Em 06-12-2013 14:31, Chris Smith escreveu:
> This falls under the category "When in doubt, ask the OpenBSD guys"
> (and as all of my firewalls are running OpenBSD I hope this isn't too
> off topic).
>
> Basically, four of my networks are not getting an answer for a
> specific mx query from dyn.com's DNS server. Yet every other DNS cache
> I've queried works just fine (Google, Level3, Hurricane Electric,
> Comcast, etc.) and dyn's support claims there is no problem on their
> end and all of their tests return the proper answer just as one of my
> networks does.
>
> Results from the four non-working networks (two are on Comcast, one is AT&T):
> =========================================
> dig @216.146.35.35 lwtitle.com mx
>
> ; <<>> DiG 9.4.2-P2 <<>> @216.146.35.35 lwtitle.com mx
> ; (1 server found)
> ;; global options:  printcmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5502
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
>
> ;; QUESTION SECTION:
> ;lwtitle.com.                   IN      MX
>
> ;; Query time: 29 msec
> ;; SERVER: 216.146.35.35#53(216.146.35.35)
> ;; WHEN: Fri Dec  6 11:18:05 2013
> ;; MSG SIZE  rcvd: 29
> =========================================
> Consequently mail fails to get sent to the lwtitle.com domain.
>
> I should note that if I dig with +trace the proper answer does show up:
> =========================================
> dig @216.146.35.35 lwtitle.com mx +trace
>
> ; <<>> DiG 9.4.2-P2 <<>> @216.146.35.35 lwtitle.com mx +trace
> ; (1 server found)
> ;; global options:  printcmd
> .                       518400  IN      NS      a.root-servers.net.
> .                       518400  IN      NS      b.root-servers.net.
> .                       518400  IN      NS      c.root-servers.net.
> .                       518400  IN      NS      d.root-servers.net.
> .                       518400  IN      NS      e.root-servers.net.
> .                       518400  IN      NS      f.root-servers.net.
> .                       518400  IN      NS      g.root-servers.net.
> .                       518400  IN      NS      h.root-servers.net.
> .                       518400  IN      NS      i.root-servers.net.
> .                       518400  IN      NS      j.root-servers.net.
> .                       518400  IN      NS      k.root-servers.net.
> .                       518400  IN      NS      l.root-servers.net.
> .                       518400  IN      NS      m.root-servers.net.
> ;; Received 228 bytes from 216.146.35.35#53(216.146.35.35) in 34 ms
>
> com.                    172800  IN      NS      j.gtld-servers.net.
> com.                    172800  IN      NS      k.gtld-servers.net.
> com.                    172800  IN      NS      h.gtld-servers.net.
> com.                    172800  IN      NS      b.gtld-servers.net.
> com.                    172800  IN      NS      c.gtld-servers.net.
> com.                    172800  IN      NS      e.gtld-servers.net.
> com.                    172800  IN      NS      i.gtld-servers.net.
> com.                    172800  IN      NS      l.gtld-servers.net.
> com.                    172800  IN      NS      m.gtld-servers.net.
> com.                    172800  IN      NS      a.gtld-servers.net.
> com.                    172800  IN      NS      f.gtld-servers.net.
> com.                    172800  IN      NS      d.gtld-servers.net.
> com.                    172800  IN      NS      g.gtld-servers.net.
> ;; Received 489 bytes from 202.12.27.33#53(m.root-servers.net) in 116 ms
>
> lwtitle.com.            172800  IN      NS      ns21.domaincontrol.com.
> lwtitle.com.            172800  IN      NS      ns22.domaincontrol.com.
> ;; Received 113 bytes from 192.12.94.30#53(e.gtld-servers.net) in 115 ms
>
> lwtitle.com.            3600    IN      MX      0
> lwtitle-com.mail.protection.outlook.com.
> lwtitle.com.            3600    IN      NS      ns22.domaincontrol.com.
> lwtitle.com.            3600    IN      NS      ns21.domaincontrol.com.
> ;; Received 133 bytes from 208.109.255.11#53(ns22.domaincontrol.com) in 32 ms
> =========================================
> Although this doesn't help normal resolution.
>
> So I'm baffled. Any clues?
>
> Thanks,
>
> Chris
>
Chris,

    I do not know if it is the case, but many isp's today use dns
transparent proxying. That is, even if you're not using their provided
dns servers, they intercept your dns connection, and they do all sort of
nasty things with it, ranging from displaying ad pages for mistyped
domains, to recording every dns query you make.

    You can try using the site www.dnsleaktest.com to see if it is your
case. If it is, I suggest you to use the dnscrypt proxy, which is a
implementation of dnscurve, that was made by opendns. By default it uses
the opendns server, but there are others servers enabled for it and you
can use one of your servers too. Try this and see if it improves your
situation.

Cheers,

-- 
Giancarlo Razzolini
GPG: 4096R/77B981BC

Reply via email to