On Tue, 2017-09-19 at 08:41 -0500, David Jones wrote:
> On 09/19/2017 08:25 AM, Chris wrote:
> > 
> > On Tue, 2017-09-19 at 08:16 -0500, Chris wrote:
> > > 
> > > On Tue, 2017-09-19 at 07:45 -0500, David Jones wrote:
> > > > 
> > > > 
> > > > On 09/18/2017 06:03 PM, Chris wrote:
> > > [snip]
> > > > 
> > > > 
> > > > > 
> > > > > 
> > > > > 
> > > > > localhost dnsmasq[2323]: started, version 2.75 cachesize 150
> > > > > localhost dnsmasq[2323]: compile time options: IPv6 GNU-
> > > > > getopt
> > > > > DBus
> > > > > i18n IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC
> > > > > loop-
> > > > > detect inotify
> > > > > localhost dnsmasq-dhcp[2323]: DHCP, IP range 192.168.122.2 --
> > > > > 192.168.122.254, lease time 1h
> > > > > localhost dnsmasq-dhcp[2323]: DHCP, sockets bound exclusively
> > > > > to
> > > > > interface virbr0
> > > > > localhost dnsmasq[2323]: reading /etc/resolv.conf
> > > > > localhost dnsmasq[2323]: using nameserver 127.0.0.1#53
> > > > > localhost dnsmasq[2323]: using nameserver 127.0.0.1#53
> > > > > localhost dnsmasq[2323]: read /etc/hosts - 7 addresses
> > > > > localhost dnsmasq[2323]: read
> > > > > /var/lib/libvirt/dnsmasq/default.addnhosts - 0 addresses
> > > > > localhost dnsmasq-dhcp[2323]: read
> > > > > /var/lib/libvirt/dnsmasq/default.hostsfile
> > > > > 
> > > > > I'm not really running a mail server in the true sense of the
> > > > > word
> > > > > I
> > > > > believe. Fetchmail queries my email accounts and pipes the
> > > > > messages
> > > > > through procmail. Anything that doesn't already have a recipe
> > > > > is
> > > > > run
> > > > > through SA. I'm just using Bind to speed up the queries that
> > > > > SA
> > > > > makes.
> > > > > I believe I'm stating that correctly but who knows could be
> > > > > way
> > > > > off.
> > > > > 
> > > > > If I can give any other information I'll be glad to do it.
> > > > > Again,
> > > > > I
> > > > > have no idea why the queries are going to 168.150.251.35.
> > > > > There
> > > > > hasn't
> > > > > been another query to isipp since a bit after noon. I'll see
> > > > > what
> > > > > happens the next time there is one.
> > > > > 
> > > > Run 'netstat -tunlap | grep ":53 "' and see what is listening
> > > > on
> > > > port
> > > > 53
> > > > as your DNS server.  You probably need to remove/uninstall
> > > > dnsmasq.
> > > > 
> > > > Here's my output:
> > > > 
> > > > # netstat -tunlap | grep ":53 "
> > > > tcp        0      0 127.0.0.1:53                0.0.0.0:*
> > > >      LISTEN      24019/pdns_recursor
> > > > udp        0      0 127.0.0.1:53                0.0.0.0:*
> > > >                  24019/pdns_recursor
> > > > 
> > > > Once you know you are only running named on port 53, then make
> > > > sure
> > > > your
> > > > named.conf doesn't have any forwarders defined in the options
> > > > section.
> > > > 
> > > > Now check your logs and see if you are still getting a lot of
> > > > refused
> > > > responses.  BIND should be doing full recursive lookups
> > > > directly to
> > > > the
> > > > authoritative DNS servers just like you saw with the "dig
> > > > +trace"
> > > > command.
> > > > 
> > > David, here's my output. I ran as sudo to see all inclusive:
> > > 
> > > sudo netstat -tunlap | grep ":53"
> > > [sudo] password for chris:
> > > tcp        0      0
> > > 192.168.122.1:53        0.0.0.0:*               LISTEN      1245/
> > > name
> > > d
> > >       
> > > tcp        0      0
> > > 127.0.1.1:53            0.0.0.0:*               LISTEN      1316/
> > > dnsm
> > > as
> > > q
> > > tcp        0      0
> > > 192.168.0.51:53         0.0.0.0:*               LISTEN      1245/
> > > name
> > > d
> > >       
> > > tcp        0      0
> > > 127.0.0.1:53            0.0.0.0:*               LISTEN      1245/
> > > name
> > > d
> > >       
> > > tcp        0      0
> > > 192.168.0.51:56697      192.52.178.30:53        TIME_WAIT   -
> > >    
> > >       
> > > tcp        1      1
> > > 192.168.0.51:33475      198.97.190.53:53        CLOSING     -
> > >    
> > >       
> > > tcp        0      0
> > > 192.168.0.51:52483      192.5.6.30:53           TIME_WAIT   -
> > >    
> > >       
> > > tcp        0      0
> > > 192.168.0.51:57335      192.5.6.30:53           TIME_WAIT   -
