Re: DNS resolution when 1st nameserver does not know

2024-02-15 Thread Rudolf Sykora
Stuart Henderson wrote: > On 2024-02-15, Rudolf Sykora wrote: > > Josh Grosse wrote: > >> On Thu, Feb 15, 2024 at 02:15:07PM +0100, rsyk...@disroot.org wrote: > >> > my computer is connected to a LAN, from which it obtains its > >> > IP and also local-DNS-server IP via DHCP. The latter is then >

Re: DNS resolution when 1st nameserver does not know

2024-02-15 Thread Stuart Henderson
On 2024-02-15, Rudolf Sykora wrote: > Josh Grosse wrote: >> On Thu, Feb 15, 2024 at 02:15:07PM +0100, rsyk...@disroot.org wrote: >> > my computer is connected to a LAN, from which it obtains its >> > IP and also local-DNS-server IP via DHCP. The latter is then >> > inserted into /etc/resolv.conf

Re: DNS resolution when 1st nameserver does not know

2024-02-15 Thread Rudolf Sykora
Josh Grosse wrote: > On Thu, Feb 15, 2024 at 02:15:07PM +0100, rsyk...@disroot.org wrote: > > my computer is connected to a LAN, from which it obtains its > > IP and also local-DNS-server IP via DHCP. The latter is then > > inserted into /etc/resolv.conf by, I believe, resolvd. The > > computer is

Re: DNS resolution when 1st nameserver does not know

2024-02-15 Thread Josh Grosse
On Thu, Feb 15, 2024 at 02:15:07PM +0100, rsyk...@disroot.org wrote: > my computer is connected to a LAN, from which it obtains its > IP and also local-DNS-server IP via DHCP. The latter is then > inserted into /etc/resolv.conf by, I believe, resolvd. The > computer is furthermore connected via wir

Re: dns priority from different network connections - or disabling?

2023-04-12 Thread Theo de Raadt
Stuart Henderson wrote: > There is a complication in Kaya's case because if my handle on the > config is correct, there are likely to be nameservers learned from > both DHCP (in one rdomain) and PPPOE (in another), but they won't > work on the opposite connection. > > In this situation I would d

Re: dns priority from different network connections - or disabling?

2023-04-12 Thread Theo de Raadt
Kaya Saman wrote: > Like I mentioned previously, it may have had something to do with me > running: sh /etc/netstart pppoe0 a few times after the system had been > booted. I was at the time trying to make use of 2 isp's and route > accordingly per subnet or even ip address. It might have even bee

Re: dns priority from different network connections - or disabling?

2023-04-12 Thread Stuart Henderson
On 2023/04/12 13:20, Theo de Raadt wrote: > Stuart Henderson wrote: > > > On 2023-04-11, Theo de Raadt wrote: > > > Kaya Saman wrote: > > > > > >> This somehow is overriding my resolv.conf file; another words the > > >> information is *not* being used from resolv.conf and is instead being > > >

Re: dns priority from different network connections - or disabling?

2023-04-12 Thread Kaya Saman
On 4/12/23 20:20, Theo de Raadt wrote: Stuart Henderson wrote: On 2023-04-11, Theo de Raadt wrote: Kaya Saman wrote: This somehow is overriding my resolv.conf file; another words the information is *not* being used from resolv.conf and is instead being used from the ipcp negotiation as

Re: dns priority from different network connections - or disabling?

2023-04-12 Thread Theo de Raadt
Stuart Henderson wrote: > On 2023-04-11, Theo de Raadt wrote: > > Kaya Saman wrote: > > > >> This somehow is overriding my resolv.conf file; another words the > >> information is *not* being used from resolv.conf and is instead being > >> used from the ipcp negotiation as part of the pppoe kern

Re: dns priority from different network connections - or disabling?

2023-04-12 Thread Stuart Henderson
On 2023-04-11, Theo de Raadt wrote: > Kaya Saman wrote: > >> This somehow is overriding my resolv.conf file; another words the >> information is *not* being used from resolv.conf and is instead being >> used from the ipcp negotiation as part of the pppoe kernel module. > > then the pppoe code sho

Re: dns priority from different network connections - or disabling?

2023-04-11 Thread Theo de Raadt
Kaya Saman wrote: > This somehow is overriding my resolv.conf file; another words the > information is *not* being used from resolv.conf and is instead being > used from the ipcp negotiation as part of the pppoe kernel module. then the pppoe code should submit a RTM_PROPOSAL route message ...

Re: dns priority from different network connections - or disabling?

2023-04-11 Thread Kaya Saman
Thanks Stu, and everyone else who responded :-) On 4/11/23 09:01, Stuart Henderson wrote: On 2023-04-10, Kaya Saman wrote: On 4/10/23 16:24, Daniele B. wrote: Apr 10, 2023 12:52:22 Kaya Saman : how do I override OpenBSD's behavior to explicitly not use the dns servers obtained through ipcp

Re: dns priority from different network connections - or disabling?

2023-04-11 Thread Stuart Henderson
On 2023-04-10, Kaya Saman wrote: > > On 4/10/23 16:24, Daniele B. wrote: >> Apr 10, 2023 12:52:22 Kaya Saman : >> > how do I override OpenBSD's > behavior to explicitly not use the dns servers obtained through ipcp but > instead use the ones form the resolv.conf file? >> My solution bo

Re: dns priority from different network connections - or disabling?

2023-04-10 Thread Kaya Saman
On 4/10/23 16:24, Daniele B. wrote: Apr 10, 2023 12:52:22 Kaya Saman : how do I override OpenBSD's behavior to explicitly not use the dns servers obtained through ipcp but instead use the ones form the resolv.conf file? My solution both for security reasons (I'm using unbound) for for practi

Re: dns priority from different network connections - or disabling?

2023-04-10 Thread Daniele B.
Apr 10, 2023 12:52:22 Kaya Saman : >>> how do I override OpenBSD's >>> behavior to explicitly not use the dns servers obtained through ipcp but >>> instead use the ones form the resolv.conf file? My solution both for security reasons (I'm using unbound) for for practical reasons (as per your conc

Re: dns priority from different network connections - or disabling?

2023-04-10 Thread Kaya Saman
On 4/10/23 11:40, Jonathan Gray wrote: On Mon, Apr 10, 2023 at 11:26:22AM +0100, Kaya Saman wrote: Hi, I'll ask the second question first as it might be easier to implement... Currently I have found that the dns servers specified in the resolv.conf file are not being used. Instead my machi

Re: dns priority from different network connections - or disabling?

2023-04-10 Thread Jonathan Gray
On Mon, Apr 10, 2023 at 11:26:22AM +0100, Kaya Saman wrote: > Hi, > > > I'll ask the second question first as it might be easier to implement... > > > Currently I have found that the dns servers specified in the resolv.conf > file are not being used. Instead my machine is prioritizing the ISP o

Re: DNS lookup fails and iwm0 fatal firmware errors using OpenBSD 7.0

2021-12-14 Thread Dave Turner
On Tue, 14 Dec 2021 15:38:08 +0100 Stefan Sperling wrote: > On Tue, Dec 14, 2021 at 12:49:14PM +, Dave Turner wrote: > > I have searched the web and tried various things but so far nothing > > fixes it. > > This should help: > https://marc.info/?l=openbsd-bugs&m=163459084214897&w=2 Stefan

Re: DNS lookup fails and iwm0 fatal firmware errors using OpenBSD 7.0

2021-12-14 Thread Stefan Sperling
On Tue, Dec 14, 2021 at 12:49:14PM +, Dave Turner wrote: > I have searched the web and tried various things but so far nothing > fixes it. This should help: https://marc.info/?l=openbsd-bugs&m=163459084214897&w=2

Re: DNS resolution after VPN?

2021-07-20 Thread Tom Smyth
and make sure there is a route to Route to your Internal DNS servers over the VPNs Or a policy that covers the DNS servers ip range if it is an Ipsec policy based vpn Hope this helps On Tue, 20 Jul 2021 at 13:15, Timo Myyrä wrote: > > Stuart Henderson [2021-07-20, 11:24 +]: > > > On 2021-

Re: DNS resolution after VPN?

2021-07-20 Thread Timo Myyrä
Stuart Henderson [2021-07-20, 11:24 +]: > On 2021-07-20, Timo Myyrä wrote: > >> Hi, >> >> Just started testing the new dhcleased,resolvd stuff and noticed that >> DNS resolution won't work correctly once I open my VPN connection. Name >> resolution works for external domains but not for the

Re: DNS resolution after VPN?

2021-07-20 Thread Stuart Henderson
On 2021-07-20, Timo Myyrä wrote: > Hi, > > Just started testing the new dhcleased,resolvd stuff and noticed that > DNS resolution won't work correctly once I open my VPN connection. Name > resolution works for external domains but not for the internal domains > resolved by the interal DNS servers.

Re: DNS and rdomains

2020-05-28 Thread Sebastian Benoit
Hi, James(ja...@jmp-e.com) on 2020.05.28 11:12:29 +0100: > Thanks. Your solution works but is not ideal for my situation. The > reason it's not ideal is that one of the rdomains gets its nameserver > from DHCP and I don't think unbound can read this information. > > For example, In the case of a

Re: DNS and rdomains

2020-05-28 Thread James
Thanks. Your solution works but is not ideal for my situation. The reason it's not ideal is that one of the rdomains gets its nameserver from DHCP and I don't think unbound can read this information. For example, In the case of a captive portal or floating between APs I would like DNS to work on

Re: DNS and rdomains

2020-05-28 Thread Tom Smyth
Unbound can use root hints And you can over ride nameservers learned from dhclient Check man dhclient for more info And Set your resolv.conf nameservers to 127.0.0.1 Peace out On Thursday, 28 May 2020, James wrote: > Thanks. Your solution works but is not ideal for my situation. The >

Re: DNS and rdomains

2020-05-27 Thread Tom Smyth
oh yeah you will have to adjust the flags for each daemon (to accept a different config file for each dns server in each Rdomain... hope this helps... On Wed, 27 May 2020 at 23:35, Tom Smyth wrote: > howdy, > > you can use symbolic links for /etc/rc.d/nsd to /etc/rc.d/nsd1 > and to/etc/r

Re: DNS and rdomains

2020-05-27 Thread Tom Smyth
howdy, you can use symbolic links for /etc/rc.d/nsd to /etc/rc.d/nsd1 and to/etc/rc.d/nsd2 to /etc/rc.d/nsdn where 1,2 n are your r domains for your dns servers (authoritive) or you can use unbound instead of nsd if it is just a forwarding dns server then use for a dns server for rdo

Re: DNS lookups on a different port for testing?

2020-01-23 Thread Claus Assmann
On Thu, Jan 23, 2020, Stuart Henderson wrote: > On 2020-01-22, Claus Assmann wrote: > > The functional tests for sendmail use ldns-testns as DNS server > > which provides specific test data and error behaviours. > > It runs on a port > 1024 to avoid requiring root access. > For the libbind port,

Re: DNS lookups on a different port for testing?

2020-01-23 Thread Stuart Henderson
On 2020-01-22, Claus Assmann wrote: > The functional tests for sendmail use ldns-testns as DNS server > which provides specific test data and error behaviours. > It runs on a port > 1024 to avoid requiring root access. > There's code in sendmail to set the IP and port for a NS: > _res.nsadd

Re: DNS lookups on a different port for testing?

2020-01-22 Thread Ted Unangst
Claus Assmann wrote: > The functional tests for sendmail use ldns-testns as DNS server > which provides specific test data and error behaviours. > It runs on a port > 1024 to avoid requiring root access. you can use a combination of pf.conf rdr-to and 127.0.0.2 etc. i.e., bind to port 5353, have

Re: DNS Race Condition on Boot

2019-07-04 Thread sven falempin
Aren’t new version enabling (some.host) to not race ? On Thu, Jul 4, 2019 at 7:26 AM Andy Lemin wrote: > Hey guys. > > Thanks for the ideas. Sadly I cannot use static IPs as we don’t control > the domains. > > I think I’ll use Otto’s suggestion as I am already doing that to provide a > black hol

Re: DNS Race Condition on Boot

2019-07-04 Thread Andy Lemin
Hey guys. Thanks for the ideas. Sadly I cannot use static IPs as we don’t control the domains. I think I’ll use Otto’s suggestion as I am already doing that to provide a black hole table for the spamhaus drop list. So I’ll just enhance that script to manage some more tables 😀 After all, the c

Re: DNS Race Condition on Boot

2019-07-04 Thread Otto Moerbeek
On Thu, Jul 04, 2019 at 09:14:19AM +0100, Andy Lemin wrote: > Hi guys, > > Is anyone else aware of the Unbound and PF race condition that exists when > FQDNs are used in pf.conf with a local Unbound server? Yes, it's an obvious one isn't it? > > The issue occurs when pf starts before unbound,

Re: DNS (UNBOUND) + PF ISSUE

2018-08-30 Thread Craig Skinner
Hi NN, On Wed, 29 Aug 2018 11:57:15 +0200 NN wrote: > > here is my pf.conf on VM#1: > >     int_if="{ vether0 re0 }" >     set block-policy drop >     set log interface egress >     set skip on lo0 >     match in all scrub (no-df random-id max-mss 1440) >     match out on egress inet from

Re: DNS (UNBOUND) + PF ISSUE

2018-08-29 Thread Stuart Henderson
On 2018-08-29, NN wrote: > Hi, > > All is working for me with new ACL Rule: > >     access-control: 0.0.0.0/0 allow > > Many Thanks Solène Rapenne ! > > ISSUE is closed. > > P.S. > > Why opening unbound to the internet is a bad idea ??? Because your resolver *will* be found and quite likely peop

Re: DNS (UNBOUND) + PF ISSUE

2018-08-29 Thread NN
Hi, All is working for me with new ACL Rule:     access-control: 0.0.0.0/0 allow Many Thanks Solène Rapenne ! ISSUE is closed. P.S. Why opening unbound to the internet is a bad idea ??? Thx. On 08/29/18 12:51, Solène Rapenne wrote: Le 2018-08-29 12:41, NN a écrit : Hi, many thanks for y

