Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS Resolver not caching correct?

    Scheduled Pinned Locked Moved DHCP and DNS
    56 Posts 5 Posters 8.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by johnpoz

      not a traceroute a dig +trace

      $ dig www.whatever.com +trace
      
      ; <<>> DiG 9.14.4 <<>> www.whatever.com +trace
      ;; global options: +cmd
      .                       27190   IN      NS      h.root-servers.net.
      .                       27190   IN      NS      k.root-servers.net.
      .                       27190   IN      NS      d.root-servers.net.
      .                       27190   IN      NS      l.root-servers.net.
      .                       27190   IN      NS      c.root-servers.net.
      .                       27190   IN      NS      a.root-servers.net.
      .                       27190   IN      NS      m.root-servers.net.
      .                       27190   IN      NS      f.root-servers.net.
      .                       27190   IN      NS      e.root-servers.net.
      .                       27190   IN      NS      j.root-servers.net.
      .                       27190   IN      NS      i.root-servers.net.
      .                       27190   IN      NS      g.root-servers.net.
      .                       27190   IN      NS      b.root-servers.net.
      .                       27190   IN      RRSIG   NS 8 0 518400 20190912170000 20190830160000 59944 . DtQjgY6hTjQoBx95E2qR9YHr/VIiwFqkjYjvBuX21XlBEYjlH3Rq0+sF 0XkyzUwp6xq2SXW3ZPgK0SHf2/hv+3fx0sricuQ5mAhvlw9yVVIwQTq5 dr2B0hfs6tfZNiX+CDNMK6DzjEAlX34gnVZmtSuv5KG87PG9ztBoygPd AxobqaiBksHS8DsCNpVwRunZCZ0Wd59LlWl72etkTft779F8YxvIa9B4 MOf497UcW+Wk38utZ4LRtJL0nTk5BeP0jf6oPi95Sp80SgkOGlOAkwvM c10ZiG5NrH0CtBJYQtOpAG4SamwxhxzK1TElq2SZY7lLOTtrFCQYNK53 0Y5yVA==
      ;; Received 525 bytes from 192.168.3.10#53(192.168.3.10) in 3 ms
      
      com.                    172800  IN      NS      m.gtld-servers.net.
      com.                    172800  IN      NS      c.gtld-servers.net.
      com.                    172800  IN      NS      e.gtld-servers.net.
      com.                    172800  IN      NS      a.gtld-servers.net.
      com.                    172800  IN      NS      d.gtld-servers.net.
      com.                    172800  IN      NS      b.gtld-servers.net.
      com.                    172800  IN      NS      g.gtld-servers.net.
      com.                    172800  IN      NS      f.gtld-servers.net.
      com.                    172800  IN      NS      k.gtld-servers.net.
      com.                    172800  IN      NS      j.gtld-servers.net.
      com.                    172800  IN      NS      l.gtld-servers.net.
      com.                    172800  IN      NS      i.gtld-servers.net.
      com.                    172800  IN      NS      h.gtld-servers.net.
      com.                    86400   IN      DS      30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
      com.                    86400   IN      RRSIG   DS 8 1 86400 20190913050000 20190831040000 59944 . ZmaE6S3yTVnYVXNywBnPO1hD4iHQ/DaBiMDi2+mRC88NXTH1Qrsnflnm fIInk6AnQAtl9uS3LM+qXinwCUMrpVGupSi9FQ3QneZgnilRzhyuloxM xJi/22+WulaBE7UzDZJrpA572P3dWBHl296vw3oCoF8OENW/D2Z16gWw xOBJD57Jocnhghm9ONXoE60WPWSOQD9xytzc5vl1oZIRYpmcYsNe1wsq NYm+WUSuM1+AaG0tyjdbwxR23nkRowRxTJyARkc4wcaIEQaNXyEm7Iad ToAyiKVxpCGs2B7JKHuVL9sXsNYo/+awj5yGXuWz1tLBk3teXKgMI0Yu qjSSig==
      ;; Received 1204 bytes from 192.33.4.12#53(c.root-servers.net) in 12 ms
      
