Mark Andrews
7329012471
regen
2006-01-27 05:17:12 +00:00
Mark Andrews
c6d4f78152
1973. [func] TSIG HMACSHA1, HMACSHA224, HMACSHA256, HMACSHA384 and
...
HMACSHA512 support. [RT #13606 ]
2006-01-27 02:35:15 +00:00
Mark Andrews
7934319e24
auto update
2006-01-25 23:16:59 +00:00
Mark Andrews
7f9da0f91c
new draft
2006-01-24 23:28:20 +00:00
Mark Andrews
4afceb476f
auto update
2006-01-24 23:17:36 +00:00
Mark Andrews
66b82704c9
auto update
2006-01-23 23:16:57 +00:00
Mark Andrews
adf8d90c0c
auto update
2006-01-20 23:17:13 +00:00
Mark Andrews
1ad4fd6717
update
2006-01-20 06:14:04 +00:00
Mark Andrews
5e93157435
update
2006-01-20 06:08:04 +00:00
Mark Andrews
75ee4e8c23
update
2006-01-20 05:04:02 +00:00
Rob Austein
d262a0085a
classify gss-tsig branches
2006-01-20 04:41:17 +00:00
Mark Andrews
a36377a57e
update
2006-01-20 04:30:21 +00:00
Mark Andrews
1665f802ed
update
2006-01-20 04:07:13 +00:00
Mark Andrews
baa2422514
auto update
2006-01-19 23:16:52 +00:00
Mark Andrews
2825b37e42
auto update
2006-01-18 23:17:27 +00:00
Mark Andrews
0ff8225e67
auto update
2006-01-17 23:16:54 +00:00
Mark Andrews
bf8626363c
new draft
2006-01-13 23:34:02 +00:00
Mark Andrews
26ec4b0eda
auto update
2006-01-13 23:17:45 +00:00
Mark Andrews
efbcd33453
draft-ietf-dnsext-nsid-01.txt
2006-01-12 22:58:53 +00:00
Mark Andrews
aacfb65e0a
4343: Domain Name System (DNS) Case Insensitivity Clarification
2006-01-12 02:16:30 +00:00
Mark Andrews
86cc1db806
new draft
2006-01-11 00:38:23 +00:00
Mark Andrews
b4c69565c0
auto update
2006-01-10 23:17:41 +00:00
Mark Andrews
abc8b50920
update
2006-01-10 05:45:13 +00:00
Mark Andrews
74341db5c3
new draft
2006-01-10 04:01:17 +00:00
Mark Andrews
e9bfdce7b1
auto update
2006-01-09 23:16:49 +00:00
Mark Andrews
557a0ad515
regen
2006-01-07 03:34:55 +00:00
Mark Andrews
c0381ec648
auto update
2006-01-06 23:17:04 +00:00
Mark Andrews
00b872e4f7
4255: Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints
2006-01-06 23:16:00 +00:00
Mark Andrews
3b4098640d
regen
2006-01-06 01:55:39 +00:00
Mark Andrews
dc6da18ccb
1964. [func] Seperate out MX and SRV to CNAME checks. [RT #15723 ]
2006-01-05 23:45:34 +00:00
Mark Andrews
3e3eae9127
unbalanced <term>'s
2006-01-05 11:52:32 +00:00
Mark Andrews
a1bc941093
1959. [func] Control the zeroing of the negative response TTL to
...
a soa query. Defaults "zero-no-soa-ttl yes;" and
"zero-no-soa-ttl-cache no;". [RT #15460 ]
2006-01-05 02:19:02 +00:00
Mark Andrews
08c9026166
1953. [func] Named now falls back to advertising EDNS with a
...
512 byte receive buffer if the initial EDNS queries
fail. [RT #14852 ]
1952. [func] The maximum EDNS UDP response named will send can
now be set in named.conf (max-udp-size). This is
independent of the advertised receive buffer
(edns-udp-size). [RT #14852 ]
2006-01-05 00:01:46 +00:00
Mark Andrews
acb4f52369
update copyright notice
2006-01-04 23:50:24 +00:00
Mark Andrews
2b66a51a7d
1950. [port] Solaris 2.5.1 and earlier cannot bind() then connect()
...
a TCP socket. This prevents the source address being
set for TCP connections. [RT #15628 ]
2006-01-04 04:15:55 +00:00
Mark Andrews
fabf2ee6b0
1947. [func] It is now possible to configure named to accept
...
expired RRSIGs. Default "dnssec-accept-expired no;".
Setting "dnssec-accept-expired yes;" leaves named
vulnerable to replay attacks. [RT #14685 ]
2006-01-04 02:35:49 +00:00
Mark Andrews
b0f3c5b1cc
auto update
2006-01-03 23:16:49 +00:00
Mark Andrews
efc32b02d1
auto update
2005-12-21 23:16:51 +00:00
Mark Andrews
dba453de6f
auto update
2005-12-18 23:16:26 +00:00
Mark Andrews
1a402572f3
auto update
2005-12-16 23:16:33 +00:00
Mark Andrews
15909e3040
new draft
2005-12-14 00:14:31 +00:00
Mark Andrews
272ccfe977
auto update
2005-12-12 23:16:44 +00:00
Mark Andrews
38b82ae6c6
auto update
2005-12-08 23:16:33 +00:00
Mark Andrews
c701f1e632
auto update
2005-12-07 23:16:29 +00:00
Mark Andrews
cd816b0380
auto update
2005-12-06 23:16:56 +00:00
Mark Andrews
2c8bc6d73b
auto update
2005-12-05 23:16:39 +00:00
Mark Andrews
6101b9f0d9
regen
2005-12-05 02:08:05 +00:00
Mark Andrews
cf224bbf7b
1942. [bug] If the name of a DNSKEY match that of one in
...
trusted-keys do not attempt to validate the DNSKEY
using the parents DS RRset. [RT #15649 ]
2005-12-04 23:54:01 +00:00
Mark Andrews
6e3b7da810
new draft
2005-12-02 01:16:54 +00:00
Mark Andrews
4e62d67b11
auto update
2005-11-30 23:16:43 +00:00