Brian Wellington
499b34cea0
copyright update
2001-01-09 22:01:04 +00:00
Bob Halley
75768d5fa2
It was possible to join to an already running fctx
...
after it had "cloned" its events, but before it sent
them. In this case, the event of the newly joined
fetch would not contain the answer, and would
trigger the INSIST() in fctx_sendevents().
[RT #597 , #605 , #607 ]
2001-01-03 20:31:34 +00:00
Brian Wellington
6d5032f9a2
Micro-optimizations:
...
- use the DNS_NAME_INIT macro in name.c
- create dns_name_copy() and use it instead of dns_name_concatenate()
when doing a copy.
2001-01-03 00:05:15 +00:00
Andreas Gustafsson
22dbaf9ad8
647. [bug] Resolver queries sent after following multiple
...
referrals had excessively long retransmission
timeouts due to incorrectly counting the referrals
as "restarts".
2001-01-02 20:46:07 +00:00
Andreas Gustafsson
21931e9334
cleanup of logging code
2001-01-02 18:51:07 +00:00
Andreas Gustafsson
6af9849f74
log message about disabling EDNS0 only once per lookup
2001-01-02 17:59:13 +00:00
Brian Wellington
65a275fb3d
The resolver doesn't need to manually dissect a TSIG and look at the error
...
field, since dns_message_checksig returns an error in that case.
2000-12-29 23:24:32 +00:00
Andreas Gustafsson
7d33e89969
627. [bug] The EDNS0 blackhole detection code of 327. waited
...
for three retransmissions to each server, which
takes much too long when a domain has many name
and all of them drop EDNS0 queries. Now we retry
without EDNS0 after three consecutive timeouts,
even if they are all from different servers.
2000-12-20 23:18:37 +00:00
Brian Wellington
78838d3e0c
8 space -> tab conversion
2000-12-11 19:24:30 +00:00
Mark Andrews
6fda157766
ISC_LINK_*UNSAFE -> ISC_LINK_INITAND*
2000-12-07 20:15:58 +00:00
Bob Halley
59e1a928bc
do not INSIST when restarting with returnlame
2000-11-27 19:56:16 +00:00
Brian Wellington
ef6a36d944
tsig signed queries by the resolver both didn't always work and leaked memory.
2000-11-22 23:16:04 +00:00
Mark Andrews
3fdad8e3bb
adjust is_lame test for same level.
2000-11-15 04:53:06 +00:00
Brian Wellington
78d78f05d9
556. [func] The DNSSEC OK bit in the EDNS extended flags
...
is now implemented. Responses to queries without
this bit set will not contain any DNSSEC records.
2000-11-13 21:34:03 +00:00
Andreas Gustafsson
ae7e8784aa
log messages should not be capitalized
2000-11-11 02:14:50 +00:00
Mark Andrews
bfcdcde570
implement lame-ttl.
2000-11-08 03:53:16 +00:00
Brian Wellington
fa3cbea8bf
541. [func] Add bogus server support.
2000-11-04 02:20:58 +00:00
Brian Wellington
a123725906
blackhole address matching broke the resolver
2000-11-03 22:53:14 +00:00
Brian Wellington
e21d199dca
539. [func] Support the blackhole option.
2000-11-03 02:45:55 +00:00
Mark Andrews
368b37b616
dns_rdata_invalidate -> dns_rdata_reset
2000-10-31 03:22:05 +00:00
Mark Andrews
c03bb27f06
532. [func] Implement DNS UPDATE pseudo records using
...
DNS_RDATA_UPDATE flag.
531. [func] Rdata really should be initalized before being
assigned to (dns_rdata_fromwire(), dns_rdata_fromtext(),
dns_rdata_clone(), dns_rdata_fromregion()),
check that it is.
2000-10-25 04:26:57 +00:00
Mark Andrews
5e589b5356
Uninitalised link fixes, batch 1.
2000-10-20 02:21:58 +00:00
Bob Halley
c40085afa7
Fix problems with DNAME chain processing in the resolver, and with
...
retrievals of DNAMEs from the cache. (Changes 516, 517, and 518).
2000-10-13 18:55:11 +00:00
Brian Wellington
d1cbf71409
clean up suspicious looking and incorrect uses of dns_name_fromregion
2000-10-07 00:09:28 +00:00
Brian Wellington
6850cdd449
508. [func] dns_message_parse() can now do a best-effort
...
attempt, which should allow dig to print more invalid
messages.
2000-10-06 18:58:30 +00:00
Mark Andrews
e549eb1242
494. [func] Do not cache NXDOMAIN responses for SOA queries.
