]>
git.ipfire.org Git - thirdparty/pdns.git/log
Pieter Lexis [Tue, 10 Dec 2019 10:45:43 +0000 (11:45 +0100)]
pkgs: drop EL6
Pieter Lexis [Tue, 10 Dec 2019 10:40:31 +0000 (11:40 +0100)]
rec: drop EL6 pkg support
Otto Moerbeek [Tue, 8 Dec 2020 07:06:38 +0000 (08:06 +0100)]
Merge pull request #9799 from Habbie/backport-9574-to-rec-4.4.x
rec-4.4.x: Ensure socket-dir matches runtimedir on old systemd
Otto Moerbeek [Mon, 7 Dec 2020 14:04:45 +0000 (15:04 +0100)]
Merge pull request #9825 from omoerbeek/backport-9807-to-rec-4.4.x
rec: Backport 9807 to rec 4.4.x: Untangle the validation/resolving qnames and qtypes
Remi Gacogne [Wed, 2 Dec 2020 13:46:19 +0000 (14:46 +0100)]
rec: Untangle the validation/resolving qnames and qtypes
(cherry picked from commit
6d1218188747bdeb9f8fddc52a0499a8d9490ff4 )
Remi Gacogne [Mon, 7 Dec 2020 13:57:04 +0000 (14:57 +0100)]
Merge pull request #9821 from rgacogne/rec44-more-bogus-states
rec-4.4.x: Move to several distinct Bogus states, for easier debugging
Remi Gacogne [Mon, 7 Dec 2020 12:32:17 +0000 (13:32 +0100)]
rec: Preserve compatibility with Lua scripts using the 'Bogus' state
Otto Moerbeek [Mon, 7 Dec 2020 12:28:03 +0000 (13:28 +0100)]
Merge pull request #9805 from omoerbeek/backport-9790-to-rec-4.4.x
rec: backport 9790 to rec-4.4.x: Do not chase CNAME during qname minization step 4
Remi Gacogne [Mon, 7 Dec 2020 09:22:36 +0000 (10:22 +0100)]
rec: Export a 'Bogus' metric as the sum of all other Bogus metrics
Remi Gacogne [Thu, 29 Oct 2020 15:00:14 +0000 (16:00 +0100)]
rec: Add more Bogus states to better match rfc8914 extended codes
(cherry picked from commit
fecac3ba8edd4f14d88bab29a215ef246e5af764 )
Remi Gacogne [Mon, 12 Oct 2020 10:43:04 +0000 (12:43 +0200)]
rec: Move to several distinct Bogus states, for easier debugging
This is especially useful after the fact, when the Bogus state is
retrieved from a cache and we don't have any clue left as to how
we ended up with that state.
(cherry picked from commit
fd8709153d9318904ef2b1063bff10244d9724fd )
Remi Gacogne [Tue, 1 Dec 2020 09:52:37 +0000 (10:52 +0100)]
rec: Do not chase CNAME during qname minization step 4
(cherry picked from commit
7373cea835239f1b18a72000821bb17b516d954b )
Pieter Lexis [Thu, 1 Oct 2020 18:36:51 +0000 (20:36 +0200)]
Ensure socket-dir matches runtimedir on old systemd
This is mostly a hack for systemd version <240 so using virtual hosting
on Ubuntu Bionic and EL7 does not lead to surprises.
This Commit explicitly adds the `--socket-dir` to the invocation of the
unit. Any users who want to use their own runtimedirs should use a
drop-in unit overriding ExecStart. I believe this does not validate the
principle of least surprise for those using the PowerDNS provided
packages and virtual hosting.
Fixes #9485
(cherry picked from commit
7bbaae110abb53f43d0bf60c81efe3bb8630a925 )
Otto Moerbeek [Thu, 26 Nov 2020 11:52:07 +0000 (12:52 +0100)]
Merge pull request #9774 from Habbie/backport-9766-to-rec-4.4.x
rec-4.4.x: APL records: fix endianness problem.
Peter van Dijk [Tue, 24 Nov 2020 14:13:49 +0000 (15:13 +0100)]
APL records: fix endianness problem. Closes #9763
(cherry picked from commit
a0d9f00d8d76bb07847abb2f837f7c629fb238b2 )
Otto Moerbeek [Mon, 16 Nov 2020 14:47:17 +0000 (15:47 +0100)]
Merge pull request #9719 from omoerbeek/backport-9707-to-rec-4.4.x
rec: Backport to 4.4.x: Do not add request to a wait chain that's already processed or being processed.
Otto Moerbeek [Mon, 16 Nov 2020 07:05:08 +0000 (08:05 +0100)]
Merge pull request #9687 from omoerbeek/backport-9651-to-rec-4.4.x
rec: Backport 9651 to rec 4.4.x: Allow to specify a name in getMetric() that is used for Prometheus export only.
Otto Moerbeek [Wed, 11 Nov 2020 11:02:50 +0000 (12:02 +0100)]
Do not add request to a wait chain that's already processed or being processed.
The following scenario can occur. Multiple concurrent clients doing the same query A
are needed to trigger it:
1. Incoming request A, which has a need for request X
2. Add request X to chain because we already have an identical outstanding request
3. We receive the reply for X
4. We process the chain
5. In the meantime a new request for X that's identical is added to the chain
6. The added id in step 5 is not being processed anymore -> timeout
This can happen if request X has TTL 0, otherwise the record cache would have a hit.
(cherry picked from commit
c647a254a0f863aabeaea9d33f673afa26c60457 )
Remi Gacogne [Thu, 12 Nov 2020 20:37:28 +0000 (21:37 +0100)]
Merge pull request #9710 from rgacogne/rec44-fakeaaa-cname-loop
rec-4.4.x: Avoid a CNAME loop detection issue with DNS64
Otto Moerbeek [Thu, 12 Nov 2020 19:22:34 +0000 (20:22 +0100)]
Merge pull request #9705 from Habbie/rec-4.4-nod-oversize
rec-4.4: do not send overly long NOD lookups
Remi Gacogne [Tue, 10 Nov 2020 10:16:43 +0000 (11:16 +0100)]
rec: Add a regression test for the DNS64 CNAME loop detection issue
(cherry picked from commit
c222611257ba7230b7d5f5cea76bf79067079ce2 )
Remi Gacogne [Tue, 10 Nov 2020 10:15:02 +0000 (11:15 +0100)]
rec: Avoid a CNAME loop detection issue with DNS64
When the requested qname is a CNAME to a second CNAME, the CNAME
loop detection might get incorrectly triggered because the CNAMEs
were already present in the vector of result records.
(cherry picked from commit
acc9751140f91020c2917831b70c7d51f744e91e )
Peter van Dijk [Wed, 11 Nov 2020 10:20:41 +0000 (11:20 +0100)]
rec-4.4: do not send overly long NOD lookups
Otto Moerbeek [Tue, 10 Nov 2020 08:19:32 +0000 (09:19 +0100)]
Merge pull request #9683 from omoerbeek/backport-9680-to-rec-4.4.x
rec: Backport 9680 to rec 4.4.x: If a.b.c CNAME x.a.b.c is encoutered, switch off QM
Otto Moerbeek [Fri, 30 Oct 2020 08:12:06 +0000 (09:12 +0100)]
Only prepend the pdns_recursor_ prefix if no 2nd arg to getMteric was
given.
This also fixes the lookup of the HELP entries since they require the
original key. So getAllStats() now returns the key, the prometheus name
and the value.
(cherry picked from commit
308cd14cac73ba48aca3d3953e12d1cc04a96bbb )
Otto Moerbeek [Wed, 28 Oct 2020 09:39:23 +0000 (10:39 +0100)]
Allow to specify a name that is used for Prometheus export only.
