Commit graph

127 commits

Author SHA1 Message Date
Mark Andrews
f6421a43ca 2171. [bug] Handle breaks in DNSSEC trust chains where the parent
servers are not DS aware (DS queries to the parent
                        return a referral to the child).
2007-04-27 06:39:43 +00:00
Mark Andrews
815fada52d update copyright notice 2007-01-08 02:45:03 +00:00
Mark Andrews
fcc4a3dd25 2126. [bug] Serialise validation of type ANY responses. [RT #16555] 2007-01-08 01:37:34 +00:00
Mark Andrews
f5d326fb23 2117. [bug] DNSSEC fixes: named could fail to cache NSEC records
which could lead to validation failures.  named didn't
                        handle negative DS responses that were in the process
                        of being validated.  Check CNAME bit before accepting
                        NODATA proof. To be able to ignore a child NSEC there
                        must be SOA (and NS) set in the bitmap. [RT #16399]
2006-12-07 06:50:38 +00:00
Mark Andrews
089321fb44 fix minor typos 2006-02-26 23:06:40 +00:00
Mark Andrews
f21dcfa98d 1941. [bug] ncache_adderesult() should set eresult even if no
rdataset is passed to it. [RT #15642]

1939.   [bug]           The resolver could dereference a null pointer after
                        validation if all the queries have timed out.
                        [RT #15528]

1938.   [bug]           The validator was not correctly handling unsecure
                        negative responses at or below a SEP. [RT #15528]
2006-01-05 05:38:47 +00:00
Mark Andrews
9742ad0d4d 1942. [bug] If the name of a DNSKEY match that of one in
trusted-keys do not attempt to validate the DNSKEY
                        using the parents DS RRset. [RT #15649]
2006-01-05 04:45:24 +00:00
Mark Andrews
a4c4295268 update copyright notice 2006-01-04 23:50:21 +00:00
Mark Andrews
2b6fdd9c92 type-punned pointer 2006-01-04 21:43:15 +00:00
Mark Andrews
8019162f81 1940. [bug] Fixed a number of error conditions reported by
Coverity.
2006-01-04 03:43:20 +00:00
Mark Andrews
3170cfa99a 1936. [bug] The validator could leak memory. [RT #15544] 2005-11-02 02:07:47 +00:00
Mark Andrews
5a5d7187e5 1930. [port] HPUX: ia64 support. [RT #15473]
1929.   [port]          FreeBSD: extend use of PTHREAD_SCOPE_SYSTEM.
2005-10-14 01:38:51 +00:00
Mark Andrews
7fce88dfa8 1919. [bug] dig's +sigchase code overhauled. [RT #14933]
1918.   [bug]           The DLV code has been re-worked to make no longer
                        query order sensitive. [RT #14933]
2005-08-25 01:54:34 +00:00
Mark Andrews
6c68e33b58 1867. [bug] It was possible to trigger a INSIST in
dlv_validatezonekey(). [RT #14846]
2005-06-07 00:39:35 +00:00
Mark Andrews
061ecc7f3a 1853. [bug] Rework how DLV interacts with proveunsecure().
[RT #13605]
2005-05-06 01:58:48 +00:00
Mark Andrews
1c9da279ce 1819. [bug] The validator needed to check both the algorithm and
digest types of the DS to determine if it could be
                        used to introduce a secure zone. [RT #13593]
2005-03-16 03:17:39 +00:00
Mark Andrews
d4e3d6e95d update copyright notice 2005-02-09 05:13:03 +00:00
Mark Andrews
bd59b0b193 1806. [bug] The resolver returned the wrong result when a CNAME /
DNAME was encountered when fetching glue from a
                        secure namespace. [RT #13501]

1805.   [bug]           Pending status was not being cleared when DLV was
                        active. [RT #13501]
2005-02-08 23:59:45 +00:00
Mark Andrews
6e8cf5d8db 1768. [bug] nsecnoexistnodata() could be called with a non-NSEC
rdataset. [RT #12907]
2004-11-17 23:53:10 +00:00
Mark Andrews
d6c44967f2 1659. [cleanup] Cleanup some messages that were referring to KEY vs
DNSKEY, NXT vs NSEC and SIG vs RRSIG.

1658.   [func]          Update dnssec-keygen to default to KEY for HMAC-MD5
                        and DH.  Tighten which options apply to KEY and
                        DNSKEY records.
2004-06-11 01:17:36 +00:00
Mark Andrews
c95fa7d1d8 1606. [bug] DVL insecurity proof was failing.
1605.   [func]          New dns_db_find() option DNS_DBFIND_COVERINGNSEC.
2004-05-14 05:06:42 +00:00
Mark Andrews
69b34284dc 1600. [bug] Duplicate zone pre-load checks were not case
insensitive.

1599.   [bug]           Fix memory leak on error path when checking named.conf.

1598.   [func]          Specify that certain parts of the namespace must
                        be secure (dnssec-must-be-secure).
2004-04-15 23:56:34 +00:00
Mark Andrews
46278b601d hide ((isc_event_t **) (void *)) cast using a macro, ISC_EVENT_PTR. 2004-04-15 02:10:41 +00:00
Mark Andrews
6790f1d962 1589. [func] DNSSEC lookaside validation.
enable-dnssec -> dnssec-enable
2004-03-10 02:55:59 +00:00
Mark Andrews
511621255e 1528. [cleanup] Simplify some dns_name_ functions based on the
deprecation of bitstring labels.

