp: adjust semantics -> memcmp
Vladimír Čunát [Wed, 15 Mar 2017 13:55:39 +0000 (14:55 +0100)] 
kr_bitcmp: adjust semantics -> memcmp

Motivation: allow bits=0 and consequently 0.0.0.0/0 matches in view
and renumber modules.
https://gitter.im/CZ-NIC/knot-resolver?at=58c940c721d548df2cdfda5e

We shouldn't mix up error codes with valid results from memcmp;
let's just segfault if someone passes a NULL, just as memcmp() itself.

9 years agolayer/validate: better debug message
Grigorii Demidov [Tue, 21 Mar 2017 13:21:37 +0000 (14:21 +0100)] 
layer/validate: better debug message

9 years agotrust anchors: support non-root TAs, one domain per file
Vladimír Čunát [Fri, 17 Mar 2017 12:33:54 +0000 (13:33 +0100)] 
trust anchors: support non-root TAs, one domain per file

function `add_file` is added as an alias to `config`,
but otherwise the interface is almost identical.

9 years agotrust anchors: just move the code around
Vladimír Čunát [Fri, 17 Mar 2017 10:40:32 +0000 (11:40 +0100)] 
trust anchors: just move the code around

- update() had nothing to do in the public interface
- config() implementation moved out of the definition of the main table

9 years agoresolve.c trust_chain_check: fix nested trust anchors
Vladimír Čunát [Mon, 20 Mar 2017 18:14:03 +0000 (19:14 +0100)] 
resolve.c trust_chain_check: fix nested trust anchors

We have to update the RR with the TA even when transitioning from one
(positive) TA to another, e.g. if one adds both root and non-root TA(s).

9 years agoMerge !233: trust anchors: store in prettier format
Vladimír Čunát [Tue, 21 Mar 2017 12:06:45 +0000 (13:06 +0100)] 
Merge !233: trust anchors: store in prettier format

Closes #167.

9 years agoMerge !236: worker_resolve: truly honor the options parameter
Vladimír Čunát [Tue, 21 Mar 2017 12:05:20 +0000 (13:05 +0100)] 
Merge !236: worker_resolve: truly honor the options parameter

9 years agolayer/iterate: imprevements in unhelpfull referral processing
Grigorii Demidov [Tue, 21 Mar 2017 11:48:07 +0000 (12:48 +0100)] 
layer/iterate: imprevements in unhelpfull referral processing

9 years agolayer/validate: check if iterator has not selected any records for validating from...
Grigorii Demidov [Tue, 21 Mar 2017 10:22:13 +0000 (11:22 +0100)] 
layer/validate: check if iterator has not selected any records for validating from non-empty authoritative answer

9 years agoMerge !237: layer/validate: clear AD with optout NSEC3
Vladimír Čunát [Mon, 20 Mar 2017 11:50:29 +0000 (12:50 +0100)] 
Merge !237: layer/validate: clear AD with optout NSEC3

Fixes #169.

9 years agolayer/validate: clear AD if closest encloser proof has optouted NSEC3
Grigorii Demidov [Fri, 17 Mar 2017 08:20:17 +0000 (09:20 +0100)] 
layer/validate: clear AD if closest encloser proof has optouted NSEC3

9 years agoMerge !238: fix logging of glue addresses
Vladimír Čunát [Mon, 20 Mar 2017 08:34:22 +0000 (09:34 +0100)] 
Merge !238: fix logging of glue addresses

9 years agolayer/iterate: fix logging of glue addresses
Petr Špaček [Sun, 19 Mar 2017 10:39:08 +0000 (11:39 +0100)] 
layer/iterate: fix logging of glue addresses

Previously even loopback glue addresses were logged using message
'<= using glue ...' which was very confusing. From now the loopback
addresses are logged using '<= ignoring invalid glue ...'.

Logging was moved into the function update_nsaddr() to avoid changing
return codes. As far as I can tell it does not produce any confusing
messages.

9 years agoCI: always use commited Deckard version
Petr Špaček [Fri, 17 Mar 2017 10:04:37 +0000 (11:04 +0100)] 
CI: always use commited Deckard version

9 years agocheck-integration: Warn if Deckard does not match commited version
Petr Špaček [Fri, 17 Mar 2017 10:03:31 +0000 (11:03 +0100)] 
check-integration: Warn if Deckard does not match commited version

9 years agoworker_resolve: truly honor the options parameter
Vladimír Čunát [Wed, 15 Mar 2017 15:37:36 +0000 (16:37 +0100)] 
worker_resolve: truly honor the options parameter

It was being overwritten by options from struct kr_context;
now the flags are combined (by set union).

