Comments (3)
It was UDP. I already had a poke around the TXT record parsing code before posting, but I'll try again in the next few days, thanks for the pointer.
from hickory-dns.
Is this being received over UDP or TCP? I probably won't have time to dig into this -- would need someone to figure out what layer of the code is dropping the response here so we can see why it is doing so.
If this is over UDP, try adding some debugging to send_serial_message_inner()
in udp_client_stream.rs
to see how this is getting parsed? If TCP, not quite sure where its SerialMessage
s get converted to Message
right now...
from hickory-dns.
Sorry for the noise, it turns out that that particular request had a non-character byte attached to the front of it, when my application attempted to stringify the response it was silently dropping that entry.
Not sure how my test on a different server with another long string also managed to trigger that bug, but either way, it's not your bug!
Thanks again.
from hickory-dns.
Related Issues (20)
- several conformance tests fail due to overlapping Docker networks
- Resolver takes a long time to resolve NXDOMAIN HOT 7
- test that AD bit is set when valid answer includes DNSSEC records
- test that RRSIG signature expiration / validation fields are respected HOT 1
- test caching behavior on DO=0 query followed by DO=1 query
- dns-test: spurious test failure `tshark::tests::nameserver` HOT 4
- Random test failing that sends request to Google's DNS server HOT 3
- test what the AD should be set to when all the answer sections are empty
- return SERVFAIL when DNSSEC validation fails and CD bit is not set
- add DNSSEC validation to the recursive resolver tool HOT 3
- DNSSEC validation fails for `NS nameservers.com.` in test environment HOT 1
- `dig DS .` / `dig A .` return zero records instead of some authority records
- `cargo doc -p hickory-recursor` fails HOT 1
- test that validating resolver sets the TTL field to a value smaller than `now() - signature_expiration_time`
- make validating `Recursor` cache intermediate DNSSEC validations HOT 1
- (perf) skip DNSSEC validation altogether on CD=1 queries
- address CVE-2024-33655 DOS attack (DNSBomb) HOT 1
- `dig +dnssec NS nameservers.com.` does not include RRSIG records
- implement RFC 8914 (Extended DNS errors)
- hickory as validating resolver times out against bind security aware name server HOT 3
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from hickory-dns.