b26fa1a2fbcfee7d03b0c8fd15ec3aa64ae70b9f |
|
10-Feb-2016 |
Daniel Mack <daniel@zonque.org> |
tree-wide: remove Emacs lines from all files
This should be handled fine now by .dir-locals.el, so need to carry that
stuff in every file. |
011696f76233486bc56c266b18a328924f70269c |
|
01-Feb-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved: rework what ResolveHostname() with family == AF_UNSPEC means
Previously, if a hostanem is resolved with AF_UNSPEC specified, this would be used as indication to resolve both an
AF_INET and an AF_INET6 address. With this change this logic is altered: an AF_INET address is only resolved if there's
actually a routable IPv4 address on the specific interface, and similar an AF_INET6 address is only resolved if there's
a routable IPv6 address. With this in place, it's ensured that the returned data is actually connectable by
applications. This logic mimics glibc's resolver behaviour.
Note that if the client asks explicitly for AF_INET or AF_INET6 it will get what it asked for.
This also simplifies the logic how it is determined whether a specific lookup shall take place on a scope.
Specifically, the checks with dns_scope_good_key() are now moved out of the transaction code and into the query code,
so that we don't even create a transaction object on a specific scope if we cannot execute the resolution on it anyway. |
6955a3ba9dc5d36487724878333a5745987e6656 |
|
25-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved: when checking whether a link is relevant, check kernel operstate
This mimics what networkd is doing to detect a carrier. |
c69fa7e3c44240bedc0ee1bd89fecf954783ac85 |
|
19-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved: rework DNSSECSupported property
Not only report whether the server actually supports DNSSEC, but also first check whether DNSSEC is actually enabled
for it in our local configuration.
Also, export a per-link DNSSECSupported property in addition to the existing manager-wide property. |
97e5d693c04e50605d438af1c8a965fd2963bbe9 |
|
19-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved: add bus API for configuring per-link DNS settings
This is useful for alternative network management solutions (such as NetworkManager) to push DNS configuration data
into resolved.
The calls will fail should networkd already have taken possesion of a link, so that the bus API is only available if
we don't get the data from networkd. |
dfc1091b2f5f21f69e0aa6d3c4536b8990d4b100 |
|
19-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved: allocate DNS scope for links only if the interface is up
For mDNS and LLMNR we already created the scopes only if the specific interfaces where actually up and suitable for
Multicasting. Add a similar (but weaker) logic for unicast DNS as well. |
8a516214c4412e8a40544bd725a6d499a30cbbbf |
|
06-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved: introduce support for per-interface negative trust anchors |
ad6c04756115809d615dede330213d73edf732a8 |
|
05-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved,networkd: add a per-interface DNSSEC setting
This adds a DNSSEC= setting to .network files, and makes resolved honour
them. |
af49ca27ffd790d78dbbb465b978266dfd5c93da |
|
05-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved,networkd: unify ResolveSupport enum
networkd previously knew an enum "ResolveSupport" for configuring
per-interface LLMNR support, resolved had a similar enum just called
"Support", with the same value and similar pasers.
Unify this, call the enum ResolveSupport, and port both daemons to it. |
b4f1862df2e45aba90386887d685b8bf3c840e10 |
|
08-Dec-2015 |
Daniel Mack <daniel@zonque.org> |
resolved: create dns scopes for mDNS
Follow what LLMNR does, and create per-link DnsScope objects. |
bc7702b098b63031767174206f5df14a8ccb45cf |
|
08-Dec-2015 |
Daniel Mack <daniel@zonque.org> |
resolved: add infrastructure for mDNS related sockets
Just hook up mDNS listeners with an empty packet dispather function,
introduce a config directive, man page updates etc. |
eed857b71702f8551b46b66b31fa0d08583cf23c |
|
25-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
resolved: enforce a maximum limit on both dns servers and search domains |
4b95f1798f22c1bb75295f448188560cb6ec9ece |
|
25-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
resolved: unify DnsServer handling code between Link and Manager
This copies concepts we introduced for the DnsSearchDomain stuff, and
reworks the operations on lists of dns servers to be reusable and
generic for use both with the Link and the Manager object. |
a51c10485af349eb15faa4d1a63b9818bcf3e589 |
|
25-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
resolved: add a generic DnsSearchDomain concept
With this change, we add a new object to resolved, "DnsSearchDomain="
which wraps a search domain. This is then used to introduce a global
search domain list, in addition to the existing per-link search domain
list which is reword to make use of this new object too.
