tailscale/tailcfg
Andrew Dunham 530aaa52f1 net/dns: retry forwarder requests over TCP
We weren't correctly retrying truncated requests to an upstream DNS
server with TCP. Instead, we'd return a truncated request to the user,
even if the user was querying us over TCP and thus able to handle a
large response.

Also, add an envknob and controlknob to allow users/us to disable this
behaviour if it turns out to be buggy ( DNS ).

Updates #9264

Signed-off-by: Andrew Dunham <andrew@du.nham.ca>
Change-Id: Ifb04b563839a9614c0ba03e9c564e8924c1a2bfd
2023-09-25 16:42:07 -04:00
..
c2ntypes.go ipn/ipnlocal: add logging and locking to c2n /update (#9290) 2023-09-08 14:26:55 -07:00
derpmap.go net/netcheck, tailcfg: add DERPHomeParams and use it 2023-07-13 22:41:21 -04:00
tailcfg_clone.go all: declare & plumb IPv6 masquerade address for peer 2023-09-18 21:27:36 -07:00
tailcfg_test.go all: declare & plumb IPv6 masquerade address for peer 2023-09-18 21:27:36 -07:00
tailcfg_view.go all: declare & plumb IPv6 masquerade address for peer 2023-09-18 21:27:36 -07:00
tailcfg.go net/dns: retry forwarder requests over TCP 2023-09-25 16:42:07 -04:00
tka.go tailcfg: add RPC structs for /tka/affected-sigs 2023-02-21 21:58:38 +00:00