1. 07 Mar, 2018 1 commit
    • Simon Kelley's avatar
      Fix nettle_hash() function to avoid ABI incompatibilities. · f3223fbf
      Simon Kelley authored
      The way of accessing the list of available hashes on nettle was
      vulnerable to breaking if the version of libnettle in use was
      different to the version dnsmasq was compiled against.
      Change to a new system if libnettle >= 3.4 is in use.
      Older versions if nettle are still OK, once 3.4 is reached,
      the ABi problem is fixed. Thanks to Petr Menšík for clues on this.
      f3223fbf
  2. 17 Feb, 2018 7 commits
  3. 15 Feb, 2018 5 commits
  4. 09 Feb, 2018 1 commit
  5. 07 Feb, 2018 2 commits
  6. 31 Jan, 2018 1 commit
  7. 30 Jan, 2018 1 commit
  8. 26 Jan, 2018 3 commits
  9. 21 Jan, 2018 2 commits
  10. 20 Jan, 2018 2 commits
  11. 19 Jan, 2018 3 commits
  12. 15 Jan, 2018 3 commits
  13. 14 Jan, 2018 1 commit
  14. 07 Jan, 2018 1 commit
    • Simon Kelley's avatar
      Handle duplicate RRs in DNSSEC validation. · e5412459
      Simon Kelley authored
      RFC 4034 says:
        [RFC2181] specifies that an RRset is not allowed to contain duplicate
        records (multiple RRs with the same owner name, class, type, and
        RDATA).  Therefore, if an implementation detects duplicate RRs when
        putting the RRset in canonical form, it MUST treat this as a protocol
        error.  If the implementation chooses to handle this protocol error
        in the spirit of the robustness principle (being liberal in what it
        accepts), it MUST remove all but one of the duplicate RR(s) for the
        purposes of calculating the canonical form of the RRset.
      
      We chose to handle this robustly, having found at least one recursive
      server in the wild which returns duplicate NSEC records in the AUTHORITY
      section of an answer generated from a wildcard record. sort_rrset() is
      therefore modified to delete duplicate RRs which are detected almost
      for free during the bubble-sort process.
      
      Thanks to Toralf Förster for helping to diagnose this problem.
      e5412459
  15. 03 Jan, 2018 1 commit
  16. 02 Jan, 2018 1 commit
  17. 15 Dec, 2017 3 commits
  18. 06 Dec, 2017 2 commits
    • Simon Kelley's avatar
      Fix infinite retries in strict-order mode. · ef3d137a
      Simon Kelley authored
       If all configured dns servers return refused in
       response to a query; dnsmasq will end up in an infinite loop
       retransmitting the dns query resulting into high CPU load.
       Problem is caused by the dns refuse retransmission logic which does
       not check for the end of a dns server list iteration in strict mode.
       Having one configured dns server returning a refused reply easily
       triggers this problem in strict order mode. This was introduced in
       9396752c
      
       Thanks to Hans Dedecker <dedeckeh@gmail.com> for spotting this
       and the initial patch.
      ef3d137a
    • Simon Kelley's avatar
      Make 373e9173 compile without DNSSEC. · 8c707e1e
      Simon Kelley authored
      8c707e1e