Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
D
Dnsmasq
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Locked Files
Issues
0
Issues
0
List
Boards
Labels
Service Desk
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Security & Compliance
Security & Compliance
Dependency List
License Compliance
Packages
Packages
List
Container Registry
Analytics
Analytics
CI / CD
Code Review
Insights
Issues
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
nanahira
Dnsmasq
Commits
39c1eb76
Commit
39c1eb76
authored
Mar 23, 2015
by
Chen Wei
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
--address=/malware.com/# returns NXDOMAIN
add a new option for blocking malware site
parent
303dd8b9
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
13 additions
and
6 deletions
+13
-6
src/dnsmasq.h
src/dnsmasq.h
+1
-0
src/forward.c
src/forward.c
+6
-4
src/option.c
src/option.c
+6
-2
No files found.
src/dnsmasq.h
View file @
39c1eb76
...
...
@@ -484,6 +484,7 @@ union mysockaddr {
#define SERV_NO_REBIND 2048
/* inhibit dns-rebind protection */
#define SERV_FROM_FILE 4096
/* read from --servers-file */
#define SERV_LOOP 8192
/* server causes forwarding loop */
#define SERV_NXDOMAIN 16384
/* domain should return NXDOMAIN */
struct
serverfd
{
int
fd
;
...
...
src/forward.c
View file @
39c1eb76
...
...
@@ -164,10 +164,9 @@ search_servers (time_t now, struct all_addr **addrpp,
*
norebind
=
1
;
/* no server, domain is local only */
if
(
obj
->
domain_flags
&
SERV_NO_ADDR
)
if
(
obj
->
domain_flags
&
SERV_NO_ADDR
||
obj
->
domain_flags
&
SERV_NXDOMAIN
)
{
flags
=
F_NXDOMAIN
;
}
else
if
(
obj
->
domain_flags
&
SERV_LITERAL_ADDRESS
)
{
...
...
@@ -210,7 +209,9 @@ search_servers (time_t now, struct all_addr **addrpp,
/* don't forward A or AAAA queries for simple names, except the empty name */
flags
=
F_NOERR
;
if
(
flags
==
F_NXDOMAIN
&&
check_for_local_domain
(
qdomain
,
now
))
if
(
flags
==
F_NXDOMAIN
&&
!
(
obj
->
domain_flags
&
SERV_NXDOMAIN
)
&&
check_for_local_domain
(
qdomain
,
now
))
flags
=
F_NOERR
;
if
(
flags
)
...
...
@@ -1827,7 +1828,8 @@ unsigned char *tcp_request(int confd, time_t now,
/* largest field in header is 16-bits, so this is still sufficiently aligned */
struct
dns_header
*
header
=
(
struct
dns_header
*
)
payload
;
u16
*
length
=
(
u16
*
)
packet
;
struct
server
*
last_server
,
*
fwdserv
,
*
serv
;
struct
server
*
last_server
,
*
serv
;
struct
server
*
fwdserv
=
NULL
;
struct
in_addr
dst_addr_4
;
union
mysockaddr
peer_addr
;
socklen_t
peer_len
=
sizeof
(
union
mysockaddr
);
...
...
src/option.c
View file @
39c1eb76
...
...
@@ -2264,12 +2264,16 @@ static int one_opt(int option, char *arg, char *errstr, char *gen_err, int comma
start_addr
++
;
}
/* --xxxx=/example.org/# , here "#" means use standard server */
if
(
start_addr
!=
NULL
)
{
if
(
*
start_addr
==
'#'
)
{
newserv
.
flags
|=
SERV_USE_RESOLV
;
/* --server=/example.org/# , "#" means use standard server */
if
(
option
==
'S'
)
newserv
.
flags
|=
SERV_USE_RESOLV
;
/* --address=/malware.com/# , "#" means return NXDOMAIN */
else
if
(
option
==
'A'
)
newserv
.
flags
|=
SERV_NXDOMAIN
;
}
/* --xxxx=/example.org/here-is-empty */
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment