summaryrefslogtreecommitdiff
path: root/test/sched_rr_bad.service
diff options
context:
space:
mode:
authorLennart Poettering <lennart@poettering.net>2016-01-08 17:10:49 +0100
committerLennart Poettering <lennart@poettering.net>2016-01-11 19:40:00 +0100
commit91adc4db33f69606aabd332813a5d7d5751c859f (patch)
treeba1435ba438cb3148c1729c3aa20241db70eb6d2 /test/sched_rr_bad.service
parent29ab055292924329ab0512ddb83846a53dd8e0ab (diff)
resolved: don't attempt to send queries for DNSSEC RR types to servers not supporting them
If we already degraded the feature level below DO don't bother with sending requests for DS, DNSKEY, RRSIG, NSEC, NSEC3 or NSEC3PARAM RRs. After all, we cannot do DNSSEC validation then anyway, and we better not press a legacy server like this with such modern concepts. This also has the benefit that when we try to validate a response we received using DNSSEC, and we detect a limited server support level while doing so, all further auxiliary DNSSEC queries will fail right-away.
Diffstat (limited to 'test/sched_rr_bad.service')
0 files changed, 0 insertions, 0 deletions