Mark Andrews
a27b3757fd
2968. [security] Named could fail to prove a data set was insecure
...
before marking it as insecure. One set of conditions
that can trigger this occurs naturally when rolling
DNSKEY algorithms. [RT #22309 ]
2010-11-16 01:14:51 +00:00
Mark Andrews
240a7dc59d
2951. [bug] named failed to generate a correct signed response
...
in a optout, delegation only zone with no secure
delegations. [RT #22007 ]
2010-09-07 00:58:36 +00:00
Mark Andrews
c73d8c1b72
2938. [bug] When skipping NSEC3 records that don't match the
...
current NSEC3PARAM record in use for zone named
could dereference a uninitialised pointer attempting
to obtain a lock. [RT# 21868]
2010-08-13 06:46:25 +00:00
Evan Hunt
cb933b69ff
2932. [cleanup] Corrected a numbering error in the "dnssec" test.
...
[RT #21597 ]
2010-08-09 22:34:56 +00:00
Tatuya JINMEI 神明達哉
f1f39b7e07
2931. [bug] Temporarily and partially disable change 2864
...
because it would cause inifinite attempts of RRSIG
queries. This is an urgent care fix; we'll
revisit the issue and complete the fix later.
[RT #21710 ]
2010-07-15 01:17:45 +00:00
Mark Andrews
a7d2b922ee
match the dig.out.ns#.$n to the nameserver
2010-06-28 01:34:11 +00:00
Mark Andrews
8fa6ca58b6
check that we have non-cachable answers to test against
2010-06-28 01:31:49 +00:00
Mark Andrews
810656a187
2925. [bug] Named failed to accept uncachable negative responses
...
from insecure zones. [RT# 21555]
2010-06-25 23:50:13 +00:00
Mark Andrews
f35a87f58f
remove leading zeros on keyid
...
account for trusted keys not applying to _bind anymore
2010-06-25 07:28:46 +00:00
Mark Andrews
bf13e709db
2924. [func] 'rndc secroots' dump a combined summary of the
...
current managed keys combined with trusted keys.
[RT #20904 ]
2010-06-25 03:24:05 +00:00
Mark Andrews
5ee4d3f2ee
iterations is -H
2010-06-04 00:04:39 +00:00
Mark Andrews
e74c3a0f59
specify NSEC3 iterations
2010-06-03 21:44:49 +00:00
Mark Andrews
675cc80975
2911. [bug] dnssec-signzone didn't handle out of zone records well.
...
[RT #21367 ]
2010-06-03 03:13:32 +00:00
Automatic Updater
6bb1560124
update copyright notice
2010-01-18 23:48:40 +00:00
Evan Hunt
e11a0c114c
2841. [func] Added "smartsign" and improved "autosign" and
...
"dnssec" regression tests. [RT #20865 ]
2010-01-18 19:19:31 +00:00
Tatuya JINMEI 神明達哉
d8680445d6
2828. [security] Cached CNAME or DNAME RR could be returned to clients
...
without DNSSEC validation. [RT #20737 ]
9.4-ESV, 9.5.3, 9.6.2, 9.7.0, 9.8.0(?)
2009-12-30 08:02:23 +00:00
Automatic Updater
990dca4605
update copyright notice
2009-10-27 23:47:45 +00:00
Mark Andrews
e09cdbac08
2738. [func] Add RSASHA256 and RSASHA512 tests to the dnssec system
...
test. [RT #20453 ]
2009-10-27 22:25:37 +00:00
Automatic Updater
3398334b3a
update copyright notice
2008-09-25 04:02:39 +00:00
Mark Andrews
6098d364b6
2448. [func] Add NSEC3 support. [RT #15452 ]
2008-09-24 02:46:23 +00:00
Automatic Updater
70e5a7403f
update copyright notice
2007-06-19 23:47:24 +00:00
Automatic Updater
ec5347e2c7
update copyright notice
2007-06-18 23:47:57 +00:00
Mark Andrews
8131d4ed6d
update copyright notice
2006-02-26 23:49:50 +00:00
Mark Andrews
95b484c958
fix minor typos
2006-02-26 22:57:18 +00:00
Mark Andrews
675d696977
update copyright notice
2005-09-06 03:51:37 +00:00
Mark Andrews
5be3685b0e
1919. [bug] dig's +sigchase code overhauled. [RT #14933 ]
...
