Libor Peltan
e4aa69fe67
tests: add XoT (XFR over TLS) interop with Bind9
2024-10-23 13:42:43 +02:00
Libor Peltan
323f215e58
nameserver: avoid wildcard-expansion-by-compression trick on DNAME...
...
...as in that case the DNAME node owner differs from original qname
2023-09-19 11:22:55 +02:00
Libor Peltan
1e6d6b04af
tests/flags: add NULL record with empty rdata (just for fun)
2023-08-22 15:56:35 +02:00
Daniel Salzman
e0da1872ec
tests-extra: update valgrind suppressions for Ubuntu 22.04
2022-05-12 09:44:42 +02:00
Libor Peltan
0add240070
tests: make flags. zone readable by bind
2021-10-01 10:44:15 +02:00
Libor Peltan
60632709ed
nameserver: dont put additionals induced by additionals
2021-09-30 13:26:50 +02:00
Libor Peltan
1a22a8a4a0
bugfix: fix answering with opt-outed NSEC3 on empty-non-terminal
2021-08-31 09:18:10 +02:00
Daniel Salzman
9d401712c0
tests-extra: remove explicit TTLs from records.zone to solve different processing Knot/Bind
2021-06-23 07:31:24 +02:00
Daniel Salzman
e57e99fe7e
nameserver: correct owner of answered CNAME from wildcard expansion
...
fixes #715
2021-05-25 17:21:03 +02:00
Libor Peltan
fa5b745402
tests/catalog: recover from kill between update and zonedb_reload
2021-03-26 12:07:32 +01:00
Daniel Salzman
1f98f8dc18
nameserver: decrease maximum CNAME/DNAME chain length from 20 to 5
...
The reason for this change is to reduce possible amplification attacks and
other negative effects of long processing loops.
Also most resolvers don't accept multiple jumps without requerying, so this
change should be harmless.
2021-03-05 08:50:06 +01:00
Libor Peltan
06a319cab0
nameserver: allow applying one DNAME repeatedly (e.g. DNAME loop)
2021-03-05 08:50:06 +01:00
Libor Peltan
16a4d29578
nameserver: don't follow DNAME under delegation (NONAUTH node)
2021-01-14 13:33:18 +01:00
Libor Peltan
12f56116c1
nameserver: don't follow CNAME under delegation (NONAUTH node)
2021-01-14 12:57:55 +01:00
Daniel Salzman
599c4a9dbb
tests-extra: fix DNAME loop test case in basic/query
2020-12-21 14:47:58 +01:00
Libor Peltan
33324965ca
DNAME: synthesized CNAME might be perfect answer to CNAME query
2020-11-20 09:26:45 +01:00
Libor Peltan
ba77821d66
bugfix: NXDOMAIN authority SOA has TTL limited by minimum-ttl field
...
See https://tools.ietf.org/html/rfc2308#section-3
2020-02-29 20:10:41 +01:00
Libor Peltan
af0025424a
nameserver: limit processing depth of C/DNAME chain
2019-11-26 13:12:40 +01:00
Libor Peltan
b4eaafe62d
dnssec: implemented parallel signing of zone
2019-01-09 17:19:41 +01:00
Daniel Salzman
066cc4c7ed
tests-extra: update README and valgrind suppression file
2018-04-25 13:34:23 +02:00
Daniel Salzman
2f92f5894d
internet: solve DS query bellow a delegation point as a delegation
2017-11-18 20:30:02 +01:00
Vítězslav Kříž
102c7f4f83
tests-extra: valgrind suppression for call_rcu
2017-03-08 18:16:20 +01:00
Daniel Salzman
9c42c1442c
tests-extra: update EDNS payload tests
2017-01-29 12:23:02 +01:00
Daniel Salzman
59d110fc4f
internet: skip empty non-terminal parents during delegation lookup
2016-10-25 14:20:58 +02:00
Daniel Salzman
05d1507b93
tests-extra: enable URI and CAA samples in the records zone
2016-04-22 15:47:30 +02:00
Daniel Salzman
3eb7278c12
libknot: add URI and CAA record types support
2016-04-18 10:55:47 +02:00
Daniel Salzman
8ad34a410f
tests-extra: add NSEC Name error case - wildcard NSEC with delegation boundary
2015-08-24 15:59:21 +02:00
Jan Vcelak
e44e6b499e
tests-extra: fix query for a CNAME below NS
2015-07-09 15:40:35 +02:00
Lubos Slovak
76e84fc247
tests-extra: CNAME loop + fixed basic/query test.
