George Thessalonikefs
a60bbd12ed
-Fix review comment for use-after-free when failing to send UDP out.
2022-01-31 11:27:35 +01:00
George Thessalonikefs
888eb224a6
- Better cleanup on failed DoT/DoH listening socket creation.
2022-01-29 15:14:56 +01:00
gthess
ddc3c754b0
Merge pull request #612 from NLnetLabs/tcp-race-condition
...
TCP race condition
2022-01-25 17:26:30 +01:00
George Thessalonikefs
5c85615515
- Fix #588 : Unbound 1.13.2 crashes due to p->pc is NULL in
...
serviced_udp_callback.
2022-01-25 17:15:37 +01:00
George Thessalonikefs
4573629fc4
- Mark waiting_tcp and serviced_query as being in the
...
cb_and_decommission stage to signal later code about their state;
prevents premature item deletion.
2022-01-25 09:46:16 +01:00
George Thessalonikefs
c3c0186658
- Add serviced_query timer to send upstream queries outside of the mesh
...
flow to prevent race conditions.
2022-01-25 00:01:43 +01:00
George Thessalonikefs
773d1f2911
- Make sure callback changes for EDNS are not lost.
2022-01-14 15:18:43 +01:00
George Thessalonikefs
de1e91fc7f
- Fix EDNS to upstream where the same option could be attached more than
...
once.
- Add a region to serviced_query for allocations.
2022-01-14 13:55:34 +01:00
George Thessalonikefs
a97604737b
- Fix prematurely terminated TCP queries when a reply has the same ID.
2022-01-11 10:00:45 +01:00
W.C.A. Wijngaards
33ef79d433
- Fix for #596 : Fix rpz-signal-nxdomain-ra to work for clientip
...
triggered operation.
2022-01-05 16:48:35 +01:00
W.C.A. Wijngaards
ceef84e022
- Fix that RPZ does not set RD flag on replies, it should be copied
...
from the query.
2022-01-04 13:49:31 +01:00
W.C.A. Wijngaards
95644c9309
- Fix #596 : only unset RA when NXDOMAIN is signalled.
2022-01-04 13:48:29 +01:00
W.C.A. Wijngaards
392c1f0f54
- Fix #596 : unset the RA bit when a query is blocked by an unbound
...
RPZ nxdomain reply. The option rpz-signal-nxdomain-ra allows to
signal that a domain is externally blocked to clients when it
is blocked with NXDOMAIN by unsetting RA.
2022-01-04 13:40:07 +01:00
W.C.A. Wijngaards
83c712ca60
- Fix to pick up other class local zone information before unlock.
2021-12-13 10:00:53 +01:00
George Thessalonikefs
2c1a5203a5
- Allow local-data for classes other than IN to inherit a configured
...
local-zone's type if possible, instead of defaulting to type
transparent as per the implicit rule.
2021-12-10 17:35:36 +01:00
Florian Obser
ef076c0e15
Fix -Wshadow
2021-12-03 18:30:08 +01:00
Florian Obser
56cf526c68
Fix -Wmissing-prototypes by declaring functions static.
2021-12-03 18:29:04 +01:00
George Thessalonikefs
3dbda3aac3
- Fix #454 : listen_dnsport.c:825: error: ‘IPV6_TCLASS’ undeclared.
2021-12-01 04:26:36 +01:00
Wouter Wijngaards
9645228f03
Merge pull request #570 from rex4539/typos
...
Fix typos
2021-11-29 11:39:48 +01:00
tcarpay
c47e98a659
Merge pull request #563 from NLnetLabs/bugfix/general-edns-options3
...
Better positioning of general EDNS option handling: revisited V2
2021-11-15 15:14:51 +01:00
Dimitris Apostolou
c21d6af617
Fix typos
2021-11-13 16:56:15 +02:00
TCY16
8205c87a96
complete renaming of the modules edns list
2021-11-08 11:50:29 +01:00
W.C.A. Wijngaards
738c7db9ab
- Fix to remove unused code from rpz resolve client and action
...
function.
2021-11-05 12:13:38 +01:00
W.C.A. Wijngaards
0006c08f15
- Fix analyzer review failure in rpz action override code to not
...
crash on unlocking the local zone lock.
2021-11-05 12:02:50 +01:00
W.C.A. Wijngaards
1a94a68fc2
- Fix #552 : Unbound assumes index.html exists on RPZ host.
2021-11-02 16:45:02 +01:00
Tom Carpay
5f8447830a
Move option handling to parse-time
2021-11-01 13:48:31 +00:00
Tom Carpay
89d7476539
split edns_data.opt_list in opt_list_in and opt_list_out
...
opt_list_in for parsed (incoming) edns options, and
opt_list_out for outgoing (to be encoded) edns options
2021-11-01 12:48:40 +00:00
Tom Carpay
3925297d07
Remove apply_edns_options from worker and mesh...
