Fix server selection for DS queries.

This was mainly done in 57e582492b
This commit extends the new behaviour to cases where DNSSEC
validation is not compiled-in or not enabled.
This commit is contained in:
Simon Kelley
2025-07-07 17:16:32 +01:00
parent c70b92b2a4
commit 84445dec26

View File

@@ -1245,12 +1245,10 @@ unsigned int extract_request(struct dns_header *header, size_t qlen, char *name,
return F_IPV4 | F_IPV6; return F_IPV4 | F_IPV6;
} }
#ifdef HAVE_DNSSEC
/* Make the behaviour for DS and DNSKEY queries we forward the same /* Make the behaviour for DS and DNSKEY queries we forward the same
as for DS and DNSKEY queries we originate. */ as for DS and DNSKEY queries we originate. */
if (option_bool(OPT_DNSSEC_VALID) && (qtype == T_DS || qtype == T_DNSKEY)) if (qtype == T_DS || qtype == T_DNSKEY)
return F_DNSSECOK | (qtype == T_DS ? F_DS : 0); return F_DNSSECOK | (qtype == T_DS ? F_DS : 0);
#endif
return F_QUERY; return F_QUERY;
} }