Annotation of embedaddon/dnsmasq/FAQ, revision 1.1
1.1 ! misho 1: Q: Why does dnsmasq open UDP ports >1024 as well as port 53.
! 2: Is this a security problem/trojan/backdoor?
! 3:
! 4: A: The high ports that dnsmasq opens are for replies from the upstream
! 5: nameserver(s). Queries from dnsmasq to upstream nameservers are sent
! 6: from these ports and replies received to them. The reason for doing this is
! 7: that most firewall setups block incoming packets _to_ port 53, in order
! 8: to stop DNS queries from the outside world. If dnsmasq sent its queries
! 9: from port 53 the replies would be _to_ port 53 and get blocked.
! 10:
! 11: This is not a security hole since dnsmasq will only accept replies to that
! 12: port: queries are dropped. The replies must be to oustanding queries
! 13: which dnsmasq has forwarded, otherwise they are dropped too.
! 14:
! 15: Addendum: dnsmasq now has the option "query-port" (-Q), which allows
! 16: you to specify the UDP port to be used for this purpose. If not
! 17: specified, the operating system will select an available port number
! 18: just as it did before.
! 19:
! 20: Second addendum: following the discovery of a security flaw in the
! 21: DNS protocol, dnsmasq from version 2.43 has changed behavior. It
! 22: now uses a new, randomly selected, port for each query. The old
! 23: default behaviour (use one port allocated by the OS) is available by
! 24: setting --query-port=0, and setting the query port to a positive
! 25: value still works. You should think hard and know what you are
! 26: doing before using either of these options.
! 27:
! 28: Q: Why doesn't dnsmasq support DNS queries over TCP? Don't the RFC's specify
! 29: that?
! 30:
! 31: A: Update: from version 2.10, it does. There are a few limitations:
! 32: data obtained via TCP is not cached, and source-address
! 33: or query-port specifications are ignored for TCP.
! 34:
! 35: Q: When I send SIGUSR1 to dump the contents of the cache, some entries have
! 36: no IP address and are for names like mymachine.mydomain.com.mydomain.com.
! 37: What are these?
! 38:
! 39: A: They are negative entries: that's what the N flag means. Dnsmasq asked
! 40: an upstream nameserver to resolve that address and it replied "doesn't
! 41: exist, and won't exist for <n> hours" so dnsmasq saved that information so
! 42: that if _it_ gets asked the same question it can answer directly without
! 43: having to go back to the upstream server again. The strange repeated domains
! 44: result from the way resolvers search short names. See "man resolv.conf" for
! 45: details.
! 46:
! 47:
! 48: Q: Will dnsmasq compile/run on non-Linux systems?
! 49:
! 50: A: Yes, there is explicit support for *BSD and MacOS X and Solaris.
! 51: There are start-up scripts for MacOS X Tiger and Panther
! 52: in /contrib. Dnsmasq will link with uclibc to provide small
! 53: binaries suitable for use in embedded systems such as
! 54: routers. (There's special code to support machines with flash
! 55: filesystems and no battery-backed RTC.)
! 56: If you encounter make errors with *BSD, try installing gmake from
! 57: ports and building dnsmasq with "make MAKE=gmake"
! 58: For other systems, try altering the settings in config.h.
! 59:
! 60: Q: My company's nameserver knows about some names which aren't in the
! 61: public DNS. Even though I put it first in /etc/resolv.conf, it
! 62: dosen't work: dnsmasq seems not to use the nameservers in the order
! 63: given. What am I doing wrong?
! 64:
! 65: A: By default, dnsmasq treats all the nameservers it knows about as
! 66: equal: it picks the one to use using an algorithm designed to avoid
! 67: nameservers which aren't responding. To make dnsmasq use the
! 68: servers in order, give it the -o flag. If you want some queries
! 69: sent to a special server, think about using the -S flag to give the
! 70: IP address of that server, and telling dnsmasq exactly which
! 71: domains to use the server for.
! 72:
! 73: Q: OK, I've got queries to a private nameserver working, now how about
! 74: reverse queries for a range of IP addresses?
! 75:
! 76: A: Use the standard DNS convention of <reversed address>.in-addr.arpa.
! 77: For instance to send reverse queries on the range 192.168.0.0 to
! 78: 192.168.0.255 to a nameserver at 10.0.0.1 do
! 79: server=/0.168.192.in-addr.arpa/10.0.0.1
! 80: Note that the "bogus-priv" option take priority over this option,
! 81: so the above will not work when the bogus-priv option is set.
! 82:
! 83: Q: Dnsmasq fails to start with an error like this: "dnsmasq: bind
! 84: failed: Cannot assign requested address". What's the problem?
! 85:
! 86: A: This has been seen when a system is bringing up a PPP interface at
! 87: boot time: by the time dnsmasq start the interface has been
! 88: created, but not brought up and assigned an address. The easiest
! 89: solution is to use --interface flags to specify which interfaces
! 90: dnsmasq should listen on. Since you are unlikely to want dnsmasq to
! 91: listen on a PPP interface and offer DNS service to the world, the
! 92: problem is solved.
! 93:
! 94: Q: I'm running on BSD and dnsmasq won't accept long options on the
! 95: command line.
! 96:
! 97: A: Dnsmasq when built on some BSD systems doesn't use GNU getopt by
! 98: default. You can either just use the single-letter options or
! 99: change config.h and the Makefile to use getopt-long. Note that
! 100: options in /etc/dnsmasq.conf must always be the long form,
! 101: on all platforms.
! 102:
! 103: Q: Names on the internet are working fine, but looking up local names
! 104: from /etc/hosts or DHCP doesn't seem to work.
! 105:
! 106: A: Resolver code sometime does strange things when given names without
! 107: any dots in. Win2k and WinXP may not use the DNS at all and just
! 108: try and look up the name using WINS. On unix look at "options ndots:"
! 109: in "man resolv.conf" for details on this topic. Testing lookups
! 110: using "nslookup" or "dig" will work, but then attempting to run
! 111: "ping" will get a lookup failure, appending a dot to the end of the
! 112: hostname will fix things. (ie "ping myhost" fails, but "ping
! 113: myhost." works. The solution is to make sure that all your hosts
! 114: have a domain set ("domain" in resolv.conf, or set a domain in
! 115: your DHCP server, see below for Windows XP and Mac OS X).
! 116: Any domain will do, but "localnet" is traditional. Now when you
! 117: resolve "myhost" the resolver will attempt to look up
! 118: "myhost.localnet" so you need to have dnsmasq reply to that name.
! 119: The way to do that is to include the domain in each name on
! 120: /etc/hosts and/or to use the --expand-hosts and --domain options.
! 121:
! 122: Q: How do I set the DNS domain in Windows XP or MacOS X (ref: previous
! 123: question)?
! 124:
! 125: A: for XP, Control Panel > Network Connections > { Connection to gateway /
! 126: DNS } > Properties > { Highlight TCP/IP } > Properties > Advanced >
! 127: DNS Tab > DNS suffix for this connection:
! 128:
! 129: A: for OS X, System Preferences > Network > {Connection to gateway / DNS } >
! 130: Search domains:
! 131:
! 132: Q: Can I get dnsmasq to save the contents of its cache to disk when
! 133: I shut my machine down and re-load when it starts again?
! 134:
! 135: A: No, that facility is not provided. Very few names in the DNS have
! 136: their time-to-live set for longer than a few hours so most of the
! 137: cache entries would have expired after a shutdown. For longer-lived
! 138: names it's much cheaper to just reload them from the upstream
! 139: server. Note that dnsmasq is not shut down between PPP sessions so
! 140: go off-line and then on-line again will not lose the contents of
! 141: the cache.
! 142:
! 143: Q: Who are Verisign, what do they have to do with the bogus-nxdomain
! 144: option in dnsmasq and why should I wory about it?
! 145:
! 146: A: [note: this was written in September 2003, things may well change.]
! 147: Versign run the .com and .net top-level-domains. They have just
! 148: changed the configuration of their servers so that unknown .com and
! 149: .net domains, instead of returning an error code NXDOMAIN, (no such
! 150: domain) return the address of a host at Versign which runs a web
! 151: server showing a search page. Most right-thinking people regard
! 152: this new behaviour as broken :-). You can test to see if you are
! 153: suffering Versign brokeness by run a command like
! 154:
! 155: host jlsdajkdalld.com
! 156:
! 157: If you get "jlsdajkdalld.com" does not exist, then all is fine, if
! 158: host returns an IP address, then the DNS is broken. (Try a few
! 159: different unlikely domains, just in case you picked a wierd one
! 160: which really _is_ registered.)
! 161:
! 162: Assuming that your DNS is broken, and you want to fix it, simply
! 163: note the IP address being returned and pass it to dnsmasq using the
! 164: --bogus-nxdomain flag. Dnsmasq will check for results returning
! 165: that address and substitute an NXDOMAIN instead.
! 166:
! 167: As of writing, the IP address in question for the .com and .net
! 168: domains is is 64.94.110.11. Various other, less prominent,
! 169: registries pull the same stunt; there is a list of them all, and
! 170: the addresses to block, at http://winware.org/bogus-domains.txt
! 171:
! 172: Q: This new DHCP server is well and good, but it doesn't work for me.
! 173: What's the problem?
! 174:
! 175: A: There are a couple of configuration gotchas which have been
! 176: encountered by people moving from the ISC dhcpd to the dnsmasq
! 177: integrated DHCP daemon. Both are related to differences in
! 178: in the way the two daemons bypass the IP stack to do "ground up"
! 179: IP configuration and can lead to the dnsmasq daemon failing
! 180: whilst the ISC one works.
! 181:
! 182: The first thing to check is the broadcast address set for the
! 183: ethernet interface. This is normally the adddress on the connected
! 184: network with all ones in the host part. For instance if the
! 185: address of the ethernet interface is 192.168.55.7 and the netmask
! 186: is 255.255.255.0 then the broadcast address should be
! 187: 192.168.55.255. Having a broadcast address which is not on the
! 188: network to which the interface is connected kills things stone
! 189: dead.
! 190:
! 191: The second potential problem relates to firewall rules: since the ISC
! 192: daemon in some configurations bypasses the kernel firewall rules
! 193: entirely, the ability to run the ISC daemon does not indicate
! 194: that the current configuration is OK for the dnsmasq daemon.
! 195: For the dnsmasq daemon to operate it's vital that UDP packets to
! 196: and from ports 67 and 68 and broadcast packets with source
! 197: address 0.0.0.0 and destination address 255.255.255.255 are not
! 198: dropped by iptables/ipchains.
! 199:
! 200: Q: I'm running Debian, and my machines get an address fine with DHCP,
! 201: but their names are not appearing in the DNS.
! 202:
! 203: A: By default, none of the DHCP clients send the host-name when asking
! 204: for a lease. For most of the clients, you can set the host-name to
! 205: send with the "hostname" keyword in /etc/network/interfaces. (See
! 206: "man interfaces" for details.) That doesn't work for dhclient, were
! 207: you have to add something like "send host-name daisy" to
! 208: /etc/dhclient.conf [Update: the lastest dhcpcd packages _do_ send
! 209: the hostname by default.
! 210:
! 211: Q: I'm network booting my machines, and trying to give them static
! 212: DHCP-assigned addresses. The machine gets its correct address
! 213: whilst booting, but then the OS starts and it seems to get
! 214: allocated a different address.
