Willem Toorop
2a0114591a
Resolve compile warnings
...
Thanks Andreas!
2021-06-03 20:45:55 +02:00
Willem Toorop
3c6756d68b
Issue #466 : Memory leak with retrying queries
...
(for examples with search paths).
Thanks doublez13.
2020-03-13 22:31:01 +01:00
Jim Hague
e00a79a240
Remove autoconf build and update to autoconf-less Stubby.
2019-11-01 12:27:10 +00:00
Jim Hague
a2d09d2be5
Fix type warning on Windows.
2019-10-15 16:56:34 +01:00
Willem Toorop
754d65eb6d
Correct dependencies
2019-03-15 16:58:10 +01:00
Willem Toorop
324370c537
GnuTLS with Zero configuration DNSSEC
2019-03-15 16:50:10 +01:00
Havard Eidnes
c68f5a7a8d
Fix various build warnings uncovered on NetBSD w/pkgsrc.
...
The isxxxx() and toxxxx() functions have a limited well-defined
input value range, namely that of "unsigned char" plus EOF. Cast
args accordingly.
Bring strncasecmp() into scope by including <strings.h>.
2019-01-28 11:24:10 +01:00
Willem Toorop
cad7eb2461
Probably the strlcpy
2019-01-23 14:06:04 +01:00
Willem Toorop
f72fe60035
Cannot reuse qname (via name) after read_line_cb..
...
.. returns.
2019-01-23 13:55:29 +01:00
Willem Toorop
d71dccaf2c
- Nested getdns_context_runt() prevention
...
- Fix address query with qname and missing qtype for -I and -F too
- disable tiny delay again
2019-01-23 12:43:20 +01:00
Willem Toorop
8980f5f5ee
Fix nested scheduling with getdns_query -F and -I
...
+ add 1 millisecond delay between batched queries, just because...
2019-01-23 11:41:00 +01:00
Jim Hague
3fe0c94357
Merge branch 'develop' into feature/abstract-tls
2019-01-14 19:09:20 +00:00
Jim Hague
b0c057e8ae
Update dependencies for GnuTLS.
...
In practice a 'make depend' is required before building with either OpenSSL or GnuTLS.
2018-12-06 16:35:43 +00:00
Jim Hague
46c49cbcfe
Modify getdns_server_mon to use GnuTLS or OpenSSL.
...
Untested.
2018-12-06 16:32:20 +00:00
Willem Toorop
ea55b12a08
getdns_query for addresses with qname but no qtype
2018-12-03 14:52:58 +01:00
Willem Toorop
c1f51815ba
RFE #408 : "dnssec" extension requiring DNSSEC
...
When this extension is set, GETDNS_DNSSEC_INDETERMINATE status will no
longer be returned.
2018-11-30 14:20:12 +01:00
Jim Hague
aba0e2fb4c
Move non-TLS-library specific parts of tls.h to ~/src/tls.h and have it include lib-specific tls-internal.h.
...
Update dependencies.
2018-11-19 09:49:54 +00:00
Willem Toorop
9b4e8e9e91
X509_get_notAfter not in OpenSSL 1.1.1 anymore
2018-06-12 16:37:46 +02:00
Daniel Kahn Gillmor
9301f8970c
Fix minor spelling and formatting.
...
These issues were found with the codespell tool.
2018-02-23 14:12:11 -08:00
Willem Toorop
b914b63e18
Merge branch 'feature/monitor-tool' into release/1.4.0
2018-02-08 14:06:40 +01:00
Jim Hague
088d775117
In Keepalive test, send the maximum possible timeout value to the server.
...
The response will then show the server's value.
2018-02-08 12:35:45 +00:00
Willem Toorop
f7278ca696
Make getdns_server_mon work with libressl
2018-02-08 12:38:50 +01:00
Willem Toorop
87fec7f9b4
Merge branch 'feature/monitor-tool' into release/1.4.0
2018-02-07 17:11:28 +01:00
Willem Toorop
9c5a93bbdf
Merge branch 'develop' into devel/spki_pinset_via_tlsa_checking
2018-02-07 14:12:24 +01:00
Willem Toorop
82c00eb0a5
version.bind CH TXT for getdns_query
2018-02-07 13:50:29 +01:00
Jim Hague
13d7a730ee
Further mitigate cache effects for OOOR by adding random label to delay lookup.
...
It turns out that delay.getdnsapi.net only pays attention to the left-most label.
2018-02-07 12:41:24 +00:00
Jim Hague
a25f832d8a
Remove timeout argument from keepalive test.
...
The client doesn't send a timeout value to the server, so there's no point having this argument.
2018-02-01 16:04:22 +00:00
Jim Hague
3b5657e580
Reduce delay on OOOR delayed lookup.
...
A delay of 1000ms was causing frequent lookup timeouts e.g. on 9.9.9.9. We hypothesise that the delay causes an internal timeout in the server to fire. So reduce the delay to a smaller value that seems to leave the test working but reduces the incidence of timeouts.
We observe this still leaves timeouts on TLS connections to 9.9.9.9. These seem to occur only on TLS connections, and reducing the delay much further does not alter the observed behaviour. We guess there is something else going on there.
