Commit Graph

6594 Commits

Author SHA1 Message Date
Mark Andrews
ea3aa401bc 4015. [bug] Nameservers that are skipped due to them being
CNAMEs were not being logged. They are now logged
                        to category 'cname' as per BIND 8. [RT #37935]
2014-12-03 11:34:07 +11:00
Mark Andrews
6444de08d1 4014. [bug] When including a master file origin_changed was
not being properly set leading to a potentially
                        spurious 'inherited owner' warning. [RT #37919]
2014-12-03 09:42:30 +11:00
Francis Dupont
5c5c6d289d Add a TCP only option to server/peer 2014-12-02 14:17:59 +01:00
Mark Andrews
401f7510d7 use the actual header 2014-11-28 19:17:26 +11:00
Mark Andrews
7554ff1619 add #define rdataset_clearprefetch rdataset_clearprefetch64 2014-11-25 12:06:23 +11:00
Tinderbox User
523ad879ce update copyright notice / whitespace 2014-11-24 23:53:16 +00:00
Mark Andrews
092d3b76db 4010. [cleanup] Clear the prefetchable state when initiating a prefetch.
[RT #37399]
2014-11-24 11:18:30 +11:00
Evan Hunt
92384667ff [master] delv +tcp
4009.	[func]		delv: added a +tcp option. [RT #37855]
2014-11-21 09:42:04 -08:00
Evan Hunt
3e5b4176d8 [master] win32 build fix 2014-11-20 15:55:43 -08:00
Evan Hunt
05e448935c [master] refactor max-recursion-queries
- the counters weren't set correctly when fetches timed out.
  instead we now pass down a counter object.
2014-11-19 18:21:02 -08:00
Evan Hunt
c4f54e5bd1 [master] add max-recursion-queries
also fixes and documentation for max-recursion-depth
2014-11-18 22:02:02 -08:00
Evan Hunt
3230429e17 [master] limit recursion depth and iterative queries
4006.	[security]	A flaw in delegation handling could be exploited
			to put named into an infinite loop.  This has
			been addressed by placing limits on the number
			of levels of recursion named will allow (default 7),
			and the number of iterative queries that it will
			send (default 50) before terminating a recursive
			query (CVE-2014-8500).

			The recursion depth limit is configured via the
			"max-recursion-depth" option.  [RT #35780]
2014-11-17 23:24:44 -08:00
Evan Hunt
a0b4f6d952 [master] geoip security fixes
4003.	[security]	When geoip-directory was reconfigured during
			named run-time, the previously loaded GeoIP
			data could remain, potentially causing wrong
			ACLs to be used or wrong results to be served
			based on geolocation. [RT #37720]

4002.	[security]	Lookups in GeoIP databases that were not
			loaded could cause an assertion failure.
			[RT #37679]

4001.	[security]	The caching of GeoIP lookups did not always
			handle address families correctly, potentially
			resulting in an assertion failure. [RT #37672]
2014-11-16 08:43:22 -08:00
Evan Hunt
e32d354f75 [master] allow arbitrary-size rndc output
4005.	[func]		The buffer used for returning text from rndc
			commands is now dynamically resizable, allowing
			arbitrarily large amounts of text to be sent back
			to the client. (Prior to this change, it was
			possible for the output of "rndc tsig-list" to be
			truncated.) [RT #37731]
2014-11-14 15:58:54 -08:00
Evan Hunt
c4abb19716 [master] reference leak with AAAA glue but not A
4004.	[bug]		When delegations had AAAA glue but not A, a
			reference could be leaked causing an assertion
			failure on shutdown. [RT #37796]
2014-11-14 09:02:28 -08:00
Evan Hunt
ce96d4326c [master] new mkeys and nzf naming format
3999.	[func]		"mkeys" and "nzf" files are now named after
			their corresponding views, unless the view name
			contains characters that would be incompatible
			with use in a filename (i.e., slash, backslash,
			or capital letters). If a view name does contain
			these characters, the files will still be named
			using a cryptographic hash of the view name.
			Regardless of this, if a file using the old name
			format is found to exist, it will continue to be
			used. [RT #37704]
2014-11-04 19:43:27 -08:00
Tinderbox User
5781d00939 update copyright notice 2014-11-04 23:45:20 +00:00
Mark Andrews
a31d0513c3 add missing opening bracket 2014-11-04 17:02:32 +11:00
Mark Andrews
1feee79e1f 3997. [protocol] Add OPENGPGKEY record. [RT# 37671] 2014-11-04 12:24:39 +11:00
Tinderbox User
03fc2ff527 update copyright notice 2014-10-31 23:45:23 +00:00
Mark Andrews
c2f8108123 3996. [bug] Address use after free on out of memory error in
keyring_add. [RT #37639]
2014-10-31 11:44:09 +11:00
Mark Andrews
4e59131f18 3995. [bug] receive_secure_serial holds the zone lock for too
long. [RT #37626]
2014-10-31 11:38:14 +11:00
Mark Andrews
eb5243365c 3989. [cleanup] Remove redundent dns_db_resigned calls. [RT #35748] 2014-10-30 10:53:12 +11:00
Mark Andrews
bad93fb90c missing comma 2014-10-28 16:10:49 +11:00
Tinderbox User
6932de75ef update copyright notice 2014-10-21 23:45:24 +00:00
Francis Dupont
4d6329c1b3 Handle VS14 incompatible changes [RT #37380] 2014-10-21 09:34:33 +02:00
Mark Andrews
4140a96f22 3987. [func] Allow the zone serial of a dynamically updatable
zone to be updated via rndc. [RT #37404]
2014-10-21 18:15:42 +11:00
Mark Andrews
72775a79fe 3981. [bug] Cache DS/NXDOMAIN independently of other query types.
[RT #37467]
2014-10-18 13:09:09 +11:00
Mark Andrews
48f97c23b7 3979. [bug] Negative trust anchor fetches where not properly
managed. [RT #37488]
2014-10-18 10:07:24 +11:00
Evan Hunt
188690149b [master] add diffie-hellman key unit test
3978.	[test]		Added a unit test for Diffie-Hellman key
			computation, completing change #3974. [RT #37477]
2014-10-17 15:55:37 -07:00
Evan Hunt
eb6d61d5e0 [master] correctly validate 5011 trust anchors
3976.	[bug]		When refreshing managed-key trust anchors, clear
			any cached trust so that they will always be
			revalidated with the current set of secure
			roots. [RT #37506]
2014-10-17 15:40:07 -07:00
Tinderbox User
28b2fddfd4 update copyright notice 2014-10-16 23:45:23 +00:00
Mark Andrews
ca77632f65 initialize rdataset->private7 2014-10-16 11:23:01 +11:00
Mark Andrews
58a1051e92 3974. [bug] handle DH_compute_key() failure correctly in
openssldh_link.c. [RT #37477]
2014-10-13 23:41:36 +11:00
Evan Hunt
34cb27055a [master] install badcache.h 2014-10-08 19:42:48 -07:00
Mark Andrews
bbec761a67 silence compiler warning 2014-10-08 17:47:46 +11:00
Tinderbox User
d1573beb05 update copyright notice 2014-10-04 23:45:22 +00:00
Mark Andrews
c81d56c03e 3971. [bug] Reduce the cascasding failures due to a bad $TTL line
in named-checkconf / named-checkzone. [RT #37138]
2014-10-05 08:29:34 +11:00
Tinderbox User
7a3f584cfc update copyright notice 2014-10-02 23:45:25 +00:00
Mark Andrews
9c0589bc8b 3966. [bug] Missing dns_db_closeversion call in receive_secure_db.
[RT #35746]
2014-10-03 07:50:09 +10:00
Mark Andrews
dda69168ea 3965. [func] Log outgoing packets and improve packet logging to
support logging the remote address. [RT #36624]
2014-10-02 09:40:11 +10:00
Mark Andrews
ed1c845c1d 3964. [func] nsupdate now performs check-names processing.
[RT #36266]
2014-10-02 09:35:43 +10:00
Tinderbox User
be484acb22 update copyright notice 2014-09-30 23:45:22 +00:00
Mark Andrews
ffeaac1d82 3961. [bug] Forwarding of SIG(0) signed UPDATE messages failed with
BADSIG.  [RT #37216]
2014-10-01 07:24:16 +10:00
Mark Andrews
fa827173df 3959. [bug] Updates could be lost if they arrived immediately
after a rndc thaw. [RT #37233]
2014-10-01 06:59:19 +10:00
Tinderbox User
2fb35a6d59 update copyright notice 2014-09-29 23:45:24 +00:00
Mark Andrews
80169c379d 3957. [bug] "dnssec-keygen -S" failed for ECCGOST, ECDSAP256SHA256
and ECDSAP384SHA384. [RT #37183]
2014-09-29 10:18:54 +10:00
Mark Andrews
10c12aa549 3956. [func] Notify messages are now rate limited by notify-rate and
startup-notify-rate instead of serial-query-rate.
                        [RT #24454]

3955.   [bug]           Notify messages due to changes are no longer queued
                        behind startup notify messages. [RT #24454]
2014-09-29 10:01:08 +10:00
Mark Andrews
4b92bc0022 don't redefine GEOIP_DATA 2014-09-29 09:33:24 +10:00
Tinderbox User
e64f32cd04 update copyright notice 2014-09-27 23:45:22 +00:00