mirror of
https://github.com/hickory-dns/hickory-dns.git
synced 2026-04-25 11:15:54 +03:00
[PR #586] [MERGED] Wrap types in Restrict and force validation before usage #1534
Labels
No labels
blocked
breaking-change
bug
bug:critical
bug:tests
cleanup
compliance
compliance
compliance
crate:all
crate:client
crate:native-tls
crate:proto
crate:recursor
crate:resolver
crate:resolver
crate:rustls
crate:server
crate:util
dependencies
docs
duplicate
easy
easy
enhance
enhance
enhance
feature:dns-over-https
feature:dns-over-quic
feature:dns-over-tls
feature:dnsssec
feature:global_lb
feature:mdns
feature:tsig
features:edns
has workaround
ops
perf
platform:WASM
platform:android
platform:fuchsia
platform:linux
platform:macos
platform:windows
pull-request
question
test
tools
tools
trust
unclear
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hickory-dns#1534
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/hickory-dns/hickory-dns/pull/586
Author: @bluejekyll
Created: 10/13/2018
Status: ✅ Merged
Merged: 10/19/2018
Merged by: @bluejekyll
Base:
master← Head:decoder-restrictions📝 Commits (7)
69d2af5Add Restrict type5df662dmake all data read from BinDecoder Restrict68faf34make rdata_length Restricted on all readsea7fe66properly verify NSEC type map length dataab5ae89document all usages of unverified8abe735convert all checked_math ops to return Restrict9ec1098stricter length evaluation in nsec3 and fixed review changes from #586📊 Changes
31 files changed (+591 additions, -331 deletions)
View changed files
📝
proto/src/op/header.rs(+14 -31)📝
proto/src/rr/dns_class.rs(+3 -3)📝
proto/src/rr/dnssec/algorithm.rs(+1 -1)📝
proto/src/rr/dnssec/digest_type.rs(+1 -0)📝
proto/src/rr/dnssec/rdata/dnskey.rs(+24 -19)📝
proto/src/rr/dnssec/rdata/ds.rs(+12 -7)📝
proto/src/rr/dnssec/rdata/key.rs(+20 -19)📝
proto/src/rr/dnssec/rdata/mod.rs(+1 -1)📝
proto/src/rr/dnssec/rdata/nsec.rs(+10 -7)📝
proto/src/rr/dnssec/rdata/nsec3.rs(+63 -31)📝
proto/src/rr/dnssec/rdata/nsec3param.rs(+13 -9)📝
proto/src/rr/dnssec/rdata/sig.rs(+19 -43)📝
proto/src/rr/domain/name.rs(+15 -11)📝
proto/src/rr/rdata/a.rs(+4 -4)📝
proto/src/rr/rdata/aaaa.rs(+8 -8)📝
proto/src/rr/rdata/caa.rs(+34 -29)📝
proto/src/rr/rdata/mx.rs(+1 -1)📝
proto/src/rr/rdata/null.rs(+5 -12)📝
proto/src/rr/rdata/opt.rs(+16 -8)📝
proto/src/rr/rdata/soa.rs(+5 -5)...and 11 more files
📄 Description
@hawkw you may be interested in reviewing this? I broke it up into three commits to follow more easily.
@oherrala I think this completely covers all uses where data read from potentially malicious packets.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.