030-fix-arcount-edns0-behaviour.patch 1.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344
  1. From a3303e196e5d304ec955c4d63afb923ade66c6e8 Mon Sep 17 00:00:00 2001
  2. From: Simon Kelley <simon@thekelleys.org.uk>
  3. Date: Thu, 7 Sep 2017 20:45:00 +0100
  4. Subject: [PATCH] Don't return arcount=1 if EDNS0 RR won't fit in the packet.
  5. Omitting the EDNS0 RR but setting arcount gives a malformed packet.
  6. Also, don't accept UDP packet size less than 512 in recieved EDNS0.
  7. ---
  8. src/edns0.c | 5 ++++-
  9. src/forward.c | 2 ++
  10. 2 files changed, 6 insertions(+), 1 deletion(-)
  11. diff --git a/src/edns0.c b/src/edns0.c
  12. index 3fde17f..f5b798c 100644
  13. --- a/src/edns0.c
  14. +++ b/src/edns0.c
  15. @@ -208,7 +208,10 @@ size_t add_pseudoheader(struct dns_header *header, size_t plen, unsigned char *l
  16. free(buff);
  17. p += rdlen;
  18. }
  19. - header->arcount = htons(ntohs(header->arcount) + 1);
  20. +
  21. + /* Only bump arcount if RR is going to fit */
  22. + if (((ssize_t)optlen) <= (limit - (p + 4)))
  23. + header->arcount = htons(ntohs(header->arcount) + 1);
  24. }
  25. if (((ssize_t)optlen) > (limit - (p + 4)))
  26. diff --git a/src/forward.c b/src/forward.c
  27. index e3fa94b..942b02d 100644
  28. --- a/src/forward.c
  29. +++ b/src/forward.c
  30. @@ -1412,6 +1412,8 @@ void receive_query(struct listener *listen, time_t now)
  31. defaults to 512 */
  32. if (udp_size > daemon->edns_pktsz)
  33. udp_size = daemon->edns_pktsz;
  34. + else if (udp_size < PACKETSZ)
  35. + udp_size = PACKETSZ; /* Sanity check - can't reduce below default. RFC 6891 6.2.3 */
  36. }
  37. #ifdef HAVE_AUTH
  38. --
  39. 1.7.10.4