2018-01-29 10:17:54 +00:00
Jim Hague
037f6039c8
Improve AsciiDoc table formatting.
2018-01-23 13:53:08 +00:00
Jim Hague
01ea1d6a22
Note TLS 1.3 is experimental. At least until we find a stable test server.
2018-01-23 13:47:31 +00:00
Jim Hague
b0661b9d9f
Add a tool README.
...
Use AsciiDoc for this, as the GitHub table support in Markdown is woeful. But AsciiDoc is always better than Markdown anyway.
2018-01-23 13:45:55 +00:00
Jim Hague
8ba53f10b6
Correct RTT warning and critical default thresholds.
2018-01-23 13:45:09 +00:00
Jim Hague
fcaa4f9845
Reflow usage message entry.
2018-01-23 12:37:14 +00:00
Jim Hague
f3b2f83879
More output tittivating. Make verbose by default in non-monitoring mode.
2018-01-23 12:14:40 +00:00
Jim Hague
a4f17760ab
Revise rcode_text() to get text from getdns, and add rrtype_text().
2018-01-23 12:13:59 +00:00
Jim Hague
7e884e2cd0
Rename concurrent to OOOR (Out Of Order Responses).
2018-01-23 11:30:12 +00:00
Jim Hague
bedd3a02cf
Revise concurrency test to use <n>.delay.getdnsapi.net.
...
This gives more secure results than the previous method.
2018-01-22 17:39:25 +00:00
Jim Hague
1e774a95f5
Don't rely on GCC extensions.
2018-01-22 16:49:53 +00:00
Jim Hague
8c3047dbe0
Add 'concurrent' test
...
The concurrent test works by sending a known good query synchronously,
and then sending asynchronous queries for three random TLDs followed by
the known good query. The latter should be answerable from cache, and so
give a result before at least one of the random TLDs.
2018-01-22 16:49:53 +00:00
Jim Hague
f9e4c9f853
Revise output.
...
If in monitoring mode, make output conform to Nagios norms. This starts with the probe type and result, so we need to save output generated during the operation and print it at the end.
If not in monitoring mode, make the formatting more expansive.
2018-01-22 14:36:54 +00:00
Jim Hague
0291e205fd
Add TLS 1.3 test.
...
Add a new item tls_version to call_reporting, containing the OpenSSL version string for the name of the protocol used for the connection.
The test does a normal lookup, but first sets the cipher list to TLS1.3 only ciphers. This will cause a Bad Context error at search time, so we can tell if the underlying OpenSSL library lacks TLS 1.3. The check the call reporting for a TLS version of "TLSv1.3".
2018-01-19 15:56:40 +00:00
Jim Hague
62ad159f15
Update dnssec-validate. Check we can retrieve info for bogus domain, and remove must use TCP flag.
...
Run a second query with the CD bit set and check that succeeds.
2018-01-19 14:51:46 +00:00
Jim Hague
3fd4f7f240
Add 'dnssec-validate' test.
...
This test checks whether the server does DNSSEC validation. If it manages to find an A record for dnssec-failed.org, it doesn't.
2018-01-19 14:51:46 +00:00
Jim Hague
1a3025a405
If server does not return expected TXT in qname-min, return UNKNOWN not WARNING.
2018-01-18 17:17:16 +00:00
Jim Hague
ea035fa82e
Correct some code formatting.
2018-01-18 17:16:28 +00:00
Jim Hague
add818fea2
Remove dependency on timegm() when using OpenSSL < 1.0.2.
...
Convert dates to Julian and diff. This is basically what ASN1_TIME_diff() does internally.
And that's quite enough near-pointless polishing here.
2018-01-18 10:55:44 +00:00
Jim Hague
00c17dca14
Add to certificate time conversion to cope with pre-1.0.2 OpenSSL. Also tag printed time with UTC.
...
The time parse with pre-1.0.2 is a best effort, and relies on timegm() to convert struct tm in UTC to time_t. There being attractive alternative. Isn't C time handling grotty?
2018-01-17 18:38:28 +00:00
Jim Hague
760269acbd
Make internal types POSIX-compliant by not naming them *_t.
...
See: http://pubs.opengroup.org/onlinepubs/9699919799/xrat/V4_xsh_chap02.html#tag_22_02_12_01
The change tacitly ignores the colossal number of coach and horses the entire world, including getdns, has stampeded through this POSIX hope for decades, but simply hopes for some small recognition when the Recording Angel tots up the damages.
2018-01-17 15:35:56 +00:00
Jim Hague
6bd0f8b980
Encode exit status words in () to make it clear that it's not part of the sentence.
...
'Server validates OK' -> 'Server validates (OK)'
2018-01-17 15:24:17 +00:00
Jim Hague
3666d994a7
Add 'keepalive' test and supporting changes to getdns library.
...
Checking for server support for keepalive means we need to know if the server did send a keepalive option to the client. This information is not currently exposed in getdns, so add a flag 'server_keepalive_received' to call_reporting. This is 0 if not received, 1 if received. If received, the actual timeout is in 'idle timeout in ms', though watch out for the overflow alternative.
2018-01-17 15:17:20 +00:00