1. 11 May, 2017 1 commit
  2. 10 May, 2017 2 commits
  3. 09 May, 2017 2 commits
  4. 04 May, 2017 2 commits
  5. 01 May, 2017 1 commit
  6. 29 Apr, 2017 3 commits
  7. 25 Apr, 2017 2 commits
  8. 23 Apr, 2017 1 commit
  9. 17 Apr, 2017 5 commits
  10. 12 Apr, 2017 4 commits
  11. 11 Apr, 2017 6 commits
  12. 10 Apr, 2017 2 commits
    • Floris Bos's avatar
      --dhcp-reply-delay option to workaround PXE client bugs. · 503c6091
      Floris Bos authored
      Adds option to delay replying to DHCP packets by one or more seconds.
      This provides a workaround for a PXE boot firmware implementation
      that has a bug causing it to fail if it receives a (proxy) DHCP
      reply instantly.
      
      On Linux it looks up the exact receive time of the UDP packet with
      the SIOCGSTAMP ioctl to prevent multiple delays if multiple packets
      come in around the same time.
      503c6091
    • Floris Bos's avatar
      Add support for unique TFTP root per MAC. · 60704f5e
      Floris Bos authored
      It is currently only possible to let the TFTP server serve a different
      folder depending on the client's IP address.
      However it isn't always possible to predict what the client's
      IP address will be, especially in situations in which we are not
      responsible for handing them out (e.g. proxy dhcp setups).
      
      Extend the current --tftp-unique-root parameter to support having a
      separate folder per MAC address instead.
      60704f5e
  13. 23 Mar, 2017 1 commit
    • Kristian Evensen's avatar
      Allow binding to both source address and interface in server specs. · 4e7694d7
      Kristian Evensen authored
      The current --server syntax allows for binding to interface or
      address. However, in some (admittedly special) cases it is useful to
      be able to specify both. This commit introduces the following syntax
      to support binding to both interface and address:
      
      --server X.X.X.X@IP@interface#port
      
      Based on my tests, the syntax is backwards compatible with the current
      @IP/interface#port. The code will fail if two interface names are given.
      
      v1->v2:
      * Add man page description of the extended server syntax (thanks Simon Kelley)
      Signed-off-by: default avatarKristian Evensen <kristian.evensen@gmail.com>
      4e7694d7
  14. 18 Mar, 2017 2 commits
    • James Bottomley's avatar
      When forwarding a query to a non-DNSSEC nameserver, don't verify the lack of DNSSEC. · e33b4870
      James Bottomley authored
      The man page says that we don't do DNSSEC on forwarded domains, but if
      you turn on dnssec_check_signatures this turns out to be untrue,
      because we try to build up a DS chain to them.  Since forwarded domains
      are usually used for split DNS to hidden domains, they're unlikely to
      verify to the DNS root anyway, so the way to do DNSSEC for them (as the
      manual says) is to provide a trust anchor for each forwarder.
      
      The problem I've run into is a split DNS setup where I want DNSSEC to
      work mostly, but one of the forwarding domains doesn't have an internal
      DNSSEC capable resolver. Without this patch the entire domain goes
      unresolvable because the DS record query to the internal resolver
      returns a failure which is interpreted as the domain being BOGUS.
      
      The fix is not to do the DS record chase for forwarded domains.
      e33b4870
    • Petr Menšík's avatar
  15. 07 Mar, 2017 3 commits
    • Bert Gijsbers's avatar
      16f03e71
    • Olivier Gayot's avatar
      Improve error checking for --rev-server. · dc99058d
      Olivier Gayot authored
      The rev-server directive only handles the following CIDR prefixes
      properly: /8, /16, /24, /32.
      
      Any other value was silently converted to /16 which could result in
      unexpected behaviour.
      
      This patch rejects any other value instead of making a silent
      conversion.
      dc99058d
    • Olivier Gayot's avatar
      Fix rev-server with /32 prefix. · 916959c1
      Olivier Gayot authored
      [ excerpt from the man page ]
      The rev-server directive provides a syntactic sugar to make specifying
      address-to-name queries easier. For example
      --rev-server=1.2.3.0/24,192.168.0.1 is exactly equivalent to
      --server=/3.2.1.in-addr.arpa/192.168.0.1
      
      It is not mentioned in the man page but the only prefixes that the
      directive properly handles when dealing with IPv4 are /8, /16 and /24.
      Specifying anything else as the same effect as specifying /16.
      
      It is not a big deal for subnets on non-octet boundaries since they
      cannot be represented using a single in-addr.arpa address. However, it
      is unconvenient for /32 prefix while the analogous server directive
      behaves as expected. E.g. the following server directive work
      as expected:
      
          server=/42.10.168.192.in-addr.arpa/1.2.3.4
      
      but the following does not:
      
          rev-server=192.168.10.42/32,1.2.3.4
      
      and, in practice, the later behaves the same as:
      
          server=/168.192.in-addr.arpa/1.2.3.4
      
      This strange behaviour is fixed by accepting /32 CIDR prefixes as a
      valid value. Any other value will still be considered the same as /16.
      916959c1
  16. 01 Mar, 2017 2 commits
  17. 20 Feb, 2017 1 commit
    • Simon Kelley's avatar
      Fix CNAME wildcard in auth-mode. · 62f9c0d4
      Simon Kelley authored
      A domain can only have a CNAME if it has not other records.
      
      Don't return a CNAME when there are records of other types on the name.
      62f9c0d4