Following the advise I found out, while running "unbound-control
dump_requestlist", what seems to be Unbound trying to resolve IPV6
address instead IPV4.
I do not have IPV6 configured on the server, and have "do-ip6: no"
explicitly in unbound.conf.
thread #0
# type cl name seconds module status
0 A IN blade.4t2.com. - iterator wait for 217.11.57.53
1 AAAA IN www.edicron.com. 40.960788 iterator wait for 217.160.83.143
2 AAAA IN www.edicron.com.privacychain.ch. 10.932778 iterator wait
for 185.148.76.30
3 AAAA IN www.tubetown.de. 6.024901 iterator wait for 88.198.65.232
4 AAAA IN www.eurotubes.com. 11.084678 iterator wait for 208.109.255.22
5 AAAA IN www.tubemonger.com. 10.982738 iterator wait for 69.49.191.246
6 AAAA IN www.diyhifisupply.com. 40.981773 iterator wait for
216.35.197.129
7 AAAA IN www.diyhifisupply.com.privacychain.ch. 10.954016 iterator
wait for 185.148.76.30
8 AAAA IN www.hificollective.co.uk. 41.052734 iterator wait for
212.67.202.2
9 AAAA IN www.hificollective.co.uk.privacychain.ch. 11.024719
iterator wait for 46.16.200.135
Thank you.
On 25/10/16 13:28, Daniel Ryšlink via Unbound-users wrote:
For the record, I am also running the latest version of Unbound
(1.5.10) on FreeBSD 10.3 with libevent compilation option, and I have
no problems whatsoever.
Recommended things to check:
- sysctl limits for network buffers, expecially TCP buffers, since the
penetration of DNSSec means that TCP based DNS traffic is increasing.
- in case you use stateful firewall, check limits for max number of
states, since you can run out quite easily. Stateless rules for DNS
traffic are recommended. Also limit for maximum fragmented packet limits.
- try to monitor your system resource usage, especially memory - do
you have enough? does the system swap during peaks in traffic?
- check logs for messages concerning failures to send packets, limits
for various resources reached, etc
Also, my servers are constantly bombarded by bogus queries about bogus
domains featuring non-responsive authoritative nameservers (targets of
some DDOS attack, if I understand it correctly), and such queries can
exhaust your resources rapidly, since each unresolved TCP query
consumes a portion of memory before it times out. Use the command
"unbound-control dump_requestlist" to check what queries are being
resolved during the time the server appears to be non-responsive/slow.
I had to implement a countermeasure that recognizes these bogus
queries and replies with NXDOMAIN RCODE immediately, saving the
resolver's memory for legitimate traffic.
I am not saying that there cannot be a problem with the newest version
of Unbound, just reporting everything is fine here and trying to
provide some tips.