This can be used to specify names that are structured using Prometheus
conventions. If no name Prometheus name is given, do a more thorough
conversion to a name Prometheus likes by replacng any non-alnum
char by an underscore.
(cherry picked from commit
57c5fefb0f2d97e072f8a9e34a30729e6c24b52b )
Otto Moerbeek [Mon, 9 Nov 2020 11:39:58 +0000 (12:39 +0100)]
Merge pull request #9682 from omoerbeek/backport-9679-to-rec-4.4.x
rec: Backport 9679 to rec 4.4.x: Fix the processing of answers generated from gettag
Otto Moerbeek [Mon, 9 Nov 2020 09:36:58 +0000 (10:36 +0100)]
Use the same words for for both cases
(cherry picked from commit
90ef54c85523e845107fecda53b365e50ae69569 )
Otto Moerbeek [Fri, 6 Nov 2020 11:58:53 +0000 (12:58 +0100)]
If a.b.c CNAME x.a.b.c is encoutered, switch off
QM, it will lead to great recursion depth without result.
(cherry picked from commit
157d17730c4fa6b25c1e0f5e720b7e73ac7723aa )
Remi Gacogne [Fri, 6 Nov 2020 14:28:53 +0000 (15:28 +0100)]
rec: Add a regression test for answers generated from gettag
(cherry picked from commit
9fbfe39b195982fbce4123014a943a6f02bbe58d )
Remi Gacogne [Fri, 6 Nov 2020 10:56:58 +0000 (11:56 +0100)]
rec: Fix the processing of answers generated from gettag
The logic to let a RPZ match override the answers generated from Lua
was broken, ignoring the generated values.
(cherry picked from commit
995884ff35d9591857edd6aef0df07e892c19485 )
Otto Moerbeek [Tue, 13 Oct 2020 10:17:29 +0000 (12:17 +0200)]
Merge pull request #9605 from omoerbeek/rec-backport-to-4.4.x-sec-2020-07
rec: Backport of CVE-2020-25829 (any-cache-update) to 4.4.x
Remi Gacogne [Thu, 24 Sep 2020 16:02:13 +0000 (18:02 +0200)]
rec: Add a unit test for the ANY "just-in-time" cached records case
Remi Gacogne [Thu, 24 Sep 2020 16:01:16 +0000 (18:01 +0200)]
rec: Fix validation when more than one cached record is returned
We need to validate them RRSet by RRSet.
Remi Gacogne [Tue, 22 Sep 2020 14:49:34 +0000 (16:49 +0200)]
rec: Fix returning more than one cached records
The existing implementation did not properly update the DNSSEC
and authoritative status, and did not include all the needed
RRSIG and additional records.
Remi Gacogne [Tue, 22 Sep 2020 14:48:11 +0000 (16:48 +0200)]
rec: Prevent updating the status of all cached records for a name
Before that fix, it was possible to make the recursor update the
DNSSEC status of all cached records for a given name using an ANY
query.
This real issue is that we should retrieve the needed RRSIGs and
authority records for all cached records when processing an ANY
query, but this fix prevents the cache pollution which is the worst
part of the issue.
Otto Moerbeek [Fri, 2 Oct 2020 10:23:25 +0000 (12:23 +0200)]
Merge pull request #9579 from omoerbeek/backport-9434-to-rec-4.4.x
rec: Backport 9434 to rec 4.4.x: When deciding if we are auth in the local auth or forwarding case, DS is special
Otto Moerbeek [Fri, 4 Sep 2020 09:13:17 +0000 (11:13 +0200)]
Otto Moerbeek [Wed, 2 Sep 2020 13:57:40 +0000 (15:57 +0200)]
Test for the reported issue wrt doing an spurious DS queries
I'm trying to setup a valid a.test and b.test, using a non-recursive forward
but somehow my DNSSEC setup is not right. Cannot spot the issue atm.
(cherry picked from commit
5879cd2d6d8d374a3aaa38e280a16c4d01d16ef4 )
Otto Moerbeek [Wed, 2 Sep 2020 12:03:44 +0000 (14:03 +0200)]
When deciding if we are auth in the local auth or forwarding case,
for DS records we need to look at the parent of the particular name.
Seems to fix #9433
(cherry picked from commit
68f6b16cb2709d5cc9ca53823def2781cc2f1f06 )
Otto Moerbeek [Fri, 2 Oct 2020 09:10:45 +0000 (11:10 +0200)]
Merge pull request #9577 from omoerbeek/backport-9569-to-rec-4.4.x
rec: backport 9569 to rec 4.4.x: Don't parse any config with `--version`
Otto Moerbeek [Fri, 2 Oct 2020 09:10:24 +0000 (11:10 +0200)]
Merge pull request #9576 from omoerbeek/backport-9562-to-rec-4.4.x
rec: Backport 9562 to rec 4.4.x: Expose typed cache flush via Web API
Pieter Lexis [Thu, 1 Oct 2020 11:47:27 +0000 (13:47 +0200)]
recursor: Don't parse any config with `--version`
This ensures we don't log anything _apart_ from the version info.
Spotted in https://github.com/PowerDNS/pdns_recursor-ansible/issues/66
(cherry picked from commit
2733183fc0b35ed2b59c87aab5aaaa86688db778 )
Otto Moerbeek [Fri, 2 Oct 2020 08:21:21 +0000 (10:21 +0200)]
Be explicit we're talking about the recursor.
(cherry picked from commit
193a9a7a0b1c8791d4d9de2bee290d62a8d0114c )
Otto Moerbeek [Wed, 30 Sep 2020 08:24:33 +0000 (10:24 +0200)]
Expose typed cache flush via Web API
(cherry picked from commit
3bb2d9875c82776d91c2c7a7d4de1a8ce8ed3097 )
Otto Moerbeek [Wed, 30 Sep 2020 06:31:14 +0000 (08:31 +0200)]
Merge pull request #9557 from omoerbeek/rec-backport-9515-to-4.4.x
rec: Backport #9515 to rec 4.4.x: actually fix wipe-cache-typed
Otto Moerbeek [Tue, 29 Sep 2020 13:46:20 +0000 (15:46 +0200)]
Backport #9515 to 4.4.x: actually fix wipe-cache-typed
Otto Moerbeek [Fri, 25 Sep 2020 12:38:29 +0000 (14:38 +0200)]
Merge pull request #9528 from omoerbeek/backport-9471-to-rec-4.4.x
rec: Backport 9471 to rec-4.4.x: Log when going Bogus because of a missing SOA in authority
Otto Moerbeek [Fri, 25 Sep 2020 12:38:03 +0000 (14:38 +0200)]
Merge pull request #9526 from omoerbeek/backport-9495-to-rec-4.4.x
rec: Backport 9495 to rec 4.4.x: Watch the descriptor again after an out-of-order read timeout
Remi Gacogne [Tue, 15 Sep 2020 13:03:34 +0000 (15:03 +0200)]
rec: Log when going Bogus because of a missing SOA in authority
A missing SOA in the authority section of negative (NXDOMAIN, NODATA)
answers in a DNSSEC-secure zone currently leads to a Bogus result,
because the needed NSEC/NSEC3 could not be validated.
(cherry picked from commit
832f4fbdd7ef50d0e0ff5135ee6e270acc22df9d )
Remi Gacogne [Wed, 23 Sep 2020 08:31:36 +0000 (10:31 +0200)]
rec: Fix a typo in a comment
Co-authored-by: Otto Moerbeek <otto.moerbeek@open-xchange.com>
(cherry picked from commit
ebcde9cbc9e1239157963e581327cdacde3a862f )
Remi Gacogne [Mon, 21 Sep 2020 15:24:55 +0000 (17:24 +0200)]
rec: Watch the descriptor again after an out-of-order read timeout
It might be that there was no other incoming query on that connection
and we timed out while the response had not been sent yet, but the
client might want to re-use the connection after receving the response.
