[Dnsmasq-discuss] Query forwarding behaviour with multiple name servers.

John Robson jrobson at zenoss.com
Thu Mar 7 19:00:52 GMT 2019


In the case I was seeing ... one of the three servers was returning
nxdomain for internal queries (user had defined google as a ‘backup’
resolver). So the subsequent replies had massive value (they contained
information, rather than no information).

I’ve removed the ‘backup resolver’ from their config, cloud systems get
very fast response times from google!





On Thu, 7 Mar 2019 at 18:24, Simon Kelley <simon at thekelleys.org.uk> wrote:

> On 08/02/2019 09:49, John Robson wrote:
> > Hi all,
> >
> > I'm trying to understand the mechanism by which dnsmasq uses the
> > resolvers specified (in this case they are all specified in
> > /etc/resolv.conf).
> > Specifically I am trying to work out why dnsmasq is (erratically)
> > sending the same query to multiple servers, and not listening beyond the
> > first response.
> >
> >
> > As I understand it the default (i.e. non dnsmasq) resolver behaviour is
> > to try the first name server entry first, then the second etc.  This can
> > be changed by use of the 'rotate' option in that file.
> >
> > However, dnsmasq reads it's name servers from /etc/resolv.conf, but the
> > defaults are different - relevant options from the man page say:
> > *-o, --strict-order*
> >     By default, dnsmasq will send queries to any of the upstream servers
> >     it knows about and tries to favour servers that are known to be up.
> >     Setting this flag forces dnsmasq to try each query with each server
> >     strictly in the order they appear in /etc/resolv.conf
> > *--all-servers*
> >     By default, when dnsmasq has more than one upstream server
> >     available, it will send queries to just one server. Setting this
> >     flag forces dnsmasq to send all queries to all available servers.
> >     The reply from the server which answers first will be returned to
> >     the original requester.
> >
> > To me that means that, by default, dnsmasq will send to any one of the
> > upstream servers, favouring servers it thinks are up - that seems
> > reasonable.
> >
> >
> > What I am seeing is that sometimes (and I can't figure a packet count, a
> > query count, or a time based correlation) dnsmasq forwards a query to
> > both of the listed name servers (I presume this is part of the
> > 'aliveness' testing?).
> > When this happens dnsmasq then only listens to the first reply, meaning
> > that the server which is slightly slower/further away then gets their
> > response bounced in an ICMP port unreachable message from the dnsmasq
> box.
> >
> > I then see dnsmasq stick to the 'first responding' server until it
> > forwards a query to both again (always in the same order, that listed in
> > /etc/resolv.conf) and, depending on the first response, it either sticks
> > or flips it's preferred server until ???
> >
> >
> > Two questions:
> >  - What triggers dnsmasq to forward a query to multiple upstream
> > resolvers (aside from the first query after startup, which seems
> reasonable)
>
> Kevin answered this.
>
> >  - Why does dnsmasq not bother to listen for the second (or more)
> > response - which would surely be useful in terms of timing/aliveness
> > information, as well as less odd for the upstream server*.
>
> Because to do so involves keeping resources around: at least some state
> and an open network socket. Since a server may never respond, those
> resources have to be reclaimed at some point (this functions exists
> already, since no answer may be forthcoming from any server) If dnsmasq
> is sending queries to a server which never answers, that implies far
> more resources hanging around during a long timeout, which increases the
> resource footprint for the daemon, and maybe even provides an DoS attack
> opportunity. TBH, it never occurred to me that the subsequent replies
> had any real utility, but I can see that they might. I'm not aware of
> any DNS server which would react in any way to an ICMP port unreachable.
> Don't forget that this is UDP. The server sends the reply "fire an
> forget". I think it would be next to impossible to get the OS to even
> tell the server that the port unreachable message had been seen.
>
>
> Cheers,
>
> Simon.
>
>
> >
> > Cheers,
> >
> > John
> >
> >
> > * I can imagine an upstream server eventually deciding that it is being
> > used in an amplification attack and just not responding any more.
> >
> >
> > --
> >
> >
> > _______________________________________________
> > Dnsmasq-discuss mailing list
> > Dnsmasq-discuss at lists.thekelleys.org.uk
> > http://lists.thekelleys.org.uk/mailman/listinfo/dnsmasq-discuss
> >
>
>
> _______________________________________________
> Dnsmasq-discuss mailing list
> Dnsmasq-discuss at lists.thekelleys.org.uk
> http://lists.thekelleys.org.uk/mailman/listinfo/dnsmasq-discuss
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/attachments/20190307/385358b1/attachment.html>


More information about the Dnsmasq-discuss mailing list