mirror of
https://github.com/hickory-dns/hickory-dns.git
synced 2026-04-25 19:25:56 +03:00
[GH-ISSUE #332] rfc6761: Add .localhost., .invalid and reverse mapping validation for server #152
Labels
No labels
blocked
breaking-change
bug
bug:critical
bug:tests
cleanup
compliance
compliance
compliance
crate:all
crate:client
crate:native-tls
crate:proto
crate:recursor
crate:resolver
crate:resolver
crate:rustls
crate:server
crate:util
dependencies
docs
duplicate
easy
easy
enhance
enhance
enhance
feature:dns-over-https
feature:dns-over-quic
feature:dns-over-tls
feature:dnsssec
feature:global_lb
feature:mdns
feature:tsig
features:edns
has workaround
ops
perf
platform:WASM
platform:android
platform:fuchsia
platform:linux
platform:macos
platform:windows
pull-request
question
test
tools
tools
trust
unclear
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hickory-dns#152
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @bluejekyll on GitHub (Jan 26, 2018).
Original GitHub issue: https://github.com/hickory-dns/hickory-dns/issues/332
see
client/src/rr/zone.rsandZoneUsagefor matching zone names.@DemiMarie commented on GitHub (Mar 18, 2018):
I will take this.
@DemiMarie commented on GitHub (Apr 4, 2018):
I think I can handle the
.localhostand.invalidparts.@DemiMarie commented on GitHub (Apr 4, 2018):
So this seems like a simple problem of substring matching. For
.invalid, we can simply ignore it at the loading stage (causing the server to return failure by default). For.localhost, we can just add a pinned entry.@bluejekyll commented on GitHub (Apr 4, 2018):
Take a look at this module:
https://github.com/bluejekyll/trust-dns/blob/master/proto/src/rr/domain/usage.rsI think that is what we probably want... the
is_zone_offunction does the proper domain checking...@bluejekyll commented on GitHub (Apr 4, 2018):
The real question in my mind is where we actually perform this check... What I think would be neat is to start a zone validation component, that would check that zones are good to load and serve. I could see this as part of that. Then there is the actual resolution, i.e. returning standard entries for this stuff. For that the question in my mind is, should we just have standard zone files that are loaded (potentially allowing people to change the functionality) or should these be hardcoded entries in the authority...
@DemiMarie commented on GitHub (Apr 4, 2018):
I think we should never pass a request upstream when the RFC prohibits us
from doing so, but I could see uses for allowing local configuration to
override the values we return. This should be opt-in though, perhaps with
a command-line switch. The default should be standards-conforming behavior.
On Wed, Apr 4, 2018, 1:05 PM Benjamin Fry notifications@github.com wrote:
@DemiMarie commented on GitHub (Apr 6, 2018):
Also note that
.oniondomains are reserved for Tor hidden services and shall not be successfully resolved otherwise.@bluejekyll commented on GitHub (Apr 6, 2018):
We can add that, though I don't know if it's RFC compliant. It would also be interesting to talk about
.onionresolution at some point.@moonshiner commented on GitHub (Apr 10, 2018):
RFC 7686 added .onion to the special use registry.