Hi,
On Tue, 2014-01-14 at 15:00 +0200, Patrik Flykt wrote:
> > After running git bisect, it appears the regression has been introduced by
> > the commit:
> > 984b91168c327ca8a68ef4bae28bafa05bee7559 - "service: Update nameservers
> > after IP state check"
>
> It's not that one, checked out the code at the previous commit and it
> still doesn't work. I noticed that even Wireshark cannot decipher the
> replies we send. It's due to DNS Message compression specified in
> chapter 3.1.3 in RFC 1035 whose pointers are not properly updated in
> dnsproxy.c, forward_dns_reply().
>
> 'host myserver 127.0.0.1' makes the host command spit out a long
> gibberish of bad packet.
This is indeed due to the DNS messge compression. Fixing this is a
little more complicated than anticipated. It's not only a matter of
updating the pointers after removing the domain part from the reply
whenever a short form like 'www' is requested; it's also handling any
pointers that can point to the now removed domain part. With a protocol
around for ~30 years already, we can surely bet on every weird protocol
aspect being used.
That said, let's have another ConnMan bugfix release and then attack
this issue again.
Cheers,
Patrik
_______________________________________________
connman mailing list
[email protected]
https://lists.connman.net/mailman/listinfo/connman