wildcard DNAME detect

git-svn-id: file:///svn/unbound/trunk@585 be551aaa-1e26-0410-a405-d3ace91eadb9
This commit is contained in:
Wouter Wijngaards 2007-09-04 12:57:40 +00:00
parent 0e11cd160d
commit d45774fe03
2 changed files with 7 additions and 7 deletions

View file

@ -7,6 +7,7 @@
- neater testbound tpkg output. - neater testbound tpkg output.
- DNAMEs no longer match their apex when synthesized from the cache. - DNAMEs no longer match their apex when synthesized from the cache.
- find correct signer name for DNAME responses. - find correct signer name for DNAME responses.
- wildcarded DNAME test and fixup code to detect.
3 September 2007: Wouter 3 September 2007: Wouter
- Fixed error in iterator that would cause assertion failure in - Fixed error in iterator that would cause assertion failure in

View file

@ -707,8 +707,7 @@ validate_cname_response(struct query_info* qchase,
* Do not follow a wildcarded DNAME because * Do not follow a wildcarded DNAME because
* its synthesized CNAME expansion is underdefined */ * its synthesized CNAME expansion is underdefined */
if(qchase->qtype != LDNS_RR_TYPE_DNAME && if(qchase->qtype != LDNS_RR_TYPE_DNAME &&
ntohs(s->rk.type) == LDNS_RR_TYPE_DNAME && ntohs(s->rk.type) == LDNS_RR_TYPE_DNAME && wc) {
dname_is_wild(s->rk.dname)) {
log_nametypeclass(VERB_DETAIL, "cannot validate a " log_nametypeclass(VERB_DETAIL, "cannot validate a "
"wildcarded DNAME:", s->rk.dname, "wildcarded DNAME:", s->rk.dname,
ntohs(s->rk.type), ntohs(s->rk.rrset_class)); ntohs(s->rk.type), ntohs(s->rk.rrset_class));