mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-09-03 16:15:27 +00:00
Merge tag 'v9_18_7' into v9_18
BIND 9.18.7
This commit is contained in:
25
CHANGES
25
CHANGES
@@ -14,6 +14,31 @@
|
|||||||
5963. [bug] Ensure struct named_server is properly initialized.
|
5963. [bug] Ensure struct named_server is properly initialized.
|
||||||
[GL #6531]
|
[GL #6531]
|
||||||
|
|
||||||
|
--- 9.18.7 released ---
|
||||||
|
|
||||||
|
5962. [security] Fix memory leak in EdDSA verify processing.
|
||||||
|
(CVE-2022-38178) [GL #3487]
|
||||||
|
|
||||||
|
5960. [security] Fix serve-stale crash that could happen when
|
||||||
|
stale-answer-client-timeout was set to 0 and there was
|
||||||
|
a stale CNAME in the cache for an incoming query.
|
||||||
|
(CVE-2022-3080) [GL #3517]
|
||||||
|
|
||||||
|
5959. [security] Fix memory leaks in the DH code when using OpenSSL 3.0.0
|
||||||
|
and later versions. The openssldh_compare(),
|
||||||
|
openssldh_paramcompare(), and openssldh_todns()
|
||||||
|
functions were affected. (CVE-2022-2906) [GL #3491]
|
||||||
|
|
||||||
|
5958. [security] When an HTTP connection was reused to get
|
||||||
|
statistics from the stats channel, and zlib
|
||||||
|
compression was in use, each successive
|
||||||
|
response sent larger and larger blocks of memory,
|
||||||
|
potentially reading past the end of the allocated
|
||||||
|
buffer. (CVE-2022-2881) [GL #3493]
|
||||||
|
|
||||||
|
5957. [security] Prevent excessive resource use while processing large
|
||||||
|
delegations. (CVE-2022-2795) [GL #3394]
|
||||||
|
|
||||||
5956. [func] Make RRL code treat all QNAMEs that are subject to
|
5956. [func] Make RRL code treat all QNAMEs that are subject to
|
||||||
wildcard processing within a given zone as the same
|
wildcard processing within a given zone as the same
|
||||||
name. [GL #3459]
|
name. [GL #3459]
|
||||||
|
@@ -34,6 +34,7 @@ https://www.isc.org/download/. There you will find additional
|
|||||||
information about each release, and source code.
|
information about each release, and source code.
|
||||||
|
|
||||||
.. include:: ../notes/notes-current.rst
|
.. include:: ../notes/notes-current.rst
|
||||||
|
.. include:: ../notes/notes-9.18.7.rst
|
||||||
.. include:: ../notes/notes-9.18.6.rst
|
.. include:: ../notes/notes-9.18.6.rst
|
||||||
.. include:: ../notes/notes-9.18.5.rst
|
.. include:: ../notes/notes-9.18.5.rst
|
||||||
.. include:: ../notes/notes-9.18.4.rst
|
.. include:: ../notes/notes-9.18.4.rst
|
||||||
|
73
doc/notes/notes-9.18.7.rst
Normal file
73
doc/notes/notes-9.18.7.rst
Normal file
@@ -0,0 +1,73 @@
|
|||||||
|
.. Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
||||||
|
..
|
||||||
|
.. SPDX-License-Identifier: MPL-2.0
|
||||||
|
..
|
||||||
|
.. This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
.. License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
.. file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
||||||
|
..
|
||||||
|
.. See the COPYRIGHT file distributed with this work for additional
|
||||||
|
.. information regarding copyright ownership.
|
||||||
|
|
||||||
|
Notes for BIND 9.18.7
|
||||||
|
---------------------
|
||||||
|
|
||||||
|
Security Fixes
|
||||||
|
~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
- Previously, there was no limit to the number of database lookups
|
||||||
|
performed while processing large delegations, which could be abused to
|
||||||
|
severely impact the performance of :iscman:`named` running as a
|
||||||
|
recursive resolver. This has been fixed. (CVE-2022-2795)
|
||||||
|
|
||||||
|
ISC would like to thank Yehuda Afek from Tel-Aviv University and Anat
|
||||||
|
Bremler-Barr & Shani Stajnrod from Reichman University for bringing
|
||||||
|
this vulnerability to our attention. :gl:`#3394`
|
||||||
|
|
||||||
|
- When an HTTP connection was reused to request statistics from the
|
||||||
|
stats channel, the content length of successive responses could grow
|
||||||
|
in size past the end of the allocated buffer. This has been fixed.