For example, the NO_CACHE flag is important for the prefetch module and
for trust anchor updates.

9 years agotrust anchors: add KeyTag into comments
Vladimír Čunát [Tue, 14 Mar 2017 17:21:50 +0000 (18:21 +0100)] 
trust anchors: add KeyTag into comments

Fixes #167.

9 years agotrust anchors: store in prettier format (#167)
Vladimír Čunát [Mon, 13 Mar 2017 19:38:58 +0000 (20:38 +0100)] 
trust anchors: store in prettier format (#167)

The output is only better if built with libknot >= 2.4.0.
As a side-effect, add lua method knot_rrset_t::txt_dump;
it's a light wrapper around knot_rrset_txt_dump.

Re-tested rolling with a.moot-servers.net, to be sure.

9 years agodaemon/lua/kres.lua -> *.in
Vladimír Čunát [Mon, 13 Mar 2017 19:26:46 +0000 (20:26 +0100)] 
daemon/lua/kres.lua -> *.in

9 years agoversion: don't depend on rr2str output style
Vladimír Čunát [Mon, 13 Mar 2017 18:08:29 +0000 (19:08 +0100)] 
version: don't depend on rr2str output style

It would break after making rr2str pretty-print the data.

9 years agoMerge !235: dnstap.mk: fix race around dnstap.pb-c.h
Vladimír Čunát [Wed, 15 Mar 2017 14:30:48 +0000 (15:30 +0100)] 
Merge !235: dnstap.mk: fix race around dnstap.pb-c.h

9 years agodnstap.mk: fix race around dnstap.pb-c.h
Vladimír Čunát [Tue, 14 Mar 2017 18:14:13 +0000 (19:14 +0100)] 
dnstap.mk: fix race around dnstap.pb-c.h

Probably.  The problem sometimes appeared on osx Travis.

9 years agoMerge !232: nitpick in kresd(8) man page
Vladimír Čunát [Mon, 13 Mar 2017 22:11:44 +0000 (23:11 +0100)] 
Merge !232: nitpick in kresd(8) man page

9 years agokresd(8) should refer to the resolver as "kresd", not as "unbound"
Daniel Kahn Gillmor [Mon, 13 Mar 2017 22:00:53 +0000 (18:00 -0400)] 
kresd(8) should refer to the resolver as "kresd", not as "unbound"

9 years agoMerge branch 'release-1.2.4' into '1.2' v1.2.4
Ondřej Surý [Thu, 9 Mar 2017 12:55:25 +0000 (13:55 +0100)] 
Merge branch 'release-1.2.4' into '1.2'

Knot Resolver 1.2.4

See merge request !231

9 years agoKnot Resolver 1.2.4
Ondřej Surý [Thu, 9 Mar 2017 12:07:27 +0000 (13:07 +0100)] 
Knot Resolver 1.2.4

9 years agoUpdate deckard to latest master
Ondřej Surý [Thu, 9 Mar 2017 12:44:15 +0000 (13:44 +0100)] 
Update deckard to latest master

9 years agoMerge branch 'cherry-pick-2ff4eb98' into '1.2'
Ondřej Surý [Wed, 8 Mar 2017 12:39:34 +0000 (13:39 +0100)] 
Merge branch 'cherry-pick-2ff4eb98' into '1.2'

Merge branch 'fix-auth-qname' into '1.2'

See merge request !230

9 years agoGet a fresh deckard copy before the build
Ondřej Surý [Wed, 8 Mar 2017 12:24:42 +0000 (13:24 +0100)] 
Get a fresh deckard copy before the build

9 years agoUpdate NEWS
Ondřej Surý [Wed, 8 Mar 2017 12:03:03 +0000 (13:03 +0100)] 
Update NEWS

9 years agoMerge branch 'fix-auth-qname' into 'master'
Ondřej Surý [Wed, 8 Mar 2017 10:58:14 +0000 (11:58 +0100)] 
Merge branch 'fix-auth-qname' into 'master'

layer\iterate: when processing delegations, check if qname is at\below new authority

See merge request !229

9 years agoMerge branch '1.2.4-dev' into '1.2'
Ondřej Surý [Wed, 8 Mar 2017 12:00:08 +0000 (13:00 +0100)] 
Merge branch '1.2.4-dev' into '1.2'

1.2.4 dev

See merge request !227

9 years agoMerge branch 'fix-auth-qname' into 'master'
Ondřej Surý [Wed, 8 Mar 2017 10:58:14 +0000 (11:58 +0100)] 
Merge branch 'fix-auth-qname' into 'master'

layer\iterate: when processing delegations, check if qname is at\below new authority

