diff options
author | 2018-01-03 11:11:56 +0000 | |
---|---|---|
committer | 2018-01-03 11:11:56 +0000 | |
commit | 311af9314dc9cd3db3bfe6a4e212d5842151e9fb (patch) | |
tree | 79bc694919e28cdb966058024fcafcd4d06ef97d /plugin/dnssec/handler.go | |
parent | 7fe5b0bb1f34735859d611e170fa8709adac73ea (diff) | |
download | coredns-311af9314dc9cd3db3bfe6a4e212d5842151e9fb.tar.gz coredns-311af9314dc9cd3db3bfe6a4e212d5842151e9fb.tar.zst coredns-311af9314dc9cd3db3bfe6a4e212d5842151e9fb.zip |
plugin/dnssec: implement shotgun from CloudFlare (#1305)
* plugin/dnssec: implement shotgun from CloudFlare
Put a whole bunch of types in the NSEC bitmap and remove the one that's
being asked for.
Add more records for queries to the apex, SOA, DNSKEY, MX.
Diffstat (limited to 'plugin/dnssec/handler.go')
-rw-r--r-- | plugin/dnssec/handler.go | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/plugin/dnssec/handler.go b/plugin/dnssec/handler.go index 0fde35dd7..0bef73afa 100644 --- a/plugin/dnssec/handler.go +++ b/plugin/dnssec/handler.go @@ -23,6 +23,8 @@ func (d Dnssec) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) return plugin.NextOrFailure(d.Name(), d.Next, ctx, w, r) } + state.Zone = zone + // Intercept queries for DNSKEY, but only if one of the zones matches the qname, otherwise we let // the query through. if qtype == dns.TypeDNSKEY { |