netty5/codec-dns/src
Norman Maurer d0bfbdde8e
Detect truncated responses caused by EDNS0 and MTU miss-match (#9468)
Motivation:

It is possible that the user uses a too big EDNS0 setting for the MTU and so we may receive a truncated datagram packet. In this case we should try to detect this and retry via TCP if possible

Modifications:

- Fix detecting of incomplete records
- Mark response as truncated if we did not consume the whole packet
- Add unit test

Result:

Fixes https://github.com/netty/netty/issues/9365
2019-08-17 09:58:22 +02:00
..
main/java/io/netty/handler/codec/dns Detect truncated responses caused by EDNS0 and MTU miss-match (#9468) 2019-08-17 09:58:22 +02:00
test/java/io/netty/handler/codec/dns Detect truncated responses caused by EDNS0 and MTU miss-match (#9468) 2019-08-17 09:58:22 +02:00