diff options
author | Simon Kelley <simon@thekelleys.org.uk> | 2022-09-09 12:53:49 +0100 |
---|---|---|
committer | Simon Kelley <simon@thekelleys.org.uk> | 2022-09-09 12:53:49 +0100 |
commit | c4b9bc63e0029cf1beaf8bdcbd92fa09f33b599d (patch) | |
tree | 70d186ace578ec9aa02138fbe7b08f77110d46f4 | |
parent | 4447d48bb9ad3c19234594f0a5eb81f7959cbb10 (diff) | |
download | dnsmasq-c4b9bc63e0029cf1beaf8bdcbd92fa09f33b599d.tar.gz |
Fix a problem in overload handling.v2.87
Sending the same query repeatedly to a dnsmasq instance which
doesn't get replies from upstream will eventually hit the
hard limit on frec_src structures and start gettin REFUSED
replies. This is OK, except that since the queries are no longer
being forwarded, an upstream server coming back doesn't reset the
situation. If there is any other traffic, frec allocation will
eventually delete the timed-out frec and get things moving again,
but that's not guaranteed.
To fix this we explicitly delete the frec once timed out in this case.
Thanks to Filip Jenicek for noticing and characterising this problem.
-rw-r--r-- | src/forward.c | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/src/forward.c b/src/forward.c index 8562b2d..fa80251 100644 --- a/src/forward.c +++ b/src/forward.c @@ -244,6 +244,14 @@ static int forward_query(int udpfd, union mysockaddr *udpaddr, if (!daemon->free_frec_src) { query_full(now, NULL); + /* This is tricky; if we're blasted with the same query + over and over, we'll end up taking this path each time + and never resetting until the frec gets deleted by + aging followed by the receipt of a different query. This + is a bit of a DoS vuln. Avoid by explicitly deleting the + frec once it expires. */ + if (difftime(now, forward->time) >= TIMEOUT) + free_frec(forward); goto reply; } |