Re: DNS (UNBOUND) + PF ISSUE

2018-08-29 Thread Arnaud BRAND
Le 2018-08-29 11:57, NN a écrit : *Hi all,* *Its my first topic here =) * *Please help me investigate DNS+PF issue. ** * *I have 2 VM on OpenBSD 6.3:* *    VM#1 - Router with PF, IP:192.168.50.1* *    VM#2 - DNS (as unbound), IP:192.168.50.2** * *here is my pf.conf on VM#1:*     int_if="{

Re: DNS (UNBOUND) + PF ISSUE

2018-08-29 Thread Solène Rapenne
Le 2018-08-29 12:41, NN a écrit : Hi, many thanks for your quick answer, I try to  use your PF rule, and got the same answer from my DNS:     ...     >> WARNING: recursion requested but not available     ... I need the DNS request RULE's for my PF Any ideas? BR deface On 08/29/18 12:34, Arn

Re: DNS (UNBOUND) + PF ISSUE

2018-08-29 Thread NN
Hi, many thanks for your quick answer, I try to  use your PF rule, and got the same answer from my DNS:     ...     >> WARNING: recursion requested but not available     ... I need the DNS request RULE's for my PF Any ideas? BR deface On 08/29/18 12:34, Arnaud BRAND wrote: Le 2018-08-29 11:

Re: DNS-01 challenge in acme-client

2018-03-02 Thread Consus
On 19:27 Fri 02 Mar, Stuart Henderson wrote: > On 2018-03-01, Consus wrote: > > Let's Encrypt is going to support wildcard certificates soon enough, but > > only through DNS-01 challenge, but acme-client(1) does not support it. > > Have you guys considered implemeting DNS challenges? Maybe someon

Re: DNS-01 challenge in acme-client

2018-03-02 Thread Stuart Henderson
On 2018-03-01, Consus wrote: > Let's Encrypt is going to support wildcard certificates soon enough, but > only through DNS-01 challenge, but acme-client(1) does not support it. > Have you guys considered implemeting DNS challenges? Maybe someone is > already working on the implementation? If not

Re: DNS-01 challenge in acme-client

2018-03-02 Thread Consus
On 15:46 Fri 02 Mar, Consus wrote: > On 11:45 Fri 02 Mar, Etienne wrote: > > Well, really, what you're asking for is having acme-client offload the > > complicated stuff (set the TXT records, then check for verification) to a > > script, which to me looks pretty much the same as writing a script to

Re: DNS-01 challenge in acme-client

2018-03-02 Thread Consus
On 11:45 Fri 02 Mar, Etienne wrote: > Well, really, what you're asking for is having acme-client offload the > complicated stuff (set the TXT records, then check for verification) to a > script, which to me looks pretty much the same as writing a script to do > everything. I'm not. Writing TXT ent

Re: DNS-01 challenge in acme-client

2018-03-02 Thread Etienne
On 01/03/18 14:39, Consus wrote: It is more complicated than creating a file in a folder. With a little luck it's not. Both NSD and BIND allow you to include files in zone configuration like this: [...] The only problem here is #3, but it's possible to create e.g. another pledged process tha

Re: DNS-01 challenge in acme-client

2018-03-01 Thread Consus
On 15:20 Thu 01 Mar, Solène Rapenne wrote: > It is not easy to implement because this requires access to your > DNS server (like nsd or bind) or your registrar admin API which would > require adding plugins for each API. Well... that's why it's called DNS challenge, right? > It is more complicate

Re: DNS-01 challenge in acme-client

2018-03-01 Thread Solène Rapenne
Le 2018-03-01 10:45, Consus a écrit : Hi, Let's Encrypt is going to support wildcard certificates soon enough, but only through DNS-01 challenge, but acme-client(1) does not support it. Have you guys considered implemeting DNS challenges? Maybe someone is already working on the implementation

Re: DNS hijacking (was Re: Is this an intrusion?)

2017-06-19 Thread Stuart Henderson
On 2017-06-19, Rui Ribeiro wrote: > Depending on how "evil" the ISP is, or how you want to obfuscate your > metadata, you might want to have a look at dnscrypt > https://blog.ipredator.se/openbsd-dnscrypt-howto.html Yes, that's an option, though it does just move your trust from the ISP to the dn

Re: DNS hijacking (was Re: Is this an intrusion?)

2017-06-19 Thread Rui Ribeiro
Hi, Depending on how "evil" the ISP is, or how you want to obfuscate your metadata, you might want to have a look at dnscrypt https://blog.ipredator.se/openbsd-dnscrypt-howto.html On 18 June 2017 at 10:59, Stuart Henderson wrote: > On 2017-06-17, Paul Suh wrote: > > Folks,=20 > > > > My unders

Re: DNS hijacking (was Re: Is this an intrusion?)

2017-06-18 Thread Joe Holden
On 18/06/2017 10:59, Stuart Henderson wrote: > On 2017-06-17, Paul Suh wrote: >> Folks,=20 >> >> My understanding of the way that this is done is by returning a CNAME = >> when the ISP's DNS recursive DNS server would otherwise return a = >> NXDOMAIN result, followed by a HTTP 302 when the browse

Re: DNS hijacking (was Re: Is this an intrusion?)

2017-06-18 Thread Stuart Henderson
On 2017-06-17, Paul Suh wrote: > Folks,=20 > > My understanding of the way that this is done is by returning a CNAME = > when the ISP's DNS recursive DNS server would otherwise return a = > NXDOMAIN result, followed by a HTTP 302 when the browser attempts to = > reach the host via the bogus CNAME

Re: DNS lookup utility with port

2016-07-01 Thread Stuart Henderson
On 2016-06-30, Kapetanakis Giannis wrote: > On 30/06/16 16:01, Stuart Henderson wrote: >> On 2016-06-30, Kapetanakis Giannis wrote: >>> Hi, >>> >>> a) I'm asking if there is any program in base for dns lookups that support >>> port for name server. >> >> Not in base, you will need packages. >>

Re: DNS lookup utility with port

2016-06-30 Thread Kapetanakis Giannis
On 30/06/16 21:11, Alexander Hall wrote: I guess you could play some games with pf(4) for a single occasion: # ifconfig lo0 127.0.0.2 alias # in pf.conf: set skip on none pass on lo pass on lo0 from any to 127.0.0.2 port 53 rdr-to 127.0.0.2 port 5678 (and maybe sth more I might be missing) /A

Re: DNS lookup utility with port

2016-06-30 Thread Alexander Hall
On Thu, Jun 30, 2016 at 01:01:58PM +, Stuart Henderson wrote: > On 2016-06-30, Kapetanakis Giannis wrote: > > Hi, > > > > a) I'm asking if there is any program in base for dns lookups that support > > port for name server. > > Not in base, you will need packages. I guess you could play some

Re: DNS lookup utility with port

2016-06-30 Thread Kapetanakis Giannis
On 30/06/16 16:16, Kapetanakis Giannis wrote: > understood and thanks for the reply. > > Would you think to add libldns/drill in base or is it out of question? > > G forget that I asked. Even linbldns seems abandoned an drill does not have what I need (apart from -p) dig from newer bind packa

Re: DNS lookup utility with port

2016-06-30 Thread Kapetanakis Giannis
On 30/06/16 16:01, Stuart Henderson wrote: > On 2016-06-30, Kapetanakis Giannis wrote: >> Hi, >> >> a) I'm asking if there is any program in base for dns lookups that support >> port for name server. > > Not in base, you will need packages. > >> b) would a patch for this in src/usr.sbin/bind/ b

Re: DNS lookup utility with port

2016-06-30 Thread Stuart Henderson
On 2016-06-30, Kapetanakis Giannis wrote: > Hi, > > a) I'm asking if there is any program in base for dns lookups that support > port for name server. Not in base, you will need packages. > b) would a patch for this in src/usr.sbin/bind/ be accepted or is > there a reason for this to be out (ex

Re: DNS servers around here not working for days. dig works. fix?

2016-06-15 Thread Abel Abraham Camarillo Ojeda
On Tue, Jun 14, 2016 at 3:49 PM, Chris Bennett wrote: > On Tue, Jun 14, 2016 at 09:05:57PM +0100, Stuart Henderson wrote: >> >> If you can't find some other way to get things working then at least >> you should be able to browse by "ssh -D 1080 somehost" and setting the >> browser to use 127.0.0.1

Re: DNS servers around here not working for days. dig works. fix?

2016-06-15 Thread Peter Hessler
On 2016 Jun 14 (Tue) at 11:38:03 -0700 (-0700), Christopher Ahrens wrote: :li...@wrant.com wrote: :>Tue, 14 Jun 2016 11:46:39 -0500 Chris Bennett :> :>>$ dig bsd.org @8.8.4.4 +trace :>>dig: couldn't get address for 'm.root-servers.net': not found :>> :>>pass ~ $ dig bsd.org @8.8.8.8 +trace :>>dig

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread lists
> > > > I don't know if this will be usable for your case, here at home the aDSL > > > > modem tries to be the resolver. The trouble is with the ISP: their DNS > > > > servers are quite frequently unreliable and unstable. They even affect > > > > the PPP connection sate, as the modem firmware use

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Chris Bennett
On Tue, Jun 14, 2016 at 09:05:57PM +0100, Stuart Henderson wrote: > > If you can't find some other way to get things working then at least > you should be able to browse by "ssh -D 1080 somehost" and setting the > browser to use 127.0.0.1:1080 as SOCKS proxy, and tell it to have the > far end reso

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread lists
Tue, 14 Jun 2016 14:50:57 -0500 Chris Bennett > > Could you trip the power to the wifi translating network segment? > > Possibly, but since mostly even the mains coming into large buildings > aren't even fully enclosed with metal, might get severe burns and eye > damage from the arc-flash. > But

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Stuart Henderson
On 2016/06/14 13:48, Chris Bennett wrote: > On Tue, Jun 14, 2016 at 05:28:48PM +, Stuart Henderson wrote: > > On 2016-06-14, Chris Bennett wrote: > > > They both work for me also, with dig @8.8.8.8, etc. > > > Whois fails, lynx, elinks, firefox cannot connect outside > > > > > > Could this pro

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread lists
Tue, 14 Jun 2016 13:48:56 -0500 Chris Bennett > > > They both work for me also, with dig @8.8.8.8, etc. > > > Whois fails, lynx, elinks, firefox cannot connect outside > > > > > > Could this problem be because of my being behind the wifi NAT? Could you trip the power to the wifi translating net

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread lists
Tue, 14 Jun 2016 11:38:03 -0700 Christopher Ahrens > li...@wrant.com wrote: > > Tue, 14 Jun 2016 11:46:39 -0500 Chris Bennett > > > >> $ dig bsd.org @8.8.4.4 +trace > >> dig: couldn't get address for 'm.root-servers.net': not found > >> > >> pass ~ $ dig bsd.org @8.8.8.8 +trace > >> dig: coul

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Chris Bennett
On Tue, Jun 14, 2016 at 05:28:48PM +, Stuart Henderson wrote: > On 2016-06-14, Chris Bennett wrote: > > They both work for me also, with dig @8.8.8.8, etc. > > Whois fails, lynx, elinks, firefox cannot connect outside > > > > Could this problem be because of my being behind the wifi NAT? > >

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Christopher Ahrens
li...@wrant.com wrote: Tue, 14 Jun 2016 11:46:39 -0500 Chris Bennett $ dig bsd.org @8.8.4.4 +trace dig: couldn't get address for 'm.root-servers.net': not found pass ~ $ dig bsd.org @8.8.8.8 +trace dig: couldn't get address for 'i.root-servers.net': not found You know I'm thinking you may

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Stuart Henderson
On 2016-06-14, Chris Bennett wrote: > They both work for me also, with dig @8.8.8.8, etc. > Whois fails, lynx, elinks, firefox cannot connect outside > > Could this problem be because of my being behind the wifi NAT? Compare the full output from resolving there with dig with the same thing ssh'd

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Christopher Ahrens
Chris Bennett wrote: $ dig bsd.org @8.8.4.4 +trace ; <<>> DiG 9.4.2-P2 <<>> bsd.org @8.8.4.4 +trace ;; global options: printcmd . 7197IN NS a.root-servers.net. . 7197IN NS b.root-servers.net. . 7197

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Dmitrij D. Czarkoff
Chris Bennett said: > Neither 8.8.8.8 or 8.8.4.4 works. What does that mean, precisely? Can you ping them? -- Dmitrij D. Czarkoff

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread lists
Tue, 14 Jun 2016 11:46:39 -0500 Chris Bennett > $ dig bsd.org @8.8.4.4 +trace > dig: couldn't get address for 'm.root-servers.net': not found > > pass ~ $ dig bsd.org @8.8.8.8 +trace > dig: couldn't get address for 'i.root-servers.net': not found You know I'm thinking you may be behind capt

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Stuart Henderson
On 2016-06-14, Chris Bennett wrote: > This happens here in Mexico and also in Guatemala. > But it has been about five days now. Enough! > > dig works fine, locally and using the server my USA website uses. > I tried adding that to /etc/resolv.conf and .tail but no help. > whois fails. > Digging ev

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Chris Bennett
$ dig bsd.org @8.8.4.4 +trace ; <<>> DiG 9.4.2-P2 <<>> bsd.org @8.8.4.4 +trace ;; global options: printcmd . 7197IN NS a.root-servers.net. . 7197IN NS b.root-servers.net. . 7197IN NS c.

