mirror of
https://github.com/safing/portmaster
synced 2025-09-01 10:09:11 +00:00
Fix error detection if query was blocked by upstream
This commit is contained in:
parent
9b4d853af3
commit
2248026365
2 changed files with 2 additions and 2 deletions
|
@ -261,7 +261,7 @@ func handleRequest(ctx context.Context, w dns.ResponseWriter, query *dns.Msg) er
|
|||
// TODO: analyze nxdomain requests, malware could be trying DGA-domains
|
||||
tracer.Warningf("nameserver: %s requested %s%s: %s", conn.Process(), q.FQDN, q.QType, err)
|
||||
|
||||
if errors.Is(err, &resolver.BlockedUpstreamError{}) {
|
||||
if errors.Is(err, resolver.ErrBlocked) {
|
||||
conn.Block(err.Error())
|
||||
} else {
|
||||
conn.Failed("failed to resolve: " + err.Error())
|
||||
|
|
|
@ -42,7 +42,7 @@ type BlockedUpstreamError struct {
|
|||
}
|
||||
|
||||
func (blocked *BlockedUpstreamError) Error() string {
|
||||
return fmt.Sprintf("Endpoint blocked by upstream DNS resolver %s", blocked.ResolverName)
|
||||
return fmt.Sprintf("%s by upstream DNS resolver %s", ErrBlocked, blocked.ResolverName)
|
||||
}
|
||||
|
||||
// Unwrap implements errors.Unwrapper
|
||||
|
|
Loading…
Add table
Reference in a new issue