Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Federation client shouldn't follow CNAME records in SRV records #127

Open
babolivier opened this issue Apr 2, 2019 · 3 comments
Open

Federation client shouldn't follow CNAME records in SRV records #127

babolivier opened this issue Apr 2, 2019 · 3 comments
Labels

Comments

@babolivier
Copy link
Contributor

RFC2782 forbids CNAME records as SRV record targets but we need to check it because Go completely ignores that

@richvdh
Copy link
Member

richvdh commented Apr 2, 2019

this turns out to be surprisingly hard to do correctly in Go, so I'm not sure this is worth fixing. It's pretty harmless if we are a bit too tolerant.

@spaetz
Copy link
Contributor

spaetz commented Jul 10, 2022

I know it forbids it, but everytime a server lets me specify a CNAME nonetheless, I dance a happy dance. Even if not accordingly strictly to spec, it is not wrong to be a bit lenient, so I propose to not do anything about this and close the issue :-)

@richvdh
Copy link
Member

richvdh commented Jul 11, 2022

I fundamentally disagree with past-me here.

Given the question "should CNAMEs be accepted as the target of SRV records", there should be one answer that applies to the whole of the matrix ecosystem, otherwise we'll be in the frustrating situation of connections working intermittently. (eg, you'll be able to federate with servers written in Go, but not in Python)

Before completely deciding what to do here, I'd be interested to know what Synapse does, but given, as Brendan says, CNAMEs are not normally valid as the target of SRV records, I am inclined to say they should not be accepted.

Related: matrix-org/matrix-spec#606

@kegsay kegsay added the T-Defect label Dec 6, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants