juched
Very Senior Member
There might need to be a "unbound-control log_reopen" command after the sed on the non-syslog-ng logfile.
Ah, thanks. Will work on a fix.
There might need to be a "unbound-control log_reopen" command after the sed on the non-syslog-ng logfile.
Can someone tell me what's this 150.xxx.xxx domain
Can't figure this out
juched, Martineau, there is something strange with the logging in unbound:
Currently I am running unbound manager 3.06 dev with juched "sgui dev". The problem is that logging and also live-logging works fine until XX:57 every hour. Then it suddenly stops - nothing more is logged. I watched live-log during this time and the log gets cleaned up so that the following line is the last line in the log:
But from that time on, no more logging is done. But unbound_manager still states logging activated and and unbound.config still states "verbosity 1" without "'#" at the beginning.Code:Apr 23 14:25:39 unbound[28089:0] info: generate keytag query _ta-4f66. NULL IN
Is this related to the cron:
Code:57 * * * * /jffs/addons/unbound/unbound_log.sh #Unbound_Log.sh#
Im trying to test if the addresses are being retrieved via vpn. Can anyone provide additional info on how to setup/test the DNS tracker rule suggested above? I.e. Where do I input the tracker rule and once created I should look inside the 'syslog' under the tmp folder correct?Think about it...
Q. Who is the DNS server when you are forwarding to an upstream DNS server?....if you are not forwarding DNS requests upstream, who can it possibly be?
Try this... I could be wrong!
Create the outbound DNS tracker rule
Code:iptables -I OUTPUT -p udp -m udp --dport 53 -j LOG -m comment --comment "DNS request tracker"
Now wait a while and check for DNS hits (whilst redacting your real WAN IP if found)
EDIT: Changed 'IN=.*DPT=53' to '^.*DPT=53' to preserve timestamps
Now if you route unbound requests via the VPN, then wait a few minutes then check again....Code:iptables --line -t filter -nvL OUTPUT WANIP=$(nvram get wan0_ipaddr);grep -o "^.*DPT=53" /tmp/syslog.log | sed -r 's/LEN.*PROTO=//' | sed -r 's/LEN.*PROTO=//' | sed -r "s/$WANIP/wan.isp.ip.addr/"
Feel free to post the results....Code:iptables --line -t filter -nvL OUTPUT WANIP=$(nvram get wan0_ipaddr);grep -o "^.*DPT=53" /tmp/syslog.log | sed -r 's/LEN.*PROTO=//' | sed -r 's/LEN.*PROTO=//' | sed -r "s/$WANIP/wan.isp.ip.addr/"
Any difference?
I knew there would eventually be a request because it's too difficult to copy'n'paste into the command promptIm trying to test if the addresses are being retrieved via vpn. Can anyone provide additional info on how to setup/test the DNS tracker rule suggested above? I.e. Where do I input the tracker rule and once created I should look inside the 'syslog' under the tmp folder correct?
e = Exit Script [?]
A:Option ==> vpn 1 debug
Do you want to route unbound requests through VPN Client '1' tunnel?
Reply 'y' or press [Enter] to skip
y
unbound requests via VPN Client 1 (100.120.138.53) tunnel ENABLED , and tracked in Syslog
unbound-checkconf: no errors in /opt/var/lib/unbound/unbound.conf
e = Exit Script [?]