See merge request !229

9 years agolayer\iterate: when proccessing delegations, check if qname is at\below new authority
Grigorii Demidov [Wed, 8 Mar 2017 10:14:00 +0000 (11:14 +0100)] 
layer\iterate: when proccessing delegations, check if qname is at\below new authority

9 years agoUpdate deckard to val_cname_secure_insecure tests
Ondřej Surý [Mon, 6 Mar 2017 12:50:58 +0000 (13:50 +0100)] 
Update deckard to val_cname_secure_insecure tests

9 years agoMerge branch 'update-gitignore-zonefile.lua' into 'master'
Ondřej Surý [Mon, 6 Mar 2017 12:32:11 +0000 (13:32 +0100)] 
Merge branch 'update-gitignore-zonefile.lua' into 'master'

Add daemon/lua/zonefile.lua to git ignore list

See merge request !228

9 years agoAdd daemon/lua/zonefile.lua to git ignore list
Ondřej Surý [Mon, 6 Mar 2017 12:29:17 +0000 (13:29 +0100)] 
Add daemon/lua/zonefile.lua to git ignore list

9 years agoClarify conditions when invalid RRSIG can lead to AD=1 response
Petr Špaček [Mon, 6 Mar 2017 12:24:20 +0000 (13:24 +0100)] 
Clarify conditions when invalid RRSIG can lead to AD=1 response

Further clarification of fb957a9b5593aaa46dcfddd9adb488cf898b4a45

9 years agoMerge branch 'dnstap' into 'master'
Ondřej Surý [Mon, 6 Mar 2017 12:08:03 +0000 (13:08 +0100)] 
Merge branch 'dnstap' into 'master'

add dnstap module

See merge request !213

9 years agoTest failing make clean on missing dnstap dependencies
Ondřej Surý [Mon, 6 Mar 2017 12:06:13 +0000 (13:06 +0100)] 
Test failing make clean on missing dnstap dependencies

9 years agomodules/dnstap: Change option names to socket_path and log_responses, we don't use...
Ondřej Surý [Mon, 6 Mar 2017 12:02:18 +0000 (13:02 +0100)] 
modules/dnstap: Change option names to socket_path and log_responses, we don't use camelCase anywhere else

9 years agodnstap module also needs protobuf-c compiler (protoc-c)
Ondřej Surý [Mon, 6 Mar 2017 11:54:40 +0000 (12:54 +0100)] 
dnstap module also needs protobuf-c compiler (protoc-c)

9 years agomodules/dnstap: move description into the docs
Vladimír Čunát [Wed, 22 Feb 2017 13:47:26 +0000 (14:47 +0100)] 
modules/dnstap: move description into the docs

9 years agomodules/dnstap: nitpicks
Vladimír Čunát [Wed, 22 Feb 2017 12:50:10 +0000 (13:50 +0100)] 
modules/dnstap: nitpicks

9 years agodnstap.proto: move from contrib into module
Vladimír Čunát [Wed, 22 Feb 2017 12:10:21 +0000 (13:10 +0100)] 
dnstap.proto: move from contrib into module

... and generate files instead of including them.

9 years agominor changes from https://github.com/CZ-NIC/knot-resolver/pull/39
Vicky Shrestha [Tue, 17 Jan 2017 08:08:17 +0000 (08:08 +0000)] 
minor changes from https://github.com/CZ-NIC/knot-resolver/pull/39

9 years agoadding dnstap to documentation
Vicky Shrestha [Fri, 30 Dec 2016 20:14:55 +0000 (12:14 -0800)] 
adding dnstap to documentation

9 years agodnstap tests requires go 1.5+
Vicky Shrestha [Fri, 30 Dec 2016 20:14:02 +0000 (12:14 -0800)] 
dnstap tests requires go 1.5+

removing it from make test since default go version for language
C in Travis is 1.4 which has no vendoring support

9 years agoadding dnstap dependencies to bootstrap
Vicky Shrestha [Mon, 26 Dec 2016 09:16:05 +0000 (01:16 -0800)] 
adding dnstap dependencies to bootstrap

9 years agofixing makefile to compile protobuf if dnstap is enabled
Vicky Shrestha [Mon, 26 Dec 2016 08:05:49 +0000 (00:05 -0800)] 
fixing makefile to compile protobuf if dnstap is enabled

9 years agoFixing structs after rebasing upstream changes
Vicky Shrestha [Sat, 24 Dec 2016 18:04:53 +0000 (10:04 -0800)] 
Fixing structs after rebasing upstream changes

9 years agodnstap testing application
Vicky Shrestha [Thu, 8 Dec 2016 07:26:04 +0000 (23:26 -0800)] 
dnstap testing application

