1. 11 Mar, 2018 1 commit
  2. 09 Mar, 2018 1 commit
  3. 07 Mar, 2018 2 commits
    • Petr Menšík's avatar
      Allow trailing dot in CNAME. · 56f06239
      Petr Menšík authored
      I got reported bug in Fedora [1], that cname is broken in new releases.
      At first I though this was false report, but there is still new
      regression in cname handling.
      
      Before, it accepted alias with trailing dot. Not it would accept only
      target, but not alias.
      
      cname=alias.,target
      
      is no longer valid. The issue is it will count size to skip after
      canonicalize. If that ignores trailing dot, next name would be "". And
      that is invalid and refused, dnsmasq refuses to start.
      
      I also think that any whitespace like tab should be possible after
      comma. So this fixes also 30858e3b.
      56f06239
    • Simon Kelley's avatar
      Fix nettle_hash() function to avoid ABI incompatibilities. · f3223fbf
      Simon Kelley authored
      The way of accessing the list of available hashes on nettle was
      vulnerable to breaking if the version of libnettle in use was
      different to the version dnsmasq was compiled against.
      Change to a new system if libnettle >= 3.4 is in use.
      Older versions if nettle are still OK, once 3.4 is reached,
      the ABi problem is fixed. Thanks to Petr Menšík for clues on this.
      f3223fbf
  4. 17 Feb, 2018 7 commits
  5. 15 Feb, 2018 5 commits
  6. 09 Feb, 2018 1 commit
  7. 07 Feb, 2018 2 commits
  8. 31 Jan, 2018 1 commit
  9. 30 Jan, 2018 1 commit
  10. 26 Jan, 2018 3 commits
  11. 21 Jan, 2018 2 commits
  12. 20 Jan, 2018 2 commits
  13. 19 Jan, 2018 3 commits
  14. 15 Jan, 2018 3 commits
  15. 14 Jan, 2018 1 commit
  16. 07 Jan, 2018 1 commit
    • Simon Kelley's avatar
      Handle duplicate RRs in DNSSEC validation. · e5412459
      Simon Kelley authored
      RFC 4034 says:
        [RFC2181] specifies that an RRset is not allowed to contain duplicate
        records (multiple RRs with the same owner name, class, type, and
        RDATA).  Therefore, if an implementation detects duplicate RRs when
        putting the RRset in canonical form, it MUST treat this as a protocol
        error.  If the implementation chooses to handle this protocol error
        in the spirit of the robustness principle (being liberal in what it
        accepts), it MUST remove all but one of the duplicate RR(s) for the
        purposes of calculating the canonical form of the RRset.
      
      We chose to handle this robustly, having found at least one recursive
      server in the wild which returns duplicate NSEC records in the AUTHORITY
      section of an answer generated from a wildcard record. sort_rrset() is
      therefore modified to delete duplicate RRs which are detected almost
      for free during the bubble-sort process.
      
      Thanks to Toralf Förster for helping to diagnose this problem.
      e5412459
  17. 03 Jan, 2018 1 commit
  18. 02 Jan, 2018 1 commit
  19. 15 Dec, 2017 2 commits