p.s. Couple of DNS servers were hijacked to resolve http://myetherwallet.com users to be redirected to a phishing site. This is not on @myetherwallet side, we are in the process of verifying which servers to get it resolved asap.
root@nuc1:~# lxc launch images:debian/jessie/amd64 snf-image-jessie
Creating snf-image-jessie
Error: Failed container creation: Get https://images.linuxcontainers.org/streams/v1/index.json: lookup images.linuxcontainers.org on 10.12.255.1:53: read udp 10.12.255.11:46962->10.12.255.1:53: i/o timeout
/etc/resolv.conf
root@nuc1:~# dig @10.12.255.1 images.linuxcontainers.org +dnssec +multi
...
;; ANSWER SECTION:
images.linuxcontainers.org. 900 IN CNAME canonical.images.linuxcontainers.org.
canonical.images.linuxcontainers.org. 900 IN A 91.189.91.21
canonical.images.linuxcontainers.org. 900 IN A 91.189.88.37
root@nuc1:~# dig @8.8.8.8 images.linuxcontainers.org +dnssec +multi
...
;; ANSWER SECTION:
images.linuxcontainers.org. 77 IN CNAME canonical.images.linuxcontainers.org.
images.linuxcontainers.org. 77 IN RRSIG CNAME 8 3 900 (
20180718083502 20180704052307 23359 linuxcontainers.org.
NdCMnXYwpegRTCx0b92mylHnjgS7msdjnfTvz+ozjZOc
JqA2DQxYFqsbKETc2nE3U2eOSi3UEFtR3V2959oMNTQv
Du8R6OdZb9hFrXh6woEyAPe93fbk+hnehKP4UtqfPRG8
uRJn6Tiqjdqt8TubHGQqpn9uJDpNMzSArXyZhyM= )
canonical.images.linuxcontainers.org. 334 IN A 91.189.91.21
canonical.images.linuxcontainers.org. 334 IN A 91.189.88.37
canonical.images.linuxcontainers.org. 334 IN RRSIG A 8 4 900 (
20180710143450 20180626095643 23359 linuxcontainers.org.
Uumc8LbdvVrbtuihoZo1dsDZTylkDLZNzK6V+Z66i+L0
CIFRkbyRuHM8x2A1LQknuhwQfDJcZftjl5fPtNaztLYk
hkhGVZ86vVwgqCS7clZLqpr38oSroB/NbqOxP/R7ibcJ
l2h3UqNvLev4FpqqVYHLD/KIN62llCi7MoK7HNo= )
I think there's a lot of reasons people wouldn't want to do that though.Simple: do not use the resolver in the MikroTik for clients, but let them directly use 1.1.1.1 or 8.8.8.8 or similar.
(advertised via DHCP)
What are those reasons?I think there's a lot of reasons people wouldn't want to do that though.Simple: do not use the resolver in the MikroTik for clients, but let them directly use 1.1.1.1 or 8.8.8.8 or similar.
(advertised via DHCP)
such as when you need to force some domain resolve into specific IP?What are those reasons?I think there's a lot of reasons people wouldn't want to do that though.Simple: do not use the resolver in the MikroTik for clients, but let them directly use 1.1.1.1 or 8.8.8.8 or similar.
(advertised via DHCP)
With most routers on the market, the built-in resolver is limited and sometimes buggy, and it is usually preferred not to use it and
directly refer to the internet resolvers of the ISP or one of those public resolvers. (there are others)
Then you are already in I-like-broken-networks territory. And DNSSEC is preventing you from doing it.such as when you need to force some domain resolve into specific IP?
Ever heard of hosts file?such as when you need to force some domain resolve into specific IP?
I can imagine many situations where you want tosuch as when you need to force some domain resolve into specific IP?I think there's a lot of reasons people wouldn't want to do that though.Simple: do not use the resolver in the MikroTik for clients, but let them directly use 1.1.1.1 or 8.8.8.8 or similar.
Hosts file are a mess for multiple clients or any client not under your control.Ever heard of hosts file?
A late reply, but since the thread was dug up by someone else...What are those reasons?I think there's a lot of reasons people wouldn't want to do that though.Simple: do not use the resolver in the MikroTik for clients, but let them directly use 1.1.1.1 or 8.8.8.8 or similar.
(advertised via DHCP)
About 1.5 years ago I enabled DNSSEC on a caching resolver used by a number of users, and there were massive problems.Yes, it would be interesting to watch how many things it would break. All kinds of DNS overrides would stop working. You could still set static records on your own router, but if done upstream, they would not pass the validation.