2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-28 21:17:54 +00:00

413 Commits

Author SHA1 Message Date
Andreas Gustafsson
b879ed05f4 785. [bug] A race condition in the resolver could cause
an assertion failure. [RT #673, #872, #1048]
2001-03-20 22:13:00 +00:00
Brian Wellington
0d19c777ae Use a counter instead of a flag to indicate if the resolver is in the
process of connecting.  There's a possibility that a connect might not
have sent a completion event when another one starts, and this could cause
bad things to happen since the query would only know about one connect.
2001-03-16 21:50:59 +00:00
Brian Wellington
2048bb8c0c dns_message_parse() cannot return DNS_R_MOREDATA. 2001-03-15 02:00:15 +00:00
Mark Andrews
b01cd0d5c7 Use dns_dispatch_getlocaladdress() to retrieve the local address to bind too. 2001-03-13 05:49:58 +00:00
Andreas Gustafsson
fc04bb9d98 lame server on ... -> lame server resolving ... [RT #641] 2001-03-07 18:03:07 +00:00
Brian Wellington
d25dd5b056 770. [func] Add the "edns yes_or_no" statement to the server
clause. [RT #524]
2001-03-06 23:54:37 +00:00
Brian Wellington
e43b9a2005 move compression context create/delete into the caller of the message
rendering functions.  This reduces the size of the message object.
2001-03-05 21:15:47 +00:00
Brian Wellington
a0b4d6cf8a comment style 2001-02-28 21:19:53 +00:00
Andreas Gustafsson
d1cc210d20 RT #927 fix from Bob:
759.   [bug]           The resolver didn't turn off "avoid fetches" mode
                        when restarting, possibly causing resolution
                        to fail when it should not.  This bug only affected
                        platforms which support both IPv4 and IPv6. [RT #927]

 758.   [bug]           The "avoid fetches" code did not treat negative
                        cache entries correctly, causing fetches that would
                        be useful to be avoided.  This bug only affected
                        platforms which support both IPv4 and IPv6. [RT #927]
2001-02-28 20:51:22 +00:00
Brian Wellington
36608f2052 When returning from validation, make sure to handle chaiing correctly. 2001-02-21 05:16:44 +00:00
Bob Halley
1e50dad10d When returning DNS_R_CNAME or DNS_R_DNAME as the result of an ANY or SIG
query, the resolver failed to setup the return event's rdatasets, causing an
assertion failure in the query code.  [RT #881]