A:Option ==> vpn debug show
<snip>
Apr 24 17:54:49 RT-AC68U kernel: IN= OUT=vlan2 SRC=wan.isp.ip.addr DST=192.42.93.30 UDP SPT=27686 DPT=53
Apr 24 17:54:58 RT-AC68U kernel: IN= OUT=vlan2 SRC=100.120.138.53 DST=192.35.51.30 UDP SPT=12015 DPT=53
My bad...I didn't know it that it was a simple cut & paste or if I had to create a test "script" with the DNS rule inside the script you mentioned. Thanks again for the clarification for my slow selfI knew there would eventually be a request because it's too difficult to copy'n'paste into the command prompt
e.g. for VPN Client 1
thenCode:e = Exit Script [?] A:Option ==> vpn 1 debug Do you want to route unbound requests through VPN Client '1' tunnel? Reply 'y' or press [Enter] to skip y unbound requests via VPN Client 1 (100.120.138.53) tunnel ENABLED , and tracked in Syslog unbound-checkconf: no errors in /opt/var/lib/unbound/unbound.conf
Hopefully if the unbound DNS requests are being sent via the WAN, then the WAN IP address if matched will be redacted, and any other SRC IP address shown should be the VPN GatewayCode:e = Exit Script [?] IP address. A:Option ==> vpn debug show <snip> Apr 24 17:54:49 RT-AC68U kernel: IN= OUT=vlan2 SRC=wan.isp.ip.addr DST=192.42.93.30 UDP SPT=27686 DPT=53 Apr 24 17:54:58 RT-AC68U kernel: IN= OUT=vlan2 SRC=100.120.138.53 DST=192.35.51.30 UDP SPT=12015 DPT=53
I knew there would eventually be a request because it's too difficult to copy'n'paste into the command prompt
e.g. for VPN Client 1
thenCode:e = Exit Script [?] A:Option ==> vpn 1 debug Do you want to route unbound requests through VPN Client '1' tunnel? Reply 'y' or press [Enter] to skip y unbound requests via VPN Client 1 (100.120.138.53) tunnel ENABLED , and tracked in Syslog unbound-checkconf: no errors in /opt/var/lib/unbound/unbound.conf
Hopefully if the unbound DNS requests are being sent via the WAN, then the WAN IP address (if matched) will be redacted, and any other SRC IP address shown should be the VPN Gateway IP address.Code:e = Exit Script [?] A:Option ==> vpn debug show <snip> Apr 24 17:54:49 RT-AC68U kernel: IN= OUT=vlan2 SRC=wan.isp.ip.addr DST=192.42.93.30 UDP SPT=27686 DPT=53 Apr 24 17:54:58 RT-AC68U kernel: IN= OUT=vlan2 SRC=100.120.138.53 DST=192.35.51.30 UDP SPT=12015 DPT=53
Apr 24 13:00:57 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=XX SRC=89.248.172.123 DST=wan.isp.ip.addr UDP SPT=47347 DPT=53
Do you use skynet? - if so you will need to modify the unbound report to exclude these DNS request records.You are very clairvoyant! haha. I have run this and the result is
Code:Apr 24 13:00:57 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=XX SRC=89.248.172.123 DST=wan.isp.ip.addr UDP SPT=47347 DPT=53
Not what I was expecting since the SRC isn't the address in the .conf file nor associated with my VPN at all....not sure....any thoughts?
Do you use skynet? - if so you will need to modify the unbound report to exclude these DNS request records.
I pushed a Hotfix to the GitHub 'dev' branch if you want to test it.Indeed I do use Skynet.....I will re-attempt....thanks as always...
Working! Logging continues... Thanks for taking this point.I have pushed a possible fix as proposed by @dave14305 . If you could try (while not using scribe) to install the dev version, let me know if logging continues. The "sgui dev" command from advanced menu should install v1.5 of the log script.
Thank you!
It gives following resultsNavigate in your browser to https://otx.alienvault.com/indicator/ip/<IP> and this will give you a good idea what this IP is.
I pushed a Hotfix to the GitHub 'dev' branch if you want to test itQUOTE]
Applied , let's see if it makes a differenceI have pushed a possible fix as proposed by @dave14305 . If you could try (while not using scribe) to install the dev version, let me know if logging continues. The "sgui dev" command from advanced menu should install v1.5 of the log script.
Thank you!
I know you have been asked this a million times, but I just set this up with my VPN, is it normal to see the exit IP address of the VPN as the DNS address when running dnsleaktest, while using vpn in conjunction with unbound. Basically, does this sound like it has been setup correctly?I pushed a Hotfix to the GitHub 'dev' branch if you want to test it.
Sounds right to me. Send dns queries out the VPN tunnel and they get received at the authoritative server from the VPN provider’s IP range. Mission accomplished.I know you have been asked this a million times, but I just set this up with my VPN, is it normal to see the exit IP address of the VPN as the DNS address when running dnsleaktest, while using vpn in conjunction with unbound. Basically, does this sound like it has been setup correctly?
@dave14305Sounds right to me. Send dns queries out the VPN tunnel and they get received at the authoritative server from the VPN provider’s IP range. Mission accomplished.
Bad address
[1587834413] unbound-checkconf[4520:0] fatal error: control-key-file: "(null)" does not exist
is there and that file does exist (and is properly populated). I have no idea what's going on.control-key-file: "/opt/var/lib/unbound/unbound_control.key"
I'm getting a weird error message when trying to install Unbound.
I've checked the configuration file and the line is there and that file does exist (and is properly populated). I have no idea what's going on.Code:Bad address [1587834413] unbound-checkconf[4520:0] fatal error: control-key-file: "(null)" does not exist
I originally posted something similar to this in the Unbound thread but I was directed here instead. Thanks for any help you may be able to provide me with this ^_^
unbound_manager recovery
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!