On 19/10/15 01:18, Stefan Monnier wrote: >> RFC6303 specifies reverse dns zones that ideally should not be forwarded >> to upstream (root) servers and create unnecessary load upon them. > Shouldn't this be done upstream (i.e. in dnsmasq directly) rather than > in our config? > > > Stefan
Ideally yes. I'm currently looking at adding the additional ipv4 addresses in its exclude list with a view to sending a patch to Simon because there seems to be an unwillingness to move on this topic here, Unfortunately there's no pre-existing ipv6 'bogus-priv' block section of code for me to extend and I suspect it may be beyond my copy'n'paste'n'tweak code skills. More controversially I'm also of the opinion that 'bogus-priv' should be on in dnsmasq by default and I will suggest that to Simon. May I ask you look at the v1 of this patch to see how things have been headed so far: https://patchwork.ozlabs.org/patch/522303/ Meantime, I'm not a complete fan of occupying bandwidth & time on dns root servers sending them queries we know they cannot answer, so until (hopefully) upstream dnsmasq handles this sort of thing, I really don't see why we shouldn't. Kevin > _______________________________________________ > openwrt-devel mailing list > openwrt-devel@lists.openwrt.org > https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ openwrt-devel mailing list openwrt-devel@lists.openwrt.org https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel