PARSE_ERROR when querying large size TXT records #3128
Replies: 2 comments 2 replies
-
|
DNS responses are limited to 4096 bytes, which is already quite large. Legitimate responses (i.e., not used for tunneling or DDoS amplification) exceeding this size are extremely rare. You can change the The examples you mentioned are an accumulation of forgotten one-time service verification tokens. It's unlikely that they are relevant to your applications or even to the original reason they were added. For legitimate usage, the limit is large enough and will not be changed. |
Beta Was this translation helpful? Give feedback.
-
|
dnscrypt-proxy/dnscrypt-proxy/resolve.go Line 59 in 7b90eaf @jedisct1 Force TCP bypass? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
When DNS responses from upstream are large in size dnscrypt-proxy fails with a
PARSE_ERROR, only visible in DEBUG logs and doesn't return anything to the client.Some test domains with ~4000 bytes of TXT records are -
microsoft.com,amazon.comIdeal Behaviour
dig microsoft.com TXT @dnscrypt-proxy-instance.TC(Truncation) flag to client so that client switches to TCP for successfully receiving the large DNS response.Observed Behaviour
PARSE_ERRORSteps taken to resolve issue
googlecloudflarecloudflare-ipv6etc.force_tcp = truedig +tcpLogs
Beta Was this translation helpful? Give feedback.
All reactions