0013-Treat-DS-and-DNSKEY-queries-being-forwarded-the-same.patch 1.1 KB

1234567891011121314151617181920212223242526272829303132
  1. From 07e25da5bf26d46aad4f1d2eb19b260789182004 Mon Sep 17 00:00:00 2001
  2. From: Simon Kelley <[email protected]>
  3. Date: Sun, 16 Dec 2018 18:21:58 +0000
  4. Subject: [PATCH 13/30] Treat DS and DNSKEY queries being forwarded the same as
  5. those locally originated.
  6. The queries will not be forwarded to a server for a domain, unless
  7. there's a trust anchor provided for that domain. This allows, especially,
  8. suitable proof of non-existance for DS records to come from
  9. the parent domain for domains which are not signed.
  10. Signed-off-by: Kevin Darbyshire-Bryant <[email protected]>
  11. ---
  12. src/rfc1035.c | 7 +++++++
  13. 1 file changed, 7 insertions(+)
  14. --- a/src/rfc1035.c
  15. +++ b/src/rfc1035.c
  16. @@ -916,6 +916,13 @@ unsigned int extract_request(struct dns_
  17. if (qtype == T_ANY)
  18. return F_IPV4 | F_IPV6;
  19. }
  20. +
  21. + /* F_DNSSECOK as agument to search_servers() inhibits forwarding
  22. + to servers for domains without a trust anchor. This make the
  23. + behaviour for DS and DNSKEY queries we forward the same
  24. + as for DS and DNSKEY queries we originate. */
  25. + if (qtype == T_DS || qtype == T_DNSKEY)
  26. + return F_DNSSECOK;
  27. return F_QUERY;
  28. }