yunwei
5d5e4579de
Merge pull request #1 from NLnetLabs/master
...
synchronize the code.
2021-02-10 09:03:38 +08:00
W.C.A. Wijngaards
ad8104bb7c
- Fix empty clause warning in edns pass for padding.
2021-01-28 09:15:45 +01:00
W.C.A. Wijngaards
3a19ceaae6
- Fix to use correct type for label count in ipdnametoaddr rpz routine.
2021-01-28 09:14:19 +01:00
W.C.A. Wijngaards
cb55b5906a
- Fix empty clause warning in config_file nsid parse.
2021-01-28 09:11:46 +01:00
George Thessalonikefs
515df834a5
Merge branch 'rijswijk-orig_ttl'
2021-01-26 12:58:38 +01:00
George Thessalonikefs
707eb6108d
Merge branch 'yacc-clashes' of https://github.com/fobser/unbound into fobser-yacc-clashes
2021-01-25 20:56:36 +01:00
George Thessalonikefs
f5b7169729
Merge branch 'orig_ttl' of https://github.com/rijswijk/unbound into rijswijk-orig_ttl
2021-01-25 17:39:24 +01:00
Willem Toorop
ca2139bf3d
Some review nits from George
2021-01-25 15:13:54 +01:00
Roland van Rijswijk-Deij
d253db04fd
Addressed review comment from @wcawijngaards
2021-01-22 18:56:09 +00:00
Roland van Rijswijk-Deij
c4c849d878
Rebase on master
2021-01-22 16:44:56 +00:00
Willem Toorop
48ecf95108
Merge branch 'master' into features/padding
2021-01-22 10:29:50 +01:00
yunwei
0215500261
Update netevent.c
...
#386
I found the root cause of this issue. r_buffer is r->query_reply.c->buffer, used to fill the reply in the mesh_send_reply function, then call comm_point_send_reply, and then call http2_submit_dns_response to send the DOH response. However, the buffer is not cleared after use. If the query length is greater than the last response length, the next dns query in the same H2 session will encounter an error.
This is bug!!!
Clear the buffer after use.
2021-01-20 14:12:51 +08:00
Florian Obser
68d92b7bbb
Prevent a few more yacc clashes.
2021-01-19 17:13:00 +01:00
Willem Toorop
a152c7f907
Merge branch 'master' into features/nsid
2021-01-19 14:21:18 +01:00
W.C.A. Wijngaards
c125fe67bc
- Fix #404 : DNS query with small edns bufsize fail.
2021-01-18 08:29:52 +01:00
xiangbao227
93e5705259
I found that in function lruhash_remove, table was locked at first ,then lru_remove the entry , then unlock the table, and then markdel entry , but in function rrset_cache_touch , the entry will be touched to lru again before markdelling entry in function lruhash_remove. This is a bug!
2021-01-13 10:33:41 +08:00
W.C.A. Wijngaards
d1b92a6ce2
- Fix so local zone types always_nodata and always_deny can be used
...
from the config file.
2021-01-12 13:39:07 +01:00
W.C.A. Wijngaards
3322f631e5
- Fix #397 : [Feature request] add new type always_null to local-zone
...
similar to always_nxdomain.
2021-01-12 13:35:05 +01:00
W.C.A. Wijngaards
d9dd7bc36f
- Add comment documentation.
2021-01-08 11:01:06 +01:00
W.C.A. Wijngaards
ee2545d939
- For #391 : fix indentation.
2021-01-08 09:53:52 +01:00
W.C.A. Wijngaards
3e03e2c26d
- For #391 : use struct timeval* start_time for callback information.
2021-01-08 09:47:46 +01:00
Wouter Wijngaards
48724de155
Merge pull request #391 from fhriley/reply_cb_start_time
...
Add start_time to reply callbacks so modules can compute the response…
2021-01-08 09:35:07 +01:00
Anton Lindqvist
422213c171
add missing null check
...
I have a unbound forward zone configured on my router for my $DAYJOB.
The address associated with the zone is only accessible when the router
is connected to a VPN. If the VPN connection is absent, trying to
resolve any domain that must be handled by the zone crashes unbound.
Turns out there's a missing NULL check in `comm_point_send_udp_msg()`.
The same routine already has `if (addr) {} else {}` branches so I guess
protecting the call to `log_addr()` using the same conditional is
reasonable
I have also committed the same fix to unbound shipped with OpenBSD[1].
[1] https://marc.info/?l=openbsd-cvs&m=160993335615698&w=2
2021-01-06 12:44:26 +01:00
W.C.A. Wijngaards
44075a06a5
- Fix #379 : zone loading over HTTP appears to have buffer issues.
2021-01-06 10:36:23 +01:00
W.C.A. Wijngaards
64cccdb8d5
- iana portlist updated.
2021-01-04 14:18:24 +01:00
W.C.A. Wijngaards
4d51c6b86e
- For #376 : Fix that comm point event is not double removed or double
...
added to event map.
2021-01-04 14:05:50 +01:00
Frank Riley
e3abd772f7
Add start_time to reply callbacks so modules can compute the response time.
2021-01-01 15:44:21 -07:00
George Thessalonikefs
08968baec1
- Fix error cases when udp-connect is set and send() returns an error
...
(modified patch from Xin Li @delphij).
2020-12-16 17:11:41 +01:00
Wouter Wijngaards
48c038391a
Merge pull request #373 from fobser/void-arithmetic
...
Warning: arithmetic on a pointer to void is a GNU extension.
2020-12-11 14:07:30 +01:00
Wouter Wijngaards
29b5b25852
Merge pull request #335 from fobser/static
...
Sprinkle in some static to prevent missing prototype warnings.
2020-12-11 14:03:46 +01:00
Florian Obser
15e1b16da0
Warning: arithmetic on a pointer to void is a GNU extension.
2020-12-11 14:00:20 +01:00
W.C.A. Wijngaards
7077660932
- Fix to squelch permission denied and other errors from remote host,
...
they are logged at higher verbosity but not on low verbosity.
2020-12-11 10:30:54 +01:00
W.C.A. Wijngaards
b49cc2e667
- iana portlist updated.
2020-12-03 10:27:19 +01:00
W.C.A. Wijngaards
9eeb95a960
- Fix update, with write event check with streamreuse and fastopen.
2020-12-02 16:17:26 +01:00
W.C.A. Wijngaards
0502ab3026
- Fix for #283 : fix stream reuse and tcp fast open.
2020-12-02 15:42:24 +01:00
W.C.A. Wijngaards
e049fb303c
- Fix on windows to ignore connection failure on UDP, unless verbose.
2020-12-02 11:58:24 +01:00
Willem Toorop
fb150f9655
Merge branch 'master' into features/nsid
2020-12-02 11:19:32 +01:00
W.C.A. Wijngaards
16c496bff6
- Fix #356 : deadlock when listening tcp.
2020-12-02 10:10:27 +01:00
W.C.A. Wijngaards
1ebf851bf0
- Fix #360 : for the additionally reported TCP Fast Open makes TCP
...
connections fail, in that case we print a hint that this is
happening with the error in the logs.
2020-12-02 09:51:26 +01:00
Willem Toorop
ddb751751c
NSID for Unbound
2020-12-01 15:19:17 +01:00
W.C.A. Wijngaards
67a0614db7
- Fix that after failed read, the readagain cannot activate.
2020-11-26 12:12:52 +01:00
W.C.A. Wijngaards
4a8669612a
- Fix to omit UDP receive errors from log, if verbosity low.
...
These happen because of udp-connect.
2020-11-26 09:39:54 +01:00
W.C.A. Wijngaards
e50152aa1f
- Fix readagain and writeagain callback functions for comm point
...
cleanup.
2020-11-25 13:46:28 +01:00
W.C.A. Wijngaards
a5167e495f
- Fix memory leak for edns client tag opcode config element.
2020-11-25 12:04:38 +01:00
W.C.A. Wijngaards
15e8f5c6d4
- Fix udp-connect on FreeBSD, do send calls on connected UDP socket.
2020-11-25 09:55:01 +01:00
W.C.A. Wijngaards
5924a591be
- with udp-connect ignore connection refused with UDP timeouts.
2020-11-25 09:41:06 +01:00
W.C.A. Wijngaards
4e8a1ede3b
- Fix padding of struct regional for 32bit systems.
2020-11-24 17:06:54 +01:00
W.C.A. Wijngaards
a69304011a
- iana portlist updated.
2020-11-24 13:17:15 +01:00
Wouter Wijngaards
ead06af086
Merge branch 'master' into stream-reuse
2020-11-24 08:20:07 +01:00
George Thessalonikefs
b0247b6e93
Merge branch 'master' into edns-string
2020-11-23 16:58:30 +01:00