[Dnsmasq-discuss] Becoming authoritative DNS for additional netblock

Albert ARIBAUD albert.aribaud at free.fr
Tue Dec 1 15:46:50 GMT 2015


Hi "A C",

Le Mon, 30 Nov 2015 21:34:58 -0800
A C <agcme at hotmail.com> a écrit:

> On 2015-11-30 05:02, Albert ARIBAUD wrote:
> 
> > Can you watch the router's DNS traffic rather than the VPN server's?
> > Possibly give a tcpdump of a successful and a failed DNS request? I
> > assume you cannot change how dnsmasq runs on the router but if you
> > can, then try having it log the successful and failed DNS requests
> > too. This log might show whether a request is forwarded or cached,
> > for instance.
> 
> 
> Ok.  I ran with query logging turned on and queried for a device
> already on the main 10.0.0.0/16 network from another machine and one
> of the VPN clients that the VPN server should know and answer from
> the same machine (the machine being 10.0.0.2).
> 
> 
> The working query:
> dnsmasq: query[A] device.example.com from 10.0.0.2
> dnsmasq: /etc/hosts device.example.com is 10.0.0.180
> 
> 
> The query that should be forwarded to the VPN server's instance of
> dnsmasq responds like this:
> dnsmasq: query[A] client1.vpn.example.com from 10.0.0.2
> dnsmasq: config client1.vpn.example.com is <NXDOMAIN>-IPv4

Can you copy-paste, with as little modifications as possible, the
complete dnsmasq configuration of the router?

Amicalement,
-- 
Albert.



More information about the Dnsmasq-discuss mailing list