2000-09-28 06:43:36 +00:00
Brian Wellington
f7fa8ec1a9
selective forwarding didn't quite work.
2000-09-15 22:41:07 +00:00
Brian Wellington
5e387b9ce6
and more calls to DESTROYLOCK
2000-08-26 01:37:00 +00:00
Brian Wellington
30e6ea9ded
405. [func] Add support for selective forwarding (forward zones)
2000-08-24 22:15:40 +00:00
Andreas Gustafsson
e1368a7770
397. [func] Added utility functions dns_view_gettsig() and
...
dns_view_getpeertsig().
2000-08-17 00:18:12 +00:00
Brian Wellington
9cd6710f91
validators can now be cancelled.
2000-08-15 00:21:05 +00:00
Andreas Gustafsson
1199d0ee34
use isc_sockaddr_anyofpf()
2000-08-09 19:11:27 +00:00
David Lawrence
40f53fa8d9
Trailing whitespace trimmed. Perhaps running "perl util/spacewhack.pl in your
...
own CVS tree will help minimize CVS conflicts. Maybe not.
Blame Graff for getting me to trim all trailing whitespace.
2000-08-01 01:33:37 +00:00
Brian Wellington
4eabcbb83b
In several places, the resolver assigned values to event->ev_sender simply
...
because the field couldn't be NULL (until recently). They now use NULL.
2000-07-29 01:18:36 +00:00
Brian Wellington
cd54303345
357. [bug] The server would crash if a response contained both
...
a CNAME and records of the query type.
2000-07-28 22:37:47 +00:00
Brian Wellington
47846b7468
A comment was reformatted badly.
2000-07-27 22:05:04 +00:00
Brian Wellington
fbde30645b
cd queries would cause the server to hang on exit.
2000-07-27 21:29:58 +00:00
Brian Wellington
f15af68028
negative responses to cd queries should work now.
2000-07-27 18:42:08 +00:00
David Lawrence
15a4474541
word wrap copyright notice at column 70
2000-07-27 09:55:03 +00:00
Brian Wellington
53dc771403
The CD bit changes broke insecurity proofs. They work again.
2000-07-26 00:03:18 +00:00
Brian Wellington
94ec6e9a1a
whitespace fixes
2000-07-25 22:04:33 +00:00
Brian Wellington
69a761838b
Support for the cd (checking disabled) bit. Also remove data from the
...
cache if validation fails.
2000-07-25 22:03:25 +00:00
Andreas Gustafsson
56f8b1c404
the "done" variable reintroduced in the previous revision
...
was not initialized
2000-07-24 23:55:19 +00:00
Andreas Gustafsson
6f12e3ca45
Restored the "done" variable removed in 1.150 and made
...
the result code check after the loop deal with ISC_R_SUCCESS
instead. The previous fix had the side effect of keeping multiple
answers to non-ANY queries, causing assertion failures in cache_name()
which is not prepared to deal with this situation
2000-07-24 20:10:26 +00:00
Andreas Gustafsson
aa5940281a
When handling the response to an ANY query in a secure zone, deal with
...
the multiple answer RRsets by validating each one separately. Also,
eliminated the "done" variable in answer_response() because in the
rare situations where it got set to ISC_TRUE, it caused the function
to return prematurely by exiting a loop with a result of ISC_R_SUCCESS
and hitting a "if (result != ISC_R_NOMORE) return (result);" test
immediately following following the loop.
This should fix [RT #109 ], "ANY query in secure zone crashes server".
2000-07-19 23:19:05 +00:00
Andreas Gustafsson
0e65062acb
strengthened the check added in the previous change:
...
the new query domain must not only be a non-child of the query name,
it must be a parent of the query name (or equal to the query name)
2000-07-16 18:26:18 +00:00
Andreas Gustafsson
64024eaa4d
333. [bug] The resolver incorrectly accepted referrals to
...
subdomains of the query domain, causing an
assertion failure.
2000-07-15 01:02:25 +00:00
Andreas Gustafsson
10f4e9668a
the INSIST condition of 1.145 was too strong, weakened it;
...
dded another INSIST to help track down the INSIST(!external) crash
2000-07-14 00:37:27 +00:00
Andreas Gustafsson
55da37e18f
removed dead code
2000-07-14 00:33:09 +00:00
Brian Wellington
ecb2897c71
Insist that when a fetch returns a successful event, the rdataset is associated.
...
A test failed about a week ago because this was not true, and because it
died in the event handler, diagnosing the problem was impossible.
2000-07-12 23:56:06 +00:00