On 01/17/2013 04:05 PM, Michael Lambert wrote:
On 17 Jan 2013, at 06:44, lilit-aibolit wrote:
On 01/17/2013 11:27 AM, Vadim Zhukov wrote:
At first, find where the flow gets stopped: enable debug logging on resolver and add
"match log (matches) to port 53" rule as first one in your firewall. Then
probably you'll see the problem yourself.
match log on $ext_if inet proto udp to port 53
Don't you want:
match log on $ext_if inet proto {tcp, udp} to port 53
Michael
.
done. but this didn't help me.
I also see incoming request from Internet and request from my server to
provider's DNS forwarders.
I'm sure that named running on all my interfaces:
# netstat -na | grep .53
tcp 0 0 ext.ip.53 *.* LISTEN
tcp 0 0 127.0.0.1.953 *.* LISTEN
tcp 0 0 192.168.55.254.53 *.* LISTEN
tcp 0 0 192.168.5.254.53 *.* LISTEN
tcp 0 0 127.0.0.1.53 *.* LISTEN
udp 0 0 ext.ip.53 *.*
udp 0 0 192.168.55.254.53 *.*
udp 0 0 192.168.5.254.53 *.*
udp 0 0 127.0.0.1.53 *.*
# fstat | grep internet | grep named
named named 21647 20* internet stream tcp 0xd89db198 127.0.0.1:53
named named 21647 21* internet stream tcp 0xd89db000
192.168.5.254:53
named named 21647 22* internet stream tcp 0xd89db330
192.168.55.254:53
named named 21647 23* internet stream tcp 0xd89db4c8 127.0.0.1:953
named named 21647 25* internet stream tcp 0xd88a17fc ext.ip:53
named named 21647 512* internet dgram udp 127.0.0.1:53
named named 21647 513* internet dgram udp 192.168.5.254:53
named named 21647 514* internet dgram udp 192.168.55.254:53
named named 21647 515* internet dgram udp *:13169
named named 21647 516* internet dgram udp ext.ip:53