1. 18 Apr, 2019 2 commits
  2. 25 Jan, 2019 1 commit
    • Evan Hunt's avatar
      fix inline test · 09b61926
      Evan Hunt authored
      use regex instead of exact string matching, to deal with CR at end of ine
      09b61926
  3. 03 Dec, 2018 2 commits
  4. 24 Aug, 2018 1 commit
    • Michał Kępień's avatar
      Prevent a race in the "inline" system test · 6831af77
      Michał Kępień authored
      A short time window exists between logging the addition of an NSEC3PARAM
      record to a zone and committing it to the current version of the zone
      database.  If a query arrives during such a time window, an unsigned
      response will be returned.  One of the checks in the "inline" system
      test requires NSEC3 records to be present in an answer - that check
      would fail in the case described above.  Use rndc instead of log
      watching for checking whether zone signing and NSEC3 chain modifications
      are complete in order to prevent intermittent "inline" system test
      failures.
      
      (cherry picked from commit e36c869e)
      6831af77
  5. 22 Aug, 2018 2 commits
    • Michał Kępień's avatar
      Fix reloading inline-signed zones · cf7557dc
      Michał Kępień authored
      While "rndc reload" causes dns_zone_asyncload() to be called for the
      signed version of an inline-signed zone, the subsequent zone_load() call
      causes the raw version to be reloaded from storage.  This means that
      DNS_ZONEFLG_LOADPENDING gets set for the signed version of the zone by
      dns_zone_asyncload() before the reload is attempted, but zone_postload()
      is only called for the raw version and thus DNS_ZONEFLG_LOADPENDING is
      cleared for the raw version, but not for the signed version.  This in
      turn prevents zone maintenance from happening for the signed version of
      the zone.
      
      Until commit 749b3cac, this problem
      remained dormant because DNS_ZONEFLG_LOADPENDING was previously
      immediately, unconditionally cleared after zone loading was started
      (whereas it should only be cleared when zone loading is finished or an
      error occurs).  This behavior caused other issues [1] and thus had to be
      changed.
      
      Fix reloading inline-signed zones by clearing DNS_ZONEFLG_LOADPENDING
      for the signed version of the zone once the raw version reload
      completes.  Take care not to clear it prematurely during initial zone
      load.  Also make sure that DNS_ZONEFLG_LOADPENDING gets cleared when
      zone_postload() encounters an error or returns early, to prevent other
      scenarios from resulting in the same problem.  Add comments aiming to
      help explain code flow.
      
      [1] see RT #47076
      
      (cherry picked from commit 54315839)
      cf7557dc
    • Michał Kępień's avatar
      Set DNS_JOURNALOPT_RESIGN when loading the secure journal for an inline-signed zone · de6b8ded
      Michał Kępień authored
      When an inline-signed zone is loaded, the master file for its signed
      version is loaded and then a rollforward of the journal for the signed
      version of the zone is performed.  If DNS_JOURNALOPT_RESIGN is not set
      during the latter phase, signatures loaded from the journal for the
      signed version of the zone will not be scheduled for refresh.  Fix the
      conditional expression determining which flags should be used for the
      dns_journal_rollforward() call so that DNS_JOURNALOPT_RESIGN is set when
      zone_postload() is called for the signed version of an inline-signed
      zone.
      
      Extend bin/tests/system/stop.pl so that it can use "rndc halt" instead
      of "rndc stop" as the former allows master file flushing upon shutdown
      to be suppressed.
      
      (cherry picked from commit 8db550c4)
      de6b8ded
  6. 14 Aug, 2018 1 commit
    • Michał Kępień's avatar
      Queue "rndc signing -nsec3param ..." requests if needed · cbd85e01
      Michał Kępień authored
      If "rndc signing -nsec3param ..." is ran for a zone which has not yet
      been loaded or transferred (i.e. its "db" field is NULL), it will be
      silently ignored by named despite rndc logging an "nsec3param request
      queued" message, which is misleading.  Prevent this by keeping a
      per-zone queue of NSEC3PARAM change requests which arrive before a zone
      is loaded or transferred and processing that queue once the raw version
      of an inline-signed zone becomes available.
      
      (cherry picked from commit cb40c522)
      cbd85e01
  7. 25 Apr, 2018 1 commit
    • Michał Kępień's avatar
      Apply raw zone deltas to yet unsigned secure zones · 91183650
      Michał Kępień authored
      When inline signing is enabled for a zone without creating signing keys
      for it, changes subsequently applied to the raw zone will not be
      reflected in the secure zone due to the dns_update_signaturesinc() call
      inside receive_secure_serial() failing.  Given that an inline zone will
      be served (without any signatures) even with no associated signing keys
      being present, keep applying raw zone deltas to the secure zone until
      keys become available in an attempt to follow the principle of least
      astonishment.
      
      (cherry picked from commit 6acf3269)
      (cherry picked from commit 8a58a607)
      91183650
  8. 14 Mar, 2018 1 commit
  9. 23 Feb, 2018 1 commit
  10. 03 Jan, 2018 2 commits
  11. 06 Dec, 2017 1 commit
  12. 04 Dec, 2017 1 commit
  13. 03 Dec, 2017 1 commit
  14. 18 Sep, 2017 1 commit
  15. 13 Sep, 2017 2 commits
  16. 27 Jun, 2016 1 commit
  17. 14 Jun, 2016 2 commits
  18. 21 Nov, 2014 1 commit
  19. 17 Nov, 2014 1 commit
  20. 21 Oct, 2014 1 commit
  21. 04 Sep, 2014 1 commit
    • Evan Hunt's avatar
      [master] servfail cache · a8783019
      Evan Hunt authored
      3943.	[func]		SERVFAIL responses can now be cached for a
      			limited time (configured by "servfail-ttl",
      			default 10 seconds, limit 30). This can reduce
      			the frequency of retries when an authoritative
      			server is known to be failing, e.g., due to
      			ongoing DNSSEC validation problems. [RT #21347]
      a8783019
  22. 27 Jun, 2014 1 commit
  23. 21 Jan, 2014 1 commit
    • Evan Hunt's avatar
      [master] testcrypto.sh in system tests · d58e33bf
      Evan Hunt authored
      3714.	[test]		System tests that need to test for cryptography
      			support before running can now use a common
      			"testcrypto.sh" script to do so. [RT #35213]
      d58e33bf
  24. 18 Jan, 2014 1 commit
  25. 16 Jan, 2014 1 commit
  26. 14 Jan, 2014 1 commit
    • Evan Hunt's avatar
      [master] native PKCS#11 support · ba751492
      Evan Hunt authored
      3705.	[func]		"configure --enable-native-pkcs11" enables BIND
      			to use the PKCS#11 API for all cryptographic
      			functions, so that it can drive a hardware service
      			module directly without the need to use a modified
      			OpenSSL as intermediary (so long as the HSM's vendor
      			provides a complete-enough implementation of the
      			PKCS#11 interface). This has been tested successfully
      			with the Thales nShield HSM and with SoftHSMv2 from
      			the OpenDNSSEC project. [RT #29031]
      ba751492
  27. 04 Dec, 2013 1 commit
  28. 13 Nov, 2013 1 commit
  29. 19 Sep, 2013 1 commit
  30. 09 Sep, 2013 2 commits
  31. 05 Sep, 2013 1 commit
  32. 04 Sep, 2013 2 commits