mirror of
https://github.com/pi-hole/dnsmasq.git
synced 2025-12-19 18:28:25 +00:00
Bound the value of UDP packet size in the EDNS0 header of
forwarded queries to the configured or default value of edns-packet-max. There's no point letting a client set a larger value if we're unable to return the answer.
This commit is contained in:
committed by
Simon Kelley
parent
6134b94c02
commit
5586934da0
@@ -1619,13 +1619,17 @@ void receive_query(struct listener *listen, time_t now)
|
||||
|
||||
/* If the client provides an EDNS0 UDP size, use that to limit our reply.
|
||||
(bounded by the maximum configured). If no EDNS0, then it
|
||||
defaults to 512 */
|
||||
defaults to 512. We write this value into the query packet too, so that
|
||||
if it's forwarded, we don't specify a maximum size greater than we can handle. */
|
||||
if (udp_size > daemon->edns_pktsz)
|
||||
udp_size = daemon->edns_pktsz;
|
||||
else if (udp_size < PACKETSZ)
|
||||
udp_size = PACKETSZ; /* Sanity check - can't reduce below default. RFC 6891 6.2.3 */
|
||||
}
|
||||
|
||||
pheader -= 6; /* ext_class */
|
||||
PUTSHORT(udp_size, pheader); /* Bounding forwarded queries to maximum configured */
|
||||
}
|
||||
|
||||
#ifdef HAVE_CONNTRACK
|
||||
#ifdef HAVE_AUTH
|
||||
if (!auth_dns || local_auth)
|
||||
|
||||
Reference in New Issue
Block a user