|
||||||
|
(CVE-2022-2881) :gl:`#3493`
|
||||||
|
|
||||||
|
- Memory leaks in code handling Diffie-Hellman (DH) keys were fixed that
|
||||||
|
could be externally triggered, when using TKEY records in DH mode with
|
||||||
|
OpenSSL 3.0.0 and later versions. (CVE-2022-2906) :gl:`#3491`
|
||||||
|
|
||||||
|
- :iscman:`named` running as a resolver with the
|
||||||
|
:any:`stale-answer-client-timeout` option set to ``0`` could crash
|
||||||
|
with an assertion failure, when there was a stale CNAME in the cache
|
||||||
|
for the incoming query. This has been fixed. (CVE-2022-3080)
|
||||||
|
:gl:`#3517`
|
||||||
|
|
||||||
|
- Memory leaks were fixed that could be externally triggered in the
|
||||||
|
DNSSEC verification code for the EdDSA algorithm. (CVE-2022-38178)
|
||||||
|
:gl:`#3487`
|
||||||
|
|
||||||
|
Feature Changes
|
||||||
|
~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
- Response Rate Limiting (RRL) code now treats all QNAMEs that are
|
||||||
|
subject to wildcard processing within a given zone as the same name,
|
||||||
|
to prevent circumventing the limits enforced by RRL. :gl:`#3459`
|
||||||
|
|
||||||
|
- Zones using :any:`dnssec-policy` now require dynamic DNS or
|
||||||
|
:any:`inline-signing` to be configured explicitly. :gl:`#3381`
|
||||||
|
|
||||||
|
- When reconfiguring :any:`dnssec-policy` from using NSEC with an
|
||||||
|
NSEC-only DNSKEY algorithm (e.g. RSASHA1) to a policy that uses NSEC3,
|
||||||
|
BIND 9 no longer fails to sign the zone; instead, it keeps using NSEC
|
||||||
|
until the offending DNSKEY records have been removed from the zone,
|
||||||
|
then switches to using NSEC3. :gl:`#3486`
|
||||||
|
|
||||||
|
- A backward-compatible approach was implemented for encoding
|
||||||
|
internationalized domain names (IDN) in :iscman:`dig` and converting
|
||||||
|
the domain to IDNA2008 form; if that fails, BIND tries an IDNA2003
|
||||||
|
conversion. :gl:`#3485`
|
||||||
|
|
||||||
|
Bug Fixes
|
||||||
|
~~~~~~~~~
|
||||||
|
|
||||||
|
- A serve-stale bug was fixed, where BIND would try to return stale data
|
||||||
|
from cache for lookups that received duplicate queries or queries that
|
||||||
|
would be dropped. This bug resulted in premature SERVFAIL responses,
|
||||||
|
and has now been resolved. :gl:`#2982`
|
@@ -165,6 +165,7 @@ openssldh_computesecret(const dst_key_t *pub, const dst_key_t *priv,
|
|||||||
|
|
||||||
static bool
|
static bool
|
||||||
openssldh_compare(const dst_key_t *key1, const dst_key_t *key2) {
|
openssldh_compare(const dst_key_t *key1, const dst_key_t *key2) {
|
||||||
|
bool ret = true;
|
||||||
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||||
DH *dh1, *dh2;
|
DH *dh1, *dh2;
|
||||||
const BIGNUM *pub_key1 = NULL, *pub_key2 = NULL;
|
const BIGNUM *pub_key1 = NULL, *pub_key2 = NULL;
|
||||||
@@ -214,18 +215,17 @@ openssldh_compare(const dst_key_t *key1, const dst_key_t *key2) {
|
|||||||
if (BN_cmp(p1, p2) != 0 || BN_cmp(g1, g2) != 0 ||
|
if (BN_cmp(p1, p2) != 0 || BN_cmp(g1, g2) != 0 ||
|
||||||
BN_cmp(pub_key1, pub_key2) != 0)
|
BN_cmp(pub_key1, pub_key2) != 0)
|
||||||
{
|
{
|
||||||
return (false);
|