...
- Test response with a long CNAME loop.
- Some queries in basic/query test did not have the zone name
appended, resulting in bogus answers (REFUSED). Not visible,
because the responses are only compared to ones from Bind.
TODO: Comparison with Bind should be replaced by checks for
particular requirements for the response.
2014-11-11 23:26:52 +01:00
Lubos Slovak
91c027be4b
tests-extra: Different origin case in records zone
2014-09-17 14:11:06 +02:00
Lubos Slovak
1e67c70611
tests-extra: Duplicate RDATA differing only in case
2014-09-09 16:22:10 +02:00
Lubos Slovak
18dd340a7b
tests-extra: DNSSEC + mixed cases in RDATA dnames
...
- no_resign extended to test whether the zone will be resigned
if only the case of RDATA dname changes.
- Added new DNSSEC test to sign zone with wierd records.
2014-09-08 19:14:59 +02:00
Daniel Salzman
98038e8e43
tests-extra: extend records. zone with special domain names
2014-09-03 12:31:49 +02:00
Daniel Salzman
6e220fa5f5
dname: dump '#' char in \ddd notation to fix possible collision with '\#' hex rdata notation
2014-09-03 10:28:04 +02:00
Daniel Salzman
00dd2cbdb9
tests-extra: merge test zones cname-loop. and wild. into records.
2014-08-18 10:34:32 +02:00
Daniel Salzman
674f5d2ba4
tests-extra: extend wild. zone with upper-case records + generate random dnames
2014-08-05 17:42:20 +02:00
Daniel Salzman
b601c536ae
tests-extra: extend xfr and ddns tests with empty record
2014-06-24 10:38:42 +02:00
Daniel Salzman
53a4cba803
tests-extra: extend records.zone with samples from RFCs
2014-06-18 12:21:25 +02:00
Jan Kadlec
a622526abc
tests-extra: Cleaned up template zone
2014-06-17 19:45:20 +02:00
Daniel Salzman
5a574d1d83
tests-extra: add buggy NAPTR record to records.zone
2014-06-17 16:01:32 +02:00
Marek Vavrusa
a4b5df22a8
tests-extra: tests for proofs of expanded/unexpanded wildcards below dp
2014-02-25 15:36:24 +01:00
Lubos Slovak
1b438a7e2c
Added some more test cases to basic tests.
2014-02-12 19:02:52 +01:00
Marek Vavrusa
5aafc31688
tests-extra: added NSEC/NSEC3 tests for wildcard expansions
...
- new test for wildcard expansion leading to NXDOMAIN
- new test for wildcard expansion leading to NODATA
2014-02-10 16:27:49 +01:00
Marek Vavrusa
5e74c14ba2
nameserver: fixed query to wildcard expansion -> apex
...
Added test cases for this and previous commit.
Conflicts:
src/libknot/nameserver/name-server.c
2014-02-10 16:27:49 +01:00
Daniel Salzman
b6c4c4e77b
func-tests: update and resign (extend expiration) root zone
2014-02-04 10:52:10 +01:00
Marek Vavrusa
2a73ac7973
AUTHORITY NS not added for CNAME loop or CNAME leading to out-of-zone
...
data.
This conforms to RFC1034, 4.3.2/pt 3.a I think,
as the CNAME target would lead us out of available zones.
(We don't support answer from multiple local zones as of now.)
2014-01-17 17:05:49 +01:00
Marek Vavrusa
4830b7ceaf
Discover wildcard-covered additional records for affected nodes.
...
This requires an additional passthrough of the adjusted nodes
and may pose a performance penalty in the future.
If that need arises, we could sort it out in a different way.
2014-01-15 18:28:36 +01:00
Marek Vavrusa
7e33916830
CNAME loop over wildcard is checked after RR is added.
...
This is to give requestor proof of the loop in single response.
Also added test for this case.
2014-01-15 18:28:36 +01:00
Marek Vavrusa
017e663977
Some records may not have additionals.
...
Added check + test case.
2014-01-15 14:26:48 +01:00
Daniel Salzman
4ab28cb4db
func-tests: change zone type from dict to list
2014-01-07 16:22:41 +01:00