aboutsummaryrefslogtreecommitdiffstats
path: root/package/network/services/dnsmasq/patches/0013-Treat-DS-and-DNSKEY-queries-being-forwarded-the-same.patch
diff options
context:
space:
mode:
authorKevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>2019-03-09 08:40:57 +0000
committerKevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>2020-03-04 20:44:23 +0000
commit3251ac8f2d3de29af2a1584f427246ea702fdbd9 (patch)
tree6c00b1db0a44edb920cb8a1ba33e3538944981b6 /package/network/services/dnsmasq/patches/0013-Treat-DS-and-DNSKEY-queries-being-forwarded-the-same.patch
parent633c5137df86e782759e0d88c0facfb2d3f0c424 (diff)
downloadupstream-3251ac8f2d3de29af2a1584f427246ea702fdbd9.tar.gz
upstream-3251ac8f2d3de29af2a1584f427246ea702fdbd9.tar.bz2
upstream-3251ac8f2d3de29af2a1584f427246ea702fdbd9.zip
dnsmasq: bump to v2.81rc1
1st release candidate for v2.81 after 18 months. Refresh patches & remove all upstreamed leaving: 110-ipset-remove-old-kernel-support.patch Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
Diffstat (limited to 'package/network/services/dnsmasq/patches/0013-Treat-DS-and-DNSKEY-queries-being-forwarded-the-same.patch')
-rw-r--r--package/network/services/dnsmasq/patches/0013-Treat-DS-and-DNSKEY-queries-being-forwarded-the-same.patch32
1 files changed, 0 insertions, 32 deletions
diff --git a/package/network/services/dnsmasq/patches/0013-Treat-DS-and-DNSKEY-queries-being-forwarded-the-same.patch b/package/network/services/dnsmasq/patches/0013-Treat-DS-and-DNSKEY-queries-being-forwarded-the-same.patch
deleted file mode 100644
index 7053d032b8..0000000000
--- a/package/network/services/dnsmasq/patches/0013-Treat-DS-and-DNSKEY-queries-being-forwarded-the-same.patch
+++ /dev/null
@@ -1,32 +0,0 @@
-From 07e25da5bf26d46aad4f1d2eb19b260789182004 Mon Sep 17 00:00:00 2001
-From: Simon Kelley <simon@thekelleys.org.uk>
-Date: Sun, 16 Dec 2018 18:21:58 +0000
-Subject: [PATCH 13/32] Treat DS and DNSKEY queries being forwarded the same as
- those locally originated.
-
-The queries will not be forwarded to a server for a domain, unless
-there's a trust anchor provided for that domain. This allows, especially,
-suitable proof of non-existance for DS records to come from
-the parent domain for domains which are not signed.
-
-Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
----
- src/rfc1035.c | 7 +++++++
- 1 file changed, 7 insertions(+)
-
---- a/src/rfc1035.c
-+++ b/src/rfc1035.c
-@@ -916,6 +916,13 @@ unsigned int extract_request(struct dns_
- if (qtype == T_ANY)
- return F_IPV4 | F_IPV6;
- }
-+
-+ /* F_DNSSECOK as agument to search_servers() inhibits forwarding
-+ to servers for domains without a trust anchor. This make the
-+ behaviour for DS and DNSKEY queries we forward the same
-+ as for DS and DNSKEY queries we originate. */
-+ if (qtype == T_DS || qtype == T_DNSKEY)
-+ return F_DNSSECOK;
-
- return F_QUERY;
- }