Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
D
Dnsmasq
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Locked Files
Issues
0
Issues
0
List
Boards
Labels
Service Desk
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Security & Compliance
Security & Compliance
Dependency List
License Compliance
Packages
Packages
List
Container Registry
Analytics
Analytics
CI / CD
Code Review
Insights
Issues
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
nanahira
Dnsmasq
Commits
9d633048
Commit
9d633048
authored
Dec 13, 2013
by
Simon Kelley
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Saving progress
parent
a9b55837
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
40 additions
and
27 deletions
+40
-27
src/dns-protocol.h
src/dns-protocol.h
+2
-0
src/dnsmasq.h
src/dnsmasq.h
+2
-3
src/forward.c
src/forward.c
+36
-24
No files found.
src/dns-protocol.h
View file @
9d633048
...
...
@@ -82,6 +82,8 @@ struct dns_header {
#define HB4_RCODE 0x0f
#define OPCODE(x) (((x)->hb3 & HB3_OPCODE) >> 3)
#define SET_OPCODE(x, code) (x)->hb3 = ((x)->hb3 & ~HB3_OPCODE) | code
#define RCODE(x) ((x)->hb4 & HB4_RCODE)
#define SET_RCODE(x, code) (x)->hb4 = ((x)->hb4 & ~HB4_RCODE) | code
...
...
src/dnsmasq.h
View file @
9d633048
...
...
@@ -511,9 +511,8 @@ struct hostsfile {
#define FREC_NOREBIND 1
#define FREC_CHECKING_DISABLED 2
#define FREC_HAS_SUBNET 4
#define FREC_DNSSEC_QUERY 8
#define FREC_DNSKEY_QUERY 16
#define FREC_DS_QUERY 32
#define FREC_DNSKEY_QUERY 8
#define FREC_DS_QUERY 16
struct
frec
{
union
mysockaddr
source
;
...
...
src/forward.c
View file @
9d633048
...
...
@@ -677,7 +677,16 @@ void reply_query(int fd, int family, time_t now)
#ifdef HAVE_DNSSEC
if
(
option_bool
(
OPT_DNSSEC_VALID
)
&&
!
(
forward
->
flags
&
FREC_CHECKING_DISABLED
))
{
int
status
=
dnssec_validate
(
forward
->
flags
,
header
,
n
);
int
status
;
char
rrbitmap
[
256
/
8
];
int
class
;
if
(
forward
->
flags
&&
FREC_DNSSKEY_QUERY
)
status
=
dnssec_validate_by_ds
(
header
,
n
,
daemon
->
namebuff
,
&
class
);
else
if
(
forward
->
flags
&&
FREC_DS_QUERY
)
status
=
dnssec_validate_dnskey
(
header
,
n
,
daemon
->
namebuff
,
&
class
);
else
status
=
dnssec_validate_reply
(
&
rrbitmap
,
header
,
n
,
daemon
->
namebuff
,
&
class
);
/* Can't validate, as we're missing key data. Put this
answer aside, whilst we get that. */
...
...
@@ -687,26 +696,29 @@ void reply_query(int fd, int family, time_t now)
if
((
forward
->
stash
=
blockdata_alloc
((
char
*
)
header
,
n
)))
{
forward
->
stash_len
=
n
;
/* Now formulate a query for the missing data. */
nn
=
dnssec_generate_query
(
header
,
status
);
new
=
get_new_frec
(
now
,
NULL
,
1
);
if
(
new
)
if
((
new
=
get_new_frec
(
now
,
NULL
,
1
)))
{
int
fd
;
new
=
forward
;
/* copy everything, then overwrite */
new
->
dependent
=
forward
;
/* to find query awaiting new one. */
forward
->
blocking_query
=
new
;
/* for garbage cleaning */
new
->
flags
|=
FREC_DNSSEC_QUERY
;
/* validate routines leave name of required record in daemon->namebuff */
if
(
status
==
STAT_NEED_KEY
)
new
->
flags
|=
FREC_DNSKEY_QUERY
;
/* So we verify differently */
{
new
->
flags
|=
FREC_DNSKEY_QUERY
;
nn
=
dnssec_generate_query
(
header
,
daemon
->
namebuff
,
class
,
T_DNSKEY
);
}
else
if
(
status
==
STAT_NEED_DS
)
new
->
flags
|=
FREC_DS_QUERY
;
{
new
->
flags
|=
FREC_DS_QUERY
;
nn
=
dnssec_generate_query
(
header
,
daemon
->
namebuff
,
class
,
T_DS
);
}
new
->
crc
=
questions_crc
(
header
,
nn
,
daemon
->
namebuff
);
new
->
new_id
=
get_id
(
new
->
crc
);
header
->
id
=
htons
(
new
->
id
);
/* Don't resend this. */
daemon
->
srv_save
=
NULL
;
...
...
@@ -714,19 +726,19 @@ void reply_query(int fd, int family, time_t now)
fd
=
server
->
sfd
->
fd
;
else
#ifdef HAVE_IPV6
/* Note that we use the same random port for the DNSSEC stuff */
if
(
server
->
addr
.
sa
.
sa_family
==
AF_INET6
)
{
fd
=
new
->
rfd6
->
fd
;
new
->
rfd6
->
refcount
++
;
}
else
/* Note that we use the same random port for the DNSSEC stuff */
if
(
server
->
addr
.
sa
.
sa_family
==
AF_INET6
)
{
fd
=
new
->
rfd6
->
fd
;
new
->
rfd6
->
refcount
++
;
}
else
#endif
{
fd
=
new
->
rfd4
->
fd
;
new
->
rfd4
->
refcount
++
;
}
{
fd
=
new
->
rfd4
->
fd
;
new
->
rfd4
->
refcount
++
;
}
/* Send DNSSEC query to same server as original query */
while
(
sendto
(
fd
,
(
char
*
)
header
,
nn
,
0
,
&
server
->
addr
.
sa
,
sa_len
(
&
server
->
addr
))
==
-
1
&&
retry_send
());
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment