Evan Hunt
bfbd69c43f
2720. [bug] RFC 5011 trust anchor updates could trigger an
...
assert if the DNSKEY record was unsigned. [RT #20406 ]
2009-10-20 04:13:38 +00:00
Mark Andrews
3c5e54941f
2718. [bug] The space calculations in opensslrsa_todns() were
...
incorrect. [RT #20394 ]
2009-10-20 02:59:19 +00:00
Mark Andrews
29dd4bdd14
2717. [bug] named failed to update the NSEC/NSEC3 record when
...
the last private type record was removed as a result
of completing the signing the zone with a key.
[RT #20399 ]
2009-10-20 02:45:06 +00:00
Mark Andrews
9ac35b4e4d
grammar, line length
2009-10-19 02:37:08 +00:00
Automatic Updater
8ab6a775bb
update copyright notice
2009-10-16 23:47:54 +00:00
Evan Hunt
8f7de3db7e
Respinning to fix memory leak in dnssec-signzone. (Also adopting doc changes.)
2009-10-16 02:59:41 +00:00
Automatic Updater
f6cd5ef97a
update copyright notice
2009-10-14 23:47:51 +00:00
Mark Andrews
cbee6197d1
2713. [bug] powerpc: atomic operations missing asm("ics") /
...
__isync() calls.
2009-10-14 03:54:23 +00:00
Evan Hunt
19ac4707ee
changes needed for win32 build
2009-10-13 00:55:51 +00:00
Automatic Updater
97639003b0
update copyright notice
2009-10-12 23:48:02 +00:00
Evan Hunt
77b8f88f14
2712. [func] New 'auto-dnssec' zone option allows zone signing
...
to be fully automated in zones configured for
dynamic DNS. 'auto-dnssec allow;' permits a zone
to be signed by creating keys for it in the
key-directory and using 'rndc sign <zone>'.
'auto-dnssec maintain;' allows that too, plus it
also keeps the zone's DNSSEC keys up to date
according to their timing metadata. [RT #19943 ]
2009-10-12 20:48:12 +00:00
Mark Andrews
30bb4870da
remove, not zero, extended flags
2009-10-12 09:03:06 +00:00
Mark Andrews
11804ca08f
zero extended flags
2009-10-12 08:57:38 +00:00
Mark Andrews
515053881b
remove extended flags before comparing if set
2009-10-12 06:05:29 +00:00
Mark Andrews
af20baa960
silence compiler warning/enforce const [RT #20390 ]
2009-10-12 05:50:52 +00:00
Automatic Updater
8667770ad2
update copyright notice
2009-10-10 23:47:58 +00:00
Evan Hunt
3727725bb7
2710. [func] New 'dnssec-signzone -x' flag and 'dnskey-ksk-only'
...
zone option cause a zone to be signed with only KSKs
signing the DNSKEY RRset, not ZSKs. This reduces
the size of a DNSKEY answer. [RT #20340 ]
2009-10-10 01:48:00 +00:00
Mark Andrews
0d9fb986c5
silence comiler warning
2009-10-10 01:13:39 +00:00
Automatic Updater
8a07de2f03
update copyright notice
2009-10-09 23:48:09 +00:00
Evan Hunt
315a1514a5
2709. [func] Added some data fields, currently unused, to the
...
private key file format, to allow implementation
of explicit key rollover in a future release
without impairing backward or forward compatibility.
[RT #20310 ]
2009-10-09 06:09:21 +00:00
Mark Andrews
d1bcaec0d6
2708. [func] Insecure to secure and NSEC3 parameter changes via
...
update are now fully supported and no longer require
defines to enable. We now no longer overload the
NSEC3PARAM flag field, nor the NSEC OPT bit at the
apex. Secure to insecure changes are controlled by
by the named.conf option 'secure-to-insecure'.
Warning: If you had previously enabled support by
adding defines at compile time to BIND 9.6 you should
ensure that all changes that are in progress have
completed prior to upgrading to BIND 9.7. BIND 9.7
is not backwards compatible.
2009-10-09 00:33:39 +00:00
Mark Andrews
bb4e0bd8e8
silence ininitialised
2009-10-08 23:58:14 +00:00
Mark Andrews
0838b3c02f
Recompute check_ksk as it may have changed
2009-10-08 23:55:57 +00:00
Automatic Updater
15bbb8a129
update copyright notice
2009-10-08 23:48:10 +00:00
Mark Andrews
2847930722
2708. [func] Insecure to secure and NSEC3 parameter changes via
...
update are now fully supported and no longer require
defines to enable. We now no longer overload the
NSEC3PARAM flag field, nor the NSEC OPT bit at the
apex. Secure to insecure changes are controlled by
by the named.conf option 'secure-to-insecure'.
Warning: If you had previously enabled support by
adding defines at compile time to BIND 9.6 you should
ensure that all changes that are in progress have
completed prior to upgrading to BIND 9.7. BIND 9.7
is not backwards compatible.
2009-10-08 23:13:07 +00:00
Evan Hunt
246c504f90
2706. [bug] Loading a zone with a very large NSEC3 salt could
...
trigger an assert. [RT #20368 ]
2009-10-06 21:20:45 +00:00
Automatic Updater
e74245134d
update copyright notice
2009-10-06 04:40:14 +00:00
Automatic Updater
464f9144fe
update copyright notice
2009-10-05 23:48:27 +00:00
Evan Hunt
ea845a6b72
Rebase all of the API files to interface=60, as this is the first
...
beta of a new major release.
2009-10-05 22:01:26 +00:00
Evan Hunt
3ff75c89eb
2704. [bug] Serial of dynamic and stub zones could be inconsistent
...
with their SOA serial. [RT #19387 ]
2009-10-05 19:39:20 +00:00
Francis Dupont
3c52c4e44c
20230 update
2009-10-05 17:39:36 +00:00
Francis Dupont
8b78c993cb
explicit engine rt20230a
2009-10-05 17:30:49 +00:00
Automatic Updater
4fa2649d57
update copyright notice
2009-10-03 23:48:10 +00:00
Evan Hunt
c36ba263d6
2699. [bug] Missing lock in rbtdb.c. [RT #20037 ]
2009-10-03 22:39:27 +00:00
Evan Hunt
1210799345
Add /* NOTREACHED */ comments
2009-10-03 18:03:54 +00:00
Automatic Updater
edb08fdf7b
update copyright notice
2009-10-01 23:48:08 +00:00
Mark Andrews
cf7432f747
2697. [port] win32: ensure that S_IFMT, S_IFDIR, S_IFCHR and
...
S_IFREG are defined after including <isc/stat.h>.
[RT #20309 ]
2009-10-01 04:43:30 +00:00
Mark Andrews
eb95d2e917
2696. [bug] named failed to successfully process some valid
...
acl constructs. [RT #20308 ]
2009-10-01 04:06:37 +00:00
Shawn Routhier
bafa76b324
Updates to fdwatch code to support DHCP/DDNS code, ticket rt20253.
2009-10-01 01:30:01 +00:00
Automatic Updater
61dd99bfae
update copyright notice
2009-09-29 23:48:04 +00:00
Francis Dupont
debd489a44
noreturn RT #20257
2009-09-29 15:06:07 +00:00
Mark Andrews
1e733ffc11
2792. [port] win32: 32/64 bit cleanups. [RT #128244 ]
2009-09-29 04:38:23 +00:00
Automatic Updater
627f3e0805
update copyright notice
2009-09-25 23:48:13 +00:00
Mark Andrews
ff850b81c8
2690. [bug] win32: fix isc_thread_key_getspecific() prototype.
...
[RT #20315 ]
2009-09-25 05:48:17 +00:00
Mark Andrews
ef830a7750
use (char *) for {get,set}sockopt argument
2009-09-25 02:44:06 +00:00
Mark Andrews
11144f86dc
silence signed/unsigned comparision warning
2009-09-25 01:42:09 +00:00
Automatic Updater
b4336342d1
update copyright notice
2009-09-24 23:48:13 +00:00
Mark Andrews
0f869e8d52
2689. [bug] Correctly handle snprintf result. [RT #20306 ]
2009-09-24 22:19:08 +00:00
Francis Dupont
c59a7b0629
missing updates in recent changes
2009-09-24 14:39:17 +00:00
Mark Andrews
69338455d9
2688. [bug] Use INTERFACE_F_POINTTOPOINT, not IFF_POINTOPOINT,
...
to decide to fetch the destination address. [RT #20305 ]
2009-09-24 06:37:50 +00:00