Commit Graph

7869 Commits

Author SHA1 Message Date
Evan Hunt
bfbd69c43f 2720. [bug] RFC 5011 trust anchor updates could trigger an
assert if the DNSKEY record was unsigned. [RT #20406]
2009-10-20 04:13:38 +00:00
Mark Andrews
3c5e54941f 2718. [bug] The space calculations in opensslrsa_todns() were
incorrect. [RT #20394]
2009-10-20 02:59:19 +00:00
Mark Andrews
29dd4bdd14 2717. [bug] named failed to update the NSEC/NSEC3 record when
the last private type record was removed as a result
                        of completing the signing the zone with a key.
                        [RT #20399]
2009-10-20 02:45:06 +00:00
Mark Andrews
9ac35b4e4d grammar, line length 2009-10-19 02:37:08 +00:00
Automatic Updater
8ab6a775bb update copyright notice 2009-10-16 23:47:54 +00:00
Evan Hunt
8f7de3db7e Respinning to fix memory leak in dnssec-signzone. (Also adopting doc changes.) 2009-10-16 02:59:41 +00:00
Automatic Updater
f6cd5ef97a update copyright notice 2009-10-14 23:47:51 +00:00
Mark Andrews
cbee6197d1 2713. [bug] powerpc: atomic operations missing asm("ics") /
__isync() calls.
2009-10-14 03:54:23 +00:00
Evan Hunt
19ac4707ee changes needed for win32 build 2009-10-13 00:55:51 +00:00
Automatic Updater
97639003b0 update copyright notice 2009-10-12 23:48:02 +00:00
Evan Hunt
77b8f88f14 2712. [func] New 'auto-dnssec' zone option allows zone signing
to be fully automated in zones configured for
			dynamic DNS.  'auto-dnssec allow;' permits a zone
			to be signed by creating keys for it in the
			key-directory and using 'rndc sign <zone>'.
			'auto-dnssec maintain;' allows that too, plus it
			also keeps the zone's DNSSEC keys up to date
			according to their timing metadata. [RT #19943]
2009-10-12 20:48:12 +00:00
Mark Andrews
30bb4870da remove, not zero, extended flags 2009-10-12 09:03:06 +00:00
Mark Andrews
11804ca08f zero extended flags 2009-10-12 08:57:38 +00:00
Mark Andrews
515053881b remove extended flags before comparing if set 2009-10-12 06:05:29 +00:00
Mark Andrews
af20baa960 silence compiler warning/enforce const [RT #20390] 2009-10-12 05:50:52 +00:00
Automatic Updater
8667770ad2 update copyright notice 2009-10-10 23:47:58 +00:00
Evan Hunt
3727725bb7 2710. [func] New 'dnssec-signzone -x' flag and 'dnskey-ksk-only'
zone option cause a zone to be signed with only KSKs
			signing the DNSKEY RRset, not ZSKs.  This reduces
			the size of a DNSKEY answer.  [RT #20340]
2009-10-10 01:48:00 +00:00
Mark Andrews
0d9fb986c5 silence comiler warning 2009-10-10 01:13:39 +00:00
Automatic Updater
8a07de2f03 update copyright notice 2009-10-09 23:48:09 +00:00
Evan Hunt
315a1514a5 2709. [func] Added some data fields, currently unused, to the
private key file format, to allow implementation
			of explicit key rollover in a future release
			without impairing backward or forward compatibility.
			[RT #20310]
2009-10-09 06:09:21 +00:00
Mark Andrews
d1bcaec0d6 2708. [func] Insecure to secure and NSEC3 parameter changes via
update are now fully supported and no longer require
                        defines to enable.  We now no longer overload the
                        NSEC3PARAM flag field, nor the NSEC OPT bit at the
                        apex.  Secure to insecure changes are controlled by
                        by the named.conf option 'secure-to-insecure'.

                        Warning: If you had previously enabled support by
                        adding defines at compile time to BIND 9.6 you should
                        ensure that all changes that are in progress have
                        completed prior to upgrading to BIND 9.7.  BIND 9.7
                        is not backwards compatible.
2009-10-09 00:33:39 +00:00
Mark Andrews
bb4e0bd8e8 silence ininitialised 2009-10-08 23:58:14 +00:00
Mark Andrews
0838b3c02f Recompute check_ksk as it may have changed 2009-10-08 23:55:57 +00:00
Automatic Updater
15bbb8a129 update copyright notice 2009-10-08 23:48:10 +00:00
Mark Andrews
2847930722 2708. [func] Insecure to secure and NSEC3 parameter changes via
update are now fully supported and no longer require
                        defines to enable.  We now no longer overload the
                        NSEC3PARAM flag field, nor the NSEC OPT bit at the
                        apex.  Secure to insecure changes are controlled by
                        by the named.conf option 'secure-to-insecure'.

                        Warning: If you had previously enabled support by
                        adding defines at compile time to BIND 9.6 you should
                        ensure that all changes that are in progress have
                        completed prior to upgrading to BIND 9.7.  BIND 9.7
                        is not backwards compatible.
2009-10-08 23:13:07 +00:00
Evan Hunt
246c504f90 2706. [bug] Loading a zone with a very large NSEC3 salt could
trigger an assert. [RT #20368]
2009-10-06 21:20:45 +00:00
Automatic Updater
e74245134d update copyright notice 2009-10-06 04:40:14 +00:00
Automatic Updater
464f9144fe update copyright notice 2009-10-05 23:48:27 +00:00
Evan Hunt
ea845a6b72 Rebase all of the API files to interface=60, as this is the first
beta of a new major release.
2009-10-05 22:01:26 +00:00
Evan Hunt
3ff75c89eb 2704. [bug] Serial of dynamic and stub zones could be inconsistent
with their SOA serial.  [RT #19387]
2009-10-05 19:39:20 +00:00
Francis Dupont
3c52c4e44c 20230 update 2009-10-05 17:39:36 +00:00
Francis Dupont
8b78c993cb explicit engine rt20230a 2009-10-05 17:30:49 +00:00
Automatic Updater
4fa2649d57 update copyright notice 2009-10-03 23:48:10 +00:00
Evan Hunt
c36ba263d6 2699. [bug] Missing lock in rbtdb.c. [RT #20037] 2009-10-03 22:39:27 +00:00
Evan Hunt
1210799345 Add /* NOTREACHED */ comments 2009-10-03 18:03:54 +00:00
Automatic Updater
edb08fdf7b update copyright notice 2009-10-01 23:48:08 +00:00
Mark Andrews
cf7432f747 2697. [port] win32: ensure that S_IFMT, S_IFDIR, S_IFCHR and
S_IFREG are defined after including <isc/stat.h>.
                        [RT #20309]
2009-10-01 04:43:30 +00:00
Mark Andrews
eb95d2e917 2696. [bug] named failed to successfully process some valid
acl constructs. [RT #20308]
2009-10-01 04:06:37 +00:00
Shawn Routhier
bafa76b324 Updates to fdwatch code to support DHCP/DDNS code, ticket rt20253. 2009-10-01 01:30:01 +00:00
Automatic Updater
61dd99bfae update copyright notice 2009-09-29 23:48:04 +00:00
Francis Dupont
debd489a44 noreturn RT #20257 2009-09-29 15:06:07 +00:00
Mark Andrews
1e733ffc11 2792. [port] win32: 32/64 bit cleanups. [RT #128244] 2009-09-29 04:38:23 +00:00
Automatic Updater
627f3e0805 update copyright notice 2009-09-25 23:48:13 +00:00
Mark Andrews
ff850b81c8 2690. [bug] win32: fix isc_thread_key_getspecific() prototype.
[RT #20315]
2009-09-25 05:48:17 +00:00
Mark Andrews
ef830a7750 use (char *) for {get,set}sockopt argument 2009-09-25 02:44:06 +00:00
Mark Andrews
11144f86dc silence signed/unsigned comparision warning 2009-09-25 01:42:09 +00:00
Automatic Updater
b4336342d1 update copyright notice 2009-09-24 23:48:13 +00:00
Mark Andrews
0f869e8d52 2689. [bug] Correctly handle snprintf result. [RT #20306] 2009-09-24 22:19:08 +00:00
Francis Dupont
c59a7b0629 missing updates in recent changes 2009-09-24 14:39:17 +00:00
Mark Andrews
69338455d9 2688. [bug] Use INTERFACE_F_POINTTOPOINT, not IFF_POINTOPOINT,
to decide to fetch the destination address. [RT #20305]
2009-09-24 06:37:50 +00:00