b26fa1a2fbcfee7d03b0c8fd15ec3aa64ae70b9f |
|
10-Feb-2016 |
Daniel Mack <daniel@zonque.org> |
tree-wide: remove Emacs lines from all files
This should be handled fine now by .dir-locals.el, so need to carry that
stuff in every file. |
0cf40f5527501f80044c1a2612781dd552d46591 |
|
18-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved add dns_name_apply_idna() to convert a domain name into its IDNA equivalent |
b9282bc12840aff500a334836226f6b8df24926d |
|
17-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved: on negative NODATA replies, properly deal with empty non-terminals
empty non-terminals generally lack NSEC RRs, which means we can deduce their existance only from the fact that there
are other RRs that contain them in their suffix. Specifically, the NSEC proof for NODATA on ENTs works by sending the
NSEC whose next name is a suffix of the queried name to the client. Use this information properly. |
97c67192eadaffe67b803ec5b991a92bb1137d0b |
|
17-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved: when validating an RRset, store information about the synthesizing source and zone in each RR
Having this information available is useful when we need to check whether various RRs are suitable for proofs. This
information is stored in the RRs as number of labels to skip from the beginning of the owner name to reach the
synthesizing source/signer. Simple accessor calls are then added to retrieve the signer/source from the RR using this
information.
This also moves validation of a a number of RRSIG parameters into a new call dnssec_rrsig_prepare() that as side-effect
initializes the two numeric values. |
eb241cdbeea092d891137c018cacf919a895e6a6 |
|
13-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
shared: add new dns_name_startswith() call
dns_name_startswith() is to dns_name_endswith() as startswith() is to endswith(). |
db5b0e92b3c23e6f360bd0f44a655b35921a6c98 |
|
26-Dec-2015 |
Lennart Poettering <lennart@poettering.net> |
resolved: tighten search for NSEC3 RRs a bit
Be stricter when searching suitable NSEC3 RRs for proof: generalize the
check we use to find suitable NSEC3 RRs, in nsec3_is_good(), and add
additional checks, such as checking whether all NSEC3 RRs use the same
parameters, have the same suffix and so on. |
e7ff0e0b391341bdc4d9c08dff1c477e1df6a682 |
|
26-Dec-2015 |
Lennart Poettering <lennart@poettering.net> |
resolved: properly implement RRSIG validation of wildcarded RRsets
Note that this is still not complete, one additional step is still
missing: when we verified that a wildcard RRset is properly signed, we
still need to do an NSEC/NSEC3 proof that no more specific RRset exists. |
f7455baa01805f2f0904de8cfe51362dc220be49 |
|
18-Dec-2015 |
Lennart Poettering <lennart@poettering.net> |
shared: add dns_name_parent() call to determine parent domain of a domain |
a8fbdf5424be099ba1b2b1ec261c02b8759d6b0c |
|
06-Dec-2015 |
Thomas Hindoe Paaboel Andersen <phomes@gmail.com> |
shared: include what we use
The next step of a general cleanup of our includes. This one mostly
adds missing includes but there are a few removals as well. |
2b442ac87838be7c326c984d8751c96dee7258ab |
|
02-Dec-2015 |
Lennart Poettering <lennart@poettering.net> |
resolved: add basic DNSSEC support
This adds most basic operation for doing DNSSEC validation on the
client side. However, it does not actually add the verification logic to
the resolver. Specifically, this patch only includes:
- Verifying DNSKEY RRs against a DS RRs
- Verifying RRSets against a combination of RRSIG and DNSKEY RRs
- Matching up RRSIG RRs and DNSKEY RRs
- Matching up RR keys and RRSIG RRs
- Calculating the DNSSEC key tag from a DNSKEY RR
All currently used DNSSEC combinations of SHA and RSA are implemented. Support
for MD5 hashing and DSA or EC cyphers are not. MD5 and DSA are probably
obsolete, and shouldn't be added. EC should probably be added
eventually, if it actually is deployed on the Internet. |
3cd03457bd3546a9d54a17bc00dae2058b43081b |
|
02-Dec-2015 |
Lennart Poettering <lennart@poettering.net> |
util-lib: update dns_name_to_wire_format() to optionally generate DNSSEC canonical names
We'll need this later when putting together RR serializations to
checksum. |
1dfbf0007af3023c2e3ae8282a0d0f229f3a89e3 |
|
30-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
dns-domain: don't accept overly long hostnames
Make sure dns_name_normalize(), dns_name_concat(), dns_name_is_valid()
do not accept/generate invalidly long hostnames, i.e. longer than 253
characters. |
3b37fa735224e58fcc23c737b764d13e22c2885b |
|
30-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
dns-domain: be more strict when encoding/decoding labels
Labels of zero length are not OK, refuse them early on. The concept of a
"zero-length label" doesn't exist, a zero-length full domain name
however does (representing the root domain). See RFC 2181, Section 11. |
422baca0f230913158078fddf884e06c8c64a316 |
|
25-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
dns-domain: rework dns_label_escape() to not imply memory allocation
The new dns_label_escape() call now operates on a buffer passed in,
similar to dns_label_unescape(). This should make decoding a bit faster,
and nicer. |
7e8131e9c6c150732503899a092206578fdc13de |
|
25-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
dns-domain: change dns_srv_type_is_valid() return value to bool
For similar reasons as dns_name_is_root() got changed in the previous
commit. |
dc477e7385e8ab29efb8fadb72ec994077a105c6 |
|
25-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
dns-domain: simplify dns_name_is_root() and dns_name_is_single_label()
Let's change the return value to bool. If we encounter an error while
parsing, return "false" instead of the actual parsing error, after all
the specified hostname does not qualify for what the function is
supposed to test.
Dealing with the additional error codes was always cumbersome, and
easily misused, like for example in the DHCP code.
Let's also rename the functions from dns_name_root() to
dns_name_is_root(), to indicate that this function checks something and
returns a bool. Similar for dns_name_is_signal_label(). |
97f1b2f35478fe8aee5d18dac1a1aa2bb16e6fec |
|
25-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
dns-domain: remove prototype for function that doesn't exist |
58db254ade4fb2ef77de68f28c4f13814819f6a1 |
|
24-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
resolved: implement client-side DNAME resolution
Most servers apparently always implicitly convert DNAME to CNAME, but
some servers don't, hence implement this properly, as this is required
by edns0. |
0e8eedbb490b8928d4fa4e33f565a3cda5013018 |
|
23-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
dns-domain: add calls to join/split SRV/DNS-SD service domains
This adds dns_service_join() and dns_service_split() which may be used
to concatenate a DNS-SD service name, am SRV service type string, and a
domain name into a full resolvable DNS domain name string. If the
service name is specified as NULL, only the type and domain are
appended, to implement classic, non-DNS-SD SRV lookups.
The reverse is dns_service_split() which takes the full name, and split
it into the three components again. |
0a49b6b6dce3a756bd8c4d458a34c2d8035ae99d |
|
23-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
dns-domain: add code for verifying validity of DNS-SD service names and types |
54adabf727fbcf1a4f49b59362e92b79da1082f1 |
|
17-Nov-2015 |
Beniamino Galvani <bgalvani@redhat.com> |
dns-domain: add dns_name_to_wire_format()
The function converts a domain name string to the wire format
described in RFC 1035 Section 3.1. |
b826ab586c9e0a9c0d438a75c28cf3a8ab485929 |
|
05-Oct-2015 |
Tom Gundersen <teg@jklm.no> |
hashmap: refactor hash_func
All our hash functions are based on siphash24(), factor out
siphash_init() and siphash24_finalize() and pass the siphash
state to the hash functions rather than the hash key.
This simplifies the hash functions, and in particular makes
composition simpler as calling siphash24_compress() repeatedly
on separate chunks of input has the same effect as first
concatenating the input and then calling siphash23_compress()
on the result. |
9ca45586e67c6d061d0db7bdf5b05d30e37e368d |
|
21-Aug-2015 |
Lennart Poettering <lennart@poettering.net> |
dns-domain: add call for concatenating two domain names
This is specifically useful for appending the mDNS ".local" suffix to a
single-label hostname in the most correct way. (used in later commit) |
ae72b22c40569de7dba810073ea9da299491ef60 |
|
28-Jul-2015 |
Tom Gundersen <teg@jklm.no> |
shared: dns-name - add dns_name_between()
Given three DNS names this function indicates if the second argument lies
strictly between the first and the third according to the canonical DNS
name order. Note that the order is circular, so the last name is
considered to be before the first. |
642900d3fa479c01d29ebe8268746d06d1c63703 |
|
28-Jul-2015 |
Tom Gundersen <teg@jklm.no> |
shared: dns-name - introduce dns_label_unescape_suffix()
Intended to be called repeatedly, and returns then successive unescaped labels
from the most to the least significant (left to right).
This is slightly inefficient as it scans the string three times (two would be
sufficient): once to find the end of the string, once to find the beginning
of each label and lastly once to do the actual unescaping. The latter two
could be done in one go, but that seemed unnecessarily convoluted. |
df6cfeeff7b66856dd20956efe97d87faf8ce1c3 |
|
10-Jun-2015 |
Nick Owens <nick.owens@coreos.com> |
shared: add convenience function for validating dns names |
4ad7f2761da661853dcc29d542efb4727abb1101 |
|
10-Jun-2015 |
Nick Owens <nick.owens@coreos.com> |
resolve: move dns routines into shared |