Brian Wellington
c20ffa38de
808. [func] Add 'rndc flush' to flush the server's cache.
2001-04-11 20:37:50 +00:00
Brian Wellington
6eccf5bd07
788. [feature] Add the "match-mapped-addresses" options, which
...
causes IPv6 v4mapped addresses to be treated as
IPv4 addresses for the purpose of acl matching.
2001-03-26 21:33:07 +00:00
Andreas Gustafsson
b879ed05f4
785. [bug] A race condition in the resolver could cause
...
an assertion failure. [RT #673 , #872 , #1048 ]
2001-03-20 22:13:00 +00:00
Brian Wellington
0d19c777ae
Use a counter instead of a flag to indicate if the resolver is in the
...
process of connecting. There's a possibility that a connect might not
have sent a completion event when another one starts, and this could cause
bad things to happen since the query would only know about one connect.
2001-03-16 21:50:59 +00:00
Brian Wellington
2048bb8c0c
dns_message_parse() cannot return DNS_R_MOREDATA.
2001-03-15 02:00:15 +00:00
Mark Andrews
b01cd0d5c7
Use dns_dispatch_getlocaladdress() to retrieve the local address to bind too.
2001-03-13 05:49:58 +00:00
Andreas Gustafsson
fc04bb9d98
lame server on ... -> lame server resolving ... [RT #641 ]
2001-03-07 18:03:07 +00:00
Brian Wellington
d25dd5b056
770. [func] Add the "edns yes_or_no" statement to the server
...
clause. [RT #524 ]
2001-03-06 23:54:37 +00:00
Brian Wellington
e43b9a2005
move compression context create/delete into the caller of the message
...
rendering functions. This reduces the size of the message object.
2001-03-05 21:15:47 +00:00
Brian Wellington
a0b4d6cf8a
comment style
2001-02-28 21:19:53 +00:00
Andreas Gustafsson
d1cc210d20
RT #927 fix from Bob:
...
759. [bug] The resolver didn't turn off "avoid fetches" mode
when restarting, possibly causing resolution
to fail when it should not. This bug only affected
platforms which support both IPv4 and IPv6. [RT #927 ]
758. [bug] The "avoid fetches" code did not treat negative
cache entries correctly, causing fetches that would
be useful to be avoided. This bug only affected
platforms which support both IPv4 and IPv6. [RT #927 ]
2001-02-28 20:51:22 +00:00
Brian Wellington
36608f2052
When returning from validation, make sure to handle chaiing correctly.
2001-02-21 05:16:44 +00:00
Bob Halley
1e50dad10d
When returning DNS_R_CNAME or DNS_R_DNAME as the result of an ANY or SIG
...
query, the resolver failed to setup the return event's rdatasets, causing an
assertion failure in the query code. [RT #881 ]
The fix includes the addition of the DNS_NAMEATTR_CHAINING attribute,
and the removal of the DNS_NAMEATTR_CNAME and DNS_NAMEATTR_DNAME attributes,
because they were not used anywhere in the current source.
2001-02-19 08:54:54 +00:00
Brian Wellington
3f07549972
comment fix
2001-02-18 21:19:43 +00:00
Andreas Gustafsson
19eee89387
if dns_message_gettempname() failed, we would try to call
...
dns_message_putemprdataset() on an uninitialized pointer
2001-02-17 02:16:14 +00:00
Andreas Gustafsson
97f26b88f6
removed more needless attaching and detaching of the blackhole ACL
2001-02-09 00:23:16 +00:00
Andreas Gustafsson
a349fd680c
removed all code for maintaining a 'goodness' value in the adb,
...
since it was never used and Michael thinks 'it should probably be removed'.
2001-02-09 00:13:55 +00:00
Bob Halley
22457624d3
deal with 0 TTL glue
2001-02-08 19:14:58 +00:00
Bob Halley
d6b3d06db7
Referrals whose NS RRs had a 0 TTL caused the resolver to return
...
DNS_R_SERVFAIL. [RT #783 ]
2001-02-02 00:10:26 +00:00
Brian Wellington
6e8b041d9c
blackholed addresses were mishandled in the resolver.
2001-01-19 22:22:17 +00:00
Andreas Gustafsson
ff7f1dc039
676. [bug] Log messages about lame servers to category
...
'lame-servers' rather than 'resolver', so as not
to be gratuitously incompatible with BIND 8.
2001-01-11 19:38:11 +00:00
Brian Wellington
499b34cea0
copyright update
2001-01-09 22:01:04 +00:00
Bob Halley
75768d5fa2
It was possible to join to an already running fctx
...
after it had "cloned" its events, but before it sent
them. In this case, the event of the newly joined
fetch would not contain the answer, and would
trigger the INSIST() in fctx_sendevents().
