1. 19 Mar, 2018 1 commit
  2. 18 Mar, 2018 1 commit
  3. 11 Mar, 2018 3 commits
  4. 09 Mar, 2018 1 commit
  5. 07 Mar, 2018 2 commits
    • Petr Menšík's avatar
      Allow trailing dot in CNAME. · 56f06239
      Petr Menšík authored
      I got reported bug in Fedora [1], that cname is broken in new releases.
      At first I though this was false report, but there is still new
      regression in cname handling.
      
      Before, it accepted alias with trailing dot. Not it would accept only
      target, but not alias.
      
      cname=alias.,target
      
      is no longer valid. The issue is it will count size to skip after
      canonicalize. If that ignores trailing dot, next name would be "". And
      that is invalid and refused, dnsmasq refuses to start.
      
      I also think that any whitespace like tab should be possible after
      comma. So this fixes also 30858e3b.
      56f06239
    • Simon Kelley's avatar
      Fix nettle_hash() function to avoid ABI incompatibilities. · f3223fbf
      Simon Kelley authored
      The way of accessing the list of available hashes on nettle was
      vulnerable to breaking if the version of libnettle in use was
      different to the version dnsmasq was compiled against.
      Change to a new system if libnettle >= 3.4 is in use.
      Older versions if nettle are still OK, once 3.4 is reached,
      the ABi problem is fixed. Thanks to Petr Menšík for clues on this.
      f3223fbf
  6. 17 Feb, 2018 7 commits
  7. 15 Feb, 2018 5 commits
  8. 09 Feb, 2018 1 commit
  9. 07 Feb, 2018 2 commits
  10. 31 Jan, 2018 1 commit
  11. 30 Jan, 2018 1 commit
  12. 26 Jan, 2018 3 commits
  13. 21 Jan, 2018 2 commits
  14. 20 Jan, 2018 2 commits
  15. 19 Jan, 2018 3 commits
  16. 15 Jan, 2018 3 commits
  17. 14 Jan, 2018 1 commit
  18. 07 Jan, 2018 1 commit
    • Simon Kelley's avatar
      Handle duplicate RRs in DNSSEC validation. · e5412459
      Simon Kelley authored
      RFC 4034 says:
        [RFC2181] specifies that an RRset is not allowed to contain duplicate
        records (multiple RRs with the same owner name, class, type, and
        RDATA).  Therefore, if an implementation detects duplicate RRs when
        putting the RRset in canonical form, it MUST treat this as a protocol
        error.  If the implementation chooses to handle this protocol error
        in the spirit of the robustness principle (being liberal in what it
        accepts), it MUST remove all but one of the duplicate RR(s) for the
        purposes of calculating the canonical form of the RRset.
      
      We chose to handle this robustly, having found at least one recursive
      server in the wild which returns duplicate NSEC records in the AUTHORITY
      section of an answer generated from a wildcard record. sort_rrset() is
      therefore modified to delete duplicate RRs which are detected almost
      for free during the bubble-sort process.
      
      Thanks to Toralf Förster for helping to diagnose this problem.
      e5412459