Your message dated Thu, 10 Aug 2017 15:05:18 +0000
with message-id <e1dfp1s-000hn6...@fasolo.debian.org>
and subject line Bug#870226: fixed in curvedns 0.87-4
has caused the Debian Bug report #870226,
regarding curvedns’s max tcp buffer of 8192 is too small
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
870226: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870226
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: curvedns
Version: 0.87-3
Severity: normal

Testing out curvedns, I discovered that a dnssec any query for the
apex of my primary zone failed to send anything.

It turns out that with a rsa 1k zsk a reasonably long spf txt rr and
the ns and mx names in the zone (thus including their a and aaaa rrs
in the additional secion) the reply grows past 8192 octets.

global_ip_tcp_buffersize in curvedns’ io.c needs to be larger.

16384 is likely enough.  (10k would be enough for my zone, even with
the ns names switched to dnscurve style names).

This is also reported as:

https://github.com/curvedns/curvedns/issues/4

but a debian-specific patch increasing global_ip_tcp_buffersize would
be welcome.

The patch is just:

diff --git a/ip.c b/ip.c
index 664377b..c3b4493 100644
--- a/ip.c
+++ b/ip.c
@@ -45,7 +45,7 @@ int global_ip_sockets_count = 0;
 ev_tstamp      global_ip_internal_timeout = 1.2;
 ev_tstamp      global_ip_tcp_external_timeout = 60.0;
 int                    global_ip_tcp_max_number_connections = 25;
-size_t         global_ip_tcp_buffersize = 8192;
+size_t         global_ip_tcp_buffersize = 16384;
 size_t         global_ip_udp_buffersize = 4096;
 uint8_t                global_ip_udp_retries = 2;
 anysin_t       global_target_address;


-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.5.0-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages curvedns depends on:
ii  adduser              3.115
ii  init-system-helpers  1.49
ii  libc6                2.24-12
ii  libev4               1:4.22-1+b1
ii  libsodium18          1.0.13-1
ii  lsb-base             9.20161125

curvedns recommends no packages.

curvedns suggests no packages.

-- Configuration Files:
/etc/default/curvedns changed [not included]

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: curvedns
Source-Version: 0.87-4

We believe that the bug you reported is fixed in the latest version of
curvedns, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 870...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
NEVEU Stephane <stefne...@gmail.com> (supplier of updated curvedns package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 31 Jul 2017 09:02:09 +0200
Source: curvedns
Binary: curvedns
Architecture: source
Version: 0.87-4
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools Packaging Team 
<pkg-security-t...@lists.alioth.debian.org>
Changed-By: NEVEU Stephane <stefne...@gmail.com>
Description:
 curvedns   - DNS/DNSCurve forwarding name server - binaries
Closes: 870226
Changes:
 curvedns (0.87-4) unstable; urgency=medium
 .
   * Update global_ip_tcp_buffersize to 16384 octets (Closes:#870226)
Checksums-Sha1:
 846d47f9e00c255d7cd60a896983c79fd67dfd9f 1941 curvedns_0.87-4.dsc
 b247ec9ba619f33807821423b976282f744ca84c 8840 curvedns_0.87-4.debian.tar.xz
Checksums-Sha256:
 5ffccfc6ad5937efa2eb6dd4d43bf2cf6ce66e414136da57dd5fd28a81e27e33 1941 
curvedns_0.87-4.dsc
 6b7d378a6fb0046ba48cb53c86efbdbac851ff823df32fd321b4d77ee4424b53 8840 
curvedns_0.87-4.debian.tar.xz
Files:
 f27ea66d4e42865fc777dacbeae35e96 1941 net optional curvedns_0.87-4.dsc
 3a4ab89bc2708124225b93221da28ab1 8840 net optional 
curvedns_0.87-4.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQIcBAEBCAAGBQJZjHRVAAoJEPNPCXROn13ZWZgP/3VvPsyqYgz9Eb7laaVgZ9vr
44br2n6iZHN+SgxYG/EYfzyaWXPrng9AlZj59deFNoUnyHiiFKCqJl1+84JtY0r5
PyjTJUsIKTrERZ/7gFgGvMmc5dxYnRyRGTfYJ1mGWnNeOazy/qIJtm7aktwxX2CA
fGkcSTwG4TbaaWsgeZgsgAA1i468yfrOHGiZJ1Q9yN/3YUox1JpxnEdWGnlezUBA
or7VyIo5MU/CVVIfbpPr/KULTePkz/eQwzoIZPOA1Z6u58gP/ARlI+CHnCxfXKni
XRJ3bIBIAsb9In5cECz0DNGuXad5TPZs1CugOWFsS4ygCuc4IBEVlnQlG9QHJOSP
XITJAOvmr3fOMOBTO6xSN7STO548KXEVF9FNeZ1RxQNlUD8VDm8K4cgBtw+kQo/3
DV8sr5qhERxQlFdSIEuB4Bg3qb0L13g3zLi+76EQJH3Y77YQM6YD9HLzS6MSI9M2
YRVwYSlL3XSTkQzHbRhg6iOPbXmMH5U3e+dH9O+HV2T4eGPa2bQ4bTLgII86t6u5
NUr18rLyexKNwRhtpfbbFndRe/7c4C8i79nyXPHXFj2KF6yrBvLO5LimgYwLs0fr
l14PnudRgd+RZmj6otlHksh9k0FbssjoQDgVaawxHwg3E1oBAn2pTAT2baaO9gnZ
zmMnt87pJIx95iq90fWt
=JBze
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to