Skip to content

DNS resolution is broken for some addresses in master/2.0-pre #18334

@pfalcon

Description

@pfalcon

Steps to reproduce: Apply following patch:

diff --git a/samples/net/sockets/http_get/src/http_get.c b/samples/net/sockets/http_get/src/http_get.c
index 4c2ebd2962..016014e45c 100644
--- a/samples/net/sockets/http_get/src/http_get.c
+++ b/samples/net/sockets/http_get/src/http_get.c
@@ -28,7 +28,7 @@
 #endif
 
 /* HTTP server to connect to */
-#define HTTP_HOST "google.com"
+#define HTTP_HOST "mqtt.2030.ltsapis.goog"
 /* Port to connect to, as string */
 #if defined(CONFIG_NET_SOCKETS_SOCKOPT_TLS)
 #define HTTP_PORT "443"

And run the sample above. In other words, try to resolve address "mqtt.2030.ltsapis.goog" (this is valid address, used by Google's https://github.com/GoogleCloudPlatform/iot-device-sdk-embedded-c)

The culprit, from bisecting, is ef10937:

ef1093755328e7ecab2965b273110d57b4d76931 is the first bad commit
commit ef1093755328e7ecab2965b273110d57b4d76931
Author: Jukka Rissanen <[email protected]>
Date:   Tue Jun 25 10:01:54 2019 +0300

    net: dns: Make dns_unpack_answer() to check non-compressed answers
    
    Modify dns_unpack_answer() function to check if the answer is
    compressed or not, and return correct values regardless.
    
    Fixes #16594
    
    Signed-off-by: Jukka Rissanen <[email protected]>

Metadata

Metadata

Assignees

Labels

area: NetworkingbugThe issue is a bug, or the PR is fixing a bugpriority: highHigh impact/importance bug

Type

Projects

No projects

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions