Mark Andrews
a821d5fa3d
DNSSEC bis merge from HEAD:
...
1581. [func] Disable DNSSEC support by default. To enable
DNSSEC specify "enable-dnssec yes;" in named.conf.
1565. [bug] CD flag should be copied to outgoing queries unless
the query is under a secure entry point in which case
CD should be set.
1558. [func] New DNSSEC 'disable-algorithms'. Support entry into
child zones for which we don't have a supported
algorithm. Such child zones are treated as unsigned.
1557. [func] Implement missing DNSSEC tests for
* NOQNAME proof with wildcard answers.
* NOWILDARD proof with NXDOMAIN.
Cache and return NOQNAME with wildcard answers.
1541. [func] NSEC now uses new bitmap format.
1519. [bug] dnssec-signzone:nsec_setbit() computed the wrong
length of the new bitmap.
1516. [func] Roll the DNSSEC types to RRSIG, NSEC and DNSKEY.
2004-03-08 02:08:05 +00:00
Mark Andrews
cbdd3a318b
update lib copyrights
2004-03-06 08:15:48 +00:00
Mark Andrews
694b001677
1586. [func] "check-names" is now implemented.
2004-02-27 21:45:34 +00:00
Mark Andrews
69acffbb19
sync with HEAD
2003-10-14 03:48:11 +00:00
Mark Andrews
388732593d
cleanup spaces before semicolons.
2003-09-24 03:47:21 +00:00
Mark Andrews
57b54234cd
sizeof style
2003-09-11 00:18:18 +00:00
Mark Andrews
dd8e7329b1
pullup:
...
1458. [cleanup] sprintf() -> snprintf().
2003-08-27 07:22:41 +00:00
Mark Andrews
c3fedc9282
1402. [cleanup] A6 has been moved to experimental and is no longer
...
fully supported.
2003-08-25 04:16:27 +00:00
Mark Andrews
2b9f05032c
pullup:
...
change many debug(3) to debug(1), and several debug(*) to info
2003-08-21 02:50:34 +00:00
Mark Andrews
646f21b5bd
1358. [func] log the reason for rejecting a server when resolving
...
queries.
2003-08-19 07:26:09 +00:00
Mark Andrews
59771f18b8
1254. [func] preferred-glue option from BIND 8.3.
2003-08-14 05:56:10 +00:00
Mark Andrews
bcc468b92e
1225. [func] dns_message_setopt() no longer requires that
...
dns_message_renderbegin() to have been called.
2003-08-14 02:41:55 +00:00
Mark Andrews
ad1cdd5b95
1187. [bug] named was incorrectly returning DNSSEC records
...
in negative responses when the DO bit was not set.
2003-08-13 01:56:03 +00:00
Mark Andrews
79e2dd3eb8
1157. [func] match-clients and match-destinations now accept
...
keys. [RT #2045 ]
2003-08-11 05:58:18 +00:00
Mark Andrews
9052beb238
pullup
...
Check return values or cast them to (void), as required by the coding
standards; add exceptions to the coding standards for cases where this is
not desirable
2003-08-11 05:28:23 +00:00
Mark Andrews
f4d86cfcea
update_copyrights
2003-07-22 04:03:54 +00:00
Mark Andrews
3976f3b17a
1424. [bug] EDNS version not being correctly printed.
2003-05-12 07:18:37 +00:00
Mark Andrews
dc57e5e0ca
pullup:
...
<isc/print.h> for snprintf
2002-02-28 05:17:49 +00:00
Andreas Gustafsson
6bc9a03601
pullup:
...
1205. [bug] OPT, TSIG and TKEY cannot be used to set the "class"
of the message. [RT #2449 ]
2002-02-20 00:47:40 +00:00
Andreas Gustafsson
191fdb73be
pullup:
...
1198. [bug] OPT printing style was not consistant with the way the
header fields are printed. The DO bit was not reported
if set. Report if any of the MBZ bits are set.
2002-02-19 22:39:25 +00:00
Andreas Gustafsson
a07532875f
pullup:
...
1193. [bug] Best effort parsing didn't handle packet truncation.
2002-02-19 22:13:00 +00:00
Mark Andrews
73d7583d98
update copyrights
2002-02-08 03:57:47 +00:00
Andreas Gustafsson
fff1dbdf55
pullup:
...
1166. [bug] "Not Implemented" should be reported as NOTIMP,
not NOTIMPL. [RT #2281 ]
2002-01-23 17:57:51 +00:00
Mark Andrews
ab92fa0aca
pullup: style
2002-01-23 03:49:20 +00:00
Mark Andrews
309979a136
pullup:
...
Removed all code within #ifdef DNS_OPT_NEWCODES*.
It was the last thing being sanitized out of releases; removing
it makes it possible to eliminate the sanitation process.
