2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-30 05:57:52 +00:00

2415 Commits

Author SHA1 Message Date
Andreas Gustafsson
55da37e18f removed dead code 2000-07-14 00:33:09 +00:00
Brian Wellington
6bc1a64561 If a positive validation fails and it looks like the reason is that there
are no material DNSSEC signatures, try an insecurity proof.
2000-07-13 23:52:04 +00:00
Brian Wellington
4250285838 Return DNS_R_NAMETOOLONG in a few places where less useful errors were
returned before.
2000-07-13 18:10:18 +00:00
Brian Wellington
618e871c2e Add DNS_R_NAMETOOLONG 2000-07-13 02:41:20 +00:00
Andreas Gustafsson
9317787889 use isc_log_wouldlog() 2000-07-13 01:16:22 +00:00
Brian Wellington
2e1236ad1e Call isc_log_wouldlog() 2000-07-13 00:30:58 +00:00
Brian Wellington
945c32833b Call isc_log_wouldlog() in a few places. 2000-07-13 00:27:17 +00:00
Brian Wellington
ecb2897c71 Insist that when a fetch returns a successful event, the rdataset is associated.
A test failed about a week ago because this was not true, and because it
died in the event handler, diagnosing the problem was impossible.
2000-07-12 23:56:06 +00:00
Andreas Gustafsson
2c24bbb10b clarified warning messages 2000-07-12 16:17:38 +00:00
James Brister
8af589aea3 It's no longer a fatal error if a keys{} clause is missing on a control
channel definition, nor if the keys{} clause is empty. Warnings are
issued.
2000-07-12 15:36:09 +00:00
Andreas Gustafsson
403cc93b27 typo in log message 2000-07-11 22:44:33 +00:00
James Brister
f4d9f465cd 327. [bug] rndc.conf parser wasn't correctly recognising an IP
address where a host specification was required.
2000-07-11 20:13:09 +00:00
James Brister
adade77942 326. [func] 'keys' in an 'inet' control statement is now
required and must have at least one item in it.

                        warning is issued if a 'unix' control channel is
                        defined (not supported).
2000-07-11 19:09:10 +00:00
Andreas Gustafsson
a4db2a47f5 incremented library version numbers to 1.0.0 2000-07-10 22:20:43 +00:00
Michael Graff
d2762d6c37 If the name is a dynamic name, free its memory 2000-07-10 20:46:02 +00:00
Andreas Gustafsson
28059de4ef when a master file ends in a place where a newline is expected,
make the warning message say 'file does not end with newline' instead of
'unexpected end of file' to lead the user on the right tracks to fixing
the most likely cause.  Also, don't include the function name in the message.
2000-07-10 19:07:19 +00:00
David Lawrence
d4868faf3f removed the port member from dns_c_ctrl_t; the port is put in the sockaddr. 2000-07-10 11:28:31 +00:00
David Lawrence
838281ed55 318. [func] dns_c_ndcctx_destroy() could never return anything
except ISC_R_SUCCESS; made it have void return instead.
2000-07-10 11:27:12 +00:00
Mark Andrews
fd4810861c Warn on unexpected <eof> if input source is a file, treat as <eol><eof>
regardless of input source.
2000-07-10 05:15:04 +00:00
Mark Andrews
d1e971ba02 316. [bug] EOF mid line should be a error.
315.   [bug]           Handle non-empty blanks lines.
2000-07-09 12:52:34 +00:00
Andreas Gustafsson
f405ffddc8 added missing requirements 2000-07-08 17:27:28 +00:00
James Brister
475c936d4c 314. [func] Inet controls named.conf statement can now have
any non-negative number of keys specified.
2000-07-07 23:11:48 +00:00
James Brister
b4124351ad typo in printing additional-data definition.. 2000-07-07 22:57:53 +00:00
David Lawrence
d20d22616b A socket result of ISC_R_SUCCESS can still possibly be posted even after
isc_socket_cancel() has been called.  resquery_senddone() has been fixed
to account for this (there was a race condition because of the faulty
assumption that only ISC_R_CANCELED would be returned after
isc_socket_cancel()).

The interaction of resquery_response() with the dispatcher now has to be
closely reviewed to make sure it does not have a similar problem with
a canceled query.  If the faulty assumption hadn't been faulty, it was
fine, but now I'm not so sure.
2000-07-07 19:43:14 +00:00
James Brister
524c8ea0dc typo in print statement. 2000-07-07 14:30:00 +00:00
James Brister
952e9025b0 310. [func] Changes to named.conf "controls" statement (inet
subtype only)

                          - support "keys" clause

                                controls {
                                   inet * port 1024
                                        allow { any; } keys { "foo"; }
                                }

                          - allow "port xxx" to be left out of statement,
                            in which case it defaults to omapi's default port
                            of 953.
2000-07-07 13:56:14 +00:00
Brian Wellington
25496cebad If trying to validate a key set that happens to be a security root, the
validation should only consist of checking that each key in the key set
is also in the list of security root keys.

