From 22dee512f3738f87539a79aeb52b9e670b3bd104 Mon Sep 17 00:00:00 2001 From: Simon Kelley Date: Fri, 13 Oct 2017 22:54:00 +0100 Subject: [PATCH] Log DNS server max packet size reduction. --- src/forward.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/src/forward.c b/src/forward.c index de044bd..4f3a366 100644 --- a/src/forward.c +++ b/src/forward.c @@ -845,7 +845,11 @@ void reply_query(int fd, int family, time_t now) only do this when we get a truncated answer, or one larger than the safe size. */ if (server && (forward->flags & FREC_TEST_PKTSZ) && ((header->hb3 & HB3_TC) || n >= SAFE_PKTSZ)) - server->edns_pktsz = SAFE_PKTSZ; + { + server->edns_pktsz = SAFE_PKTSZ; + prettyprint_addr(&server->addr, daemon->addrbuff); + my_syslog(LOG_WARNING, _("reducing DNS packet size for nameserver %s to %n"), daemon->addrbuff, SAFE_PKTSZ); + } /* If the answer is an error, keep the forward record in place in case we get a good reply from another server. Kill it when we've