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Bruno Ferreira
Hi Chris, Does your network works fine, can you reach icmp at 8.8.8.8 for example? Try the flag +trace with dig and see where it ends. like: dig whatever.com @8.8.8.8 +trace Best Regards, 2016-06-14 11:12 GMT-03:00 Chris Bennett < chrisbenn...@bennettconstruction.us>: > This happens here in Mexi

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Indunil Jayasooriya
dig mx bsd.org @8.8.4.4 dig mx bsd.org @8.8.8.8 both work for me On Tue, Jun 14, 2016 at 9:27 PM, Chris Bennett < chrisbenn...@bennettconstruction.us> wrote: > They both work for me also, with dig @8.8.8.8, etc. > Whois fails, lynx, elinks, firefox cannot connect outside > > Could this proble

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread lists
I don't know if this will be usable for your case, here at home the aDSL modem tries to be the resolver. The trouble is with the ISP: their DNS servers are quite frequently unreliable and unstable. They even affect the PPP connection sate, as the modem firmware uses that to trigger self induced r

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Chris Bennett
They both work for me also, with dig @8.8.8.8, etc. Whois fails, lynx, elinks, firefox cannot connect outside Could this problem be because of my being behind the wifi NAT? Chris Bennett

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Chris Bennett
On Tue, Jun 14, 2016 at 06:50:53PM +0300, li...@wrant.com wrote: > I don't know if this will be usable for your case, here at home the aDSL > modem tries to be the resolver. The trouble is with the ISP: their DNS > servers are quite frequently unreliable and unstable. They even affect > the PPP c

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread lists
Tue, 14 Jun 2016 11:08:17 -0500 Chris Bennett > On Tue, Jun 14, 2016 at 06:50:53PM +0300, li...@wrant.com wrote: > > I don't know if this will be usable for your case, here at home the aDSL > > modem tries to be the resolver. The trouble is with the ISP: their DNS > > servers are quite frequently

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Indunil Jayasooriya
both 8.8.8.8 and 8.8..4.4 work for me. On Tue, Jun 14, 2016 at 8:26 PM, Chris Bennett < chrisbenn...@bennettconstruction.us> wrote: > Neither 8.8.8.8 or 8.8.4.4 works. > After netstart, no. After reboot, no. > > -- cat /etc/motd Thank you Indunil Jayasooriya http://www.theravadanet.net/ htt

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Chris Bennett
Neither 8.8.8.8 or 8.8.4.4 works. After netstart, no. After reboot, no.

Re: DNS servers around here not working for days. dig works. fix?

2016-06-14 Thread Dmitrij D. Czarkoff
Chris Bennett said: > This happens here in Mexico and also in Guatemala. > But it has been about five days now. Enough! > > dig works fine, locally and using the server my USA website uses. > I tried adding that to /etc/resolv.conf and .tail but no help. > whois fails. > Digging every site I want

Re: DNS over IPSec weirdness

2014-12-17 Thread Zé Loff
On Thu, Dec 11, 2014 at 04:13:13PM +, Zé Loff wrote: > TL,DR: > Queries to DNS server over IPSec made using host or dig work OK, > requests made by e.g. ping exit the enc0 interface but don't show up on > enc0 on the other end. > > > Hi all > > I'm puzzled by some weird stuff happening with

Re: DNS over IPSec weirdness

2014-12-12 Thread David Dahlberg
First of all, I have no real clue. It sound weird. But maybe I can help you at least with that one: Am Donnerstag, den 11.12.2014, 16:13 + schrieb Zé Loff: > However, if I try to do something like "ping -c 1 www_lan.foo.bar" (or > e.g. ssh) I can see the packets with the DNS request pass throu

Re: DNS over IPSec weirdness

2014-12-11 Thread R0me0 ***
Hey man, I'm not sure about what is happening, but pflog is your best friend ever ! http://www.openbsd.org/faq/pf/logging.html Try find out if a specific rule is blocking traffic in one of endpoints ( both ? ) Cheers, 2014-12-11 14:13 GMT-02:00 Zé Loff : > TL,DR: > Queries to DNS server over

Re: DNS: how to verify glue NS records?

2014-12-08 Thread Alexei Malinin
Thanks to all for your replies but... I'm sorry for the misleading Subject of this thread, I meant "delegation NS records" (not "glue records"). Below is the answer from bind-us...@lists.isc.org. -- Alexei Original Message Subject: Re: DNS: how

Re: DNS: how to verify glue NS records?

2014-12-07 Thread Andy Bradford
Thus said Alexei Malinin on Fri, 05 Dec 2014 15:49:59 +0300: > - the question is - how and with what tools (dig, host, nslookup, or > maybe C or Perl libs) can I verify the NS glue records in the parent > zone of my ISP (zone transfers are denied)? The entries in the ADDITIONAL SECTION below

Re: DNS: how to verify glue NS records?

2014-12-06 Thread Patrik Lundin
On Fri, Dec 05, 2014 at 03:49:59PM +0300, Alexei Malinin wrote: > > I would like to resolve this problem: > - I have a child DNS zone served by my ISP slave name server; > - the parent zone is served by my ISP master name server; It appears to me what you refer to as "master name server" above ar

Re: DNS: how to verify glue NS records?

