George Thessalonikefs
24eded6ef9
- Fix for #558 : clear the UB_EV_TIMEOUT bit before adding an event.
2021-11-05 11:21:30 +01:00
George Thessalonikefs
431b749d7a
- Fix for #558 : fix loop in comm_point->tcp_free when a comm_point is reclaimed
...
more than once during callbacks.
2021-11-05 11:19:08 +01:00
W.C.A. Wijngaards
9f26f397a9
- Fix crosscompile windows to use libssp when it exists.
...
- For the windows compile script disable gost.
- Fix that on windows, use BIO_set_callback_ex instead of deprecated
2021-09-21 13:51:34 +02:00
W.C.A. Wijngaards
520fa84265
- Fix tcp fastopen failure when disabled, try normal connect instead.
2021-09-01 16:21:10 +02:00
W.C.A. Wijngaards
ad45e9b89e
- Fix for #431 : Squelch permission denied errors for udp connect,
...
and udp send, they are visible at higher verbosity settings.
2021-08-13 09:27:58 +02:00
W.C.A. Wijngaards
2a0df9e72e
- Annotate assertion into error printout; we think it may be an
...
error, but the situation looks harmless.
2021-08-03 14:08:30 +02:00
Wouter Wijngaards
5196ee03e6
Merge pull request #517 from dyunwei/master
...
#420 breaks the mesh reply list function that need to reuse the dns answer.
2021-08-03 13:11:01 +02:00
George Thessalonikefs
a519009378
Merge branch 'master' of github.com:NLnetLabs/unbound
2021-08-03 12:20:45 +02:00
George Thessalonikefs
ca67691092
- Listen to read or write events after the SSL handshake.
...
Sticky events on windows would stick on read when write was needed.
2021-08-03 12:18:58 +02:00
daiyunwei
0784ad7a11
#420
...
clear the c->buffer in the comm_point_send_reply does resolve the "can't fit qbuffer in c->buffer" issue, but it breaks the mesh reply list function that need to reuse the answer. because the c->buffer is cleared in the comm_point_send_reply, it cannot be resued again. it means that it is not inappropriate to clear c->buffer in the comm_point_send_reply.
After some investigation, i found it is appropriate to clear c->buffer before use in the http2_query_read_done.
2021-08-03 11:40:30 +08:00
W.C.A. Wijngaards
b6abcb1508
- For #515 : Fix compilation with openssl 3.0.0 beta2, lib64 dir and
...
SSL_get_peer_certificate.
- Move acx_nlnetlabs.m4 to version 41, with lib64 openssl dir check.
2021-07-30 13:54:43 +02:00
W.C.A. Wijngaards
8180ca192f
- Fix for #510 : in depth, use ifdefs for windows api event calls.
2021-07-16 09:12:06 +02:00
Felipe Gasper
0efccaa1eb
Support OpenSSLs that lack SSL_get0_alpn_selected.
2021-04-19 13:05:50 -04:00
W.C.A. Wijngaards
addd21f750
- Fix permission denied sendto log, squelch the log messages
...
unless high verbosity is set.
2021-04-12 11:18:23 +02:00
W.C.A. Wijngaards
ff0c5f863d
- Fix #429 : Also fix end of transfer for http download of auth zones.
2021-03-25 12:18:49 +01:00
W.C.A. Wijngaards
57d4c3a8a4
- Fix for #447 : squelch connection refused tcp connection failures
...
from the log, unless verbosity is high.
2021-03-19 17:43:36 +01:00
Wouter Wijngaards
209dc32624
Merge pull request #367 from NLnetLabs/dnstap-log-local-addr
...
DNSTAP log local address
2021-02-25 11:58:36 +01:00
W.C.A. Wijngaards
40fbc3fa8a
- Fix #431 : Squelch permission denied errors for tcp connect
2021-02-22 08:24:04 +01:00
W.C.A. Wijngaards
bc4bdbabea
- Fix #429 : rpz: url: with https: broken (regression in 1.13.1).
2021-02-19 14:42:02 +01:00
W.C.A. Wijngaards
f5339ec7e5
Merge branch 'master' into dnstap-log-local-addr
2021-02-18 13:12:09 +01:00
yunwei
0215500261
Update netevent.c
...
#386
I found the root cause of this issue. r_buffer is r->query_reply.c->buffer, used to fill the reply in the mesh_send_reply function, then call comm_point_send_reply, and then call http2_submit_dns_response to send the DOH response. However, the buffer is not cleared after use. If the query length is greater than the last response length, the next dns query in the same H2 session will encounter an error.
This is bug!!!
Clear the buffer after use.
2021-01-20 14:12:51 +08:00
Anton Lindqvist
422213c171
add missing null check
...
I have a unbound forward zone configured on my router for my $DAYJOB.
The address associated with the zone is only accessible when the router
is connected to a VPN. If the VPN connection is absent, trying to
resolve any domain that must be handled by the zone crashes unbound.
Turns out there's a missing NULL check in `comm_point_send_udp_msg()`.
The same routine already has `if (addr) {} else {}` branches so I guess
protecting the call to `log_addr()` using the same conditional is
reasonable
I have also committed the same fix to unbound shipped with OpenBSD[1].
[1] https://marc.info/?l=openbsd-cvs&m=160993335615698&w=2
2021-01-06 12:44:26 +01:00
W.C.A. Wijngaards
44075a06a5
- Fix #379 : zone loading over HTTP appears to have buffer issues.
2021-01-06 10:36:23 +01:00
W.C.A. Wijngaards
4d51c6b86e
- For #376 : Fix that comm point event is not double removed or double
...
added to event map.
2021-01-04 14:05:50 +01:00
George Thessalonikefs
08968baec1
- Fix error cases when udp-connect is set and send() returns an error
...
(modified patch from Xin Li @delphij).
2020-12-16 17:11:41 +01:00
Wouter Wijngaards
48c038391a
Merge pull request #373 from fobser/void-arithmetic
...
Warning: arithmetic on a pointer to void is a GNU extension.
2020-12-11 14:07:30 +01:00
Wouter Wijngaards
29b5b25852
Merge pull request #335 from fobser/static
...
Sprinkle in some static to prevent missing prototype warnings.
2020-12-11 14:03:46 +01:00
Florian Obser
15e1b16da0
Warning: arithmetic on a pointer to void is a GNU extension.
2020-12-11 14:00:20 +01:00
W.C.A. Wijngaards
7077660932
- Fix to squelch permission denied and other errors from remote host,
...
they are logged at higher verbosity but not on low verbosity.
2020-12-11 10:30:54 +01:00
W.C.A. Wijngaards
6bf1293bcd
No need for mk_local_addr, can pass the sockaddr structure.
2020-12-09 11:56:35 +01:00
W.C.A. Wijngaards
72d3b588ca
For the DoH create_http_handler, also pass the socket.
2020-12-09 11:29:57 +01:00
W.C.A. Wijngaards
31cedb47cb
Remove unused whitespace, add missing header change, make it compile
2020-12-09 11:13:58 +01:00
W.C.A. Wijngaards
bdfa65c6ab
Import the patches from the files in the tarball in
...
issue #365 https://github.com/NLnetLabs/unbound/files/5659923/patches.tar.gz
from iruzanov. The merge conflicts are fixed, but no changes are made
to the patched code.
2020-12-09 11:00:51 +01:00
W.C.A. Wijngaards
9eeb95a960
- Fix update, with write event check with streamreuse and fastopen.
2020-12-02 16:17:26 +01:00
W.C.A. Wijngaards
0502ab3026
- Fix for #283 : fix stream reuse and tcp fast open.
2020-12-02 15:42:24 +01:00
W.C.A. Wijngaards
e049fb303c
- Fix on windows to ignore connection failure on UDP, unless verbose.
2020-12-02 11:58:24 +01:00
W.C.A. Wijngaards
16c496bff6
- Fix #356 : deadlock when listening tcp.
2020-12-02 10:10:27 +01:00
W.C.A. Wijngaards
1ebf851bf0
- Fix #360 : for the additionally reported TCP Fast Open makes TCP
...
connections fail, in that case we print a hint that this is
happening with the error in the logs.
2020-12-02 09:51:26 +01:00
W.C.A. Wijngaards
67a0614db7
- Fix that after failed read, the readagain cannot activate.
2020-11-26 12:12:52 +01:00
W.C.A. Wijngaards
4a8669612a
- Fix to omit UDP receive errors from log, if verbosity low.
...
These happen because of udp-connect.
2020-11-26 09:39:54 +01:00
W.C.A. Wijngaards
e50152aa1f
- Fix readagain and writeagain callback functions for comm point
...
cleanup.
2020-11-25 13:46:28 +01:00
W.C.A. Wijngaards
15e8f5c6d4
- Fix udp-connect on FreeBSD, do send calls on connected UDP socket.
2020-11-25 09:55:01 +01:00
W.C.A. Wijngaards
5924a591be
- with udp-connect ignore connection refused with UDP timeouts.
2020-11-25 09:41:06 +01:00
Florian Obser
9fb65e2b9e
Sprinkle in some static to prevent missing prototype warnings.
2020-10-28 14:15:23 +01:00
W.C.A. Wijngaards
78e9b8949c
Merge branch 'master' into stream-reuse
...
Resolved comm_point_start_listening conflict for socket close.
2020-10-21 09:54:03 +02:00
W.C.A. Wijngaards
531ce9e85c
Fixup for clear of tcp handler structure.
2020-10-19 13:36:53 +02:00
W.C.A. Wijngaards
68c57314c4
- Fix to set the tcp handler event toggle flag back to default when
...
the handler structure is reused.
2020-10-19 12:55:43 +02:00
W.C.A. Wijngaards
ab9d732796
- Log ip address when http session recv fails, eg. due to tls fail.
2020-10-19 11:06:55 +02:00
W.C.A. Wijngaards
a3e2bfbb0c
- Fix #330 : [Feature request] Add unencrypted DNS over HTTPS support.
...
This adds the option http-notls-downstream: yesno to change that,
and the dohclient test code has the -n option.
2020-10-19 10:24:03 +02:00
Ralph Dolmans
4ae823fbc2
Merge branch 'master' into doh
2020-09-16 18:38:51 +02:00