-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
On 11/01/2015 05:26 PM, Anonymous wrote:
>
>
> On Sunday, November 1, 2015 at 2:59:57 PM UTC-8, Pete Howell
> wrote:
>
> I'm running R3.0 and DNS over TCP is not blocked in my default
> firewall settings.
>
> On Thursday, July 4, 2013 at 11:41:55 PM UTC-6, Andrew Sorensen
> wrote:
>
> I just stumbled across this while figuring out why websites were
> inaccessible on my Qubes installation:
>
> The firewall currently allows UDP traffic on port 53 for the
> purpose of DNS queries, but does not allow TCP traffic on port 53
> (commonly used for DNS Zone transfers, but also for queries with a
> response over 512 bytes that would otherwise be truncated.
>
> Is there a reason why the Qubes firewall defaults to only UDP, or
> can I safely make this adjustment?
>
>
>
>
> Are other people have DNS issues too? I am frequently forced to
> edit /etc/resolve.conf and throw in an OpenNIC DNS server in order
> to get the VM to connect. Which gets reset on reboot. Sometimes
> correctly, sometimes incorrectly. I cannot figure out if this has
> something to do with changing the NetVMs around (I have a lot of
> Proxy and VPN VMs, so the NetVMs are always getting swapped around.
> So I assumed this was what was breaking my DNS settings).
I tried to install dnssec-trigger into a Windows 10 HVM a month or so
ago, and dnssec-trigger/unbound seemed to be unable to talk to any DNS
servers. I never figured out what the issue was. If the firewall is
actually blocking TCP-based DNS traffic, I wouldn't be surprised if
that explained my issue. I haven't yet tried to install
dnssec-trigger into a Fedora VM, so I can't be sure whether this is a
weird Windows-specific issue or a firewall issue.
- -Jeremy Rand
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=tLX4
-----END PGP SIGNATURE-----