2014-12-06 Thread Craig Skinner
On 2014-12-05 Fri 15:49 PM |, Alexei Malinin wrote: > > My child zone is 0-15.66.233.212.in-addr.arpa. I tried "dig -4 > +multiline +showsearch +trace 0-15.66.233.212.in-addr.arpa ns" but it > was not possible to make any conclusions about NS glue records from the > dig output. > Try this Alexei

Re: DNS resolver retries configurable? (or: Anything to make DNS resolves always work!)

2013-12-23 Thread Jan Stary
On Dec 20 00:36:02, mikael.tr...@gmail.com wrote: > Seems that by default OpenBSD's DNS resolver rotates what DNS server from > /etc/resolv.conf it uses, and when the DNS server used for a resolve does > not work, the DNS resolve fails; > > Perhaps not exactly like this, but clearly in this direct

Re: DNS resolver retries configurable? (or: Anything to make DNS resolves always work!)

2013-12-20 Thread Nex6
* Mikael [2013-12-20 09:58:39 +0200]: > Hi Matthew, > > Aha so the files of reference are asr.c ( > http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/asr/asr.c?rev=1.31;content-type=text%2Fplain > ) > and res_send_async.c ( > http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/asr/res_send_async

Re: DNS resolver retries configurable? (or: Anything to make DNS resolves always work!)

2013-12-20 Thread Mikael
Hi Matthew, Aha so the files of reference are asr.c ( http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/asr/asr.c?rev=1.31;content-type=text%2Fplain ) and res_send_async.c ( http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/asr/res_send_async.c?rev=1.19;content-type=text%2Fplain ) Do I unders

Re: DNS resolver retries configurable? (or: Anything to make DNS resolves always work!)

2013-12-19 Thread Matthew Dempsky
On Thu, Dec 19, 2013 at 2:36 PM, Mikael wrote: > a) OpenBSD's resolver configured to retry 999 times before failing, and > [...] > If so, is there any way to do a)? In src/lib/libc/asr/asr.c, change "ac->ac_nsretries = 4;" to "ac->ac_nsretries = 999;", recompile, and reinstall. However, I wouldn

Re: DNS resolver retries configurable? (or: Anything to make DNS resolves always work!)

2013-12-19 Thread Andy Lemin
Maybe try configuring bind (read the manuals and online docs) and setting resolv.conf to 127.0.0.1 would be a good start. OpenBSD's resolv logic won't be 'fixed' unless you want to change the code.. Sent from my iPhone > On 19 Dec 2013, at 22:36, Mikael wrote: > > Seems that by default OpenBS

Re: DNS problem

2013-12-15 Thread Patrik Lundin
On Fri, Dec 06, 2013 at 08:35:52PM +0100, Patrik Lundin wrote: > > Given the +trace output you supplied that address is not part of the > trail from the DNS root, and in that case the only involvement is > answering the initial equivalent of "dig @216.146.35.35 . NS". > For the archives: That sh

Re: DNS problem

2013-12-08 Thread Chris Smith
Turns out the problem was with the Internet Guide service. If the IP address from which the query was sent was on the subscriber list then the incorrect info was sent. That's why it worked from one of my networks but not the others. Thanks to all. Chris

Re: DNS problem

2013-12-06 Thread Andy Bradford
Thus said Chris Smith on Fri, 06 Dec 2013 11:31:23 -0500: > Basically, four of my networks are not getting an answer for a > specific mx query from dyn.com's DNS server. Yet every other DNS cache > I've queried works just fine (Google, Level3, Hurricane Electric, > Comcast, etc.) and

Re: DNS problem

2013-12-06 Thread Chris Smith
On Fri, Dec 6, 2013 at 2:35 PM, Patrik Lundin wrote: > Sorry if I'm missing something, but what lead you to suspect the > 216.146.35.35 machine in the first place? Some of my clients use that service and for them Unbound doesn't act as a validator, just an iterator that forwards non-local queries

Re: DNS problem

2013-12-06 Thread Patrik Lundin
On Fri, Dec 06, 2013 at 01:50:33PM -0500, Chris Smith wrote: > > Same results from Unbound. That's why I started "digging". > Sorry if I'm missing something, but what lead you to suspect the 216.146.35.35 machine in the first place? Given the +trace output you supplied that address is not part

Re: DNS problem

2013-12-06 Thread Chris Smith
On Fri, Dec 6, 2013 at 1:38 PM, Patrik Lundin wrote: > Just out of curiosity: If you are running unbound on the firewall, why > are you querying the troublesome resolver directly? Do you get the same > result when querying the local unbound? Same results from Unbound. That's why I started "diggin

Re: DNS problem

2013-12-06 Thread Patrik Lundin
On Fri, Dec 06, 2013 at 12:42:09PM -0500, Chris Smith wrote: > > The lwtitle.com mx and lwtitle.com txt queries both fail for me here > and I run unbound as a resolver on my firewall and I pass the DNS leak > test. > Just out of curiosity: If you are running unbound on the firewall, why are you

  1   2   3   >