aboutsummaryrefslogtreecommitdiffstats
path: root/package/network/services/dnsmasq/patches/0013-Allow-zone-transfer-in-authoritative-mode-whenever-a.patch
diff options
context:
space:
mode:
authorKevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>2018-07-28 10:47:32 +0100
committerKevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>2018-07-28 11:23:58 +0100
commitcf5a892430d34a4ecca279e11c663b48c3b3d6d2 (patch)
tree816cd68feebf766a3523d221276d782f43e14aa3 /package/network/services/dnsmasq/patches/0013-Allow-zone-transfer-in-authoritative-mode-whenever-a.patch
parentbf1b0fad2b788f2e933cbe43740402fba5acaf16 (diff)
downloadupstream-cf5a892430d34a4ecca279e11c663b48c3b3d6d2.tar.gz
upstream-cf5a892430d34a4ecca279e11c663b48c3b3d6d2.tar.bz2
upstream-cf5a892430d34a4ecca279e11c663b48c3b3d6d2.zip
dnsmasq: bump to dnsmasq v2.80test3
Refresh patches Upstream commits since last bump: 3b6eb19 Log DNSSEC trust anchors at startup. f3e5787 Trivial comment change. c851c69 Log failure to confirm an address in DHCPv6. a3bd7e7 Fix missing fatal errors when parsing some command-line/config options. ab5ceaf Document the --help option in the french manual 1f2f69d Fix recurrent minor spelling mistake in french manual f361b39 Fix some mistakes in french translation of the manual eb1fe15 When replacing cache entries, preserve CNAMES which target them. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk> (cherry picked from commit 1e93ef84981f2722138824413a1b197fdab7fb6c)
Diffstat (limited to 'package/network/services/dnsmasq/patches/0013-Allow-zone-transfer-in-authoritative-mode-whenever-a.patch')
-rw-r--r--package/network/services/dnsmasq/patches/0013-Allow-zone-transfer-in-authoritative-mode-whenever-a.patch55
1 files changed, 0 insertions, 55 deletions
diff --git a/package/network/services/dnsmasq/patches/0013-Allow-zone-transfer-in-authoritative-mode-whenever-a.patch b/package/network/services/dnsmasq/patches/0013-Allow-zone-transfer-in-authoritative-mode-whenever-a.patch
deleted file mode 100644
index cc16680686..0000000000
--- a/package/network/services/dnsmasq/patches/0013-Allow-zone-transfer-in-authoritative-mode-whenever-a.patch
+++ /dev/null
@@ -1,55 +0,0 @@
-From 090856c7e6d483bc4d7ec41f55208a9842769c45 Mon Sep 17 00:00:00 2001
-From: Simon Kelley <simon@thekelleys.org.uk>
-Date: Sat, 2 Jun 2018 18:37:07 +0100
-Subject: [PATCH 13/17] Allow zone transfer in authoritative mode whenever
- auth-peer is specified.
-
-Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
----
- CHANGELOG | 4 ++++
- man/dnsmasq.8 | 6 +++++-
- src/auth.c | 5 +++--
- 3 files changed, 12 insertions(+), 3 deletions(-)
-
---- a/CHANGELOG
-+++ b/CHANGELOG
-@@ -29,6 +29,10 @@ version 2.80
- have different parameters and avoids advertising the same
- prefix twice. Thanks to Luis Marsano for spotting this case.
-
-+ Allow zone transfer in authoritative mode if auth-peer is specified,
-+ even if auth-sec-servers is not. Thanks to Raphaƫl Halimi for
-+ the suggestion.
-+
-
- version 2.79
- Fix parsing of CNAME arguments, which are confused by extra spaces.
---- a/man/dnsmasq.8
-+++ b/man/dnsmasq.8
-@@ -817,7 +817,11 @@ authoritative zones as dnsmasq.
- Specify the addresses of secondary servers which are allowed to
- initiate zone transfer (AXFR) requests for zones for which dnsmasq is
- authoritative. If this option is not given, then AXFR requests will be
--accepted from any secondary.
-+accepted from any secondary. Specifying
-+.B auth-peer
-+without
-+.B auth-sec-servers
-+enables zone transfer but does not advertise the secondary in NS records returned by dnsmasq.
- .TP
- .B --conntrack
- Read the Linux connection track mark associated with incoming DNS
---- a/src/auth.c
-+++ b/src/auth.c
-@@ -436,8 +436,9 @@ size_t answer_auth(struct dns_header *he
- if (sockaddr_isequal(peer_addr, &peers->addr))
- break;
-
-- /* Refuse all AXFR unless --auth-sec-servers is set */
-- if ((!peers && daemon->auth_peers) || !daemon->secondary_forward_server)
-+ /* Refuse all AXFR unless --auth-sec-servers or auth-peers is set */
-+ if ((!daemon->secondary_forward_server && !daemon->auth_peers) ||
-+ (daemon->auth_peers && !peers))
- {
- if (peer_addr->sa.sa_family == AF_INET)
- inet_ntop(AF_INET, &peer_addr->in.sin_addr, daemon->addrbuff, ADDRSTRLEN);