-
Notifications
You must be signed in to change notification settings - Fork 15
-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bug!!! #1
Comments
Thanks for the report. This one is a little odd - by default Google gives you quite a bit of information back, which you can add to DNS replies (and I do) but dig tends not to like it. By and large, it seems to keep working as a practical resolver. |
$ nslookup
Non-authoritative answer:
Non-authoritative answer: |
This is because it cannot handle CNAME type answers. This hack just ignores them: @@ -259,7 +174,10 @@ func proxy(addr string, w dns.ResponseWriter, req *dns.Msg) {
// Parse google RRs to DNS RRs
answers := []dns.RR{}
for _, a := range dnsResp.Answer {
- answers = append(answers, NewRR(a))
+ log.Debugln(a)
+ if (a.Type != 5) {
+ answers = append(answers, NewRR(a))
+ }
}
// Parse google RRs to DNS RRs |
thx! |
nslookup www.facebook.com Non-authoritative answer: ping www.facebook.com |
netstat -lunp|egrep 63
udp 0 0 0.0.0.0:63 0.0.0.0:* 19550/dns-over-http
dig www.facebook.com -p 63
;; Warning: Message parser reports malformed message packet.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> www.facebook.com -p 63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33103
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0
;; WARNING: Message has 43 extra bytes at end
;; QUESTION SECTION:
;www.facebook.com. IN A
;; Query time: 634 msec
;; SERVER: 127.0.0.1#63(127.0.0.1)
;; WHEN: Tue Jun 21 18:45:34 CST 2016
;; MSG SIZE rcvd: 105
The text was updated successfully, but these errors were encountered: