| After some further testing, we were able to demonstrate this with an experiment using /etc/hosts and tcpdump. If an /etc/hosts entry enables connection to the puppet server, then the result is quickly cached and not revisited, but when the successful connection entry is removed, tcpdump shows that the failing addresses are tried in order, multiple times each. Example /etc/hosts section (all of these uncommented entries are dead ends):
Example tcpdump command line:
sudo tcpdump -n -i any port 8140 and 'tcp[tcpflags] & (tcp-syn) != 0' |
Example tcpdump output:
11:53:53.039572 IP 192.168.86.31.53746 > 192.168.5.5.8140: Flags [SEW], seq 2816518652, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374376198 ecr 0,sackOK,eol], length 0 |
11:53:54.061786 IP 192.168.86.31.53746 > 192.168.5.5.8140: Flags [S], seq 2816518652, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374377198 ecr 0,sackOK,eol], length 0 |
11:53:55.126871 IP 192.168.86.31.53746 > 192.168.5.5.8140: Flags [S], seq 2816518652, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374378198 ecr 0,sackOK,eol], length 0 |
11:53:56.197239 IP 192.168.86.31.53746 > 192.168.5.5.8140: Flags [S], seq 2816518652, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374379198 ecr 0,sackOK,eol], length 0 |
11:53:57.221763 IP 192.168.86.31.53746 > 192.168.5.5.8140: Flags [S], seq 2816518652, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374380198 ecr 0,sackOK,eol], length 0 |
11:53:58.239689 IP 192.168.86.31.53746 > 192.168.5.5.8140: Flags [S], seq 2816518652, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374381198 ecr 0,sackOK,eol], length 0 |
11:54:00.285677 IP 192.168.86.31.53746 > 192.168.5.5.8140: Flags [S], seq 2816518652, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374383198 ecr 0,sackOK,eol], length 0 |
11:54:00.294136 IP 192.168.86.31.53747 > 192.168.5.4.8140: Flags [SEW], seq 2069260728, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374383206 ecr 0,sackOK,eol], length 0 |
11:54:01.313546 IP 192.168.86.31.53747 > 192.168.5.4.8140: Flags [S], seq 2069260728, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374384206 ecr 0,sackOK,eol], length 0 |
11:54:02.336510 IP 192.168.86.31.53747 > 192.168.5.4.8140: Flags [S], seq 2069260728, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374385206 ecr 0,sackOK,eol], length 0 |
11:54:02.892301 IP 192.168.86.31.53748 > 192.69.65.8.8140: Flags [SEW], seq 750420691, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374385751 ecr 0,sackOK,eol], length 0 |
11:54:02.907608 IP 192.69.65.8.8140 > 192.168.86.31.53748: Flags [S.E], seq 201576444, ack 750420692, win 28960, options [mss 1460,sackOK,TS val 3903822055 ecr 374385751,nop,wscale 7], length 0 |
11:54:03.371566 IP 192.168.86.31.53747 > 192.168.5.4.8140: Flags [S], seq 2069260728, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374386206 ecr 0,sackOK,eol], length 0 |
11:54:04.458017 IP 192.168.86.31.53747 > 192.168.5.4.8140: Flags [S], seq 2069260728, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374387206 ecr 0,sackOK,eol], length 0 |
11:54:04.465274 IP 192.168.86.31.53749 > 192.168.5.3.8140: Flags [SEW], seq 166916616, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374387213 ecr 0,sackOK,eol], length 0 |
11:54:05.505135 IP 192.168.86.31.53749 > 192.168.5.3.8140: Flags [S], seq 166916616, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374388213 ecr 0,sackOK,eol], length 0 |
11:54:06.670413 IP 192.168.86.31.53749 > 192.168.5.3.8140: Flags [S], seq 166916616, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374389213 ecr 0,sackOK,eol], length 0 |
11:54:07.771410 IP 192.168.86.31.53749 > 192.168.5.3.8140: Flags [S], seq 166916616, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374390213 ecr 0,sackOK,eol], length 0 |
11:54:08.882183 IP 192.168.86.31.53749 > 192.168.5.3.8140: Flags [S], seq 166916616, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374391213 ecr 0,sackOK,eol], length 0 |
11:54:08.892949 IP 192.168.86.31.53750 > 192.168.5.2.8140: Flags [SEW], seq 1867558455, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374391223 ecr 0,sackOK,eol], length 0 |
11:54:09.968620 IP 192.168.86.31.53750 > 192.168.5.2.8140: Flags [S], seq 1867558455, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374392223 ecr 0,sackOK,eol], length 0 |
11:54:11.055318 IP 192.168.86.31.53750 > 192.168.5.2.8140: Flags [S], seq 1867558455, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374393223 ecr 0,sackOK,eol], length 0 |
11:54:12.120118 IP 192.168.86.31.53750 > 192.168.5.2.8140: Flags [S], seq 1867558455, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374394223 ecr 0,sackOK,eol], length 0 |
11:54:13.214470 IP 192.168.86.31.53750 > 192.168.5.2.8140: Flags [S], seq 1867558455, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 374395223 ecr 0,sackOK,eol], length 0 |
|