Commit Graph

14740 Commits

Author SHA1 Message Date
Mark Andrews
0aaeda8d70 win32 2006-03-10 03:17:03 +00:00
Mark Andrews
f44f29c8d6 win32 2006-03-10 03:14:28 +00:00
Mark Andrews
36d7f4bc26 win32 2006-03-10 03:11:45 +00:00
Mark Andrews
af61764261 win32 2006-03-10 03:04:06 +00:00
Mark Andrews
bc15fe3357 win32 2006-03-10 03:01:52 +00:00
Mark Andrews
4dec833feb update 2006-03-10 01:32:26 +00:00
Mark Andrews
bf2fe05272 HAVE_RSA_GENERATE_KEY/HAVE_DSA_GENERATE_PARAMETERS/HAVE_DH_GENERATE_PARAMETERS 2006-03-10 01:13:42 +00:00
Mark Andrews
488e4f4e6a newcopyrights 2006-03-10 00:59:05 +00:00
Mark Andrews
db8ac421d8 regen 2006-03-10 00:47:40 +00:00
Mark Andrews
50c7241d69 9.4.0a4 2006-03-10 00:28:00 +00:00
Mark Andrews
a9c698bf3a update copyright notice 2006-03-10 00:23:20 +00:00
Mark Andrews
8e6f53c1b8 newcopyrights 2006-03-10 00:20:31 +00:00
Mark Andrews
a501e657d3 2009. [bug] libbind: coverity fixes. [RT #15808] 2006-03-10 00:20:08 +00:00
Mark Andrews
e9724570aa 2008. [func] It is now posssible to enable/disable DNSSEC
validation from rndc.  This is useful for the
                        mobile hosts where the current connection point
                        breaks DNSSEC (firewall/proxy).  [RT #15592]

                                rndc validation newstate [view]
2006-03-09 23:46:20 +00:00
Mark Andrews
f560a1877b 2007. [func] It is now possible to explicitly enable DNSSEC
validation.  default dnssec-validation no; to
                        be changed to yes in 9.5.0.  [RT #15674]
2006-03-09 23:38:21 +00:00
cvs2git
915c9ab0fe This commit was manufactured by cvs2git to create branch 'v9_4'. 2006-03-09 21:58:58 +00:00
Mark Andrews
93875126dc new draft 2006-03-09 21:58:57 +00:00
Mark Andrews
035992291c regen 2006-03-09 05:04:38 +00:00
Mark Andrews
980c5d7b8d regen 2006-03-09 05:04:01 +00:00
Mark Andrews
1ba9283d78 2006. [security] Allow-query-cache and allow-recursion now default
to the builtin acls "localnets" and "localhost".

                        This is being done to make caching servers less
                        attractive as reflective amplifying targets for
                        spoofed traffic.  This still leave authoritative
                        servers exposed.

                        The best fix is for full BCP 38 deployment to
                        remove spoofed traffic.
2006-03-09 03:40:33 +00:00
Mark Andrews
fe6f384b2e 2006. [security] Allow-query-cache and allow-recursion now default
to the builtin acls "localnets" and "localhost".

                        This is being done to make caching servers less
                        attractive as reflective amplifying targets for
                        spoofed traffic.  This still leave authoritative
                        servers exposed.

                        The best fix is for full BCP 38 deployment to
                        remove spoofed traffic.
2006-03-09 03:30:18 +00:00
Mark Andrews
9cd148558b newcopyrights 2006-03-08 23:30:28 +00:00
Mark Andrews
2d583a44d6 newcopyrights 2006-03-08 23:30:18 +00:00
Mark Andrews
8a6f69ef96 2005. [bug] libbind: Retransmission timeouts should be
based on which attempt it is to the nameserver
                        and not the nameserver itself. [RT #13548]
2006-03-08 04:14:17 +00:00
Mark Andrews
5929cde251 2005. [bug] libbind: Retransmission timeouts should be
based on which attempt it is to the nameserver
                        and not the nameserver itself. [RT #13548]
2006-03-08 04:06:12 +00:00
Mark Andrews
b16c72bf12 2004. [bug] dns_tsig_sign() could pass a NULL pointer to
dst_context_destroy() when cleaning up after a
                        error. [RT #15835]
2006-03-08 03:55:50 +00:00
Mark Andrews
1412643ba5 2004. [bug] dns_tsig_sign() could pass a NULL pointer to
dst_context_destroy() when cleaning up after a
                        error. [RT #15835]
2006-03-08 03:51:01 +00:00
Mark Andrews
9b6c85ca20 2003. [bug] libbind: The DNS name/address lookup functions could
occasionally follow a random pointer due to
                        structures not being completely zeroed. [RT #15806]
2006-03-08 03:43:18 +00:00
Mark Andrews
6de9371826 2003. [bug] libbind: The DNS name/address lookup functions could
occasionally follow a random pointer due to
                        structures not being completely zeroed. [RT #15806]
2006-03-08 03:12:24 +00:00
Mark Andrews
1396c84257 tidy up 2006-03-07 05:06:09 +00:00
Mark Andrews
366c60aa36 tidy up 2006-03-07 04:58:51 +00:00
Mark Andrews
e1fd585739 update copyright notice 2006-03-07 00:34:55 +00:00
Mark Andrews
69036420c7 update copyright notice 2006-03-07 00:34:53 +00:00
Mark Andrews
8dd468a6f3 new draft 2006-03-07 00:25:48 +00:00
Mark Andrews
7f2adb8556 newcopyrights 2006-03-06 23:30:28 +00:00
Mark Andrews
3dc062fe12 newcopyrights 2006-03-06 23:30:22 +00:00
Mark Andrews
cdaad1be46 regen 2006-03-06 08:06:49 +00:00
Mark Andrews
13481a92d8 2002 [bug] libbind: tighten the constraints on when
struct addrinfo._ai_pad exists.  [RT #15783]
2006-03-06 02:27:15 +00:00
Mark Andrews
083a5588a3 regen 2006-03-06 02:23:19 +00:00
Mark Andrews
daba3af103 2002 [bug] libbind: tighten the constraints on when
struct addrinfo._ai_pad exists.  [RT #15783]
2006-03-06 02:22:36 +00:00
Mark Andrews
cb6bc372d8 2001. [func] Check the KSK flag when updating a dynamic zone.
New zone option "update-check-ksk yes;".  [RT #15817]
2006-03-06 01:38:01 +00:00
Mark Andrews
59d84d1b07 2001. [func] Check the KSK flag when updating a secure dynamic zone.
New zone option "update-check-ksk yes;".  [RT #15817]
2006-03-06 01:27:52 +00:00
Mark Andrews
ac5fb539db 2000. [bug] memmove()/strtol() fix was incomplete. [#RT 15812] 2006-03-06 01:11:04 +00:00
Mark Andrews
ac124a78a0 2000. [bug] memmove()/strtol() fix was incomplete. [#RT 15812] 2006-03-06 01:06:48 +00:00
Mark Andrews
ea8874ec35 update copyright notice 2006-03-05 23:58:52 +00:00
Mark Andrews
69ed9fe33f update copyright notice 2006-03-05 23:58:51 +00:00
Mark Andrews
a2415e0e15 newcopyrights 2006-03-05 11:25:23 +00:00
Mark Andrews
7e1a8f402e newcopyrights 2006-03-05 11:25:02 +00:00
Mark Andrews
10ea6fe0f5 new draft 2006-03-04 07:09:17 +00:00
Mark Andrews
10b03beca1 (char *) -> (unsigned char *) 2006-03-03 04:46:14 +00:00