On 7/9/21 11:57 PM, Simon Kelley wrote:
> On 09/07/2021 11:26, Petr Menšík wrote:
>> Hi,
>>
>> just personal opinion. I think all described variants should end with
>> configuration error. Desired behavior conflicts for all types. I see no
>> reason to have both at the same time when only one can be active. If we
>> care much about specific use case, it should print at least warning
>> visible in dnsmasq --test output. I would exit with fatal and require
>> user to specify clearly what is desired. Leaving only one variant
>> without caring about their order. Just comment out the line you do not
>> want active.
>>
>> As a minimum, it should warn there are conflicting orders for a single
>> domain.
>
> Order doesn't matter. As a general rule, and with very few exceptions,
> order of configuration _never_ matters in dnsmasq.
>
> The conflict is defined by priority;
>
> --server=/example.com/1.2.3.4
>
> always has higher priority than
>
> --address=/example.com/
>
> I think that's pretty reasonable.

Is it? Administrator requested both forwarding example.com to 1.2.3.4
and sending NXDOMAIN for the name. Whatever priority it takes, one of
them would be ignored and behaves like only one of these lines were
specified.

Administrator should know that just by checking dnsmasq.conf.

Citing man page:

--address=/example.com/ is equivalent to --server=/example.com/

Why would have forwarder IP higher priority than authoritative NXDOMAIN
response? It would be opposite way on common server with authoritative
zone such as bind9. Authoritative zone answers have higher priorities
than forwarders. I think conflicting instructions should not be silently
ignored to avoid confusion, especially those provided explicitly by the
user.

I think it is not well specified in manual page. Instead of describing
arbitrary priorities, I would request user to specify only
non-conflicting configuration.

>
>
> Cheers,
>
> Simon.
>
>
>
>> Cheers,
>>
>> Petr
>>
>> On 7/6/21 1:14 PM, Kevin Darbyshire-Bryant wrote:
>>> Hi Simon,
>>>
>>> An eager OpenWrt tester of current dnsmasq master has noticed the following 
>>> change in behaviour:
>>>
>>> Openwrt uses a conf file containing a list of RFC6761 domains that are 
>>> considered undesirable to forward, reducing load on upstream servers etc.  
>>> This conf file contains lines such as "server=/onion/“.  Said user 
>>> overrides this with a line in main config file 
>>> ’server=/onion/127.0.0.1#2053’.  Unfortunately current dnsmasq looks 
>>> through its servers and returns ’NXDOMAIN’.  dnsmasq v2.85 says ‘yeah fine, 
>>> I’ll forward that to 127.0.0.1#2053’
>>>
>>> The are two solutions to this: 1) drop ’server=/onion/‘ from the RFC6761 
>>> config file - 2)  Take advantage of new syntax and use 
>>> ’server=/*.onion/127.0.0.1#2053’
>>>
>>> I’m flagging this as a change in behaviour and I’m not sure how 
>>> syntactically it can or even should be fixed, or just documented as a 
>>> change in behaviour. eg.
>>>
>>> Should there be a difference (& what should it be) between
>>>
>>> --server=/onion/
>>> --server=/onion/127.0.0.1#2053
>>>
>>> (forward to 127.0.0.1#2053)
>>>
>>> and
>>>
>>> --server=/onion/127.0.0.1#2053
>>> --server=/onion/
>>>
>>> (not sure!)
>>>
>>> or even worse
>>>
>>> --server=/onion/127.0.0.1#2053
>>> --server=/onion/
>>> --server=/onion/127.0.0.1#2153
>>>
>>> (use both #2053 & #2153?)
>>>
>>> Cheers,
>>>
>>> Kevin D-B
>>>
>>> gpg: 012C ACB2 28C6 C53E 9775  9123 B3A2 389B 9DE2 334A
>>>
>>> -- 
>>> Petr Menšík
>>> Software Engineer
>>> Red Hat, http://www.redhat.com/
>>> email: pemen...@redhat.com
>>> PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB

-- 
Petr Menšík
Software Engineer
Red Hat, http://www.redhat.com/
email: pemen...@redhat.com
PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB



_______________________________________________
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss

Reply via email to