[Dnsmasq-discuss] Bug with NS records when using dnsmasq as authoritative nameserver without specific auth-interface
Thomas Erbesdobler
t.erbesdobler at gmx.de
Wed Feb 25 19:29:52 UTC 2026
Hi all,
I think I've found a bug when using dnsmasq as authoritative nameserver
(e.g. to automatically provide RRs for local DHCP clients) when querying
the NS RR. In particular I'm using dnsmasq with an auth-zone entry,
auth-sec-servers, and an auth-server entry without specifying an
interface (such that dnsmasq will still recurse on all interfaces). The
config is similar to the one below (though I've changed some fields for
anonymity):
interface=<some interface>
bind-interfaces
local=/nonexistingbanana/
domain=nonexistingbanana
no-hosts
#no-resolv
dhcp-range=192.168.0.150,192.168.0.254,12h
server=127.0.0.53
auth-zone=nonexistingbanana.
auth-server=ns1.<externally visible domain>.
auth-sec-servers=ns1.<externally visible domain>.,ns2.<externally
visible domain>.
auth-peer=192.168.1.173
auth-soa=20260225153310,<some contact>,7200,1,8
This config might not be minimal to reproduce the issue. To give some
context: dnsmasq will be used as a "hidden master", and ns1 will AXFR
from it - hence it's required to be specified in auth-server such that
the SOA RR will be correct.
Now, if one queries the NS records, dnsmasq returns the following:
;; ANSWER SECTION:
ns2.rbg.tum.de. 600 IN NS
I\137\198H\133\192\015\132\250\236\255\255\139\@4\168\@u\029\168\016\015\132\235\236\255\255H\139\021\244s\002.
ns1.rbg.tum.de. 600 IN NS
I\137\198H\133\192\015\132\250\236\255\255\139\@4\168\@u\029\168\016\015\132\235\236\255\255H\139\021\244s\002.
Note that the result is correct if one specifies an interface in the
auth-server config option (even if the interface does not exist). It
looks like this strange behavior is caused by a bug in the name
compression logic. The following patch seems to fix it:
diff --git a/src/auth.c b/src/auth.c
index 7c34522..b95e61a 100644
--- a/src/auth.c
+++ b/src/auth.c
@@ -669,14 +669,19 @@ size_t answer_auth(struct dns_header *header, char
*limit, size_t qlen, time_t n
if (!subnet)
for (secondary = daemon->secondary_forward_server;
secondary; secondary = secondary->next)
- if (add_resource_record(header, limit, &trunc, offset, &ansp,
- daemon->auth_ttl, NULL, T_NS,
C_IN, "d", secondary->name))
+ {
+ newoffset = ansp - (unsigned char *)header;
+ if (add_resource_record(header, limit, &trunc, -offset, &ansp,
+ daemon->auth_ttl, NULL, T_NS,
C_IN, "d", offset == 0 ? authname : NULL, secondary->name))
{
+ if (offset == 0)
+ offset = newoffset;
if (ns)
anscount++;
else
authcount++;
}
+ }
}
if (axfr)
I think the bug might have been introduced in git commit
b43585c34baf0c5eb478aa07423da534b2118536 , which made a similar
add_resource_record call for adding the "primary nameserver" (the one in
the SOA RR) conditional. This means that the first NS RR for the
"secondary nameserver" has to check if name compression is possible
instead of simply referring to the name in the first NS RR. Therefore
I've duplicated the logic used with the aforementioned call.
What do you think? And if this was indeed a bug, would it be possible to
include my patch upstream or fix the issue in a different way?
Regards,
Thomas (Erbesdobler)
More information about the Dnsmasq-discuss
mailing list