DST_RET(false);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (priv_key1 != NULL || priv_key2 != NULL) {
|
if (priv_key1 != NULL || priv_key2 != NULL) {
|
||||||
if (priv_key1 == NULL || priv_key2 == NULL) {
|
if (priv_key1 == NULL || priv_key2 == NULL ||
|
||||||
return (false);
|
BN_cmp(priv_key1, priv_key2) != 0) {
|
||||||
}
|
DST_RET(false);
|
||||||
if (BN_cmp(priv_key1, priv_key2) != 0) {
|
|
||||||
return (false);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
err:
|
||||||
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
||||||
if (p1 != NULL) {
|
if (p1 != NULL) {
|
||||||
BN_free(p1);
|
BN_free(p1);
|
||||||
@@ -253,11 +253,12 @@ openssldh_compare(const dst_key_t *key1, const dst_key_t *key2) {
|
|||||||
}
|
}
|
||||||
#endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */
|
#endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */
|
||||||
|
|
||||||
return (true);
|
return (ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
static bool
|
static bool
|
||||||
openssldh_paramcompare(const dst_key_t *key1, const dst_key_t *key2) {
|
openssldh_paramcompare(const dst_key_t *key1, const dst_key_t *key2) {
|
||||||
|
bool ret = true;
|
||||||
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||||
DH *dh1, *dh2;
|
DH *dh1, *dh2;
|
||||||
const BIGNUM *p1 = NULL, *g1 = NULL, *p2 = NULL, *g2 = NULL;
|
const BIGNUM *p1 = NULL, *g1 = NULL, *p2 = NULL, *g2 = NULL;
|
||||||
@@ -295,9 +296,10 @@ openssldh_paramcompare(const dst_key_t *key1, const dst_key_t *key2) {
|
|||||||
#endif /* OPENSSL_VERSION_NUMBER < 0x30000000L */
|
#endif /* OPENSSL_VERSION_NUMBER < 0x30000000L */
|
||||||
|
|
||||||
if (BN_cmp(p1, p2) != 0 || BN_cmp(g1, g2) != 0) {
|
if (BN_cmp(p1, p2) != 0 || BN_cmp(g1, g2) != 0) {
|
||||||
return (false);
|
DST_RET(false);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
err:
|
||||||
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
||||||
if (p1 != NULL) {
|
if (p1 != NULL) {
|
||||||
BN_free(p1);
|
BN_free(p1);
|
||||||
@@ -313,7 +315,7 @@ openssldh_paramcompare(const dst_key_t *key1, const dst_key_t *key2) {
|
|||||||
}
|
}
|
||||||
#endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */
|
#endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */
|
||||||
|
|
||||||
return (true);
|
return (ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||||
@@ -675,6 +677,7 @@ uint16_fromregion(isc_region_t *region) {
|
|||||||
|
|
||||||
static isc_result_t
|
static isc_result_t
|
||||||
openssldh_todns(const dst_key_t *key, isc_buffer_t *data) {
|
openssldh_todns(const dst_key_t *key, isc_buffer_t *data) {
|
||||||
|
isc_result_t ret = ISC_R_SUCCESS;
|
||||||
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||||
DH *dh;
|
DH *dh;
|
||||||
const BIGNUM *pub_key = NULL, *p = NULL, *g = NULL;
|
const BIGNUM *pub_key = NULL, *p = NULL, *g = NULL;
|
||||||
@@ -716,7 +719,7 @@ openssldh_todns(const dst_key_t *key, isc_buffer_t *data) {
|
|||||||
publen = BN_num_bytes(pub_key);
|
publen = BN_num_bytes(pub_key);
|
||||||
dnslen = plen + glen + publen + 6;
|
dnslen = plen + glen + publen + 6;
|
||||||
if (r.length < (unsigned int)dnslen) {
|
if (r.length < (unsigned int)dnslen) {
|
||||||
return (ISC_R_NOSPACE);
|
DST_RET(ISC_R_NOSPACE);
|
||||||
}
|
}
|
||||||
|
|
||||||
uint16_toregion(plen, &r);
|
uint16_toregion(plen, &r);
|
||||||
@@ -745,6 +748,7 @@ openssldh_todns(const dst_key_t *key, isc_buffer_t *data) {
|
|||||||
|
|
||||||
isc_buffer_add(data, dnslen);
|
isc_buffer_add(data, dnslen);
|
||||||
|
|
||||||
|
err:
|
||||||
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
||||||
if (p != NULL) {
|
if (p != NULL) {
|
||||||
BN_free(p);
|
BN_free(p);
|
||||||
@@ -757,7 +761,7 @@ openssldh_todns(const dst_key_t *key, isc_buffer_t *data) {
|
|||||||
}
|
}
|
||||||
#endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */
|
#endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */
|
||||||
|
|
||||||
return (ISC_R_SUCCESS);
|
return (ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
static isc_result_t
|
static isc_result_t
|
||||||
|
@@ -234,11 +234,11 @@ openssleddsa_verify(dst_context_t *dctx, const isc_region_t *sig) {
|
|||||||
}
|
}
|
||||||
#endif /* if HAVE_OPENSSL_ED448 */
|
#endif /* if HAVE_OPENSSL_ED448 */
|
||||||
if (siglen == 0) {
|
if (siglen == 0) {
|
||||||
return (ISC_R_NOTIMPLEMENTED);
|
DST_RET(ISC_R_NOTIMPLEMENTED);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (sig->length != siglen) {
|
if (sig->length != siglen) {
|
||||||
return (DST_R_VERIFYFAILURE);
|
DST_RET(DST_R_VERIFYFAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
isc_buffer_usedregion(buf, &tbsreg);
|
isc_buffer_usedregion(buf, &tbsreg);
|
||||||
|
@@ -211,6 +211,17 @@
|
|||||||
*/
|
*/
|
||||||
#define NS_FAIL_LIMIT 4
|
#define NS_FAIL_LIMIT 4
|
||||||
#define NS_RR_LIMIT 5
|
#define NS_RR_LIMIT 5
|
||||||
|
/*
|
||||||
|
* IP address lookups are performed for at most NS_PROCESSING_LIMIT NS RRs in
|
||||||
|
* any NS RRset encountered, to avoid excessive resource use while processing
|
||||||
|
* large delegations.
|
||||||
|
*/
|
||||||
|
#define NS_PROCESSING_LIMIT 20
|
||||||
|
|
||||||
|
STATIC_ASSERT(NS_PROCESSING_LIMIT > NS_RR_LIMIT,
|
||||||
|
"The maximum number of NS RRs processed for each delegation "
|
||||||
|
"(NS_PROCESSING_LIMIT) must be larger than the large delegation "
|
||||||
|
"threshold (NS_RR_LIMIT).");
|
||||||
|
|
||||||
/* Hash table for zone counters */
|
/* Hash table for zone counters */
|
||||||
#ifndef RES_DOMAIN_HASH_BITS
|
#ifndef RES_DOMAIN_HASH_BITS
|
||||||
@@ -3538,6 +3549,7 @@ fctx_getaddresses(fetchctx_t *fctx, bool badcache) {
|
|||||||
bool need_alternate = false;
|
bool need_alternate = false;
|
||||||
bool all_spilled = true;
|
bool all_spilled = true;
|
||||||
unsigned int no_addresses = 0;
|
unsigned int no_addresses = 0;
|
||||||
|
unsigned int ns_processed = 0;
|
||||||
|
|
||||||
FCTXTRACE5("getaddresses", "fctx->depth=", fctx->depth);
|
FCTXTRACE5("getaddresses", "fctx->depth=", fctx->depth);
|
||||||
|
|
||||||
@@ -3728,6 +3740,11 @@ normal_nses:
|
|||||||
|
|
||||||
dns_rdata_reset(&rdata);
|
dns_rdata_reset(&rdata);
|
||||||
dns_rdata_freestruct(&ns);
|
dns_rdata_freestruct(&ns);
|
||||||
|
|
||||||
|
if (++ns_processed >= NS_PROCESSING_LIMIT) {
|
||||||
|
result = ISC_R_NOMORE;
|
||||||
|
break;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
if (result != ISC_R_NOMORE) {
|
if (result != ISC_R_NOMORE) {
|
