Aren’t new version enabling (some.host) to not race ?

On Thu, Jul 4, 2019 at 7:26 AM Andy Lemin <andrew.le...@gmail.com> wrote:

> Hey guys.
>
> Thanks for the ideas. Sadly I cannot use static IPs as we don’t control
> the domains.
>
> I think I’ll use Otto’s suggestion as I am already doing that to provide a
> black hole table for the spamhaus drop list. So I’ll just enhance that
> script to manage some more tables 😀
>
> After all, the current fqdns in pf.conf can still go out of date (pf only
> resolves dns -> IP once during rule apply). So this solves that too.
>
> Cheers, Andy.
>
>
>
> Sent from a teeny tiny keyboard, so please excuse typos
>
> > On 4 Jul 2019, at 09:18, Otto Moerbeek <o...@drijf.net> wrote:
> >
> >> On Thu, Jul 04, 2019 at 09:14:19AM +0100, Andy Lemin wrote:
> >>
> >> Hi guys,
> >>
> >> Is anyone else aware of the Unbound and PF race condition that exists
> when FQDNs are used in pf.conf with a local Unbound server?
> >
> > Yes, it's an obvious one isn't it?
> >
> >>
> >> The issue occurs when pf starts before unbound, but where pf fails to
> start as it cannot resolve some DNS names.. and so unbound also fails to
> work when it is started later in the boot because pf failed to start..
> >>
> >> The only solution I’ve found so far is to add some commands to
> /etc/rc.local (run end of boot) to temporarily disable (the failed) pf,
> restart unbound, and restart pf again now unbound is working.
> >>
> >> Just wondering if anyone knows of a cleaner workaround? PS; Using an
> external DNS server in resolv.conf is not an option in this scenario.
> >
> > Do not use DNS names in pf.conf. Use a IP addresses or a table filled
> > from a file. Run some script to update the file periodically. If it
> > changed kick pf.
> >
> >    -Otto
> >
>
> --
--
---------------------------------------------------------------------------------------------------------------------
Knowing is not enough; we must apply. Willing is not enough; we must do

Reply via email to