The fix includes the addition of the DNS_NAMEATTR_CHAINING attribute,
and the removal of the DNS_NAMEATTR_CNAME and DNS_NAMEATTR_DNAME attributes,
because they were not used anywhere in the current source.
2001-02-19 08:54:54 +00:00
Brian Wellington
3f07549972 comment fix 2001-02-18 21:19:43 +00:00
Andreas Gustafsson
19eee89387 if dns_message_gettempname() failed, we would try to call
dns_message_putemprdataset() on an uninitialized pointer
2001-02-17 02:16:14 +00:00
Andreas Gustafsson
97f26b88f6 removed more needless attaching and detaching of the blackhole ACL 2001-02-09 00:23:16 +00:00
Andreas Gustafsson
a349fd680c removed all code for maintaining a 'goodness' value in the adb,
since it was never used and Michael thinks 'it should probably be removed'.
2001-02-09 00:13:55 +00:00
Bob Halley
22457624d3 deal with 0 TTL glue 2001-02-08 19:14:58 +00:00
Bob Halley
d6b3d06db7 Referrals whose NS RRs had a 0 TTL caused the resolver to return
DNS_R_SERVFAIL.  [RT #783]
2001-02-02 00:10:26 +00:00
Brian Wellington
6e8b041d9c blackholed addresses were mishandled in the resolver. 2001-01-19 22:22:17 +00:00
Andreas Gustafsson
ff7f1dc039 676. [bug] Log messages about lame servers to category
'lame-servers' rather than 'resolver', so as not
                        to be gratuitously incompatible with BIND 8.
2001-01-11 19:38:11 +00:00
Brian Wellington
499b34cea0 copyright update 2001-01-09 22:01:04 +00:00
Bob Halley
75768d5fa2 It was possible to join to an already running fctx
after it had "cloned" its events, but before it sent
them.  In this case, the event of the newly joined
fetch would not contain the answer, and would
trigger the INSIST() in fctx_sendevents().
[RT #597, #605, #607]
2001-01-03 20:31:34 +00:00
Brian Wellington
6d5032f9a2 Micro-optimizations:
- use the DNS_NAME_INIT macro in name.c
	- create dns_name_copy() and use it instead of dns_name_concatenate()
	  when doing a copy.
2001-01-03 00:05:15 +00:00
Andreas Gustafsson
22dbaf9ad8 647. [bug] Resolver queries sent after following multiple
referrals had excessively long retransmission
                        timeouts due to incorrectly counting the referrals
                        as "restarts".
2001-01-02 20:46:07 +00:00
Andreas Gustafsson
21931e9334 cleanup of logging code 2001-01-02 18:51:07 +00:00
Andreas Gustafsson
6af9849f74 log message about disabling EDNS0 only once per lookup 2001-01-02 17:59:13 +00:00
Brian Wellington
65a275fb3d The resolver doesn't need to manually dissect a TSIG and look at the error
field, since dns_message_checksig returns an error in that case.
2000-12-29 23:24:32 +00:00
Andreas Gustafsson
7d33e89969 627. [bug] The EDNS0 blackhole detection code of 327. waited
for three retransmissions to each server, which
                        takes much too long when a domain has many name
                        and all of them drop EDNS0 queries.  Now we retry
                        without EDNS0 after three consecutive timeouts,
                        even if they are all from different servers.
2000-12-20 23:18:37 +00:00
Brian Wellington
78838d3e0c 8 space -> tab conversion 2000-12-11 19:24:30 +00:00
Mark Andrews
6fda157766 ISC_LINK_*UNSAFE -> ISC_LINK_INITAND* 2000-12-07 20:15:58 +00:00
Bob Halley
59e1a928bc do not INSIST when restarting with returnlame 2000-11-27 19:56:16 +00:00
Brian Wellington
ef6a36d944 tsig signed queries by the resolver both didn't always work and leaked memory. 2000-11-22 23:16:04 +00:00
Mark Andrews
3fdad8e3bb adjust is_lame test for same level. 2000-11-15 04:53:06 +00:00
Brian Wellington
78d78f05d9 556. [func] The DNSSEC OK bit in the EDNS extended flags
is now implemented.  Responses to queries without
                        this bit set will not contain any DNSSEC records.
2000-11-13 21:34:03 +00:00
Andreas Gustafsson
ae7e8784aa log messages should not be capitalized 2000-11-11 02:14:50 +00:00
Mark Andrews
bfcdcde570 implement lame-ttl. 2000-11-08 03:53:16 +00:00
Brian Wellington
fa3cbea8bf 541. [func] Add bogus server support. 2000-11-04 02:20:58 +00:00
Brian Wellington
a123725906 blackhole address matching broke the resolver 2000-11-03 22:53:14 +00:00
Brian Wellington
e21d199dca 539. [func] Support the blackhole option. 2000-11-03 02:45:55 +00:00
Mark Andrews
368b37b616 dns_rdata_invalidate -> dns_rdata_reset 2000-10-31 03:22:05 +00:00
Mark Andrews
c03bb27f06 532. [func] Implement DNS UPDATE pseudo records using
DNS_RDATA_UPDATE flag.

 531.   [func]          Rdata really should be initalized before being
                        assigned to (dns_rdata_fromwire(), dns_rdata_fromtext(),
                        dns_rdata_clone(), dns_rdata_fromregion()),
                        check that it is.
2000-10-25 04:26:57 +00:00
Mark Andrews
5e589b5356 Uninitalised link fixes, batch 1. 2000-10-20 02:21:58 +00:00
Bob Halley
c40085afa7 Fix problems with DNAME chain processing in the resolver, and with
retrievals of DNAMEs from the cache.  (Changes 516, 517, and 518).
2000-10-13 18:55:11 +00:00
Brian Wellington
d1cbf71409 clean up suspicious looking and incorrect uses of dns_name_fromregion 2000-10-07 00:09:28 +00:00
Brian Wellington
6850cdd449 508. [func] dns_message_parse() can now do a best-effort
attempt, which should allow dig to print more invalid
                        messages.
2000-10-06 18:58:30 +00:00
Mark Andrews
e549eb1242 494. [func] Do not cache NXDOMAIN responses for SOA queries. 2000-09-28 06:43:36 +00:00
Brian Wellington
f7fa8ec1a9 selective forwarding didn't quite work. 2000-09-15 22:41:07 +00:00
Brian Wellington
5e387b9ce6 and more calls to DESTROYLOCK 2000-08-26 01:37:00 +00:00
Brian Wellington
30e6ea9ded 405. [func] Add support for selective forwarding (forward zones) 2000-08-24 22:15:40 +00:00
Andreas Gustafsson
e1368a7770 397. [func] Added utility functions dns_view_gettsig() and
dns_view_getpeertsig().
2000-08-17 00:18:12 +00:00
Brian Wellington
9cd6710f91 validators can now be cancelled. 2000-08-15 00:21:05 +00:00