- 29 Aug, 2014 1 commit
-
-
Evan Hunt authored
3936. [func] Added authoritative support for the EDNS Client Subnet (ECS) option. ACLs can now include "ecs" elements which specify an address or network prefix; if an ECS option is included in a DNS query, then the address encoded in the option will be matched against "ecs" ACL elements. Also, if an ECS address is included in a query, then it will be used instead of the client source address when matching "geoip" ACL elements. This behavior can be overridden with "geoip-use-ecs no;". When "ecs" or "geoip" ACL elements are used to select a view for a query, the response will include an ECS option to indicate which client network the answer is valid for. (Thanks to Vincent Bernat.) [RT #36781]
-
- 26 Aug, 2014 2 commits
-
-
Mark Andrews authored
-
Evan Hunt authored
3930. [bug] "rndc nta -r" could cause a server hang if the NTA was not found. [RT #36909]
-
- 23 Aug, 2014 1 commit
-
-
Evan Hunt authored
-
- 22 Aug, 2014 1 commit
-
-
Mark Andrews authored
-
- 18 Aug, 2014 1 commit
-
-
Mark Andrews authored
shutting down. [RT #36887]
-
- 06 Aug, 2014 1 commit
-
-
Mark Andrews authored
-
- 02 Aug, 2014 1 commit
-
-
Mark Andrews authored
views and a zone that doesn't exist at all. [RT #36691]
-
- 30 Jul, 2014 1 commit
-
-
Evan Hunt authored
Parse arguments to "rndc nta" so they can be either long or shortened (i.e., both "-dump" and "-d" will work).
-
- 25 Jun, 2014 1 commit
-
-
Mark Andrews authored
zones. [RT #36015]
-
- 19 Jun, 2014 1 commit
-
-
Mark Andrews authored
-
- 18 Jun, 2014 1 commit
-
-
Evan Hunt authored
3882. [func] By default, negative trust anchors will be tested periodically to see whether data below them can be validated, and if so, they will be allowed to expire early. The "rndc nta -force" option overrides this behvaior. The default NTA lifetime and the recheck frequency can be configured by the "nta-lifetime" and "nta-recheck" options. [RT #36146]
-
- 30 May, 2014 2 commits
-
-
Evan Hunt authored
3867. [func] "rndc nta" can now be used to set a temporary negative trust anchor, which disables DNSSEC validation below a specified name for a specified period of time (not exceeding 24 hours). This can be used when validation for a domain is known to be failing due to a configuration error on the part of the domain owner rather than a spoofing attack. [RT #29358]
-
Mark Andrews authored
[RT #36119]
-
- 15 May, 2014 1 commit
-
-
Mark Andrews authored
[RT #35979]
-
- 26 Apr, 2014 1 commit
-
-
Evan Hunt authored
3822. [bug] Log the correct type of static-stub zones when removing them. [RT #35842]
-
- 04 Apr, 2014 1 commit
-
-
Mark Andrews authored
time. [RT #35659]
-
- 13 Mar, 2014 1 commit
-
-
Evan Hunt authored
-
- 12 Mar, 2014 3 commits
-
-
Evan Hunt authored
3784. [bug] Using "rrset-order fixed" when it had not been enabled at compile time caused inconsistent results. It now works as documented, defaulting to cyclic mode. [RT #28104]
-
Mark Andrews authored
-
Mark Andrews authored
-
- 11 Mar, 2014 1 commit
-
-
Evan Hunt authored
3781. [func] Specifying "auto" as the salt when using "rndc signing -nsec3param" causes named to generate a 64-bit salt at random. [RT #35322]
-
- 07 Mar, 2014 1 commit
-
-
Evan Hunt authored
3778. [bug] Log a warning when the wrong address family is used in "listen-on" or "listen-on-v6". [RT #17848]
-
- 01 Mar, 2014 1 commit
-
-
Evan Hunt authored
3771. [cleanup] Adjusted log level for "using built-in key" messages. [RT #24383]
-
- 23 Feb, 2014 2 commits
-
-
Mark Andrews authored
-
Francis Dupont authored
-
- 19 Feb, 2014 2 commits
-
-
Evan Hunt authored
3745. [func] "configure --with-tuning=large" adjusts various compiled-in constants and default settings to values suited to large servers with abundant memory. [RT #29538]
-
Mark Andrews authored
(which are similar to DNS Cookies by Donald Eastlake) and are designed to help clients detect off path spoofed responses and for servers to detect legitimate clients. SIT use a experimental EDNS option code (65001). SIT can be enabled via --enable-developer or --enable-sit. It is on by default in Windows. RRL processing as been updated to know about SIT with legitimate clients not being rate limited. [RT #35389]
-
- 17 Feb, 2014 1 commit
-
-
Mark Andrews authored
declarations despite being documented. This is needed to support turning off forwarding and turning on delegation only at the same name. [RT #35392]
-
- 16 Feb, 2014 2 commits
-
-
Evan Hunt authored
3741. [func] "delve" (domain entity lookup and validation engine): A new tool with dig-like semantics for performing DNS lookups, with internal DNSSEC validation, using the same resolver and validator logic as named. This allows easy validation of DNSSEC data in environments with untrustworthy resolvers, and assists with troubleshooting of DNSSEC problems. (Note: not yet available on win32.) [RT #32406]
-
Francis Dupont authored
-
- 12 Feb, 2014 1 commit
-
-
Evan Hunt authored
3735. [cleanup] Merged the libiscpk11 library into libisc to simplify dependencies. [RT #35205]
-
- 07 Feb, 2014 3 commits
-
-
Mark Andrews authored
-
Mark Andrews authored
information will be automatically updated if the OS supports routing sockets. Use "automatic-interface-scan no;" to disable. Add "rndc scan" to trigger a scan. [RT #23027]
-
Evan Hunt authored
3731. [func] Added a "no-case-compress" ACL, which causes named to use case-insensitive compression (disabling change #3645) for specified clients. (This is useful when dealing with broken client implementations that use case-sensitive name comparisons, rejecting responses that fail to match the capitalization of the query that was sent.) [RT #35300]
-
- 06 Feb, 2014 1 commit
-
-
Evan Hunt authored
3726. [cleanup] Clarified the error message when attempting to configure more than 32 response-policy zones. [RT #35283]
-
- 31 Jan, 2014 1 commit
-
-
Evan Hunt authored
- remove dead code in server.c - initialize a struct tm.c
-
- 16 Jan, 2014 1 commit
-
-
Mark Andrews authored
using automatic empty zones from regular zones. [RT #35177]
-
- 14 Jan, 2014 1 commit
-
-
Evan Hunt authored
3705. [func] "configure --enable-native-pkcs11" enables BIND to use the PKCS#11 API for all cryptographic functions, so that it can drive a hardware service module directly without the need to use a modified OpenSSL as intermediary (so long as the HSM's vendor provides a complete-enough implementation of the PKCS#11 interface). This has been tested successfully with the Thales nShield HSM and with SoftHSMv2 from the OpenDNSSEC project. [RT #29031]
-
- 12 Jan, 2014 1 commit
-
-
Mark Andrews authored
for, see prefetch option for details. [RT #35041]
-