#
335482ab |
| 19-Mar-2024 |
tb <tb@openbsd.org> |
Rename parent to issuer in struct auth
Parent is confusing and issuer is the appropriate terminology. This is a mechanical diff. The only remaining uses of 'parent' in this code base now mean 'paren
Rename parent to issuer in struct auth
Parent is confusing and issuer is the appropriate terminology. This is a mechanical diff. The only remaining uses of 'parent' in this code base now mean 'parent process'.
discussed with beck and job ok job
show more ...
|
#
4032f119 |
| 27-Dec-2023 |
tb <tb@openbsd.org> |
Rework the warnings on internet resources
Unify the printing of warnings about AS numbers and IP address blocks to use a call to as_warn() and ip_warn(). Fix a bug in the latter where the upper boun
Rework the warnings on internet resources
Unify the printing of warnings about AS numbers and IP address blocks to use a call to as_warn() and ip_warn(). Fix a bug in the latter where the upper bound of an IP range didn't take the RFC 3779 encoding into account and passed the address directly to inet_pton() rather than filling the missing bits with 1. Switch the argument order to match the warnings and tweak some warning messages.
ok claudio job
show more ...
|
#
76dbb2b6 |
| 18-Oct-2023 |
tb <tb@openbsd.org> |
rpki-client: move inherit in {ip,as}_warn()
While alphabetic order makes sense, having inherit between individual AS and IP entries and ranges makes little sense. Use the order that we have elsewher
rpki-client: move inherit in {ip,as}_warn()
While alphabetic order makes sense, having inherit between individual AS and IP entries and ranges makes little sense. Use the order that we have elsewhere.
ok claudio job
show more ...
|
#
8b5bbbc5 |
| 18-Oct-2023 |
tb <tb@openbsd.org> |
rpki-client: rework ip_addr_check_overlap()
Avoid conditional early returns and significantly simplify the printing of ip addresses/ranges by using the new ip_warn(). This also eliminates an extreme
rpki-client: rework ip_addr_check_overlap()
Avoid conditional early returns and significantly simplify the printing of ip addresses/ranges by using the new ip_warn(). This also eliminates an extremely weird usage of the comma operator and reduces noise levels quite a bit.
ok claudio job
show more ...
|
#
891d6bce |
| 13-Oct-2023 |
job <job@openbsd.org> |
Allow imposing constraints on RPKI trust anchors
The ability to constrain a RPKI Trust Anchor's effective signing authority to a limited set of Internet Number Resources allows Relying Parties to en
Allow imposing constraints on RPKI trust anchors
The ability to constrain a RPKI Trust Anchor's effective signing authority to a limited set of Internet Number Resources allows Relying Parties to enjoy the potential benefits of assuming trust, within a bounded scope.
Some examples: ARIN does not support inter-RIR IPv6 transfers, so it wouldn't make any sense to see a ROA subordinate to ARIN's trust anchor covering RIPE-managed IPv6 space. Conversely, it wouldn't make sense to observe a ROA covering ARIN-managed IPv6 space under APNIC's, LACNIC's, or RIPE's trust anchor - even if a derived trust arc (a cryptographically valid certificate path) existed. Along these same lines, AFRINIC doesn't support inter-RIR transfers of any kind, and none of the RIRs have authority over private resources like 10.0.0.0/8 and 2001:db8::/32.
For more background see: https://datatracker.ietf.org/doc/draft-snijders-constraining-rpki-trust-anchors/ https://mailman.nanog.org/pipermail/nanog/2023-September/223354.html
With and OK tb@, OK claudio@
show more ...
|
#
782a58ff |
| 25-Sep-2023 |
job <job@openbsd.org> |
Introduce ip_addr_range_print() to avoid code repetition
OK tb@
|
#
77e4b1bd |
| 29-Nov-2022 |
job <job@openbsd.org> |
Only include stdarg.h, if we call any of va_{start,end}()
OK tb@
|
#
cd1c3779 |
| 29-Nov-2022 |
job <job@openbsd.org> |
Only include assert.h if we call assert()
OK tb@
|
#
e89c20d8 |
| 15-May-2022 |
tb <tb@openbsd.org> |
More KNF and whitespace fixes.
|
#
5ddaa218 |
| 15-May-2022 |
deraadt <deraadt@openbsd.org> |
whitespace spotted during read-thru
|
#
9eb589bc |
| 13-May-2022 |
tb <tb@openbsd.org> |
Fix unused bits handling for ip addresses
If ASN1_STRING_FLAG_BITS_LEFT is set, only the lower three bits of the flags represent the unused bits. Other flags have nothing to with lengths, so stop in
Fix unused bits handling for ip addresses
If ASN1_STRING_FLAG_BITS_LEFT is set, only the lower three bits of the flags represent the unused bits. Other flags have nothing to with lengths, so stop interpreting them as such and throwing strange errors.