> > >    
> > >       
> > > tcp        0      0
> > > 192.168.0.51:56609      192.52.178.30:53        TIME_WAIT   -
> > >    
> > >       
> > > tcp        0      0
> > > 192.168.0.51:36143      199.19.56.1:53          TIME_WAIT   -
> > >    
> > >       
> > > tcp        0      0
> > > 192.168.0.51:47629      199.7.83.42:53          TIME_WAIT   -
> > >    
> > >       
> > > tcp        0      0
> > > 192.168.0.51:58201      192.48.79.30:53         TIME_WAIT   -
> > >    
> > >       
> > > tcp        0      0
> > > 192.168.0.51:53145      199.19.56.1:53          TIME_WAIT   -
> > >    
> > >       
> > > tcp        0      0
> > > 192.168.0.51:55073      199.7.83.42:53          TIME_WAIT   -
> > >    
> > >       
> > > tcp        0      0
> > > 192.168.0.51:41719      192.48.79.30:53         TIME_WAIT   -
> > >    
> > >       
> > > tcp        1      1
> > > 192.168.0.51:40633      198.97.190.53:53        CLOSING     -
> > >    
> > >       
> > > udp        0      0
> > > 192.168.122.1:53        0.0.0.0:*                           2323/
> > > dnsm
> > > as
> > > q
> > > udp        0      0
> > > 192.168.122.1:53        0.0.0.0:*                           1245/
> > > name
> > > d
> > >       
> > > udp        0      0
> > > 127.0.1.1:53            0.0.0.0:*                           1316/
> > > dnsm
> > > as
> > > q
> > > udp        0      0
> > > 192.168.0.51:53         0.0.0.0:*                           1245/
> > > name
> > > d
> > >       
> > > udp        0      0
> > > 127.0.0.1:53            0.0.0.0:*                           1245/
> > > name
> > > d
> > >       
> > > udp        0      0
> > > 0.0.0.0:5353            0.0.0.0:*                           1533/
> > > snap
> > > we
> > > b
> > > udp        0      0
> > > 0.0.0.0:5353            0.0.0.0:*                           1004/
> > > avah
> > > i-
> > > daemon:
> > > udp6       0      0
> > > :::5353                 :::*                                1533/
> > > snap
> > > we
> > > b
> > > udp6       0      0
> > > :::5353                 :::*                                1004/
> > > avah
> > > i-
> > > daemon:
> > > 
> > I neglected to insert my /etc/bind/named.conf.options file
> > 
> > acl goodclients {
> >      127.0.0.1;
> >      localhost;
> >      localnets;
> > };
> > 
> > options {
> >     directory "/var/cache/bind";
> >          geoip-directory "/usr/share/GeoIP";
> > 
> >       recursion yes;
> >       allow-query { goodclients; };
> > 
> > tcp        0      0 127.0.0.1:53 
> >     // If there is a firewall between you and nameservers you want
> >     // to talk to, you may need to fix the firewall to allow
> > multiple
> >     // ports to talk.  See http://www.kb.cert.org/vuls/id/800113
> > 
> >     // If your ISP provided one or more IP addresses for stable
> >     // nameservers, you probably want to use them as forwarders.
> >     // Uncomment the following block, and insert the addresses
> > replacing
> >     // the all-0's placeholder.
> > 
> >     //forwarders {
> >     //127.0.0.1;
> >     //};
> > 
> >     //=============================================================
> > ===========
> >     // If BIND logs error messages about the root key being
> > expired,
> >     // you will need to update your keys.  See https://www.isc.org/
> > bind-keys
> >     //=============================================================
> > ===========
> >     //dnssec-validation auto;
> > 
> >     auth-nxdomain no;    # conform to RFC1035
> >     //listen-on-v6 { any; };
> >          listen-on { any; };
> > };
> > 
> Change this in the named.conf.options and BIND should be fine:
> 
> listen-on { 127.0.0.1; };
> 
> Uninstall dnsmasq and make sure it's no longer listening on
> 127.0.1.1:53 
> just to keep things simple.
> 
> Your /etc/resolv.conf should be pointed to 127.0.0.1 which is should 
> already be based on the dig +trace output.
> 
> Now check your logs to see if you are still getting odd queries to 
> destinations that aren't authoritative DNS servers which are being 
> refused.  Use dig +trace to check responses which should match the 
> http://multirbl.valli.org site responses for that particular RBL or 
> whitelist excluding IVM which is a subscription-based RBL.
> 