||||||
return (result);
|
return (result);
|
||||||
|
@@ -202,6 +202,8 @@ free_buffer(isc_mem_t *mctx, isc_buffer_t *buffer) {
|
|||||||
if (r.base != NULL) {
|
if (r.base != NULL) {
|
||||||
isc_mem_put(mctx, r.base, r.length);
|
isc_mem_put(mctx, r.base, r.length);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
isc_buffer_initnull(buffer);
|
||||||
}
|
}
|
||||||
|
|
||||||
isc_result_t
|
isc_result_t
|
||||||
@@ -861,6 +863,7 @@ httpd_compress(isc_httpd_t *httpd) {
|
|||||||
|
|
||||||
inputlen = isc_buffer_usedlength(&httpd->bodybuffer);
|
inputlen = isc_buffer_usedlength(&httpd->bodybuffer);
|
||||||
alloc_compspace(httpd, inputlen);
|
alloc_compspace(httpd, inputlen);
|
||||||
|
isc_buffer_clear(&httpd->compbuffer);
|
||||||
isc_buffer_region(&httpd->compbuffer, &r);
|
isc_buffer_region(&httpd->compbuffer, &r);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@@ -148,6 +148,7 @@ struct query_ctx {
|
|||||||
bool authoritative; /* authoritative query? */
|
bool authoritative; /* authoritative query? */
|
||||||
bool want_restart; /* CNAME chain or other
|
bool want_restart; /* CNAME chain or other
|
||||||
* restart needed */
|
* restart needed */
|
||||||
|
bool refresh_rrset; /* stale RRset refresh needed */
|
||||||
bool need_wildcardproof; /* wildcard proof needed */
|
bool need_wildcardproof; /* wildcard proof needed */
|
||||||
bool nxrewrite; /* negative answer from RPZ */
|
bool nxrewrite; /* negative answer from RPZ */
|
||||||
bool findcoveringnsec; /* lookup covering NSEC */
|
bool findcoveringnsec; /* lookup covering NSEC */
|
||||||
|
@@ -5841,7 +5841,6 @@ query_lookup(query_ctx_t *qctx) {
|
|||||||
bool dbfind_stale = false;
|
bool dbfind_stale = false;
|
||||||
bool stale_timeout = false;
|
bool stale_timeout = false;
|
||||||
bool stale_found = false;
|
bool stale_found = false;
|
||||||
bool refresh_rrset = false;
|
|
||||||
bool stale_refresh_window = false;
|
bool stale_refresh_window = false;
|
||||||
uint16_t ede = 0;
|
uint16_t ede = 0;
|
||||||
|
|
||||||
@@ -6039,8 +6038,7 @@ query_lookup(query_ctx_t *qctx) {
|
|||||||
"%s stale answer used, an attempt to "
|
"%s stale answer used, an attempt to "
|
||||||
"refresh the RRset will still be made",
|
"refresh the RRset will still be made",
|
||||||
namebuf);
|
namebuf);
|
||||||
refresh_rrset = STALE(qctx->rdataset);
|
qctx->refresh_rrset = STALE(qctx->rdataset);
|
||||||
qctx->client->nodetach = refresh_rrset;
|
|
||||||
ns_client_extendederror(
|
ns_client_extendederror(
|
||||||
qctx->client, ede,
|
qctx->client, ede,
|
||||||
"stale data prioritized over lookup");
|
"stale data prioritized over lookup");
|
||||||
@@ -6084,17 +6082,6 @@ query_lookup(query_ctx_t *qctx) {
|
|||||||
|
|
||||||
result = query_gotanswer(qctx, result);
|
result = query_gotanswer(qctx, result);
|
||||||
|
|
||||||
if (refresh_rrset) {
|
|
||||||
/*
|
|
||||||
* If we reached this point then it means that we have found a
|
|
||||||
* stale RRset entry in cache and BIND is configured to allow
|
|
||||||
* queries to be answered with stale data if no active RRset
|
|
||||||
* is available, i.e. "stale-anwer-client-timeout 0". But, we
|
|
||||||
* still need to refresh the RRset.