[RT #597 , #605 , #607 ]
2001-01-03 20:31:34 +00:00
Brian Wellington
6d5032f9a2
Micro-optimizations:
...
- use the DNS_NAME_INIT macro in name.c
- create dns_name_copy() and use it instead of dns_name_concatenate()
when doing a copy.
2001-01-03 00:05:15 +00:00
Andreas Gustafsson
22dbaf9ad8
647. [bug] Resolver queries sent after following multiple
...
referrals had excessively long retransmission
timeouts due to incorrectly counting the referrals
as "restarts".
2001-01-02 20:46:07 +00:00
Andreas Gustafsson
21931e9334
cleanup of logging code
2001-01-02 18:51:07 +00:00
Andreas Gustafsson
6af9849f74
log message about disabling EDNS0 only once per lookup
2001-01-02 17:59:13 +00:00
Brian Wellington
65a275fb3d
The resolver doesn't need to manually dissect a TSIG and look at the error
...
field, since dns_message_checksig returns an error in that case.
2000-12-29 23:24:32 +00:00
Andreas Gustafsson
7d33e89969
627. [bug] The EDNS0 blackhole detection code of 327. waited
...
for three retransmissions to each server, which
takes much too long when a domain has many name
and all of them drop EDNS0 queries. Now we retry
without EDNS0 after three consecutive timeouts,
even if they are all from different servers.
2000-12-20 23:18:37 +00:00
Brian Wellington
78838d3e0c
8 space -> tab conversion
2000-12-11 19:24:30 +00:00
Mark Andrews
6fda157766
ISC_LINK_*UNSAFE -> ISC_LINK_INITAND*
2000-12-07 20:15:58 +00:00
Bob Halley
59e1a928bc
do not INSIST when restarting with returnlame
2000-11-27 19:56:16 +00:00
Brian Wellington
ef6a36d944
tsig signed queries by the resolver both didn't always work and leaked memory.
2000-11-22 23:16:04 +00:00
Mark Andrews
3fdad8e3bb
adjust is_lame test for same level.
2000-11-15 04:53:06 +00:00
Brian Wellington
78d78f05d9
556. [func] The DNSSEC OK bit in the EDNS extended flags
...
is now implemented. Responses to queries without
this bit set will not contain any DNSSEC records.
2000-11-13 21:34:03 +00:00
Andreas Gustafsson
ae7e8784aa
log messages should not be capitalized
2000-11-11 02:14:50 +00:00
Mark Andrews
bfcdcde570
implement lame-ttl.
2000-11-08 03:53:16 +00:00
Brian Wellington
fa3cbea8bf
541. [func] Add bogus server support.
2000-11-04 02:20:58 +00:00
Brian Wellington
a123725906
blackhole address matching broke the resolver
2000-11-03 22:53:14 +00:00
Brian Wellington
e21d199dca
539. [func] Support the blackhole option.
2000-11-03 02:45:55 +00:00
Mark Andrews
368b37b616
dns_rdata_invalidate -> dns_rdata_reset
2000-10-31 03:22:05 +00:00
Mark Andrews
c03bb27f06
532. [func] Implement DNS UPDATE pseudo records using
...
DNS_RDATA_UPDATE flag.
531. [func] Rdata really should be initalized before being
assigned to (dns_rdata_fromwire(), dns_rdata_fromtext(),
dns_rdata_clone(), dns_rdata_fromregion()),
check that it is.
2000-10-25 04:26:57 +00:00
Mark Andrews
5e589b5356
Uninitalised link fixes, batch 1.
2000-10-20 02:21:58 +00:00
Bob Halley
c40085afa7
Fix problems with DNAME chain processing in the resolver, and with
...
retrievals of DNAMEs from the cache. (Changes 516, 517, and 518).
2000-10-13 18:55:11 +00:00
Brian Wellington
d1cbf71409
clean up suspicious looking and incorrect uses of dns_name_fromregion
2000-10-07 00:09:28 +00:00
Brian Wellington
6850cdd449
508. [func] dns_message_parse() can now do a best-effort
...
attempt, which should allow dig to print more invalid
messages.
2000-10-06 18:58:30 +00:00
Mark Andrews
e549eb1242
494. [func] Do not cache NXDOMAIN responses for SOA queries.
2000-09-28 06:43:36 +00:00
Brian Wellington
f7fa8ec1a9
selective forwarding didn't quite work.
2000-09-15 22:41:07 +00:00
Brian Wellington
5e387b9ce6
and more calls to DESTROYLOCK
2000-08-26 01:37:00 +00:00
Brian Wellington
30e6ea9ded
405. [func] Add support for selective forwarding (forward zones)
2000-08-24 22:15:40 +00:00