! 215:
! 216: A: What is happening is this: The boot process sends a DHCP
! 217: request and gets allocated the static address corresponding to its
! 218: MAC address. The boot loader does not send a client-id. Then the OS
! 219: starts and repeats the DHCP process, but it it does send a
! 220: client-id. Dnsmasq cannot assume that the two requests are from the
! 221: same machine (since the client ID's don't match) and even though
! 222: the MAC address has a static allocation, that address is still in
! 223: use by the first incarnation of the machine (the one from the boot,
! 224: without a client ID.) dnsmasq therefore has to give the machine a
! 225: dynamic address from its pool. There are three ways to solve this:
! 226: (1) persuade your DHCP client not to send a client ID, or (2) set up
! 227: the static assignment to the client ID, not the MAC address. The
! 228: default client-id will be 01:<MAC address>, so change the dhcp-host
! 229: line from "dhcp-host=11:22:33:44:55:66,1.2.3.4" to
! 230: "dhcp-host=id:01:11:22:33:44:55:66,1.2.3.4" or (3) tell dnsmasq to
! 231: ignore client IDs for a particular MAC address, like this:
! 232: dhcp-host=11:22:33:44:55:66,id:*
! 233:
! 234: Q: What network types are supported by the DHCP server?
! 235:
! 236: A: Ethernet (and 802.11 wireless) are supported on all platforms. On
! 237: Linux all network types (including FireWire) are supported.
! 238:
! 239: Q: What are these strange "bind-interface" and "bind-dynamic" options?
! 240:
! 241: A: Dnsmasq from v2.63 can operate in one of three different "networking
! 242: modes". This is unfortunate as it requires users configuring dnsmasq
! 243: to take into account some rather bizzare contraints and select the
! 244: mode which best fits the requirements of a particular installation.
! 245: The origin of these are deficiencies in the Unix networking
! 246: model and APIs and each mode has different advantages and
! 247: problems. Just to add to the confusion, not all modes are available on
! 248: all platforms (due the to lack of supporting network APIs).To further
! 249: add to the confusion, the rules for the DHCP subsystem on dnsmasq are
! 250: different to the rules for the DNS and TFTP subsystems.
! 251:
! 252: The three modes are "wildcard", "bind-interfaces" and "bind-dynamic".
! 253:
! 254: In "wildcard" mode, dnsmasq binds the wildcard IP address (0.0.0.0 or
! 255: ::). This allows it to recieve all the packets sent to the server on
! 256: the relevant port. Access control (--interface, --except-interface,
! 257: --listen-address, etc) is implemented by dnsmasq: it queries the
! 258: kernel to determine the interface on which a packet was recieved and
! 259: the address to which it was sent, and applies the configured
! 260: rules. Wildcard mode is the default if neither of the other modes are
! 261: specified.
! 262:
! 263: In "bind-interfaces" mode, dnsmasq runs through all the network
! 264: interfaces available when it starts, finds the set of IP addresses on
! 265: those interfaces, filters that set using the access control
! 266: configuration, and then binds the set of IP addresses. Only packets
! 267: sent to the allowed addresses are delivered by the kernel to dnsmasq.
! 268:
! 269: In "bind-dynamic" mode, access control filtering is done both by
! 270: binding individual IP addresses, as for bind-interfaces, and by
! 271: inspecting individual packets on arrival as for wildcard mode. In
! 272: addition, dnsmasq notices when new interfaces appear or new addresses
! 273: appear on existing interfaces, and the resulting IP addresses are
! 274: bound automatically without having to restart dnsmasq.
! 275:
! 276: The mode chosen has four different effects: co-existence with other
! 277: servers, semantics of --interface access control, effect of new
! 278: interfaces, and legality of --interface specifications for
! 279: non-existent inferfaces. We will deal with these in order.
! 280:
! 281: A dnsmasq instance running in wildcard mode precludes a machine from
! 282: running a second instance of dnsmasq or any other DNS, TFTP or DHCP
! 283: server. Attempts to do so will fail with an "address in use" error.