This is preparation for implement proper unicast DNS search domain
support. |
0eac462399c8e87bcce252cf058eba9f2678f2bd |
|
25-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
resolved: rework dns server lifecycle logic
Previously, there was a chance of memory corruption, because when
switching to the next DNS server we didn't care whether they linked list
of DNS servers was still valid.
Clean up lifecycle of the dns server logic:
- When a DnsServer object is still in the linked list of DnsServers for
a link or the manager, indicate so with a "linked" boolean field, and
never follow the linked list if that boolean is not set.
- When picking a DnsServer to use for a link ot manager, always
explicitly take a reference.
This also rearranges some logic, to make the tracking of dns servers by
link and globally more alike. |
1c4baffc1895809bae9ac36b670af90a4cb9cd7d |
|
13-Jun-2015 |
Tom Gundersen <teg@jklm.no> |
sd-netlink: rename from sd-rtnl |
2eec67acbb00593e414549a7e5b35eb7dd776b1b |
|
23-Feb-2015 |
Thomas Hindoe Paaboel Andersen <phomes@gmail.com> |
remove unused includes
This patch removes includes that are not used. The removals were found with
include-what-you-use which checks if any of the symbols from a header is
in use. |
aea2429d6ec32261dbf6b9caa125fcc6ea9ea76a |
|
05-Aug-2014 |
Lennart Poettering <lennart@poettering.net> |
resolved: enforce ratelimit on LLMNR traffic |
19b50b5ba7ee8c1bfb330377309e4bab7a7531d8 |
|
04-Aug-2014 |
Lennart Poettering <lennart@poettering.net> |
resolved: read the per-interface LLMNR setting from networkd and act on it |
2c27fbca2d88214bd305272308a370a962818f1e |
|
01-Aug-2014 |
Lennart Poettering <lennart@poettering.net> |
resolved: flush cache each time we change to a different DNS server |
39d8db043b599a7382f94bfc904d5e108af438bd |
|
01-Aug-2014 |
Lennart Poettering <lennart@poettering.net> |
resolved: rename resolved.h to resolved-manager.h
After all it pretty much exlcusively containers definitions about the
"Manager" object, hence let's call this the most obvious way. |
ec2c5e4398f9d65e5dfe61530f2556224733d1e6 |
|
31-Jul-2014 |
Lennart Poettering <lennart@poettering.net> |
resolved: implement LLMNR uniqueness verification |
623a4c97b9175f95c4b1c6fc34e36c56f1e4ddbf |
|
29-Jul-2014 |
Lennart Poettering <lennart@poettering.net> |
resolve: add llmnr responder side for UDP and TCP
Name defending is still missing. |
6073b6f26ab9fc6bf335faa7073ec443eef093fd |
|
23-Jul-2014 |
Tom Gundersen <teg@jklm.no> |
resolved: don't read DHCP leases
networkd will expose both statically configured DNS servers and servers
receieved over DHCP in sd_network_get_dns(), so no need to keep
the distinction in resolved. |
0dd25fb9f005d8ab7ac4bc10a609d00569f8c56a |
|
18-Jul-2014 |
Lennart Poettering <lennart@poettering.net> |
change type for address family to "int"
Let's settle on a single type for all address family values, even if
UNIX is very inconsitent on the precise type otherwise. Given that
socket() is the primary entrypoint for the sockets API, and that uses
"int", and "int" is relatively simple and generic, we settle on "int"
for this. |
1716f6dcf54d4c181c2e2558e3d5414f54c8d9ca |
|
18-Jul-2014 |
Lennart Poettering <lennart@poettering.net> |
resolved: add LLMNR support for looking up names |
e1c959948c0e31d6997bcdfbabfbd077784b2bae |
|
17-Jul-2014 |
Lennart Poettering <lennart@poettering.net> |
resolved: properly handle MTU logic |
74b2466e14a1961bf3ac0e8a60cfaceec705bd59 |
|
16-Jul-2014 |
Lennart Poettering <lennart@poettering.net> |
resolved: add a DNS client stub resolver
Let's turn resolved into a something truly useful: a fully asynchronous
DNS stub resolver that subscribes to network changes.
(More to come: caching, LLMNR, mDNS/DNS-SD, DNSSEC, IDN, NSS module) |