Mark Andrews
a39a5f4d81
2772. [security] When validating, track whether pending data was from
...
the additional section or not and only return it if
validates as secure. [RT #20438 ]
2009-11-17 23:55:18 +00:00
Evan Hunt
7048af0a55
2769. [cleanup] Change #2742 was incomplete. [RT #19589 ]
2009-11-16 07:56:06 +00:00
Evan Hunt
be69d48443
2742. [cleanup] Clarify some DNSSEC-related log messages in
...
validator.c. [RT #19589 ]
2009-10-28 05:34:21 +00:00
Evan Hunt
95f2377b4f
2739. [cleanup] Clean up API for initializing and clearing trust
...
anchors for a view. [RT #20211 ]
2009-10-27 22:46:13 +00:00
Evan Hunt
cfb1587eb9
2619. [func] Add support for RFC 5011, automatic trust anchor
...
maintenance. The new "managed-keys" statement can
be used in place of "trusted-keys" for zones which
support this protocol. (Note: this syntax is
expected to change prior to 9.7.0 final.) [RT #19248 ]
2009-06-30 02:53:46 +00:00
Mark Andrews
afbe695de3
"got insecure response; parent indicates it should be secure" wrongly emitted [RT #19800 ]
2009-06-09 22:57:09 +00:00
Automatic Updater
54cdd2b307
update copyright notice
2009-05-07 23:47:44 +00:00
Francis Dupont
ff380b05fe
comment fixes (rt19624)
2009-05-07 09:41:23 +00:00
Mark Andrews
e7eede965d
2597. [bug] Handle a validation failure with a insecure delegation
...
from a NSEC3 signed master/slave zone. [RT #19464 ]
2009-05-07 02:34:19 +00:00
Evan Hunt
6b9728dde7
ARM and log message changes to clarify "insecure response". [rt19400]
2009-03-23 22:30:57 +00:00
Automatic Updater
8e3d340655
update copyright notice
2009-03-17 23:48:02 +00:00
Mark Andrews
72dbc7216a
2579. [bug] DNSSEC lookaside validation failed to handle unknown
...
algorithms. [RT #19479 ]
2009-03-17 01:34:28 +00:00
Evan Hunt
bfe0517fdc
Clarify logged message when an insecure DNSSEC response arrives from a zone
...
thought to be secure: "insecurity proof failed" instead of "not insecure".
[RT #19400 ]
2009-03-01 02:45:38 +00:00
Mark Andrews
7d211b458f
2554. [bug] Validation of uppercase queries from NSEC3 zones could
...
fail. [RT #19297 ]
2009-02-15 23:46:23 +00:00
Mark Andrews
d2ef5b3c5c
2553. [bug] Reference leak on DNSSEC validation errors. [RT #19291 ]
2009-02-15 23:37:29 +00:00
Francis Dupont
708383382f
spelling
2009-01-17 15:12:26 +00:00
Automatic Updater
5569e7de51
update copyright notice
2009-01-05 23:47:54 +00:00
Tatuya JINMEI 神明達哉
3fb1637c92
trivial comment cleanups (RT#19118)
2009-01-05 23:20:22 +00:00
Automatic Updater
49960a74b5
update copyright notice
2008-11-14 23:47:33 +00:00
Mark Andrews
50df1ec60a
2495. [bug] Tighten RRSIG checks. [RT #18795 ]
2008-11-14 22:53:46 +00:00
Mark Andrews
6098d364b6
2448. [func] Add NSEC3 support. [RT #15452 ]
2008-09-24 02:46:23 +00:00
Mark Andrews
1bfe8851c0
2421. [bug] Handle the special return value of a empty node as
...
if it was a NXRRSET in the validator. [RT #18447 ]
2008-08-21 04:43:49 +00:00
Evan Hunt
e4d304b70b
Fix build error: parameter type was changed in the prototype but not in
...
the function header.
2008-02-19 17:07:55 +00:00
Mark Andrews
664e11f0b1
2238. [bug] check_ds() could be called with a non DS rdataset.
...
[RT #17598 ]
2008-02-18 23:06:54 +00:00
Automatic Updater
2f012d936b
update copyright notice
2008-01-18 23:46:58 +00:00
Automatic Updater
9d5ed744c4
update copyright notice
2008-01-14 23:46:56 +00:00
Mark Andrews
f1263d2aa4
2304. [bug] Check returns from all dns_rdata_tostruct() calls.
...
[RT #17460 ]
2008-01-14 23:24:24 +00:00
Mark Andrews
8bedd9647f
2245. [bug] Validating lack of DS records at trust anchors wasn't
...
working. [RT #17151 ]
2007-09-19 03:38:56 +00:00
Mark Andrews
e2c3f8059e
2238. [bug] It was possible to trigger a REQUIRE when a
...
validation was cancelled. [RT #17106 ]
2007-09-14 05:43:05 +00:00
Mark Andrews
3eab85ca54
2218. [bug] Remove unnecessary REQUIRE from dns_validator_create().
...
[RT #16976 ]
2007-08-27 04:36:54 +00:00
Automatic Updater
ec5347e2c7
update copyright notice
2007-06-18 23:47:57 +00:00
Mark Andrews
a05f23d07e
2171. [bug] Handle breaks in DNSSEC trust chains where the parent
...
servers are not DS aware (DS queries to the parent
return a referral to the child).
2007-04-27 06:13:29 +00:00
Mark Andrews
394f4aec21
2145. [bug] Check DS/DLV digest lengths for known digests.
...
[RT #16622 ]
2007-02-26 01:20:44 +00:00
Mark Andrews
f36c85c3ce
update copyright notice
2007-01-08 02:45:04 +00:00
Mark Andrews
3052274767
2126. [bug] Serialise validation of type ANY responses. [RT #16555 ]
2007-01-08 01:13:38 +00:00
Mark Andrews
29747dfe5e
2123. [func] Use Doxygen to generate internal documention.
...
[RT #11398 ]
2006-12-22 01:46:19 +00:00
Mark Andrews
1ea2595e1b
2117. [bug] DNSSEC fixes: named could fail to cache NSEC records
...
which could lead to validation failures. named didn't
handle negative DS responses that were in the process
of being validated. Check CNAME bit before accepting
NODATA proof. To be able to ignore a child NSEC there
must be SOA (and NS) set in the bitmap. [RT #16399 ]
2006-12-07 06:47:36 +00:00
Mark Andrews
cc7d91bd5c
2061. [bug] Accept expired wildcard message reversed. [RT #16296 ]
2006-07-24 22:41:59 +00:00
Mark Andrews
d2ef84e07b
2008. [func] It is now posssible to enable/disable DNSSEC
...
validation from rndc. This is useful for the
mobile hosts where the current connection point
breaks DNSSEC (firewall/proxy). [RT #15592 ]
rndc validation newstate [view]
2006-03-09 23:39:00 +00:00
Mark Andrews
95b484c958
fix minor typos
2006-02-26 22:57:18 +00:00
Mark Andrews
fcbc5d2353
post merge problem
2006-02-22 01:55:10 +00:00
Mark Andrews
c5387e6942
1987. [func] DS/DLV SHA256 digest algorithm support. [RT #15608 ]
2006-02-21 23:49:51 +00:00
Mark Andrews
acb4f52369
update copyright notice
2006-01-04 23:50:24 +00:00
Mark Andrews
fabf2ee6b0
1947. [func] It is now possible to configure named to accept
...
expired RRSIGs. Default "dnssec-accept-expired no;".
Setting "dnssec-accept-expired yes;" leaves named
vulnerable to replay attacks. [RT #14685 ]
2006-01-04 02:35:49 +00:00
Mark Andrews
cf224bbf7b
1942. [bug] If the name of a DNSKEY match that of one in
...
trusted-keys do not attempt to validate the DNSKEY
using the parents DS RRset. [RT #15649 ]
2005-12-04 23:54:01 +00:00
Mark Andrews
470c726bc8
silence dereferencing type-punned pointer will break strict-aliasing rules warning
2005-11-30 05:01:34 +00:00
Mark Andrews
2674e1a455
1940. [bug] Fixed a number of error conditions reported by
...
Coverity.
2005-11-30 03:33:49 +00:00
Mark Andrews
60ab03125c
1939. [bug] The resolver could dereference a null pointer after
...
validation if all the queries have timed out.
[RT #15528 ]
1938. [bug] The validator was not correctly handling unsecure
negative responses at or below a SEP. [RT #15528 ]
2005-11-03 00:51:55 +00:00
Mark Andrews
7d116211ec
1936. [bug] The validator could leak memory. [RT #5544 ]
2005-11-02 01:46:31 +00:00
Mark Andrews
216030f284
1930. [port] HPUX: ia64 support. [RT #15473 ]
...
1929. [port] FreeBSD: extend use of PTHREAD_SCOPE_SYSTEM.
2005-10-14 01:18:47 +00:00