- 17 Jan, 2016 1 commit
-
-
Simon Kelley authored
-
- 15 Jan, 2016 1 commit
-
-
Simon Kelley authored
-
- 12 Jan, 2016 4 commits
-
-
Simon Kelley authored
-
André Glüpker authored
-
Simon Kelley authored
-
Simon Kelley authored
server=/example.com/<ip-of-server> The rationale is that the chain-of-trust will not be complete to private servers. If it was, it would not be necessary to access the server direct.
-
- 07 Jan, 2016 3 commits
-
-
Simon Kelley authored
-
Simon Kelley authored
-
Simon Kelley authored
-
- 05 Jan, 2016 2 commits
-
-
Simon Kelley authored
-
Simon Kelley authored
-
- 01 Jan, 2016 2 commits
-
-
Simon Kelley authored
-
Simon Kelley authored
-
- 29 Dec, 2015 1 commit
-
-
Simon Kelley authored
-
- 24 Dec, 2015 1 commit
-
-
Simon Kelley authored
-
- 23 Dec, 2015 1 commit
-
-
Simon Kelley authored
-
- 22 Dec, 2015 4 commits
-
-
Simon Kelley authored
-
Simon Kelley authored
-
Simon Kelley authored
-
Simon Kelley authored
-
- 21 Dec, 2015 6 commits
-
-
Simon Kelley authored
-
Simon Kelley authored
-
Simon Kelley authored
-
Simon Kelley authored
-
Simon Kelley authored
-
Simon Kelley authored
-
- 18 Dec, 2015 2 commits
-
-
Simon Kelley authored
-
Simon Kelley authored
Thanks to Michał Kępień for spotting this.
-
- 17 Dec, 2015 2 commits
-
-
Simon Kelley authored
-
Simon Kelley authored
-
- 16 Dec, 2015 3 commits
-
-
Simon Kelley authored
A zone which has at least one key with an algorithm we don't support should be considered as insecure.
-
Simon Kelley authored
-
Simon Kelley authored
-
- 15 Dec, 2015 2 commits
-
-
Simon Kelley authored
The list of exceptions to being able to locally answer cached data for validated records when DNSSEC data is requested was getting too long, so don't ever do that. This means that the cache no longer has to hold RRSIGS and allows us to lose lots of code. Note that cached validated answers are still returned as long as do=0
-
Simon Kelley authored
Much gnarly special-case code removed and replaced with correct general implementaion. Checking of zone-status moved to DNSSEC code, where it should be, vastly simplifying query-forwarding code.
-
- 22 Nov, 2015 1 commit
-
-
Simon Kelley authored
Thanks to Brian Carpenter and American Fuzzy Lop for finding the bug.
-
- 21 Nov, 2015 1 commit
-
-
Simon Kelley authored
When we can validate a DS RRset, but don't speak the hash algo it contains, treat that the same as an NSEC/3 proving that the DS doesn't exist. 4025 5.2
-
- 15 Nov, 2015 1 commit
-
-
Edwin Török authored
-
- 21 Oct, 2015 1 commit
-
-
Simon Kelley authored
RFC6303 specifies & recommends following zones not be forwarded to globally facing servers. +------------------------------+-----------------------+ | Zone | Description | +------------------------------+-----------------------+ | 0.IN-ADDR.ARPA | IPv4 "THIS" NETWORK | | 127.IN-ADDR.ARPA | IPv4 Loopback NETWORK | | 254.169.IN-ADDR.ARPA | IPv4 LINK LOCAL | | 2.0.192.IN-ADDR.ARPA | IPv4 TEST-NET-1 | | 100.51.198.IN-ADDR.ARPA | IPv4 TEST-NET-2 | | 113.0.203.IN-ADDR.ARPA | IPv4 TEST-NET-3 | | 255.255.255.255.IN-ADDR.ARPA | IPv4 BROADCAST | +------------------------------+-----------------------+ Signed-off-by:Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
-
- 14 Oct, 2015 1 commit
-
-
Simon Kelley authored
Logs, eg, iptables DROPS of dest 255.255.255.255
-