mirror of
https://github.com/hickory-dns/hickory-dns.git
synced 2026-04-25 19:25:56 +03:00
[GH-ISSUE #3331] Resolving .onion addresses is instantly rejected with NxDomain, even in environments where it's valid #1169
Labels
No labels
blocked
breaking-change
bug
bug:critical
bug:tests
cleanup
compliance
compliance
compliance
crate:all
crate:client
crate:native-tls
crate:proto
crate:recursor
crate:resolver
crate:resolver
crate:rustls
crate:server
crate:util
dependencies
docs
duplicate
easy
easy
enhance
enhance
enhance
feature:dns-over-https
feature:dns-over-quic
feature:dns-over-tls
feature:dnsssec
feature:global_lb
feature:mdns
feature:tsig
features:edns
has workaround
ops
perf
platform:WASM
platform:android
platform:fuchsia
platform:linux
platform:macos
platform:windows
pull-request
question
test
tools
tools
trust
unclear
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hickory-dns#1169
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @nabijaczleweli on GitHub (Oct 25, 2025).
Original GitHub issue: https://github.com/hickory-dns/hickory-dns/issues/3331
Describe the bug
hickory-dns rejects resolving onion addresses.
To Reproduce
Steps to reproduce the behavior: try to do that.
Expected behavior
Should work when DNS can resolve onion addresses.
System:
Version:
Crate: resolver (for matching .onion in inner_lookup), proto (for having the broken ONION definition)
Version:
aef1fcc1f0, 0.24.4Additional context
The easiest way to get to an environment where the recursor resolves
.onionaddresses is runningtor DNSPort 53 AutomapHostsOnResolve 1with a resolv.conf ofnameserver 127.0.0.1.(The regular way to do this is torsocks, but that only patches the libc resolver.)
@djc commented on GitHub (Oct 26, 2025):
I'm open to reviewing a PR for this. Not sure how you mean that proto has a broken .onion definition. (We won't be releasing any 0.24.x versions, but if you want to backport to
release/0.25we can release that, too.)@cpu commented on GitHub (Oct 26, 2025):
Hmm, RFC 7686 is fairly clear about how resolvers should respond to lookup requests for the special purpose
.onionTLD:A quick read makes it sound like NXDOMAIN is the correct response since I don't think we would want to implement the tor-rendezvous protocol in this crate?
The guidance is similar for caching and authoritative servers.
@marcus0x62 commented on GitHub (Oct 27, 2025):
Yes. This was done intentionally in #1479 (see discussion in #1382.)