We try to reset the TTD, but that might fail when the socket descriptor
has already been removed.
(cherry picked from commit
b05ef1b472cfa3597dda44075f3947abd565008b )
Otto Moerbeek [Fri, 25 Sep 2020 06:39:11 +0000 (08:39 +0200)]
Merge pull request #9506 from omoerbeek/backport-9497-to-rec-4.4.x
rec: Backport 9497 to rec 4.4.x: raise an exception on invalid content in unknown record
Remi Gacogne [Tue, 11 Aug 2020 13:31:57 +0000 (15:31 +0200)]
rec: Fix invalid unknown record in the unit tests
(cherry picked from commit
dda934facbac96a0aad5a82f84113009ddf3ec92 )
Remi Gacogne [Tue, 11 Aug 2020 12:07:32 +0000 (14:07 +0200)]
Raise an exception on invalid first part (!= \#) in unknown records
(cherry picked from commit
2d79e3273b9b68bbdb0e45a2df1fbe4769296d07 )
Remi Gacogne [Tue, 11 Aug 2020 09:25:06 +0000 (11:25 +0200)]
Raise an exception on invalid hex content in unknown records
Otherwise we can end up reading uninitialised memory from the stack,
possibly leaking information.
This is only an issue if the content is read from an untrusted source
and can be passed back to an attacker.
(cherry picked from commit
f5234115710094a8a7bd0b5ebddaa1fde83a52f0 )
Remi Gacogne [Fri, 18 Sep 2020 06:44:12 +0000 (08:44 +0200)]
Merge pull request #9465 from omoerbeek/backport-9448-to-rec-4.4.x
rec: Backport 9448 to rec 4.4.x: We only want to do QName Minimization for the names in a forwarded domain.
Otto Moerbeek [Mon, 14 Sep 2020 09:30:42 +0000 (11:30 +0200)]
Use boost::optional to pass optional cutoff point. This way the
proper cutoff point can be specified for forwarded zones only,
making it possible to change it meaning witjout regular nameserver
lookups.
(cherry picked from commit
96ce7d340951b31a3e3d042455a1f0e7f3a6eb56 )
Otto Moerbeek [Mon, 14 Sep 2020 08:56:40 +0000 (10:56 +0200)]
Make code more clear by eliminating the "ancestor" as suggested by @rgacogne
(cherry picked from commit
1722d283bd3cf119870988213e9052bf0312a3e3 )
Otto Moerbeek [Fri, 11 Sep 2020 08:06:24 +0000 (10:06 +0200)]
If we're looking in the cache for NS for a forwarded name, we
can cut off the search at the forwarding domain.
I'm not sure if I like the added complexity...
(cherry picked from commit
007fb8008a7da4698dde9f65a8d7ace72d47970c )
Otto Moerbeek [Tue, 8 Sep 2020 09:59:32 +0000 (11:59 +0200)]
Take into account a potentially more specific NS we might
have in cache.
Also, do the forward lookup only once before the loop.
(cherry picked from commit
afb1d0393abd613b2f362e48d1e3dde3d34689ca )
Otto Moerbeek [Mon, 7 Sep 2020 10:17:30 +0000 (12:17 +0200)]
We only want to do QName Minimization for the names in a forwarded
domain.
E.g. if foo.bar.com is forwarded and the qname is x.foo.bar.com,
start the QM process with ancestor foo.bar.com, so the query is
directed to the forwarder. But if the qname is baz.bar.com, we do
regular QM, starting with the regular ancestor.
Should fix #9438 without breaking having forward for .
