mirror of
https://github.com/hickory-dns/hickory-dns.git
synced 2026-04-25 03:05:51 +03:00
[GH-ISSUE #2067] No option to select cert root at hickory_server #871
Labels
No labels
blocked
breaking-change
bug
bug:critical
bug:tests
cleanup
compliance
compliance
compliance
crate:all
crate:client
crate:native-tls
crate:proto
crate:recursor
crate:resolver
crate:resolver
crate:rustls
crate:server
crate:util
dependencies
docs
duplicate
easy
easy
enhance
enhance
enhance
feature:dns-over-https
feature:dns-over-quic
feature:dns-over-tls
feature:dnsssec
feature:global_lb
feature:mdns
feature:tsig
features:edns
has workaround
ops
perf
platform:WASM
platform:android
platform:fuchsia
platform:linux
platform:macos
platform:windows
pull-request
question
test
tools
tools
trust
unclear
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hickory-dns#871
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @LuckyTurtleDev on GitHub (Oct 17, 2023).
Original GitHub issue: https://github.com/hickory-dns/hickory-dns/issues/2067
Describe the bug
No option to select cert root at hickory_server. Looks like it was missing to forward the feature flags for hickory-resolver.
To Reproduce
Cargo.toml
Make a dot request using trust-dns-server(forward config) and it will fail with the following error message:
Expected behavior
Opiton to enable cert root
System:
Version:
Crate: [hickory-server]
Version: [0.24.0]
Additional context
Current work around:
@djc commented on GitHub (Oct 17, 2023):
See also #2066. We should probably avoid pulling rustls-native-certs/webpki-roots unless the forwarding authority is explicitly enabled?
@LuckyTurtleDev commented on GitHub (Oct 17, 2023):
Not sure if this is the same issue. It should be fined to have no default certs, but it should be possible to enable them.
I think a rustls-native-certs/webpki-roots feature should only be possible to enable, if the doh, doq, doc or dot feature is enable.Maybe a forwarding authority feature together with rustls-native-certs/webpki-roots would be a good idea.