Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Recursor 4.0.0 DNSSEC fixes #4162

Merged
merged 7 commits into from Jul 15, 2016

Commits on Jul 14, 2016

  1. Copy the full SHA
    e7b1888 View commit details
    Browse the repository at this point in the history
  2. Copy the full SHA
    adc1b25 View commit details
    Browse the repository at this point in the history
  3. Copy the full SHA
    9fc36e9 View commit details
    Browse the repository at this point in the history
  4. Copy the full SHA
    2276d8e View commit details
    Browse the repository at this point in the history
  5. Skip a level when a CNAME is found for the name

    If we'd encounter a CNAME when chasing for DS/DNSKEY, we followed it and
    concluded that the domain was bogus. We now skip this level and try to
    get a DS record for the next name.
    
    I'm unsure this is the correct solution, but it fixes PowerDNS#4158
    pieterlexis committed Jul 14, 2016
    Copy the full SHA
    19d1e7b View commit details
    Browse the repository at this point in the history
  6. Add test for PowerDNS#4158

    pieterlexis committed Jul 14, 2016
    Copy the full SHA
    694ef44 View commit details
    Browse the repository at this point in the history
  7. Add changelog entries

    pieterlexis committed Jul 14, 2016
    Copy the full SHA
    6a55699 View commit details
    Browse the repository at this point in the history