Am 11.12.2011 20:00, schrieb Ed W: > Hi, I have setup my DHCP to allocate to 192.168.111.0/24. However, I > notice queries from my ipad for various PTR records for this range > getting forwarded to my upstream DNS, eg: > > Dec 11 18:25:55 localhost daemon.info dnsmasq[32485]: query[PTR] > b._dns-sd._udp.225.177.159.10.in-addr.arpa from 192.168.111.137 > Dec 11 18:25:55 localhost daemon.info dnsmasq[32485]: forwarded > b._dns-sd._udp.225.177.159.10.in-addr.arpa to 8.8.8.8 > Dec 11 18:25:55 localhost daemon.info dnsmasq[32485]: forwarded > b._dns-sd._udp.225.177.159.10.in-addr.arpa to 8.8.4.4 > Dec 11 18:25:55 localhost daemon.info dnsmasq[32485]: query[PTR] > db._dns-sd._udp.225.177.159.10.in-addr.arpa from 192.168.111.137 > Dec 11 18:25:55 localhost daemon.info dnsmasq[32485]: forwarded > db._dns-sd._udp.225.177.159.10.in-addr.arpa to 8.8.8.8 > Dec 11 18:25:55 localhost daemon.info dnsmasq[32485]: forwarded > db._dns-sd._udp.225.177.159.10.in-addr.arpa to 8.8.4.4 > Dec 11 18:25:55 localhost daemon.info dnsmasq[32485]: query[PTR] > r._dns-sd._udp.225.177.159.10.in-addr.arpa from 192.168.111.137 > Dec 11 18:25:55 localhost daemon.info dnsmasq[32485]: forwarded > r._dns-sd._udp.225.177.159.10.in-addr.arpa to 8.8.8.8 > Dec 11 18:25:55 localhost daemon.info dnsmasq[32485]: forwarded > r._dns-sd._udp.225.177.159.10.in-addr.arpa to 8.8.4.4 > > > I try and block these using: > > server=/111.168.192.in-addr.arpa/127.0.0.1
The logs above show queries for a different address, namely for 10.159.177.225. The server line filters after query contents, not after source IP. > I'm still left with the ipad inexplicably doing some more queries for > some 10.x.x.x ips... No idea how/why, can't see this IP anywhere on my > network: > > Dec 11 18:28:08 localhost daemon.info dnsmasq[590]: query[PTR] > dr._dns-sd._udp.225.177.159.10.in-addr.arpa from 192.168.111.137 This is zeroconfiguration DNS-based service discovery stuff. Check Wikipedia for "Zeroconf". > Dec 11 18:28:08 localhost daemon.info dnsmasq[590]: forwarded > dr._dns-sd._udp.225.177.159.10.in-addr.arpa to 8.8.8.8 > Dec 11 18:28:08 localhost daemon.info dnsmasq[590]: forwarded > dr._dns-sd._udp.225.177.159.10.in-addr.arpa to 8.8.4.4 > Dec 11 18:28:08 localhost daemon.info dnsmasq[590]: query[PTR] > lb._dns-sd._udp.225.177.159.10.in-addr.arpa from 192.168.111.137 > Dec 11 18:28:08 localhost daemon.info dnsmasq[590]: forwarded > lb._dns-sd._udp.225.177.159.10.in-addr.arpa to 8.8.8.8 > Dec 11 18:28:08 localhost daemon.info dnsmasq[590]: forwarded > lb._dns-sd._udp.225.177.159.10.in-addr.arpa to 8.8.4.4 > > > > How can I tell dnsmasq that it's effectively authoritive for reverse > lookups for private IP ranges and prevent upstream lookups? I do have > "bogus-priv" set. Dnsmasq-1.58 By adding another server-line for 10.in-addr.arpa.