Strangeness occurs when the key set is signed, since the key set is marked
as secure, but the sig set is not, since it wasn't used in the validation
process.  This means that a query for a key set at a security root will
have the AD bit set if the key set is unsigned and not if the key set is signed.
2000-07-07 00:44:01 +00:00
David Lawrence
3658cf5419 comment cleanup (missing "not", spaces where tabs should have been) 2000-07-07 00:25:47 +00:00
David Lawrence
9fb4b3f08a Do not return an exact match from dns_rbt_findnode() when the exact
match does not have associated data and DNS_RBTFIND_EMPTYDATA is not set.
Return DNS_R_PARTIALMATCH instead if there is a superdomain with
data, or ISC_R_NOTFOUND if no superdomain has data.

Make dns_rbt_findname() honor DNS_RBTFIND_EMPTYDATA, per the rbt.h
documentation that has been saying it will.  It didn't.
2000-07-06 23:54:45 +00:00
Brian Wellington
ca93ad9b9e If we're asking for a key and need to call dns_view_findzonecut(), set
the DNS_DB_NOEXACT flag.  This means that the resolver will start look for the
key at or above the parent zone, and will return the key set from the parent
zone if key sets are present in both the parent and child.
2000-07-06 02:33:43 +00:00
Andreas Gustafsson
b7b5dd0d10 treat all responses to AXFR requests as AXFR responses 2000-07-05 20:28:34 +00:00
Michael Graff
8681403c16 Shut up a gcc warning 2000-07-05 20:26:46 +00:00
Mark Andrews
8c1aa8573d 308. [bug] Treat a SOA record not at top of zone as an error
when loading a zone. (RT #154)
2000-07-04 04:28:44 +00:00
Mark Andrews
3cf456d58e zone_get_from_db() now does as much as is possible. 2000-07-04 04:21:38 +00:00
Mark Andrews
84cb41f729 new error code DNS_R_NOTZONETOP 2000-07-04 03:59:54 +00:00
David Lawrence
24675e8e13 In dns_dispatch_createtcp(), REQUIRE() that attributes not include
DNS_DISPATCHATTR_UDP, and document that requirement as well as the
existing requirement for needing DNS_DISPATCHATTR_TCP.

No need to pull up.
2000-07-04 01:48:13 +00:00
Brian Wellington
9e37579870 Check that zone->view is not NULL before checking that zone->view->adb is not
NULL.  It appears that zone maintenance can occur when the zone is shutting
down and the view pointer is NULL.  We don't want to do zone maintenance in
this case.
2000-07-04 01:32:40 +00:00
David Lawrence
c7c2522a32 query-replace-o in error message; no need to pull up since no code in 9.0.0
will use the function in which the error appears
2000-07-04 01:29:48 +00:00
David Lawrence
96ab25294b 307. [bug] When canceling a query, the resolver didn't check for
isc_socket_sendto() calls that did not yet have their
			completion events posted, so it could (rarely) end up
			destroying the query context and then want to use
			it again when the send event posted, triggering an
			assertion as it tried to cancel an already-canceled
			query.  (RT #77)

... so now the resolver counts the number of outstanding isc_socket_sendto()s
and only destroys the query context when there are no more.
2000-07-04 01:19:20 +00:00
Brian Wellington
e68de4a7db 306. [bug] Reading HMAC-MD5 private key files didn't work. 2000-07-03 23:27:45 +00:00
Andreas Gustafsson
b3e4ce3059 alternative fix to 303. [RT #157] 2000-07-03 22:42:36 +00:00
Andreas Gustafsson
d8560fb7ff [RT #155]
305. [bug]             When reloading the server with a config file
                        containing a syntax error, it could catch an
                        assertion failure trying to perform zone
                        maintenance on tentatively created zones whose
                        views were never fully configured and lacked
                        an address database.
2000-07-03 20:21:53 +00:00
Mark Andrews
845e0b5f96 303. [bug] add additional sanity checks to differentiate a AXFR
response vs a IXFR response. (RT #157)
2000-07-03 13:33:05 +00:00
Brian Wellington
e405739af2 297. [bug] Specifying a key name that wasn't fully qualified
in certain parts of the config file could cause
                        an assertion.
2000-06-30 15:39:23 +00:00
Andreas Gustafsson
428b78e56d RT #153: when invoked with type==CNAME and a message
not constructed by dns_message_parse(), dns_message_findname() failed to
find anything due to checking for attribute bits set only by dns_message_parse().
This caused an infinite loop when constructing the response to an ANY query
at a CNAME in a secure zone.
2000-06-29 19:49:43 +00:00
Andreas Gustafsson
824068b85b cut-and-paste-o: dns_message_findname() tested for
dns_rdatatype_cname twice instead of cname+dname
2000-06-29 18:58:32 +00:00
Andreas Gustafsson
26be84cdfc spelling, grammar, and formatting; no functional change 2000-06-29 16:48:53 +00:00
Mark Andrews
b74e73c5b4 294. [bug] If we run out of space in while processing glue
when reading a master file and commit "current name"
			reverts to "name_current" instead of staying as
			"name_glue".
2000-06-29 15:55:19 +00:00
David Lawrence
5eae30a019 in fact, ISC_LANG_BEGINDECLS and ISC_LANG_ENDDECLS are not needed at all since
rdatastructpre.h and rdatastructsuf.h already provide the wrapper.
(no need to pull up.)
2000-06-28 19:07:19 +00:00
David Lawrence
778d24f5ba do not include isc/lang.h; rdatastructpre.h already gets it.
no need to pull these changes up to the 9.0.0 branch.
2000-06-28 19:03:24 +00:00