Le 29/12/2017 à 18:27, Andrew W a écrit :

On 27/12/2017 13:18, Bernhard Schmidt wrote:
Current BIND9 defaults to doing DNSSEC verification. DNSSEC needs large
packets. You might have an issue with UDP fragments being dropped at
your firewall/NAT Gateway?

Thanks for this tip. Looking into it I discovered TCP seems to be recommened for DNSSEC so Ive enabled TCP port 53  and so far not had a problem!

AFAIK TCP is just a fall-back transport to work around UDP packet size issues. Compared to UDP, TCP transport for DNS wastes system and network resources.

Reply via email to