2001-11-15 01:24:21 +00:00
Andreas Gustafsson
3d4d93c35b
misplaced cast could cause EDNS extended RCODE bits to be lost [RT #1483 ]
2001-07-10 20:09:24 +00:00
Andreas Gustafsson
b1a7fea53c
brace style
2001-06-28 21:21:39 +00:00
Brian Wellington
2196128fc2
When doing best-effort parsing (in dig, for example) on a message with multiple
...
questions where an unrecoverable error is seen after 2 or more questions have
been parsed, memory would be leaked from msg->namepool, and would trigger an
ENSURE() in dns_message_destroy().
2001-06-15 05:24:24 +00:00
Mark Andrews
03f91269f5
856. [func] Allow partial rdatasets to be returned in answer and
...
authority sections to help non-TCP capable clients
recover from truncation. [RT #1301 ]
2001-06-05 09:02:16 +00:00
Brian Wellington
59c85e1636
Return ISC_R_NOSPACE if the buffer isn't large enough to hold the DNS header.
2001-04-19 18:28:35 +00:00
Brian Wellington
668f8d91db
795. [func] Add the +multiline option to dig.
...
(which requires dns_message_totext(), etc. to take a style parameter)
2001-03-28 02:42:56 +00:00
Andreas Gustafsson
bed7a35293
dns_master_questiontotext() needs a style argument after all
2001-03-28 00:58:15 +00:00
Andreas Gustafsson
531eafa302
use dns_master_rdatasettotext() &co; removed unused flag
...
DNS_MESSAGETEXTFLAG_OMITDOT
2001-03-28 00:50:05 +00:00
Brian Wellington
fc0d37fa3a
init the name in dns_message_gettempname(). This means it'll be done twice
...
in many cases, but it means dns_message_puttempname() can safely be called
on the name in all cases.
2001-03-15 03:00:50 +00:00
Brian Wellington
e43b9a2005
move compression context create/delete into the caller of the message
...
rendering functions. This reduces the size of the message object.
2001-03-05 21:15:47 +00:00
Brian Wellington
be066f0629
Put 4 offsets in a msgblock, not 8. offsets are big enough that this helps.
...
Also remove an unused variable.
2001-03-05 20:12:49 +00:00
Brian Wellington
5f8b996a81
Reduce the number of objects preallocated in the message, which reduces
...
the per-recursive-client memory.
2001-03-05 20:06:10 +00:00
Brian Wellington
c5c779df9a
add a comment
2001-02-23 01:45:29 +00:00
Brian Wellington
5ca7310c8a
msg->tsigkey was not checked for NULL before deferencing [RT #913 ]
2001-02-23 01:38:07 +00:00
Brian Wellington
f70336b8c9
Cleanups to TSIG/SIG(0) parsing. This should have no noticable effect except
...
rejecting a few more malformed packets (those with the TSIG/SIG(0) not the
last record) and making best-effort parsing handle multiple TSIG/SIG(0)/OPT in
a message.
2001-02-19 20:14:23 +00:00
Brian Wellington
3bd43bb300
ENSURE that a message's memory pools don't have any allocated data at the
...
end of msgreset(). This should trigger the mpctx->allocated != 0 assertion
when the leak occurs, not at server shutdown.
2001-02-18 23:46:26 +00:00
Andreas Gustafsson
5e1c2afd10
incorrect indentation
2001-02-15 19:09:55 +00:00
Andreas Gustafsson
1dd8ee4fd5
fctx_addopt() would leak an rdataset if dns_message_setopt() ever failed;
...
fixed it by making dns_message_setopt() guarantee to either adopt
or free the rdataset
2001-02-14 02:51:12 +00:00
Brian Wellington
4ce1248f09
fixed uninitialized variable
2001-02-13 01:29:33 +00:00
Brian Wellington
55f3daa4ea
When parsing a message, add an offsets table to each name. Also allow callers
...
rendering a message to get temporary offsets tables to attach to names added
to the message.
2001-02-13 01:02:59 +00:00
Brian Wellington
94baac869a
712. [bug] Sending a large signed update message caused an
...
assertion failure. [RT #718 ]
- Resetting a message should clear the TSIG/SIG(0) sections
- Rerendering a message if the first try returned USETCP should not call
dns_message_settsigkey() again.
2001-01-27 02:28:33 +00:00
Brian Wellington
21e82177fb
make message->rcode a dns_rcode_t
2001-01-18 00:26:36 +00:00
Mark Andrews
19c7cce855
674. [func] Allow messages to be TSIG signed / verified using
...
a offset from the current time.
2001-01-09 23:35:33 +00:00
Brian Wellington
499b34cea0
copyright update
2001-01-09 22:01:04 +00:00
Brian Wellington
32e64787d9
671. [bug] The message code was failing to parse a message with
...
no question section and a TSIG record. [RT #628 ]
2001-01-09 02:55:42 +00:00