Yes, as DNS queries are not being forwarded and most probably will fail.
The problem is that the source IP for those queries is probably
incorrect, I am pretty sure 'outgoing-interface:' solves the problem but
the proper way to solve it is to put your *anycast* address on your
loopback interface
My website covers a anycasting with unbound (and DNS blacklisting):
That's not a multicast address; it's an (unusable) class-E 240/4 address.
Weird to see traffic to it...
Maybe someone has some bad glue?
That's entirely possible. These servers are handling queries from
thousands of servers and I'm sure that some domains have bad records.
Each server has interface tracking set to automatic and the anycast
IPs are on loopback interfaces. The messages don't seem to be causing
any problems but I'd like to figure out what's causing them.
I still haven't been able to figure out what is causing these notices
in the system log. Does unbound have a log level setting that could
filter the messages out? Our DNS resolvers are working fine and I'd
rather not be spammed by pointless notices.
Leave tcpdump running on a resolver and wait for the misconfigured
offender to appear. Use one of the following:
----
tcpdump -i bond0 -n -p port 53 -s 0 -w /tmp/dump.pcap
tcpdump -i bond0 -n -p port 53 -s 0 -w - -U | tee /tmp/dump.pcap | tcpdump -r - -n
----
Good hunting
Cheers
--
Alexander Clouter
.sigmonster says: Future looks spotty. You will spill soup in late evening.
This may be problematic on DNS nodes that are handling thousands of
queries per second. Is there a way to make unbound log what lookups
are causing these messages?
Leave tcpdump running on a resolver and wait for the misconfigured
offender to appear. Use one of the following:
----
tcpdump -i bond0 -n -p port 53 -s 0 -w /tmp/dump.pcap
tcpdump -i bond0 -n -p port 53 -s 0 -w - -U | tee /tmp/dump.pcap | tcpdump -r - -n
----
Good hunting
Cheers
--
Alexander Clouter
.sigmonster says: Future looks spotty. You will spill soup in late evening.
This may be problematic on DNS nodes that are handling thousands of
queries per second. Is there a way to make unbound log what lookups
are causing these messages?
Attached a small patch that logs the UDP packet that it tried to send to
that (multicast) address. It logs for all UDP failures.
with echo <that hex> | drill -i - you can see what query was being
asked.
* Michael Watters <wattersmt@gmail.com> [2011-03-25 17:38:27-0400]:
> Leave tcpdump running on a resolver and wait for the misconfigured
> offender to appear. Use one of the following:
> ----
> tcpdump -i bond0 -n -p port 53 -s 0 -w /tmp/dump.pcap
> tcpdump -i bond0 -n -p port 53 -s 0 -w - -U | tee /tmp/dump.pcap | tcpdump -r - -n
> ----
>
> Good hunting
This may be problematic on DNS nodes that are handling thousands of
queries per second.
I doubt it, what matters is the amount of data going through and if your
harddisk can keep up with the pace, I doubt you are pushing 30MB/s
As it's high-throughput I recommend you go with the first command (the
second one will chock your computer/terminal).
Is there a way to make unbound log what lookups are causing these
messages?
Patch the source I imagine, you might be able to do something with the
python bindings though.