Commit 5757371d authored by Simon Kelley's avatar Simon Kelley

Inhibit DNSSEC validation when forwarding to private servers for a domain.

server=/example.com/<ip-of-server>

The rationale is that the chain-of-trust will not be complete to
private servers. If it was, it would not be necessary to access the
server direct.
parent b633de94
......@@ -406,7 +406,7 @@ static int forward_query(int udpfd, union mysockaddr *udpaddr,
}
#ifdef HAVE_DNSSEC
if (option_bool(OPT_DNSSEC_VALID))
if (option_bool(OPT_DNSSEC_VALID) && !(type & SERV_HAS_DOMAIN))
{
size_t new = add_do_bit(header, plen, ((unsigned char *) header) + PACKETSZ);
......@@ -858,7 +858,8 @@ void reply_query(int fd, int family, time_t now)
no_cache_dnssec = 1;
#ifdef HAVE_DNSSEC
if (server && option_bool(OPT_DNSSEC_VALID) && !(forward->flags & FREC_CHECKING_DISABLED))
if (server && !(server->flags & SERV_HAS_DOMAIN) &&
option_bool(OPT_DNSSEC_VALID) && !(forward->flags & FREC_CHECKING_DISABLED))
{
int status = 0;
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment