Willem Toorop
31e5cd5ab6
sldns update
2018-02-12 15:54:01 +01:00
Willem Toorop
9a4e389946
Better #ifdef select when to use X509_check_host
2018-02-12 15:46:42 +01:00
Willem Toorop
401aa2e3b8
Specify the supported curves with TLS
2018-02-12 15:40:17 +01:00
Willem Toorop
c3e4061fe2
hostname auth with libressl
2018-02-09 15:18:44 +01:00
Willem Toorop
b914b63e18
Merge branch 'feature/monitor-tool' into release/1.4.0
2018-02-08 14:06:40 +01:00
Willem Toorop
c033e3f1a3
Merge branch 'libressl' into release/1.4.0
2018-02-08 14:04:02 +01:00
Jim Hague
088d775117
In Keepalive test, send the maximum possible timeout value to the server.
...
The response will then show the server's value.
2018-02-08 12:35:45 +00:00
Willem Toorop
f7278ca696
Make getdns_server_mon work with libressl
2018-02-08 12:38:50 +01:00
Willem Toorop
8e8dd34e85
Merge branch 'release/1.4.0-merge-PR-377' into release/1.4.0
2018-02-08 12:07:34 +01:00
Willem Toorop
bf1f01c87e
Syntactic mod to minimizing changes with before PR
...
So changes are highlighted in side-by-side views.
2018-02-08 12:02:48 +01:00
Willem Toorop
7af885396f
Merge branch 'release/1.4.0' into release/1.4.0-merge-PR-377
2018-02-08 11:46:28 +01:00
Willem Toorop
87fec7f9b4
Merge branch 'feature/monitor-tool' into release/1.4.0
2018-02-07 17:11:28 +01:00
Willem Toorop
a72359e058
Comply to new style transport logging
2018-02-07 17:08:55 +01:00
Willem Toorop
7d4ccabc7f
Merge branch 'bugfix/opportunistic_fallabck' into release/1.4.0-merge-PR-377
2018-02-07 17:00:25 +01:00
Willem Toorop
ca7c2fe00e
Merge branch 'devel/spki_pinset_via_tlsa_checking' into release/1.4.0
2018-02-07 16:50:43 +01:00
Willem Toorop
0eba73a945
LibreSSL like OpenSSL < 1.0.2
2018-02-07 16:42:11 +01:00
Willem Toorop
c28a293c9f
"Pinset validation failure" error when it occurred
2018-02-07 14:38:31 +01:00
Willem Toorop
9c5a93bbdf
Merge branch 'develop' into devel/spki_pinset_via_tlsa_checking
2018-02-07 14:12:24 +01:00
Willem Toorop
e944203e55
Merge branch 'develop' of github.com:getdnsapi/getdns into develop
2018-02-07 13:50:53 +01:00
Willem Toorop
82c00eb0a5
version.bind CH TXT for getdns_query
2018-02-07 13:50:29 +01:00
Jim Hague
13d7a730ee
Further mitigate cache effects for OOOR by adding random label to delay lookup.
...
It turns out that delay.getdnsapi.net only pays attention to the left-most label.
2018-02-07 12:41:24 +00:00
wtoorop
7e915b0601
Merge pull request #379 from getdnsapi/devel/tcp-server-stability
...
Devel/tcp server stability
Thanks @maddie & @ArchangeGabriel
2018-02-02 10:44:55 +01:00
Jim Hague
a25f832d8a
Remove timeout argument from keepalive test.
...
The client doesn't send a timeout value to the server, so there's no point having this argument.
2018-02-01 16:04:22 +00:00
Willem Toorop
ec8b8ba903
One more fixing the fixes fix that slipped through
2018-01-31 14:41:13 +01:00
Willem Toorop
9bc98272a1
Fixing the fixes
2018-01-31 14:33:31 +01:00
Willem Toorop
97b056c355
Prevent erred TCP connection to be rescheduled ...
...
for reading (or writing) when an reply comes in.
Thanks Maddie!
2018-01-30 15:21:46 +01:00
Willem Toorop
1f401f7253
Do not return freed netreqs!
2018-01-30 12:40:47 +01:00
Willem Toorop
2e03d3799c
Memory leak on some TLS creation error cases
2018-01-30 12:23:23 +01:00
Jim Hague
3b5657e580
Reduce delay on OOOR delayed lookup.
...
A delay of 1000ms was causing frequent lookup timeouts e.g. on 9.9.9.9. We hypothesise that the delay causes an internal timeout in the server to fire. So reduce the delay to a smaller value that seems to leave the test working but reduces the incidence of timeouts.
We observe this still leaves timeouts on TLS connections to 9.9.9.9. These seem to occur only on TLS connections, and reducing the delay much further does not alter the observed behaviour. We guess there is something else going on there.
2018-01-29 10:17:54 +00:00
Sara Dickinson
7e3439efbc
Improve handling of opportunistic back-off. If other transports are working, don’t forcibly promote failed upstreams just wait for the re-try timer.
...
Clean up logs.
2018-01-24 13:13:14 +00:00
Jim Hague
1d211013e6
Update top level README to include getdns_server_mon in its outline of tools.
2018-01-23 17:55:15 +00:00
Willem Toorop
4f37d2b933
No wildcard expansions allowed for RRs used in DNSSEC proofs
...
Signatures of DNSKEYs, DSs, NSECs and NSEC3s can not be wildcard expansions when used with DNSSEC proofs.
Only direct queries for those types are allowed to be wildcard expansions.
This in response to https://unbound.net/downloads/CVE-2017-15105.txt , although getdns was not vulnerable for this specific issue.
2018-01-23 16:50:05 +01:00
Jim Hague
037f6039c8
Improve AsciiDoc table formatting.
2018-01-23 13:53:08 +00:00
Jim Hague
01ea1d6a22
Note TLS 1.3 is experimental. At least until we find a stable test server.
2018-01-23 13:47:31 +00:00
Jim Hague
b0661b9d9f
Add a tool README.
...
Use AsciiDoc for this, as the GitHub table support in Markdown is woeful. But AsciiDoc is always better than Markdown anyway.
2018-01-23 13:45:55 +00:00
Jim Hague
8ba53f10b6
Correct RTT warning and critical default thresholds.
2018-01-23 13:45:09 +00:00
Jim Hague
fcaa4f9845
Reflow usage message entry.
2018-01-23 12:37:14 +00:00
Jim Hague
f3b2f83879
More output tittivating. Make verbose by default in non-monitoring mode.
2018-01-23 12:14:40 +00:00
Jim Hague
a4f17760ab
Revise rcode_text() to get text from getdns, and add rrtype_text().
2018-01-23 12:13:59 +00:00
Jim Hague
7e884e2cd0
Rename concurrent to OOOR (Out Of Order Responses).
2018-01-23 11:30:12 +00:00
Jim Hague
bedd3a02cf
Revise concurrency test to use <n>.delay.getdnsapi.net.
...
This gives more secure results than the previous method.
2018-01-22 17:39:25 +00:00
Jim Hague
1e774a95f5
Don't rely on GCC extensions.
2018-01-22 16:49:53 +00:00
Jim Hague
8c3047dbe0
Add 'concurrent' test
...
The concurrent test works by sending a known good query synchronously,
and then sending asynchronous queries for three random TLDs followed by
the known good query. The latter should be answerable from cache, and so
give a result before at least one of the random TLDs.
2018-01-22 16:49:53 +00:00
Willem Toorop
d38f233a80
Track readbuf free's
...
As tcp_connection_destroy() might be called more than once per connection (depending on outstanding work)
2018-01-22 16:56:48 +01:00
Jim Hague
f9e4c9f853
Revise output.
...
If in monitoring mode, make output conform to Nagios norms. This starts with the probe type and result, so we need to save output generated during the operation and print it at the end.
If not in monitoring mode, make the formatting more expansive.
2018-01-22 14:36:54 +00:00
Jim Hague
0291e205fd
Add TLS 1.3 test.
...
Add a new item tls_version to call_reporting, containing the OpenSSL version string for the name of the protocol used for the connection.
The test does a normal lookup, but first sets the cipher list to TLS1.3 only ciphers. This will cause a Bad Context error at search time, so we can tell if the underlying OpenSSL library lacks TLS 1.3. The check the call reporting for a TLS version of "TLSv1.3".
2018-01-19 15:56:40 +00:00
Jim Hague
62ad159f15
Update dnssec-validate. Check we can retrieve info for bogus domain, and remove must use TCP flag.
...
Run a second query with the CD bit set and check that succeeds.
2018-01-19 14:51:46 +00:00
Jim Hague
3fd4f7f240
Add 'dnssec-validate' test.
...
This test checks whether the server does DNSSEC validation. If it manages to find an A record for dnssec-failed.org, it doesn't.
2018-01-19 14:51:46 +00:00
Jim Hague
1a3025a405
If server does not return expected TXT in qname-min, return UNKNOWN not WARNING.
2018-01-18 17:17:16 +00:00
Jim Hague
ea035fa82e
Correct some code formatting.
2018-01-18 17:16:28 +00:00