Hi,

On Tue, 2014-01-14 at 15:00 +0200, Patrik Flykt wrote:
> > After running git bisect, it appears the regression has been introduced by
> > the commit:
> > 984b91168c327ca8a68ef4bae28bafa05bee7559 - "service: Update nameservers
> > after IP state check"
> 
> It's not that one, checked out the code at the previous commit and it
> still doesn't work. I noticed that even Wireshark cannot decipher the
> replies we send. It's due to DNS  Message compression specified in
> chapter 3.1.3 in RFC 1035 whose pointers are not properly updated in
> dnsproxy.c, forward_dns_reply().
> 
> 'host myserver 127.0.0.1' makes the host command spit out a long
> gibberish of bad packet.

This is indeed due to the DNS messge compression. Fixing this is a
little more complicated than anticipated. It's not only a matter of
updating the pointers after removing the domain part from the reply
whenever a short form like 'www' is requested; it's also handling any
pointers that can point to the now removed domain part. With a protocol
around for ~30 years already, we can surely bet on every weird protocol
aspect being used.

That said, let's have another ConnMan bugfix release and then attack
this issue again.

Cheers,

        Patrik


_______________________________________________
connman mailing list
[email protected]
https://lists.connman.net/mailman/listinfo/connman

Reply via email to