9 years agoAdding dnstap module
Vicky Shrestha [Thu, 22 Sep 2016 22:32:27 +0000 (15:32 -0700)] 
Adding dnstap module

9 years agoClarify security section
Ondřej Surý [Mon, 6 Mar 2017 11:41:01 +0000 (12:41 +0100)] 
Clarify security section

9 years agoUpdate NEWS
Ondřej Surý [Mon, 6 Mar 2017 10:59:17 +0000 (11:59 +0100)] 
Update NEWS

9 years agolib/resolve: deferred answer processing was fixed
Grigorii Demidov [Fri, 3 Mar 2017 09:17:06 +0000 (10:17 +0100)] 
lib/resolve: deferred answer processing was fixed

9 years agorrcache: don't store NSEC3 and their signatures
Vladimír Čunát [Thu, 2 Mar 2017 17:28:14 +0000 (18:28 +0100)] 
rrcache: don't store NSEC3 and their signatures

They would end up cached by their hashed owner names and then even
returned if explicitly queried by that hashed name, which is not correct:
https://tools.ietf.org/html/rfc4035#section-2.3

Internally we only need these for non-existence proofs, and those are
stored in pktcache instead.

9 years agolayer/validate: don't treat anwsers which contain DS non-existance proof as unsecured
Grigorii Demidov [Wed, 1 Mar 2017 12:47:27 +0000 (13:47 +0100)] 
layer/validate: don't treat anwsers which contain DS non-existance proof as unsecured

9 years agoMerge !226: lib/resolve: deferred answer processing was fixed
Vladimír Čunát [Fri, 3 Mar 2017 12:28:28 +0000 (13:28 +0100)] 
Merge !226: lib/resolve: deferred answer processing was fixed

9 years agoMerge !225: rrcache: don't store NSEC3 and their signatures
Vladimír Čunát [Fri, 3 Mar 2017 12:04:02 +0000 (13:04 +0100)] 
Merge !225: rrcache: don't store NSEC3 and their signatures

9 years agoMerge !224: layer/validate: fix missing AD flag in some cases
Vladimír Čunát [Fri, 3 Mar 2017 12:02:39 +0000 (13:02 +0100)] 
Merge !224: layer/validate: fix missing AD flag in some cases

Fixes #164.

9 years agolib/resolve: deferred answer processing was fixed
Grigorii Demidov [Fri, 3 Mar 2017 09:17:06 +0000 (10:17 +0100)] 
lib/resolve: deferred answer processing was fixed

9 years agorrcache: don't store NSEC3 and their signatures
Vladimír Čunát [Thu, 2 Mar 2017 17:28:14 +0000 (18:28 +0100)] 
rrcache: don't store NSEC3 and their signatures

They would end up cached by their hashed owner names and then even
returned if explicitly queried by that hashed name, which is not correct:
https://tools.ietf.org/html/rfc4035#section-2.3

Internally we only need these for non-existence proofs, and those are
stored in pktcache instead.

9 years agolayer/validate: don't treat anwsers which contain DS non-existance proof as unsecured
Grigorii Demidov [Wed, 1 Mar 2017 12:47:27 +0000 (13:47 +0100)] 
layer/validate: don't treat anwsers which contain DS non-existance proof as unsecured

9 years agoMerge !218: cherry-picks for 1.2.4
Vladimír Čunát [Wed, 1 Mar 2017 10:18:52 +0000 (11:18 +0100)] 
Merge !218: cherry-picks for 1.2.4

9 years agoupdate NEWS with notable chanages
Vladimír Čunát [Wed, 1 Mar 2017 10:16:38 +0000 (11:16 +0100)] 
update NEWS with notable chanages

9 years agoMerge branch 'full_check_integration' into 'master'
Petr Špaček [Wed, 1 Mar 2017 08:13:22 +0000 (09:13 +0100)] 
Merge branch 'full_check_integration' into 'master'

Update check-integration to run full test suite from Deckard

See merge request !220
(cherry picked from commit f8487fd6e7743bd4e92336750e8cada6a4296826)

9 years agodaemon: fixed memory leak and array bounds check fail
Marek Vavruša [Tue, 28 Feb 2017 19:05:20 +0000 (11:05 -0800)] 
daemon: fixed memory leak and array bounds check fail

(cherry picked from commit 924d99364548cf6f1b7d4d131fc08a3e04ecb524)

9 years agoMerge !221: daemon: fixed memory leak and array bounds check fail
Vladimír Čunát [Wed, 1 Mar 2017 09:59:56 +0000 (10:59 +0100)] 
Merge !221: daemon: fixed memory leak and array bounds check fail

Submitted as https://github.com/CZ-NIC/knot-resolver/pull/42