Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
D
Dnsmasq
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Locked Files
Issues
0
Issues
0
List
Boards
Labels
Service Desk
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Security & Compliance
Security & Compliance
Dependency List
License Compliance
Packages
Packages
List
Container Registry
Analytics
Analytics
CI / CD
Code Review
Insights
Issues
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
nanahira
Dnsmasq
Commits
424c4a8a
Commit
424c4a8a
authored
Jan 07, 2015
by
Simon Kelley
Browse files
Options
Browse Files
Download
Plain Diff
Merge branch 'unsigned'
parents
d8dbd903
97e618a0
Changes
4
Expand all
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
260 additions
and
179 deletions
+260
-179
CHANGELOG
CHANGELOG
+9
-0
src/dnsmasq.h
src/dnsmasq.h
+7
-4
src/dnssec.c
src/dnssec.c
+56
-35
src/forward.c
src/forward.c
+188
-140
No files found.
CHANGELOG
View file @
424c4a8a
...
@@ -31,7 +31,16 @@ version 2.73
...
@@ -31,7 +31,16 @@ version 2.73
request for certain domains, before the correct answer can
request for certain domains, before the correct answer can
arrive. Thanks to Glen Huang for the patch.
arrive. Thanks to Glen Huang for the patch.
Revisit the part of DNSSEC validation which determines if an
unsigned answer is legit, or is in some part of the DNS
tree which should be signed. Dnsmasq now works from the
DNS root downward looking for the limit of signed
delegations, rather than working bottom up. This is
both more correct, and less likely to trip over broken
nameservers in the unsigned parts of the DNS tree
which don't respond well to DNSSEC queries.
version 2.72
version 2.72
Add ra-advrouter mode, for RFC-3775 mobile IPv6 support.
Add ra-advrouter mode, for RFC-3775 mobile IPv6 support.
...
...
src/dnsmasq.h
View file @
424c4a8a
...
@@ -569,8 +569,9 @@ struct hostsfile {
...
@@ -569,8 +569,9 @@ struct hostsfile {
#define STAT_SECURE_WILDCARD 7
#define STAT_SECURE_WILDCARD 7
#define STAT_NO_SIG 8
#define STAT_NO_SIG 8
#define STAT_NO_DS 9
#define STAT_NO_DS 9
#define STAT_NEED_DS_NEG 10
#define STAT_NO_NS 10
#define STAT_CHASE_CNAME 11
#define STAT_NEED_DS_NEG 11
#define STAT_CHASE_CNAME 12
#define FREC_NOREBIND 1
#define FREC_NOREBIND 1
#define FREC_CHECKING_DISABLED 2
#define FREC_CHECKING_DISABLED 2
...
@@ -604,7 +605,9 @@ struct frec {
...
@@ -604,7 +605,9 @@ struct frec {
#ifdef HAVE_DNSSEC
#ifdef HAVE_DNSSEC
int
class
,
work_counter
;
int
class
,
work_counter
;
struct
blockdata
*
stash
;
/* Saved reply, whilst we validate */
struct
blockdata
*
stash
;
/* Saved reply, whilst we validate */
size_t
stash_len
;
struct
blockdata
*
orig_domain
;
/* domain of original query, whilst
we're seeing is if in unsigned domain */
size_t
stash_len
,
name_start
,
name_len
;
struct
frec
*
dependent
;
/* Query awaiting internally-generated DNSKEY or DS query */
struct
frec
*
dependent
;
/* Query awaiting internally-generated DNSKEY or DS query */
struct
frec
*
blocking_query
;
/* Query which is blocking us. */
struct
frec
*
blocking_query
;
/* Query which is blocking us. */
#endif
#endif
...
@@ -1126,7 +1129,7 @@ int in_zone(struct auth_zone *zone, char *name, char **cut);
...
@@ -1126,7 +1129,7 @@ int in_zone(struct auth_zone *zone, char *name, char **cut);
size_t
dnssec_generate_query
(
struct
dns_header
*
header
,
char
*
end
,
char
*
name
,
int
class
,
int
type
,
union
mysockaddr
*
addr
);
size_t
dnssec_generate_query
(
struct
dns_header
*
header
,
char
*
end
,
char
*
name
,
int
class
,
int
type
,
union
mysockaddr
*
addr
);
int
dnssec_validate_by_ds
(
time_t
now
,
struct
dns_header
*
header
,
size_t
n
,
char
*
name
,
char
*
keyname
,
int
class
);
int
dnssec_validate_by_ds
(
time_t
now
,
struct
dns_header
*
header
,
size_t
n
,
char
*
name
,
char
*
keyname
,
int
class
);
int
dnssec_validate_ds
(
time_t
now
,
struct
dns_header
*
header
,
size_t
plen
,
char
*
name
,
char
*
keyname
,
int
class
);
int
dnssec_validate_ds
(
time_t
now
,
struct
dns_header
*
header
,
size_t
plen
,
char
*
name
,
char
*
keyname
,
int
class
);
int
dnssec_validate_reply
(
time_t
now
,
struct
dns_header
*
header
,
size_t
plen
,
char
*
name
,
char
*
keyname
,
int
*
class
,
int
*
neganswer
);
int
dnssec_validate_reply
(
time_t
now
,
struct
dns_header
*
header
,
size_t
plen
,
char
*
name
,
char
*
keyname
,
int
*
class
,
int
*
neganswer
,
int
*
nons
);
int
dnssec_chase_cname
(
time_t
now
,
struct
dns_header
*
header
,
size_t
plen
,
char
*
name
,
char
*
keyname
);
int
dnssec_chase_cname
(
time_t
now
,
struct
dns_header
*
header
,
size_t
plen
,
char
*
name
,
char
*
keyname
);
int
dnskey_keytag
(
int
alg
,
int
flags
,
unsigned
char
*
rdata
,
int
rdlen
);
int
dnskey_keytag
(
int
alg
,
int
flags
,
unsigned
char
*
rdata
,
int
rdlen
);
size_t
filter_rrsigs
(
struct
dns_header
*
header
,
size_t
plen
);
size_t
filter_rrsigs
(
struct
dns_header
*
header
,
size_t
plen
);
...
...
src/dnssec.c
View file @
424c4a8a
This diff is collapsed.
Click to expand it.
src/forward.c
View file @
424c4a8a
This diff is collapsed.
Click to expand it.
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment