Commit graph

38 commits

Author SHA1 Message Date
Kim Alvefur
869581384d net: Prefix module imports with prosody namespace 2023-03-17 16:23:12 +01:00
Kim Alvefur
d257416abe net.resolvers.basic: Record hostname coming from secure SRV records
Will be useful even later...
2022-12-22 00:11:23 +01:00
Kim Alvefur
79f4868b63 net.resolvers.basic: Add opt-out argument for DNSSEC security status
This makes explicit which lookups can accept an unsigned response.

Insecure (unsigned, as before DNSSEC) A and AAAA records can be used as
security would come from TLS, but an insecure TLSA record is worthless.
2022-08-02 16:08:43 +02:00
Matthew Wild
860f7d6b7d net.resolvers.basic: Fix incorrect field name (thanks CI) 2022-03-18 20:14:20 +00:00
Matthew Wild
6050cd0da5 net.resolvers.basic: Indicate to callback if we have more targets available 2022-03-18 16:13:09 +00:00
Matthew Wild
3c5d7eaef1 net.resolvers.basic: Alternate IP address family targets, per RFC 8305 2022-03-18 16:10:26 +00:00
Matthew Wild
668bd38c71 net.resolvers.basic: Refactor to remove code duplication
...and prepare for Happy Eyeballs
2022-03-18 16:09:22 +00:00
Kim Alvefur
e469d015af net.resolvers: Report DNSSEC validation errors instead of NoError
Thanks Martin bringing this case to attention
2021-12-28 14:58:09 +01:00
Kim Alvefur
96b6f68b23 net.resolvers: Report when hostname fails IDNA
Not a particularly user-friendly error message, but better than "unable
to resolve service" and having no clue where it came from.
2021-12-07 21:43:36 +01:00
Kim Alvefur
93121127fa net.connect: Propagate last error message from resolvers
Previously it would only say "unable to resolve server" for all DNS
problems. While "NoError in A lookup" might not make much sense to
users, it should help in debugging more than the previous generic error.

Friendlier errors will be future work.
2021-11-12 16:52:55 +01:00
Kim Alvefur
360eda6cd3 Revert 926d53af9a7a: Restore DANE support
Previous commit adds a workaround, so this doesn't mutate global state
anymore, only per-connection 'extra' state as originally intended.
2021-07-18 21:57:24 +02:00
Kim Alvefur
409c611a37 net.resolvers.basic: Fix completion condition when IPv6 is disabled
Fixes mistake introduced in 5a71f14ab77c that made it so this ready()
newer got called and thus it would be stuck waiting for it.

Looks like the kind of thing that could have been introduced by a merge
or rebase.

Thanks MattJ
2021-03-15 23:09:42 +01:00
Kim Alvefur
3559d707bf net.resolvers.basic: Disable DANE for now, completely broken
Turns out 'extra' is, at least for mod_s2s, the same table for *all*
connections.
2021-03-03 20:48:54 +01:00
Kim Alvefur
60ec880c48 net.resolvers.basic: Don't enable DANE with zero TLSA records
Turns out it doesn't work with zero.
2021-03-03 18:42:54 +01:00
Kim Alvefur
63c92d0897 net.connect: Add DANE support
Disabled DANE by default, since it needs extra steps to be useful.  The
built-in DNS stub resolver does not support DNSSEC so having DANE
enabled by default only leads to an extra wasted DNS request.
2021-03-02 22:41:59 +01:00
Matthew Wild
a2ef355d20 Merge 0.11->trunk 2020-07-10 13:01:17 +01:00
Matthew Wild
a80cdecc46 net.resolvers.basic: Default conn_type to 'tcp' consistently if unspecified (thanks marc0s)
Fixes a traceback when passed an IP address with no conn_type.
2020-07-10 13:00:02 +01:00
Kim Alvefur
300a9a56c5 net.resolvers: Remove FIXMEs obsoleted by switch to libunbound 2020-06-25 19:24:58 +02:00
Kim Alvefur
7b89ab9b86 net.connect: Remove TODO about use_ipv4/6 done in 3bfb20be844c 2020-06-22 01:42:18 +02:00
Kim Alvefur
6137789b45 net.resolvers.basic: Fix continuing if IPv6 or Legacy IP is disabled
The code expects ready() to be called twice, but with IPv4 or v6
disabled it would only be called once.
2020-01-26 14:35:35 +01:00
Matthew Wild
d1fbb9197f net.resolvers.basic: Obey extra.use_ipv4/use_ipv6 2020-01-25 14:38:17 +00:00
Matthew Wild
b20f96afc1 net.resolvers.basic: Obey use_ipv4/use_ipv6 2020-01-25 14:03:30 +00:00
Kim Alvefur
9d5c3cb856 net.connect: Mention RFC 6724 regression
Default Address Selection algorithm is not applied, resulting in a
strong bias towards IPv4.
2019-12-07 17:39:29 +01:00
Kim Alvefur
40ffc88bad net.connect: Add some TODOs and FIXMEs
And mention issue numbers: #1246, #1428 and #1429
2019-12-07 17:05:00 +01:00
Kim Alvefur
10aa40227b Merge 0.11->trunk 2019-11-24 04:46:36 +01:00
Kim Alvefur
c3581958f7 net.resolvers.basic: Normalise IP literals, ensures net.server is happy 2019-11-24 04:41:07 +01:00
Kim Alvefur
42b9614fe2 Merge 0.11->trunk 2019-11-24 04:30:32 +01:00
Kim Alvefur
9c9722935a net.resolvers.basic: Fix resolution of IPv6 literals (in brackets) (fixes #1459) 2019-11-24 04:26:44 +01:00
Kim Alvefur
7c056be161 net.resolvers.basic: Move IP literal check to constructor
This is to prepare for fixing #1459. An IPv6 literal in [ ] brackets
does not pass IDNA and resolving it fails there.
2019-11-24 04:23:51 +01:00
Kim Alvefur
2a8b031b75 net.resolvers: Fix traceback from hostname failing IDNA
Related to #1426
2019-11-08 00:54:56 +01:00
Kim Alvefur
9c2a74d09c net.resolvers: Abort on hostnames not passing IDNA validation
Prevents error on trying to use nil.

Needs better error reporting in the future.
2019-11-02 19:36:19 +01:00
Kim Alvefur
ba431b5efc net.resolvers: Apply IDNA conversion to ascii for DNS lookups (fixes #1426) 2019-11-02 19:24:26 +01:00
Kim Alvefur
03197f584d Merge 0.11->trunk 2019-11-08 00:58:03 +01:00
Kim Alvefur
690775a9b4 Merge 0.11->trunk 2019-11-02 19:38:12 +01:00
Kim Alvefur
83e1a2af50 net.resolvers.basic: Suffix IPv4 TCP socket types with '4' to match eg 'tcp6' 2018-10-12 16:25:30 +02:00
Kim Alvefur
5cb2160a0b net.resolvers.basic: Support IP address literals 2018-05-02 19:06:59 +02:00
Matthew Wild
c27281a720 net.connect: New API for outgoing connections, based on 'service resolvers' 2018-02-23 15:53:45 +00:00
Kim Alvefur
2b289f34f9 various: Don't rely on _G.unpack existing 2018-12-08 17:09:55 +01:00