On 06/30/2015 07:01 PM, Paul Wouters wrote:
> With that many CNAMEs requiring validation and intermittent failure, my guess 
> is your wifi is dropping a significant amount of queries.

It could also be NAT state table overflow.

> This is a case where shorter negative cache lifetimes should help a lot. This 
> should come into dnssec-trigger very soon.

If it's the state table overflow, this won't help and could make the
situation worse.

Disabling DNS prefetching in the browser might improve things.  So would
using TCP.  Few consumer NAT devices are optimized for DNS over UDP with
active source port randomization.  (It's difficult to configure this
even with iptables because the relevant tools are undocumented.)

Disabling various Unbound hardening options also reduces the number of
flows needed.  In the end, it could be necessary to perform queries for
which a secure answer is expected with a constant source port.

-- 
Florian Weimer / Red Hat Product Security
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Reply via email to