ok claudio
show more ...
|
#
1377f46c |
| 11-May-2022 |
tb <tb@openbsd.org> |
Zap stray space
|
#
6822deef |
| 26-Dec-2021 |
tb <tb@openbsd.org> |
fix spelling of inheritance
|
#
83e5a181 |
| 10-Nov-2021 |
claudio <claudio@openbsd.org> |
Collaps the AFI specific IP print functions into ip_addr_print() their only difference was the buffersize and AF argument to inet_ntop. Use INET6_ADDRSTRLEN as the buffer size and convert the AFI to
Collaps the AFI specific IP print functions into ip_addr_print() their only difference was the buffersize and AF argument to inet_ntop. Use INET6_ADDRSTRLEN as the buffer size and convert the AFI to AF in a switch statement. OK denis@ kn@ deraadt@
show more ...
|
#
4ef6f693 |
| 05-Nov-2021 |
claudio <claudio@openbsd.org> |
Simplify how IP addresses and AS numbers are passed between processes. Since they are stored in an array just blast the full array in and out of the io buffers at once instead of iterating element by
Simplify how IP addresses and AS numbers are passed between processes. Since they are stored in an array just blast the full array in and out of the io buffers at once instead of iterating element by element. It also allows to remove a lot of extra code. OK benno@ job@
show more ...
|
#
7eb79a4a |
| 23-Oct-2021 |
claudio <claudio@openbsd.org> |
Finnally move away from blocking reads in rpki-client. The code was a mish mash of poll, non-blocking writes and blocking reads. Using the introduced ibuf size header in io_buf_new()/io_buf_close() t
Finnally move away from blocking reads in rpki-client. The code was a mish mash of poll, non-blocking writes and blocking reads. Using the introduced ibuf size header in io_buf_new()/io_buf_close() the read side can be changed to pull in a full ibuf and only start the un-marshal once all data has been read. OK benno@
show more ...
|
#
95b65f7c |
| 19-Apr-2021 |
deraadt <deraadt@openbsd.org> |
code review results in KNF, and moving local variables into lowest scope ok claudio
|
#
cdf38902 |
| 29-Mar-2021 |
deraadt <deraadt@openbsd.org> |
Check all inet_ntop() calls, in case we screw up the parameters somehow we prefer a failure rather than some sort of weird truncation ok claudio
|
#
039499fc |
| 29-Mar-2021 |
deraadt <deraadt@openbsd.org> |
3 additional snprintf() range checks (inconceivable these would ever truncate, but if they do, we prefer to know) ok job claudio
|
#
08db1177 |
| 08-Jan-2021 |
claudio <claudio@openbsd.org> |
Start using the ibuf API (ibuf_dynamic, ibuf_add, ibuf_close) for writing data between processes. This completely decouples the write side. rpki-client can't really use the imsg framework but it can
Start using the ibuf API (ibuf_dynamic, ibuf_add, ibuf_close) for writing data between processes. This completely decouples the write side. rpki-client can't really use the imsg framework but it can use the ibuf bits wich imsg is built on. OK benno@ job@
show more ...
|
#
0102fb1b |
| 12-Sep-2020 |
claudio <claudio@openbsd.org> |
Include openssl/x509.h in extern.h since it uses a few of the typedefs from there in structs and prototypes. Remove the openssl/ssl.h and other strange openssl includes in the .c files that don't use
Include openssl/x509.h in extern.h since it uses a few of the typedefs from there in structs and prototypes. Remove the openssl/ssl.h and other strange openssl includes in the .c files that don't use openssl specific functions. OK beck@ and tb@
show more ...
|
#
fac5751d |
| 16-Apr-2020 |
claudio <claudio@openbsd.org> |
It is unclear why data is memcpy-ed into a char buf[2] that is used as argument to ntohs(). Just memcpy to a uint16_t value and ntohs this value. Fixes possible alignment issues as reported by newer
It is unclear why data is memcpy-ed into a char buf[2] that is used as argument to ntohs(). Just memcpy to a uint16_t value and ntohs this value. Fixes possible alignment issues as reported by newer gcc compilers. OK beck@
show more ...
|
#
fd8880f6 |
| 16-Apr-2020 |
claudio <claudio@openbsd.org> |
Revert last commit, this file slipped in.
|
#
541ce356 |
| 16-Apr-2020 |
claudio <claudio@openbsd.org> |
Replace deprecated ERR_remove_state(0) with ERR_remove_thread_state(NULL); OK tb@
|
#
60b5b204 |
| 27-Nov-2019 |
deraadt <deraadt@openbsd.org> |
swap some comparisons
|