mirror of
https://github.com/isc-projects/bind9.git
synced 2026-02-23 01:40:23 -05:00
Ensure that dns_request_createvia() has a retry limit
There are a couple of problems with dns_request_createvia(): a UDP
retry count of zero means unlimited retries (it should mean no
retries), and the overall request timeout is not enforced. The
combination of these bugs means that requests can be retried forever.
This change alters calls to dns_request_createvia() to avoid the
infinite retry bug by providing an explicit retry count. Previously,
the calls specified infinite retries and relied on the limit implied
by the overall request timeout and the UDP timeout (which did not work
because the overall timeout is not enforced). The `udpretries`
argument is also changed to be the number of retries; previously, zero
was interpreted as infinity because of an underflow to UINT_MAX, which
appeared to be a mistake. And `mdig` is updated to match the change in
retry accounting.
The bug could be triggered by zone maintenance queries, including
NOTIFY messages, DS parental checks, refresh SOA queries and stub zone
nameserver lookups. It could also occur with `nsupdate -r 0`.
(But `mdig` had its own code to avoid the bug.)
(cherry picked from commit 71ce8b0a51)
This commit is contained in:
parent
9bcc537882
commit
4191fd01be
7 changed files with 29 additions and 11 deletions
3
CHANGES
3
CHANGES
|
|
@ -1,3 +1,6 @@
|
|||
5855. [bug] Ensure that zone maintenance queries have a retry limit.
|
||||
[GL #3242]
|
||||
|
||||
5853. [bug] When using both the `+qr` and `+y` options `dig` could
|
||||
crash if the connection to the first server was not
|
||||
successful. [GL #3244]
|
||||
|
|
|
|||
|
|
@ -32,4 +32,6 @@ zone "example" {
|
|||
type secondary;
|
||||
primaries { 10.53.0.2; };
|
||||
file "example.bk";
|
||||
# non-responsive notify recipient (no reply, no ICMP errors)
|
||||
also-notify { 10.53.10.53; };
|
||||
};
|
||||
|
|
|
|||
|
|
@ -211,5 +211,9 @@ grep "sending notify to 10.53.0.5#[0-9]* : TSIG (c)" ns5/named.run > /dev/null |
|
|||
|
||||
test_end
|
||||
|
||||
test_start "checking notify retries expire within 45 seconds ($n)"
|
||||
wait_for_log 45 'retries exceeded' ns3/named.run || ret=1
|
||||
test_end
|
||||
|
||||
echo_i "exit status: $status"
|
||||
[ $status -eq 0 ] || exit 1
|
||||
|
|
|
|||
|
|
@ -1458,7 +1458,6 @@ plus_option(char *option, struct query *query, bool global) {
|
|||
result = parse_uint(&query->udpretries, value,
|
||||
MAXTRIES - 1, "udpretries");
|
||||
CHECK("parse_uint(udpretries)", result);
|
||||
query->udpretries++;
|
||||
break;
|
||||
default:
|
||||
goto invalid_option;
|
||||
|
|
@ -1579,8 +1578,8 @@ plus_option(char *option, struct query *query, bool global) {
|
|||
result = parse_uint(&query->udpretries, value, MAXTRIES,
|
||||
"udpretries");
|
||||
CHECK("parse_uint(udpretries)", result);
|
||||
if (query->udpretries == 0) {
|
||||
query->udpretries = 1;
|
||||
if (query->udpretries > 0) {
|
||||
query->udpretries -= 1;
|
||||
}
|
||||
break;
|
||||
case 't':
|
||||
|
|
@ -1947,7 +1946,7 @@ parse_args(bool is_batchfile, int argc, char **argv) {
|
|||
default_query.ecs_addr = NULL;
|
||||
default_query.timeout = 0;
|
||||
default_query.udptimeout = 0;
|
||||
default_query.udpretries = 3;
|
||||
default_query.udpretries = 2;
|
||||
ISC_LINK_INIT(&default_query, link);
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -55,3 +55,12 @@ Bug Fixes
|
|||
- Handling of the TCP write timeouts has been improved to track timeout
|
||||
for each TCP write separately leading to faster connection tear down
|
||||
in case the other party is not reading the data. :gl:`#3200`
|
||||
|
||||
- Zone maintenance DNS queries would retry forever while the
|
||||
destination server was unreachable. These queries include outgoing
|
||||
NOTIFY messages, refresh SOA queries, parental DS checks, and stub
|
||||
zone NS queries. For example, if a zone has any nameservers with
|
||||
IPv6 addresses and a secondary server without IPv6 connectivity, the
|
||||
IPv4-only server would keep trying to send a growing amount of
|
||||
NOTIFY traffic over IPv6. This futile traffic was not logged.
|
||||
:gl:`#3242`
|
||||
|
|
|
|||
|
|
@ -535,7 +535,7 @@ dns_request_createraw(dns_requestmgr_t *requestmgr, isc_buffer_t *msgbuf,
|
|||
tcp = true;
|
||||
request->timeout = timeout * 1000;
|
||||
} else {
|
||||
if (udptimeout == 0 && udpretries != 0) {
|
||||
if (udptimeout == 0) {
|
||||
udptimeout = timeout / (udpretries + 1);
|
||||
}
|
||||
if (udptimeout == 0) {
|
||||
|
|
@ -1080,7 +1080,8 @@ req_response(isc_result_t result, isc_region_t *region, void *arg) {
|
|||
|
||||
if (result == ISC_R_TIMEDOUT) {
|
||||
LOCK(&request->requestmgr->locks[request->hash]);
|
||||
if (--request->udpcount != 0) {
|
||||
if (request->udpcount != 0) {
|
||||
request->udpcount -= 1;
|
||||
dns_dispatch_resume(request->dispentry,
|
||||
request->timeout);
|
||||
if (!DNS_REQUEST_SENDING(request)) {
|
||||
|
|
|
|||
|
|
@ -12681,7 +12681,7 @@ notify_send_toaddr(isc_task_t *task, isc_event_t *event) {
|
|||
}
|
||||
result = dns_request_createvia(
|
||||
notify->zone->view->requestmgr, message, &src, ¬ify->dst,
|
||||
dscp, options, key, timeout * 3, timeout, 0, notify->zone->task,
|
||||
dscp, options, key, timeout * 3, timeout, 2, notify->zone->task,
|
||||
notify_done, notify, ¬ify->request);
|
||||
if (result == ISC_R_SUCCESS) {
|
||||
if (isc_sockaddr_pf(¬ify->dst) == AF_INET) {
|
||||
|
|
@ -13410,7 +13410,7 @@ stub_request_nameserver_address(struct stub_cb_args *args, bool ipv4,
|
|||
result = dns_request_createvia(
|
||||
zone->view->requestmgr, message, &zone->sourceaddr,
|
||||
&zone->primaryaddr, args->dscp, DNS_REQUESTOPT_TCP,
|
||||
args->tsig_key, args->timeout * 3, args->timeout, 0, zone->task,
|
||||
args->tsig_key, args->timeout * 3, args->timeout, 2, zone->task,
|
||||
stub_glue_response_cb, request, &request->request);
|
||||
|
||||
if (result != ISC_R_SUCCESS) {
|
||||
|
|
@ -14658,7 +14658,7 @@ again:
|
|||
}
|
||||
result = dns_request_createvia(
|
||||
zone->view->requestmgr, message, &zone->sourceaddr,
|
||||
&zone->primaryaddr, dscp, options, key, timeout * 3, timeout, 0,
|
||||
&zone->primaryaddr, dscp, options, key, timeout * 3, timeout, 2,
|
||||
zone->task, refresh_callback, zone, &zone->request);
|
||||
if (result != ISC_R_SUCCESS) {
|
||||
zone_idetach(&dummy);
|
||||
|
|
@ -14945,7 +14945,7 @@ ns_query(dns_zone_t *zone, dns_rdataset_t *soardataset, dns_stub_t *stub) {
|
|||
result = dns_request_createvia(
|
||||
zone->view->requestmgr, message, &zone->sourceaddr,
|
||||
&zone->primaryaddr, dscp, DNS_REQUESTOPT_TCP, key, timeout * 3,
|
||||
timeout, 0, zone->task, stub_callback, cb_args, &zone->request);
|
||||
timeout, 2, zone->task, stub_callback, cb_args, &zone->request);
|
||||
if (result != ISC_R_SUCCESS) {
|
||||
zone_debuglog(zone, me, 1, "dns_request_createvia() failed: %s",
|
||||
isc_result_totext(result));
|
||||
|
|
@ -21350,7 +21350,7 @@ checkds_send_toaddr(isc_task_t *task, isc_event_t *event) {
|
|||
options |= DNS_REQUESTOPT_TCP;
|
||||
result = dns_request_createvia(
|
||||
checkds->zone->view->requestmgr, message, &src, &checkds->dst,
|
||||
dscp, options, key, timeout * 3, timeout, 0,
|
||||
dscp, options, key, timeout * 3, timeout, 2,
|
||||
checkds->zone->task, checkds_done, checkds, &checkds->request);
|
||||
if (result != ISC_R_SUCCESS) {
|
||||
dns_zone_log(
|
||||
|
|
|
|||
Loading…
Reference in a new issue