1918. [bug] The DLV code has been re-worked to make no longer
query order sensitive. [RT #14933 ]
2005-08-25 00:56:08 +00:00
Mark Andrews
38e8022ace
1625. [bug] named failed to load/transfer RFC2535 signed zones
...
which contained CNAMES. [RT# 11237]
2004-05-05 01:32:58 +00:00
Mark Andrews
50105afc55
1589. [func] DNSSEC lookaside validation.
...
enable-dnssec -> dnssec-enable
2004-03-10 02:19:58 +00:00
Mark Andrews
dafcb997e3
update copyright notice
2004-03-05 05:14:21 +00:00
Mark Andrews
35541328a8
1558. [func] New DNSSEC 'disable-algorithms'. Support entry into
...
child zones for which we don't have a supported
algorithm. Such child zones are treated as unsigned.
1557. [func] Implement missing DNSSEC tests for
* NOQNAME proof with wildcard answers.
* NOWILDARD proof with NXDOMAIN.
Cache and return NOQNAME with wildcard answers.
2004-01-14 02:06:51 +00:00
Mark Andrews
0f042c7c44
- improves tests of negative insecurity proofs, including tests for the
...
SOA TTL 0 hack.
- adds +noauth to a few invocations of dig where the authority section is
not important.
- removes the bogus first half of the dynamic zone test, which didn't
do anything other than make the test suite fail if run twice.
- fixed the fact that the keyless.example zone wasn't being securely
delegated.
bwelling
2002-07-19 06:20:24 +00:00
Mark Andrews
0b09763c35
1328. [func] DS (delegation signer) support.
2002-06-17 04:01:37 +00:00
Mark Andrews
a7038d1a05
copyrights
2002-02-20 03:35:59 +00:00
Brian Wellington
4014b6a8ae
although a privately secure zone was signed, it was never tested.
2002-02-13 01:32:12 +00:00
Brian Wellington
64ea670052
the dynamic zone test wasn't working as expected since the child zone wasn't
...
securely delegated.
2002-02-06 03:28:59 +00:00
Andreas Gustafsson
473ca0bf8c
Added RT #2399 regression test
2002-01-22 22:27:29 +00:00
Andreas Gustafsson
e4b5f088ca
Added RT #1763 regression test
2001-09-19 21:19:52 +00:00
Andreas Gustafsson
1301637cc5
check that negative validation fails with a misconfigured trusted key
2001-09-19 20:47:02 +00:00
Brian Wellington
7a224ba59b
test that validation of an ANY query returning a DNAME works
2001-02-23 06:22:11 +00:00
Brian Wellington
529d1b9ada
test that validation of a query returning a DNAME works
2001-02-23 06:14:44 +00:00
Brian Wellington
4f91c46a42
Test that both normal and ANY queries that match a CNAME are properly
...
validated.
2001-02-21 06:47:45 +00:00
Brian Wellington
a41ab607a4
Test that validation of ANY queries works. Also add data to be used for
...
CNAME/DNAME tests, but not the tests yet since they fail.
2001-02-20 18:33:50 +00:00
Brian Wellington
499b34cea0
copyright update
2001-01-09 22:01:04 +00:00
Brian Wellington
ec772e873b
651. [func] The AD bit in responses now has the meaning
...
specified in <draft-ietf-dnsext-ad-is-secure>.
2001-01-04 00:24:26 +00:00
Andreas Gustafsson
01da43e63a
pass the +dnssec flag to DIG
2000-11-22 01:26:24 +00:00
Andreas Gustafsson
bca6ff69a7
removed redundant comment
2000-11-20 17:53:41 +00:00
David Lawrence
40f53fa8d9
Trailing whitespace trimmed. Perhaps running "perl util/spacewhack.pl in your
...
own CVS tree will help minimize CVS conflicts. Maybe not.
Blame Graff for getting me to trim all trailing whitespace.
2000-08-01 01:33:37 +00:00
Brian Wellington
60eb559222
- print the number of each test
...
- add a missing simple negative response test
- check the status of the ad bit on responses
- test queries with the cd bit set
- remove duplicated arguments to dig
2000-07-27 23:22:35 +00:00
David Lawrence
15a4474541
word wrap copyright notice at column 70
2000-07-27 09:55:03 +00:00
Andreas Gustafsson
8b2d2acbff
in the multi-stage positive validation test, allow the
...
recursive server to omit the authority section
2000-07-19 19:54:50 +00:00