...
to be returned in message encoding later...
2021-11-01 10:44:55 +00:00
Tom Carpay
3ebfa9fc97
Outgoing module options go to opt_list_modules_out
...
And opt_list_modules_out is reset in case of failure
BEWARE! No options from modules will be encoded in the responses now!
2021-10-27 14:01:56 +00:00
Tom Carpay
3e6eeb504d
Modules have their own outgoing ends options list
...
But nothing happens with it yet
2021-10-27 13:48:49 +00:00
W.C.A. Wijngaards
89510f4a0c
- Implement RFC8375: Special-Use Domain 'home.arpa.'.
2021-09-27 15:09:01 +02:00
W.C.A. Wijngaards
7d70e3c861
- Fix initialisation errors reported by gcc sanitizer.
2021-09-10 14:30:57 +02:00
W.C.A. Wijngaards
9fa1ae1340
- Fix RPZ locks. Do not unlock zones lock if requested and rpz find
...
zone does not find the zone. Readlock the clientip that is found
for ipbased triggers. Unlock the nsdname zone lock when done.
Unlock zone and ip in rpz nsip and nsdname callback. Unlock
authzone and localzone if clientip found in rpz worker call.
2021-08-25 14:18:29 +02:00
W.C.A. Wijngaards
c93a7fb38a
- Fix the stream wait stream_wait_count_lock and http2 buffer locks
...
setup and desetup from race condition.
2021-08-25 13:37:50 +02:00
W.C.A. Wijngaards
a9de6879b8
Merge branch 'master' into rpz-triggers
2021-08-18 09:53:35 +02:00
W.C.A. Wijngaards
d0cc58be3d
- Fix to support harden-algo-downgrade for ZONEMD dnssec checks.
2021-08-16 16:14:32 +02:00
W.C.A. Wijngaards
4034c009bb
- zonemd, fix order of bogus printout string manipulation.
2021-08-13 15:24:53 +02:00
W.C.A. Wijngaards
c8c2dfff22
- Fix zonemd verification of key that is not in DNS but in the zone
...
and needs a chain of trust.
2021-08-13 14:43:11 +02:00
W.C.A. Wijngaards
ad45e9b89e
- Fix for #431 : Squelch permission denied errors for udp connect,
...
and udp send, they are visible at higher verbosity settings.
2021-08-13 09:27:58 +02:00
W.C.A. Wijngaards
f232562430
Merge branch 'master' into rpz-triggers
2021-08-05 13:37:22 +02:00
W.C.A. Wijngaards
c9bb0604db
- Fix static analysis warnings about localzone locks that are unused.
2021-08-04 10:58:08 +02:00
daiyunwei
0784ad7a11
#420
...
clear the c->buffer in the comm_point_send_reply does resolve the "can't fit qbuffer in c->buffer" issue, but it breaks the mesh reply list function that need to reuse the answer. because the c->buffer is cleared in the comm_point_send_reply, it cannot be resued again. it means that it is not inappropriate to clear c->buffer in the comm_point_send_reply.
After some investigation, i found it is appropriate to clear c->buffer before use in the http2_query_read_done.
2021-08-03 11:40:30 +08:00
W.C.A. Wijngaards
3ed5b62578
- Fix verbose printout failure in tcp reuse unit test.
2021-08-02 16:06:36 +02:00
George Thessalonikefs
ad2bd61ed4
- Remove redundant log_assert and fix error messages.
2021-07-26 16:12:55 +02:00
George Thessalonikefs
de73af2da2
- stream reuse, do not explicitly wait for a free pending_tcp if a reuse
...
could be used.
2021-07-26 10:47:20 +02:00
George Thessalonikefs
ab318a8b95
- Add unittest for tcp_reuse functions.
2021-07-24 01:15:00 +02:00
George Thessalonikefs
1b7358e85c
- stream reuse, move log_assert to the correct location.
2021-07-23 20:51:14 +02:00
George Thessalonikefs
e1fdac7205
- stream reuse, clean links on structs that are unlinked from a list.
2021-07-23 18:45:48 +02:00
George Thessalonikefs
0c74d6abba
- Fix for #411 , #439 , #469 : stream reuse, fix loop in the free
...
pending_tcp list.
2021-07-23 18:25:06 +02:00
George Thessalonikefs
5b4555954a
- Fix for #411 , #439 , #469 : stream reuse, fix outnet deletion for all
...
non-free pending_tcp.
2021-07-23 18:05:57 +02:00