(cherry picked from commit
21af3294a6fdacd9632ecb3a05eb2ccf204d2fdb )
Otto Moerbeek [Fri, 11 Sep 2020 07:37:36 +0000 (09:37 +0200)]
Merge pull request #9458 from omoerbeek/backport-9454-to-rec-4.4.x
rec: backport to 4.4.x: Parts is reused, so clear the names it might contain.
Otto Moerbeek [Fri, 11 Sep 2020 06:34:20 +0000 (08:34 +0200)]
Merge pull request #9459 from rgacogne/rec44-remove-non-rec-tests
rec-4.4.x: Remove non-recursor tests
Remi Gacogne [Thu, 10 Sep 2020 09:27:03 +0000 (11:27 +0200)]
rec-4.4.x: Remove non-recursor tests
Otto Moerbeek [Wed, 9 Sep 2020 13:11:26 +0000 (15:11 +0200)]
Parts is reused, so clear the names it might contain.
(cherry picked from commit
bc3d2b7386e058c39872a3aa74101283b6f1af45 )
Otto Moerbeek [Fri, 28 Aug 2020 11:19:53 +0000 (13:19 +0200)]
Merge pull request #9376 from omoerbeek/rec-rpz-store-trigger
Rec: rpz store trigger in appliedPolicy and protobuf message
Otto Moerbeek [Fri, 28 Aug 2020 09:36:50 +0000 (11:36 +0200)]
Add new field `AppliedPolicyHit` to regress test.
Otto Moerbeek [Fri, 28 Aug 2020 09:29:33 +0000 (11:29 +0200)]
Document new Lua dq fields and centralize logging in handle olicyHit functions.
Plus corrections from review.
Otto Moerbeek [Mon, 17 Aug 2020 12:44:42 +0000 (14:44 +0200)]
Define a log string method for a Policy and use it in appropriate places
to log what is going on wrt RPZ processing.
Otto Moerbeek [Fri, 14 Aug 2020 08:51:28 +0000 (10:51 +0200)]
Also record the value that caused a hit.
For triggers fomr rpz zones it makes sense to store them as listed there.
For hit values (names or IPs) it makes more sense to store them
in the regular string value and not list them as rpz trigger format.
e.g.: a trigger is listed
24.0.2.0.192.rpz-ip.rpz.local.
A corresponding hit as
192.0.2.1
Otto Moerbeek [Fri, 14 Aug 2020 08:24:17 +0000 (10:24 +0200)]
Use static constr string instead of string literals for some well-known names.
Otto Moerbeek [Mon, 10 Aug 2020 12:41:07 +0000 (14:41 +0200)]
Appease spell check
Otto Moerbeek [Mon, 10 Aug 2020 12:17:29 +0000 (14:17 +0200)]
Check appliedPolicyTrigger in protobuf regress test
Otto Moerbeek [Mon, 10 Aug 2020 09:37:28 +0000 (11:37 +0200)]
Log trigger in protobuf message
Otto Moerbeek [Fri, 7 Aug 2020 12:30:30 +0000 (14:30 +0200)]
Store the trigger hit in the (applied)Policy.
While there fix (a (I thnk) doc bug: appliedPolicy.policyAction does
not exists. I think what is meant is policyType. So document that.