1527.  [cleanup]       Reduce the number of gettimeofday() calls without
                       losing necessary timer granularity.
2004-03-08 21:06:29 +00:00
Mark Andrews
a821d5fa3d DNSSEC bis merge from HEAD:
1581.  [func]          Disable DNSSEC support by default.  To enable
                       DNSSEC specify "enable-dnssec yes;" in named.conf.

1565.  [bug]           CD flag should be copied to outgoing queries unless
                       the query is under a secure entry point in which case
                       CD should be set.

1558.  [func]          New DNSSEC 'disable-algorithms'.  Support entry into
                       child zones for which we don't have a supported
                       algorithm.  Such child zones are treated as unsigned.

1557.  [func]          Implement missing DNSSEC tests for
                       * NOQNAME proof with wildcard answers.
                       * NOWILDARD proof with NXDOMAIN.
                       Cache and return NOQNAME with wildcard answers.

1541.  [func]          NSEC now uses new bitmap format.

1519.  [bug]           dnssec-signzone:nsec_setbit() computed the wrong
                       length of the new bitmap.

1516.  [func]          Roll the DNSSEC types to RRSIG, NSEC and DNSKEY.
2004-03-08 02:08:05 +00:00
Mark Andrews
cbdd3a318b update lib copyrights 2004-03-06 08:15:48 +00:00
Mark Andrews
b1b705a049 pullup:
uninitalised variable (minimize difference with HEAD).
2003-08-15 03:01:30 +00:00
Mark Andrews
ae643dbc34 pullup: misc cleanups 2003-08-13 05:06:53 +00:00
Mark Andrews
60c8cebb10 pullup: misc cleanups 2003-08-13 04:55:28 +00:00
Mark Andrews
9052beb238 pullup
Check return values or cast them to (void), as required by the coding
standards; add exceptions to the coding standards for cases where this is
not desirable
2003-08-11 05:28:23 +00:00
Mark Andrews
891c424e56 update_copyrights 2002-08-05 06:57:16 +00:00
Mark Andrews
b0fbeb1884 1335. [bug] When performing a nonexistence proof, the validator
should discard parent NXTs from higher in the DNS.
2002-08-02 05:39:56 +00:00
Mark Andrews
0b2aba2cd2 reviewed: marka/bwelling
1247.   [bug]           The validator would incorrectly mark data as insecure
                        when seeing a bogus signature before a correct
                        signature.
2002-07-15 03:02:56 +00:00
Mark Andrews
b6cb507ae8 reviewed: marka
1275.   [bug]           When verifying that an NXT proves nonexistence, check
                        the rcode of the message and only do the matching NXT
                        check.  That is, for NXDOMAIN responses, check that
                        the name is in the range between the NXT owner and
                        next name, and for NOERROR NODATA responses, check
                        that the type is not present in the NXT bitmap.
2002-07-02 04:02:23 +00:00
Brian Wellington
a25169ea43 pullup:
1006.   [bug]           If a KEY RR was found missing during DNSSEC validation,
			an assertion failure could subsequently be triggered
			in the resolver. [RT #1763]
2001-09-19 21:51:42 +00:00
Andreas Gustafsson
76c8294c81 format string bugs and improved format string checking [RT #1578] 2001-08-08 22:54:55 +00:00
David Lawrence
92ef1a9b9d use ISC_MAGIC for all magic numbers, for our friends in EBCDIC land 2001-06-04 19:33:39 +00:00
Brian Wellington
26e5029fd5 Added a cast. [RT #899] 2001-02-21 19:57:38 +00:00
Brian Wellington
499b34cea0 copyright update 2001-01-09 22:01:04 +00:00
Brian Wellington
78838d3e0c 8 space -> tab conversion 2000-12-11 19:24:30 +00:00
Brian Wellington
c70908209e replace some INSISTs that theoretically could occur with normal failures 2000-12-05 18:53:43 +00:00
Brian Wellington
f439363eeb minor code simplification 2000-11-08 00:51:24 +00:00
Mark Andrews
368b37b616 dns_rdata_invalidate -> dns_rdata_reset 2000-10-31 03:22:05 +00:00
Mark Andrews
c03bb27f06 532. [func] Implement DNS UPDATE pseudo records using
DNS_RDATA_UPDATE flag.

 531.   [func]          Rdata really should be initalized before being
                        assigned to (dns_rdata_fromwire(), dns_rdata_fromtext(),
                        dns_rdata_clone(), dns_rdata_fromregion()),
                        check that it is.
2000-10-25 04:26:57 +00:00
Brian Wellington
d1cbf71409 clean up suspicious looking and incorrect uses of dns_name_fromregion 2000-10-07 00:09:28 +00:00
Brian Wellington
a9ba7e6564 Allow a keyset to be self-signed if the signing key is a trusted-key. 2000-09-12 12:01:50 +00:00
Brian Wellington
d6be55c63f comment the infinite loop fix 2000-09-12 10:21:45 +00:00
Brian Wellington
5c29047792 minor dst api change 2000-09-12 09:59:28 +00:00
Brian Wellington
c38cf70db1 Fix an assertion failure and a case where an rdataset's trust wasn't set. 2000-09-08 14:18:17 +00:00