      whatever.com.           172800  IN      NS      ns6217.hostgator.com.
      whatever.com.           172800  IN      NS      ns6218.hostgator.com.
      CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
      CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20190904044529 20190828033529 17708 com. vtK0SnwKj0v250DLs1saXgDLxjCfNIdwgX/HHiCRQtvwxI3gMdZbEkM2 iOCv2Sdzo0dnz4RxN6BqXXbB8ZwWqG632PgCwFZluYzSi+stiZY2RX31 FlFzE2VgSf9xB/cElOJp94o2sYEW/n4Gqp73bPbE/HFcVeklYm0MI0bA JvU=
      RNHABBI0G00MKABON3HNN10VBLL72I2F.com. 86400 IN NSEC3 1 1 0 - RNHCNLOM2HJP5G1RNIDHEF5664U20CFO NS DS RRSIG
      RNHABBI0G00MKABON3HNN10VBLL72I2F.com. 86400 IN RRSIG NSEC3 8 2 86400 20190905043336 20190829032336 17708 com. pHdhtwlMfX9QPxdOk6xuO4D+naVZOSfIqGqYB1B/QWlCzxRQa97pfUrn sffyo2mChJWntL6XHutDZHB+YGlvBLg4VqvdwUmoeoaZpVqwlSMtAB4x B1cyW+jf0byLvNjJELetC8JFhmH1LpJIRyuvsFhps3f+Nd6RoVUNLWpz FHM=
      ;; Received 614 bytes from 192.5.6.30#53(a.gtld-servers.net) in 39 ms
      
      www.whatever.com.       14400   IN      CNAME   whatever.com.
      whatever.com.           14400   IN      A       198.57.151.250
      whatever.com.           86400   IN      NS      ns6218.hostgator.com.
      whatever.com.           86400   IN      NS      ns6217.hostgator.com.
      ;; Received 159 bytes from 50.87.144.144#53(ns6217.hostgator.com) in 44 ms
      

      that is what happens when you have to resolve from roots.

      So sure if the authoritative NS or any of those others in the path are on the other side of the planet it might take a second... Doesnt matter in the big picture - its only once and after that its direct to the authoritative ns for the domain vs going all the way down from the root .

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • M
        mrsunfire
        last edited by

        ; <<>> DiG 9.12.2-P1 <<>> www.whatever.com +trace
        ;; global options: +cmd
        .			6497	IN	NS	i.root-servers.net.
        .			6497	IN	NS	h.root-servers.net.
        .			6497	IN	NS	d.root-servers.net.
        .			6497	IN	NS	j.root-servers.net.
        .			6497	IN	NS	g.root-servers.net.
        .			6497	IN	NS	b.root-servers.net.
        .			6497	IN	NS	k.root-servers.net.
        .			6497	IN	NS	m.root-servers.net.
        .			6497	IN	NS	a.root-servers.net.
        .			6497	IN	NS	e.root-servers.net.
        .			6497	IN	NS	f.root-servers.net.
        .			6497	IN	NS	c.root-servers.net.
        .			6497	IN	NS	l.root-servers.net.
        .			6497	IN	RRSIG	NS 8 0 518400 20190912050000 20190830040000 59944 . a18HBLRxbDklfb/5azG80cAJFAwNd4luRiFgFM6QUhVNkCcYfHEPN86t H2TiEwxxwQE+gfKdMFc6F+2GT5MqMgJocYS4hxyai54iMtzN9/HzUxFQ IVeOWU2g2piycqavfFqMp4pfmbESjGj3zBs3BemvD8nS9JVc7PtDnYEN HJ6iYLCSZlLp3HPTOGqd2Kh9uBmujnsVqbUoVWT7H5vT3yblT2J3MdhV XcUYAwl8CneBJGql1VT1ZS5lvGriOnrRuX9evjgHlGZuRk5tiR8oc4aH ndEc28HdihJH4fmj6P0Zq2DnP3KOMV/voHCsF29hEyT3YhpCDng5U99E 994KgA==
        ;; Received 525 bytes from 127.0.0.1#53(127.0.0.1) in 0 ms
        
        com.			172800	IN	NS	f.gtld-servers.net.
        com.			172800	IN	NS	e.gtld-servers.net.
        com.			172800	IN	NS	g.gtld-servers.net.
        com.			172800	IN	NS	c.gtld-servers.net.
        com.			172800	IN	NS	d.gtld-servers.net.
        com.			172800	IN	NS	m.gtld-servers.net.
        com.			172800	IN	NS	h.gtld-servers.net.
        com.			172800	IN	NS	i.gtld-servers.net.
        com.			172800	IN	NS	k.gtld-servers.net.
        com.			172800	IN	NS	l.gtld-servers.net.
        com.			172800	IN	NS	b.gtld-servers.net.
        com.			172800	IN	NS	j.gtld-servers.net.
        com.			172800	IN	NS	a.gtld-servers.net.
        com.			86400	IN	DS	30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
        com.			86400	IN	RRSIG	DS 8 1 86400 20190913050000 20190831040000 59944 . ZmaE6S3yTVnYVXNywBnPO1hD4iHQ/DaBiMDi2+mRC88NXTH1Qrsnflnm fIInk6AnQAtl9uS3LM+qXinwCUMrpVGupSi9FQ3QneZgnilRzhyuloxM xJi/22+WulaBE7UzDZJrpA572P3dWBHl296vw3oCoF8OENW/D2Z16gWw xOBJD57Jocnhghm9ONXoE60WPWSOQD9xytzc5vl1oZIRYpmcYsNe1wsq NYm+WUSuM1+AaG0tyjdbwxR23nkRowRxTJyARkc4wcaIEQaNXyEm7Iad ToAyiKVxpCGs2B7JKHuVL9sXsNYo/+awj5yGXuWz1tLBk3teXKgMI0Yu qjSSig==
        ;; Received 1176 bytes from 2001:7fe::53#53(i.root-servers.net) in 18 ms
        
        whatever.com.		172800	IN	NS	ns6217.hostgator.com.
        whatever.com.		172800	IN	NS	ns6218.hostgator.com.
        CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
        CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20190904044529 20190828033529 17708 com. vtK0SnwKj0v250DLs1saXgDLxjCfNIdwgX/HHiCRQtvwxI3gMdZbEkM2 iOCv2Sdzo0dnz4RxN6BqXXbB8ZwWqG632PgCwFZluYzSi+stiZY2RX31 FlFzE2VgSf9xB/cElOJp94o2sYEW/n4Gqp73bPbE/HFcVeklYm0MI0bA JvU=
        RNHABBI0G00MKABON3HNN10VBLL72I2F.com. 86400 IN NSEC3 1 1 0 - RNHCNLOM2HJP5G1RNIDHEF5664U20CFO NS DS RRSIG
        RNHABBI0G00MKABON3HNN10VBLL72I2F.com. 86400 IN RRSIG NSEC3 8 2 86400 20190905043336 20190829032336 17708 com. pHdhtwlMfX9QPxdOk6xuO4D+naVZOSfIqGqYB1B/QWlCzxRQa97pfUrn sffyo2mChJWntL6XHutDZHB+YGlvBLg4VqvdwUmoeoaZpVqwlSMtAB4x B1cyW+jf0byLvNjJELetC8JFhmH1LpJIRyuvsFhps3f+Nd6RoVUNLWpz FHM=
        ;; Received 614 bytes from 192.41.162.30#53(l.gtld-servers.net) in 15 ms
        
        www.whatever.com.	14400	IN	CNAME	whatever.com.
        whatever.com.		14400	IN	A	198.57.151.250
        whatever.com.		86400	IN	NS	ns6217.hostgator.com.
        whatever.com.		86400	IN	NS	ns6218.hostgator.com.
        ;; Received 159 bytes from 198.57.151.238#53(ns6218.hostgator.com) in 184 ms
        

        Netgate 6100 MAX

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @mrsunfire
          last edited by

          @mrsunfire said in DNS Resolver not caching correct?:

          (ns6218.hostgator.com) in 184 ms

          So you see the authoritative ns are that far away from you - lot farther than 7ms ;)

          At any given time you might of talked to something in the path that took longer than normal, maybe something in path was congested, maybe the ns took longer to answer, etc.

          But that is how something is resolved - when none of it is cached.. now the once the ns for .com are cached no reason to ask roots for those, once the ns for whatever.com is cached no reason to talk to the gtld-servers.net ns - so you can just go ask the authoritative NS directly - but since its a lot farther than 7ms away from you - there can be delays... But in the big picture makes no matter. Since its only going to be once, and then its cached for the length of the TTL, and if you have prefetch setup and or zero answer - you will get an answer from unbound instantly and it will go refresh its stuff in the background..

          So what does it matter if took 1000ms - that is not even going to be really noticed since I doubt a site couple hundred ms away from you is going to load instantly anyway.. Worse case you added a whole second to the page load time (ONCE)

          There is little need of concerning your self if a site resolves in 30ms or 300ms, or even 1000ms.. Since once its cached - none of that matters any more. And in the big picture a fraction of a second in addition to the overall first load time of the page is meaningless.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • P
            perlenbacher
            last edited by

            Hi johnpoz,

            could you post your DNS Resolver, General Settings and Advanced Settings please.

            It would be very handy for us all!

            Thanks, Perlen

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by johnpoz

              Sure here you go
              settings.png

              Notice that I have disabled automatic ACLs so you will have to create your own to allow queries.

              I have also changed from transparent to static for my zone.. Make sure you actually understand what settings do before changing them.. Any questions on what anything specifically does, just ask. Don't think this is some sort of guide to how you should set yours up.. These are my settings for my network and use case.. Most of them are just default.. Only a couple of changes really from out of the box settings. Which may or may not be good for your actual needs.

              Generally speaking - out of the box should be fine for pretty much everyone.

              As to the general settings - there are no dns set other than local... Here
              general.png

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 1
              • P
                perlenbacher
                last edited by

                Very interesting, much appreciated. Thanks!

                1 Reply Last reply Reply Quote 0
                • M
                  mrsunfire
                  last edited by

                  For info: this is the result of cacheoutput after two days and I'm happy with it:

                  total.num.queries=21177
                  total.num.queries_ip_ratelimited=0
                  total.num.cachehits=15554
                  total.num.cachemiss=5623
                  total.num.prefetch=8627
                  total.num.zero_ttl=9232
                  total.num.recursivereplies=5623
                  

                  Thanks a lot @johnpoz !

                  Netgate 6100 MAX

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    @mrsunfire said in DNS Resolver not caching correct?:

                    total.num.zero_ttl=9232

                    that seems like a lot of low TTLs - you might want to play with uping the min vs letting them set like 60 seconds and 5 min ttls

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • M
                      mrsunfire
                      last edited by

                      So with what should I start? And what does this change? Isn't this dangerous?

                      Netgate 6100 MAX

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by johnpoz

                        In the advanced tab change the min ttl to say 1800 or 3600 vs letting them set such low ttls.. Could it cause issues - maybe. But I doubt it really..

                        Lets say you had something that was using a 60 second TTL, do the IPs even change - I had issue with some software where it checked a fqdn all the time, and the ttl was 60 seconds.. But upon check it multiple times the IP wasn't even changing - so what is the F'ing point of having dns query for it every 60 seconds.

                        Then you have them doing load balancing nonsense via dns

                        example
                        ;scribe.logs.roku.com. IN A

                        ;; ANSWER SECTION:
                        scribe.logs.roku.com. 60 IN A 52.21.150.70
                        scribe.logs.roku.com. 60 IN A 35.172.120.217
                        scribe.logs.roku.com. 60 IN A 34.233.159.203
                        scribe.logs.roku.com. 60 IN A 35.170.206.212
                        scribe.logs.roku.com. 60 IN A 52.200.248.59
                        scribe.logs.roku.com. 60 IN A 52.1.249.132
                        scribe.logs.roku.com. 60 IN A 34.226.55.236
                        scribe.logs.roku.com. 60 IN A 52.21.44.213

                        So while you might use 52.21.150.70 one time, next time is 25.172.120.217, etc. Only issue you could have is that 52.21.150.170 no longer works.

                        Have really never seen it be an issue.. But I wouldn't suggest you set the min to like 24 hours or anything.. If you find your having an issue getting somewhere, you can always just flush that specific entry from your cache.

                        This should lower the amount of both local queries and external queries.. Since now vs your local client asking for something every min with such a low ttl, it would only need to query 1 an hour for example.. Same goes for external queries. If your local device is not using a local cache - doesn't really matter what the ttl is for local queries - but would keep your dns from having to resolve it every freaking 60 seconds because some dumb iot device keeps asking for it every 30 freaking seconds, etc. because it has no local cache.

                        But hey if you got some local devices asking for whatever.something.tld every minute - you just got a 60x reduction in the number of external queries you have to do ;) if you change the min ttl to 1 hour. Multiply that by a few devices and few different fqdn being queried and in the course of 24 you could be doing 10s of 1000's of less queries.. Again prob not all that big of deal in the big picture.. But why do them if you don't really need to, etc.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • M
                          mrsunfire
                          last edited by

                          I don't know if I should play around with that because everything runs fast and good for now. But I see if my WAN goes down unbound restarts. Any chance to disable this function and keep it running?

                          Netgate 6100 MAX

                          GertjanG 1 Reply Last reply Reply Quote 0
                          • GertjanG
                            Gertjan @mrsunfire
                            last edited by

                            @mrsunfire said in DNS Resolver not caching correct?:

                            But I see if my WAN goes down unbound restarts

                            It's possible that the restart of unbound wasn't needed. If the WAN IP stays the same, then maybe yes, it might not be needed.
                            I guess you should investigate why the WAN NIC goes down ? Missing an UPS ? Then add one.

                            There are many reasons that a WAN interface change has more effect, and then unbound should restart.
                            Loadbalancing. VPN usage (the tunnel is rebuild, and unbound should use the tunnel), etc.

                            However : there is no GUI setting that let you choose what to restart, or not.
                            Just stop ripping out the cable, or have people play with the power plug, and you'll be fine.

                            No "help me" PM's please. Use the forum, the community will thank you.
                            Edit : and where are the logs ??

                            1 Reply Last reply Reply Quote 0
                            • M
                              mrsunfire
                              last edited by

                              The IP stays the same. I use cable and the inhouse coax is getting renewed. The old one sometimes has ingress and the connection goes down shortly. I have to say that pfSense then switches to my failover WAN2.

                              Any chance to disable unbound restart?

                              Netgate 6100 MAX

                              GertjanG 1 Reply Last reply Reply Quote 0
                              • GertjanG
                                Gertjan @mrsunfire
                                last edited by

                                Do you mean your upstream WAN Ethernet goes really down ? The upstream device resets ?
                                It's a cable modem - your mentioned 'coax' ?

                                @mrsunfire said in DNS Resolver not caching correct?:

                                Any chance to disable unbound restart?

                                Not without you actually changing the code.

                                Btw : the monitoring process will also reset the interface if the upstream gateway becomes unreachable. You could change these settings.

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                1 Reply Last reply Reply Quote 0
                                • M
                                  mrsunfire
                                  last edited by

                                  Yes the cable modem loses connection to the upstream gateway of my ISP. Then a gateway alarm appears and it switches to my WAN2.

                                  Netgate 6100 MAX

                                  GertjanG 1 Reply Last reply Reply Quote 0
                                  • GertjanG
                                    Gertjan @mrsunfire
                                    last edited by

                                    @mrsunfire said in DNS Resolver not caching correct?:

                                    Then a gateway alarm appears and it switches to my WAN2.

                                    Ok. Pretty good reason to inform unbound about that event ^^

                                    No "help me" PM's please. Use the forum, the community will thank you.
                                    Edit : and where are the logs ??

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      mrsunfire
                                      last edited by

                                      Sure but why is it clearing the cache? An option to prevent that would be nice.

                                      Netgate 6100 MAX

                                      GertjanG 1 Reply Last reply Reply Quote 0
                                      • GertjanG
                                        Gertjan @mrsunfire
                                        last edited by Gertjan

                                        @mrsunfire said in DNS Resolver not caching correct?:

                                        Sure but why is it clearing the cache? An option to prevent that would be nice.

                                        Ah, now we are getting to the bottom of the subject.
                                        It's unbound that needs to restart when the state of one of it's interfaces change.
                                        I guess (my words) that unbound can't dynamic bind and unbind to IPs and/or ports.
                                        This means : shutting down, Start again, thus reading the config (which is probably is rebuild because some interface came up = a viable or is missing now).
                                        Side effect : cache is flushed / reset.

                                        As far as I know, the cache isn't written when unbound stops to some cache file and read back in when starting.
                                        Don't know if that is even possible - and I'm pretty sure this isn't done by pfSense.

                                        Other side effect : people that use packages like pfBlockerNG with huge DNSBL lists will see something else : it will take long time (several tens of seconds) for unbound to start up because it has to read throughout all these lists and loading them.
                                        If unbound restarts often - because, for example, it restarts when a DHCP lease comes in, they will experience DNS outages.

                                        No "help me" PM's please. Use the forum, the community will thank you.
                                        Edit : and where are the logs ??

                                        1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator
                                          last edited by johnpoz

                                          You could load the cache back

                                          You have to dump it first
                                          unbound-control dump_cache > unbound.dump

                                          Then reload it
                                          cat unbound.dump | unbound-control load_cache

                                          Here is where you could run into a problem with that - petty sure the ttls would be frozen at that moment in time. I have not done much playing with doing something like that - just don't really see the point.. So your stuff resolves again... So first query would be a couple extra ms.. But if your ttl's are frozen at the moment of the dump, then counters restart on reload then you could be serving up expired ttls - and depending on the how long it was down, etc. They could be expired by very long time.. And still have lots of time left on them, so might be getting bad info for whatever the time left on the ttl was?

                                          But sure - guess it could be coded to dump the cache every X minutes or something, and then on restart reload it. Would need easy way for users to flush other than restart.

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          GertjanG 1 Reply Last reply Reply Quote 0
                                          • GertjanG
                                            Gertjan @johnpoz
                                            last edited by

                                            @johnpoz said in DNS Resolver not caching correct?:

                                            You could load the cache back
                                            You have to dump it first
                                            unbound-control dump_cache > unbound.dump
                                            Then reload it
                                            cat unbound.dump | unbound-control load_cache

                                            Me ?
                                            Ok.

                                            First, a snapshot from what the cache is doing now :

                                            unbound-control -c /var/unbound/unbound.conf stats_noreset | grep 'cache'
                                            

                                            Note : adding " -c /var/unbound/unbound.conf '" isn't optional.

                                            Now I dump to cache :

                                            unbound-control -c /var/unbound/unbound.conf dump_cache > unbound.dump
                                            

                                            For fun, look what's in this file : mine was nearly 3 Mega Bytes.

                                            Now, I restart unbound in the GUI. A command line command exists, I'm; lazy and googled already to much this morning.

                                            Another check :

                                            unbound-control -c /var/unbound/unbound.conf stats_noreset | grep 'cache'
                                            

                                            to see that unbound is running with an empty cache now.

                                            Show time :

                                            cat unbound.dump | unbound-control -c /var/unbound/unbound.conf load_cache
                                            

                                            and re check again to see that "things" have been loaded :

                                            unbound-control -c /var/unbound/unbound.conf stats_noreset | grep 'cache'
                                            

                                            That seems to work - indeed 👍

                                            You're right - I can ^^

                                            But pfSense can't / doesn't know how to do so.
                                            (I can of course edit the related source files where unbound is restarted - it's just plain PHP .... but hey, all is fine for me already )

                                            And yes, you're right. Mighty DNS gods would come down to earth when people start to load in old cache info and issues like that ....
                                            There are already to much "issues" with DNS/unbound - or, take note : it works perfectly well out of the box.

                                            No "help me" PM's please. Use the forum, the community will thank you.
                                            Edit : and where are the logs ??

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.