|
|
||||||
*/
|
|
||||||
query_refresh_rrset(qctx);
|
|
||||||
}
|
|
||||||
|
|
||||||
cleanup:
|
cleanup:
|
||||||
return (result);
|
return (result);
|
||||||
}
|
}
|
||||||
@@ -8114,11 +8101,14 @@ query_addanswer(query_ctx_t *qctx) {
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* On normal lookups, clear any rdatasets that were added on a
|
* On normal lookups, clear any rdatasets that were added on a
|
||||||
* lookup due to stale-answer-client-timeout.
|
* lookup due to stale-answer-client-timeout. Do not clear if we
|
||||||
|
* are going to refresh the RRset, because the stale contents are
|
||||||
|
* prioritized.
|
||||||
*/
|
*/
|
||||||
if (QUERY_STALEOK(&qctx->client->query) &&
|
if (QUERY_STALEOK(&qctx->client->query) &&
|
||||||
!QUERY_STALETIMEOUT(&qctx->client->query))
|
!QUERY_STALETIMEOUT(&qctx->client->query) && !qctx->refresh_rrset)
|
||||||
{
|
{
|
||||||
|
CCTRACE(ISC_LOG_DEBUG(3), "query_clear_stale");
|
||||||
query_clear_stale(qctx->client);
|
query_clear_stale(qctx->client);
|
||||||
/*
|
/*
|
||||||
* We can clear the attribute to prevent redundant clearing
|
* We can clear the attribute to prevent redundant clearing
|
||||||
@@ -11876,9 +11866,29 @@ ns_query_done(query_ctx_t *qctx) {
|
|||||||
/*
|
/*
|
||||||
* Client may have been detached after query_send(), so
|
* Client may have been detached after query_send(), so
|
||||||
* we test and store the flag state here, for safety.
|
* we test and store the flag state here, for safety.
|
||||||
|
* If we are refreshing the RRSet, we must not detach from the client
|
||||||
|
* in the query_send(), so we need to override the flag.
|
||||||
*/
|
*/
|
||||||
|
if (qctx->refresh_rrset) {
|
||||||
|
qctx->client->nodetach = true;
|
||||||
|
}
|
||||||
nodetach = qctx->client->nodetach;
|
nodetach = qctx->client->nodetach;
|
||||||
query_send(qctx->client);
|
query_send(qctx->client);
|
||||||
|
|
||||||
|
if (qctx->refresh_rrset) {
|
||||||
|
/*
|
||||||
|
* If we reached this point then it means that we have found a
|
||||||
|
* stale RRset entry in cache and BIND is configured to allow
|
||||||
|
* queries to be answered with stale data if no active RRset
|
||||||
|
* is available, i.e. "stale-anwer-client-timeout 0". But, we
|
||||||
|
* still need to refresh the RRset. To prevent adding duplicate
|
||||||
|
* RRsets, clear the RRsets from the message before doing the
|
||||||
|
* refresh.
|
||||||
|
*/
|
||||||
|
message_clearrdataset(qctx->client->message, 0);
|
||||||
|
query_refresh_rrset(qctx);
|
||||||
|
}
|
||||||
|
|
||||||
if (!nodetach) {
|
if (!nodetach) {
|
||||||
qctx->detach_client = true;
|
qctx->detach_client = true;
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user