Here's the output now of the dig +trace
tcp        0      0
127.0.0.1:53            0.0.0.0:*               LISTEN      -          
     
tcp        0      0
127.0.1.1:53            0.0.0.0:*               LISTEN      -          
     
udp        0      0
127.0.0.1:53            0.0.0.0:*                           -          
     
udp        0      0
192.168.122.1:53        0.0.0.0:*                           -          
     
udp        0      0
127.0.1.1:53            0.0.0.0:*                           -          
     
udp        0      0
0.0.0.0:5353            0.0.0.0:*                           -          
     
udp        0      0
0.0.0.0:5353            0.0.0.0:*                           -          
     
udp6       0      0
:::5353                 :::*                                -          
     
udp6       0      0
:::5353                 :::*                                - 

I'm getting different outputs each time I run dig +trace
65.43.116.208.iadb.isipp.com

65.43.116.208.iadb.isipp.com. 3600 IN   A       127.0.1.255
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.0.0.2
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.2.255.3
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.101.202.10
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.0.0.1
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.2.255.1
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.2.255.4
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.101.201.10
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.3.100.10 
;; Received 201 bytes from 147.75.64.146#53(c.auth-ns.sonic.net) in 67
ms

65.43.116.208.iadb.isipp.com. 3600 IN   A       127.0.0.2
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.3.100.10
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.2.255.4
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.0.0.1
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.101.202.10
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.2.255.1
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.2.255.3
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.101.201.10
65.43.116.208.iadb.isipp.com. 3600 IN   A       127.0.1.255
iadb.isipp.com.         172800  IN      NS      ns2.ns
.isipp.com.
iadb.isipp.com.         172800  IN      NS      b.auth
-ns.sonic.net.
iadb.isipp.com.         172800  IN      NS      a.auth
-ns.sonic.net.
iadb.isipp.com.         172800  IN      NS      ns2.pr
gmr.com.
iadb.isipp.com.         172800  IN      NS      ns01.b
ackupdns.com.
iadb.isipp.com.         172800  IN      NS      c.auth
-ns.sonic.net.
iadb.isipp.com.         172800  IN      NS      ns1.ns
.isipp.com.
;; Received 390 bytes from 67.227.190.38#53(ns1.ns.isipp.com) in 55 ms

I've disable dnsmasq in my /etc/NetworkManager/NetworkManager.conf via
#dns=dnsmasq

However, when restarting the network I see:
dnsmasq[2323]: reading /etc/resolv.conf
dnsmasq[2323]: using nameserver 127.0.0.1#53
dnsmasq[2323]: using nameserver 127.0.0.1#53 

NetworkManager[24113]: <info>  [1505852393.3238]   nameserver
'192.168.0.1'
NetworkManager[24113]: <info>  [1505852393.3238]   nameserver
'205.171.2.226'

Unfortunately so far today since I've started trying to work this out
there have been no queries to isipp by SA. I'll have to see what
happens when there is one.

I think David I may just be confusing myself more, at least the network
is still up.

                           -       
-- 
Chris
KeyID 0xE372A7DA98E6705C
31.11972; -97.90167 (Elev. 1092 ft)
11:32:46 up 19:12, 1 user, load average: 0.43, 0.54, 0.43
Description:    Ubuntu 16.04.3 LTS, kernel 4.10.0-35-generic

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to