Knot Resolver: Resolve DNS names like it's 2021! https://www.knot-resolver.cz/support/
trust_anchors.remove('.')
Main PID: 1419726 (kresd)
Tasks: 2 (limit: 2295)
Memory: 161.1M
CGroup: /system.slice/knot-tls.service
├─1419726 /usr/sbin/kresd -c /etc/knot-resolver/kresd-tls.conf -f 2
└─1419728 /usr/sbin/kresd -c /etc/knot-resolver/kresd-tls.conf -f 2
Oct 29 20:52:03 fin1 systemd[1]: Starting Knot-tls...
Oct 29 20:52:03 fin1 kresd[1419726]: deprecation WARNING: support for running multiple --forks will be removed
tkrizek
Ed (Gitter): how did you set up the OBS repo in your system? Installing our knot-resolver-release
package from https://www.knot-resolver.cz/download/ should work just fine, unless your system is in some weird state (possibly caused by prior attempts to add the repo/key)
I'm getting these warnings on resolver restarts:
[cache] detected size change (by another instance?) of file '/var/lib/kres/cache/data.mdb': file size 10485760 -> file size 1017118720
Cache size is set (done only by one of the processes) in the configuration file like this:
cache.size = os.getenv('970') * MB
Is this something to worry about?
I'm having trouble resolving spam.molax.co.kr but it works with 1.1.1.1. Any ideas as to what might be an issue?
kdig spam.molax.co.kr
;; WARNING: response timeout for 127.0.0.1@53(UDP)
;; WARNING: response timeout for 127.0.0.1@53(UDP)
kdig spam.molax.co.kr @193.17.47.1
;; WARNING: response timeout for 193.17.47.1@53(UDP)
;; WARNING: response timeout for 193.17.47.1@53(UDP)
kdig spam.molax.co.kr @1.1.1.1
;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 23320
;; Flags: qr rd ra; QUERY: 1; ANSWER: 1; AUTHORITY: 0; ADDITIONAL: 0
;; QUESTION SECTION:
;; spam.molax.co.kr. IN A
;; ANSWER SECTION:
spam.molax.co.kr. 1024 IN A 211.105.253.26
;; Received 50 B
;; Time 2020-11-16 13:23:19 EST
;; From 1.1.1.1@53(UDP) in 2.2 ms
[65536.17][resl] => id: '26902' querying: '211.105.253.20#00053' score: 10 zone cut: 'molax.co.kr.' qname: 'SPAM.mOLaX.CO.kR.' qtype: 'A' proto: 'udp'
[65536.17][iter] <= answer received:
;; ->>HEADER<<- opcode: QUERY; status: FORMERR; id: 26902
;; Flags: qr cd QUERY: 1; ANSWER: 0; AUTHORITY: 0; ADDITIONAL: 1
;; EDNS PSEUDOSECTION:
;; Version: 0; flags: do; UDP size: 1232 B; ext-rcode: Unused
;; QUESTION SECTION
spam.molax.co.kr. A
;; ADDITIONAL SECTION
[65536.17][iter] <= rcode: FORMERR
policy.add(policy.suffix(policy.FLAGS({'SAFEMODE'}), {todname('spam.molax.co.kr.')}))