Automatic Updater
fcef5293d2
update copyright notice
2008-01-17 23:46:05 +00:00
Automatic Updater
fc36e4d54b
update copyright notice
2008-01-15 23:46:02 +00:00
Mark Andrews
59aeb87035
2304. [bug] Check returns from all dns_rdata_tostruct() calls.
...
[RT #17460 ]
2008-01-15 01:13:05 +00:00
Evan Hunt
47e37d8ebd
Validating lack of DS records at trust anchors wasn't working. [RT #17151 ]
2007-09-26 04:39:45 +00:00
Mark Andrews
8a4538cafc
2238. [bug] It was possible to trigger a REQUIRE when a
...
validation was cancelled. [RT #17106 ]
2007-09-14 05:52:50 +00:00
Automatic Updater
beb9fabda3
update copyright notice
2007-08-28 07:20:06 +00:00
Mark Andrews
b5ded8a160
2218. [bug] Remove unnecessary REQUIRE from dns_validator_create().
...
[RT #16976 ]
2007-08-27 04:47:14 +00:00
Mark Andrews
81a0879a12
2171. [bug] Handle breaks in DNSSEC trust chains where the parent
...
servers are not DS aware (DS queries to the parent
return a referral to the child).
2007-04-27 06:37:38 +00:00
Mark Andrews
f40348003a
2145. [bug] Check DS/DLV digest lengths for known digests.
...
[RT #16622 ]
2007-02-26 01:30:22 +00:00
Mark Andrews
64d5cc809c
update copyright notice
2007-01-08 02:42:00 +00:00
Mark Andrews
9aefa7e508
2126. [bug] Serialise validation of type ANY responses. [RT #16555 ]
2007-01-08 01:37:53 +00:00
Mark Andrews
b486456a3d
2117. [bug] DNSSEC fixes: named could fail to cache NSEC records
...
which could lead to validation failures. named didn't
handle negative DS responses that were in the process
of being validated. Check CNAME bit before accepting
NODATA proof. To be able to ignore a child NSEC there
must be SOA (and NS) set in the bitmap. [RT #16399 ]
2006-12-07 06:50:34 +00:00
Mark Andrews
41b6189259
2061. [bug] Accept expired wildcard message reversed. [RT #16296 ]
2006-07-24 22:43:31 +00:00
Mark Andrews
e9724570aa
2008. [func] It is now posssible to enable/disable DNSSEC
...
validation from rndc. This is useful for the
mobile hosts where the current connection point
breaks DNSSEC (firewall/proxy). [RT #15592 ]
rndc validation newstate [view]
2006-03-09 23:46:20 +00:00
Mark Andrews
7af42116ba
fix minor typos
2006-02-26 23:01:58 +00:00
Mark Andrews
2f46120278
post merge problem
2006-02-22 01:57:12 +00:00
Mark Andrews
c017465e4a
1987. [func] DS/DLV SHA256 digest algorithm support. [RT #15608 ]
2006-02-21 23:53:35 +00:00
Mark Andrews
e770e36d60
update copyright notice
2006-01-04 23:50:23 +00:00
Mark Andrews
f53e702b25
1947. [func] It is now possible to configure named to accept
...
expired RRSIGs. Default "dnssec-accept-expired no;".
Setting "dnssec-accept-expired yes;" leaves named
vulnerable to replay attacks. [RT #14685 ]
2006-01-04 02:58:42 +00:00
Mark Andrews
cf4e1143ea
1942. [bug] If the name of a DNSKEY match that of one in
...
trusted-keys do not attempt to validate the DNSKEY
using the parents DS RRset. [RT #15649 ]
2005-12-05 00:00:03 +00:00
Mark Andrews
864f9d0d0a
silence dereferencing type-punned pointer will break strict-aliasing rules warning
2005-11-30 04:58:32 +00:00
Mark Andrews
3c8367a203
1940. [bug] Fixed a number of error conditions reported by
...
Coverity.
2005-11-30 03:44:39 +00:00
Mark Andrews
c7d337e4ff
1939. [bug] The resolver could dereference a null pointer after
...
validation if all the queries have timed out.
[RT #15528 ]
1938. [bug] The validator was not correctly handling unsecure
negative responses at or below a SEP. [RT #15528 ]
2005-11-03 00:58:00 +00:00
Mark Andrews
43d25d3d13
1936. [bug] The validator could leak memory. [RT #15544 ]
2005-11-02 01:53:25 +00:00
Mark Andrews
3a204dc120
1930. [port] HPUX: ia64 support. [RT #15473 ]
...
1929. [port] FreeBSD: extend use of PTHREAD_SCOPE_SYSTEM.
2005-10-14 01:33:30 +00:00
Mark Andrews
c0c29fa38f
sync with head
2005-09-05 03:01:49 +00:00
Mark Andrews
55ae24844a
1919. [bug] dig's +sigchase code overhauled. [RT #14933 ]
...
1918. [bug] The DLV code has been re-worked to make no longer
query order sensitive. [RT #14933 ]
2005-08-25 01:54:01 +00:00
Mark Andrews
468fdfbc2b
1867. [bug] It was possible to trigger a INSIST in
...
dlv_validatezonekey(). [RT #14846 ]
2005-06-07 00:39:12 +00:00
Mark Andrews
13dea06bd6
1853. [bug] Rework how DLV interacts with proveunsecure().
...
[RT #13605 ]
2005-05-06 01:59:48 +00:00
Rob Austein
372edff338
1851. [doc] Doxygen comment markup. [RT #11398 ]
2005-04-27 05:02:59 +00:00
Mark Andrews
db82e0aaa3
1819. [bug] The validator needed to check both the algorithm and
...
digest types of the DS to determine if it could be
used to introduce a secure zone. [RT #13593 ]
2005-03-04 03:53:54 +00:00
Mark Andrews
a88ca26544
update copyright notice
2005-02-09 05:18:28 +00:00
Mark Andrews
950a40375d
1806. [bug] The resolver returned the wrong result when a CNAME /
...
DNAME was encountered when fetching glue from a
secure namespace. [RT #13501 ]
1805. [bug] Pending status was not being cleared when DLV was
active. [RT #13501 ]
2005-02-09 00:00:35 +00:00
Mark Andrews
85b5356472
1768. [bug] nsecnoexistnodata() could be called with a non-NSEC
...
rdataset. [RT #12907 ]
2004-11-17 23:53:01 +00:00
Mark Andrews
220322f0cf
1659. [cleanup] Cleanup some messages that were referring to KEY vs
...
DNSKEY, NXT vs NSEC and SIG vs RRSIG.
1658. [func] Update dnssec-keygen to default to KEY for HMAC-MD5
and DH. Tighten which options apply to KEY and
DNSKEY records.
2004-06-11 01:17:46 +00:00
Mark Andrews
aa1a497079
1606. [bug] DVL insecurity proof was failing.
...
1605. [func] New dns_db_find() option DNS_DBFIND_COVERINGNSEC.
2004-05-14 05:07:12 +00:00
Mark Andrews
c1425cc1d5
1600. [bug] Duplicate zone pre-load checks were not case
...
insensitive.
1599. [bug] Fix memory leak on error path when checking named.conf.
1598. [func] Specify that certain parts of the namespace must
be secure (dnssec-must-be-secure).
2004-04-16 00:01:45 +00:00
Mark Andrews
3bdf0a6885
hide ((isc_event_t **) (void *)) cast using a macro, ISC_EVENT_PTR.
2004-04-15 02:04:05 +00:00
Mark Andrews
50105afc55
1589. [func] DNSSEC lookaside validation.
...
enable-dnssec -> dnssec-enable
2004-03-10 02:19:58 +00:00
Mark Andrews
dafcb997e3
update copyright notice
2004-03-05 05:14:21 +00:00
Mark Andrews
daa73eae70
silence punned messages
2004-02-03 00:59:05 +00:00
Mark Andrews
519b239fc4
#include <isc/string.h>
2004-01-20 14:19:42 +00:00
Mark Andrews
35541328a8
1558. [func] New DNSSEC 'disable-algorithms'. Support entry into
...
child zones for which we don't have a supported
algorithm. Such child zones are treated as unsigned.
1557. [func] Implement missing DNSSEC tests for
* NOQNAME proof with wildcard answers.
* NOWILDARD proof with NXDOMAIN.
Cache and return NOQNAME with wildcard answers.
2004-01-14 02:06:51 +00:00
Tatuya JINMEI 神明達哉
e407562a75
1528. [cleanup] Simplify some dns_name_ functions based on the
...
deprecation of bitstring labels.
2003-10-25 00:31:12 +00:00
Mark Andrews
93d6dfaf66
1516. [func] Roll the DNSSEC types to RRSIG, NSEC and DNSKEY.
2003-09-30 06:00:40 +00:00
Mark Andrews
8b5de97014
1448. [bug] Handle empty wildcards labels.
...
developer: marka
reviewer: explorer
2003-02-27 00:19:04 +00:00
Mark Andrews
421e4cf66e
1416. [bug] Empty node should return NOERROR NODATA, not NXDOMAIN.
...
[RT #4715 ]
developer: marka
reviewer: explorer
2003-01-18 03:18:31 +00:00
Mark Andrews
638fe804a5
1255. [bug] When performing a nonexistence proof, the validator
...
should discard parent NXTs from higher in the DNS.
2002-07-22 03:00:49 +00:00
Mark Andrews
ff30cdeb78
The validator didn't handle missing DS records correctly.
2002-07-19 03:29:15 +00:00
Mark Andrews
86f6b92e35
1248. [bug] The validator could incorrectly verify an invalid
...
negative proof.
When checking the range of the nxt record, the code needs to handle
the case where the 'next name' field points to the origin. The way
that the origin was determined was looking at the 'signer' field
of the first SIG NXT, since NXTs are signed by the zone key. This
doesn't work, because the first SIG could have been spoofed. It
now defers checking the nxt range until both the SOA and NXT have
been verified, and uses the owner of the SOA name as the origin.
bwelling
2002-07-15 03:25:28 +00:00