Remi Gacogne [Fri, 28 Aug 2020 08:25:44 +0000 (10:25 +0200)]
Merge pull request #9414 from rgacogne/rec-cname-rpz-4
rec: Apply filtering policies (RPZ) on CNAME chains as well
Remi Gacogne [Thu, 27 Aug 2020 08:29:34 +0000 (10:29 +0200)]
Merge pull request #9379 from rgacogne/ddist-clear-console-history
dnsdist: Add the 'clearConsoleHistory' command
Remi Gacogne [Thu, 27 Aug 2020 07:42:43 +0000 (09:42 +0200)]
Merge pull request #9419 from Habbie/sdig-id-nonzero
sdig: report non-zero ID in response
Peter van Dijk [Wed, 26 Aug 2020 22:08:05 +0000 (00:08 +0200)]
Merge pull request #8638 from threatstop/master
Support for APL Records
Peter van Dijk [Wed, 26 Aug 2020 20:45:11 +0000 (22:45 +0200)]
sdig: report non-zero ID in response
Nicko Dehaine [Wed, 26 Aug 2020 18:32:03 +0000 (18:32 +0000)]
Use an union for the ipv4 and ipv6 fields
Nicko Dehaine [Wed, 26 Aug 2020 18:29:07 +0000 (18:29 +0000)]
Removed duplicate entry
Rewrote description as a single line
Remi Gacogne [Wed, 26 Aug 2020 14:39:00 +0000 (16:39 +0200)]
rec: Update the documentation to better describe our RPZ behaviour
Remi Gacogne [Wed, 26 Aug 2020 14:07:10 +0000 (16:07 +0200)]
rec: Add DNSFilterEngine::Policy::wasHit() to prevent code duplication
Remi Gacogne [Wed, 26 Aug 2020 12:57:10 +0000 (14:57 +0200)]
rec: Trust the result from doCNAMECacheCheck() for RPZ hits
Otto Moerbeek [Wed, 26 Aug 2020 11:25:10 +0000 (13:25 +0200)]
Merge pull request #9411 from omoerbeek/rec-inited-capture-is-cxx14
rec: Fix warning: initialized lambda captures are a C++14 extension
Otto Moerbeek [Wed, 26 Aug 2020 11:22:59 +0000 (13:22 +0200)]
Merge pull request #9417 from PowerDNS/omoerbeek-patch-1
rec: FIx a few "warning: comparison of integers of different signs" on clang.OpenBSD
Otto Moerbeek [Wed, 26 Aug 2020 11:21:45 +0000 (13:21 +0200)]
FIx a few "warning: comparison of integers of different signs" on clang/OpenBSD
Otto Moerbeek [Wed, 26 Aug 2020 10:59:58 +0000 (12:59 +0200)]
Merge pull request #9375 from omoerbeek/rec-qmin-fallback-depth
rec: Allow some more depth headroom for the no-qname-minimization fallback case
Otto Moerbeek [Wed, 26 Aug 2020 08:31:14 +0000 (10:31 +0200)]
Merge pull request #9415 from PowerDNS/omoerbeek-patch-1
auth: missing override
Otto Moerbeek [Wed, 26 Aug 2020 08:04:16 +0000 (10:04 +0200)]
missing override
Remi Gacogne [Tue, 25 Aug 2020 15:28:58 +0000 (17:28 +0200)]
Merge remote-tracking branch 'origin/rec-cname-rpz-4' into rec-cname-rpz
Remi Gacogne [Tue, 25 Aug 2020 15:28:00 +0000 (17:28 +0200)]
rec: Add regression tests for RPZ CNAME chains
Remi Gacogne [Tue, 25 Aug 2020 15:26:46 +0000 (17:26 +0200)]
rec: Properly handle RPZ hits for records retrieved from the cache
Remi Gacogne [Tue, 25 Aug 2020 15:25:47 +0000 (17:25 +0200)]
rec: When adding custom records from RPZ, remove conflicting ones
Otto Moerbeek [Tue, 25 Aug 2020 11:27:51 +0000 (13:27 +0200)]
Document the extra allowance in case of qname-minimization fallback.
Otto Moerbeek [Tue, 25 Aug 2020 09:01:54 +0000 (11:01 +0200)]
Zap some redundant args
Remi Gacogne [Tue, 25 Aug 2020 08:47:25 +0000 (10:47 +0200)]
dnsdist: Dcocument the new 'clearConsoleHistory()' command
Otto Moerbeek [Tue, 25 Aug 2020 07:44:28 +0000 (09:44 +0200)]
Merge pull request #9412 from omoerbeek/rec-channel-coverity
rec: Clean some coverity reported cases of exceptions thrown but not caught.