! 284: Dnsmasq running in --bind-interfaces or bind-dynamic mode allow other
! 285: instances of dnsmasq or other servers, as long as no two servers are
! 286: configured to listen on the same interface address.
! 287:
! 288: The semantics of --interface varies subtly between wildcard or
! 289: bind-dynamic mode and bind-interfaces mode. The situation where this
! 290: matters is a request which arrives via one interface (A), but with a
! 291: destination address of a second interface (B) and when dnsmasq is
! 292: configured to listen only on B. In wildcard or bind-dynamic mode, such
! 293: a request will be ignored, in bind-interfaces mode, it will be
! 294: accepted.
! 295:
! 296: The creation of new network interfaces after dnsmasq starts is ignored
! 297: by dnsmasq when in --bind-interfaces mode. In wildcard or bind-dynamic
! 298: mode, such interfaces are handled normally.
! 299:
! 300: A --interface specification for a non-existent interface is a fatal
! 301: error at start-up when in --bind-interfaces mode, by just generates a
! 302: warning in wildcard or bind-dynamic mode.
! 303:
! 304: Q: Why doesn't Kerberos work/why can't I get sensible answers to
! 305: queries for SRV records.
! 306:
! 307: A: Probably because you have the "filterwin2k" option set. Note that
! 308: it was on by default in example configuration files included in
! 309: versions before 2.12, so you might have it set on without
! 310: realising.
! 311:
! 312: Q: Can I get email notification when a new version of dnsmasq is
! 313: released?
! 314:
! 315: A: Yes, new releases of dnsmasq are always announced through
! 316: freshmeat.net, and they allow you to subcribe to email alerts when
! 317: new versions of particular projects are released. New releases are
! 318: also announced in the dnsmasq-discuss mailing list, subscribe at
! 319: http://lists.thekelleys.org.uk/mailman/listinfo/dnsmasq-discuss
! 320:
! 321: Q: What does the dhcp-authoritative option do?
! 322:
! 323: A: See http://www.isc.org/files/auth.html - that's
! 324: for the ISC daemon, but the same applies to dnsmasq.
! 325:
! 326: Q: Why does my Gentoo box pause for a minute before getting a new
! 327: lease?
! 328:
! 329: A: Because when a Gentoo box shuts down, it releases its lease with
! 330: the server but remembers it on the client; this seems to be a
! 331: Gentoo-specific patch to dhcpcd. On restart it tries to renew
! 332: a lease which is long gone, as far as dnsmasq is concerned, and
! 333: dnsmasq ignores it until is times out and restarts the process.
! 334: To fix this, set the dhcp-authoritative flag in dnsmasq.
! 335:
! 336: Q: My laptop has two network interfaces, a wired one and a wireless
! 337: one. I never use both interfaces at the same time, and I'd like the
! 338: same IP and configuration to be used irrespective of which
! 339: interface is in use. How can I do that?
! 340:
! 341: A: By default, the identity of a machine is determined by using the
! 342: MAC address, which is associated with interface hardware. Once an
! 343: IP is bound to the MAC address of one interface, it cannot be
! 344: associated with another MAC address until after the DHCP lease
! 345: expires. The solution to this is to use a client-id as the machine
! 346: identity rather than the MAC address. If you arrange for the same
! 347: client-id to sent when either interface is in use, the DHCP server
! 348: will recognise the same machine, and use the same address. The
! 349: method for setting the client-id varies with DHCP client software,
! 350: dhcpcd uses the "-I" flag. Windows uses a registry setting,
! 351: see http://www.jsiinc.com/SUBF/TIP2800/rh2845.htm
! 352: Addendum:
! 353: From version 2.46, dnsmasq has a solution to this which doesn't
! 354: involve setting client-IDs. It's possible to put more than one MAC
! 355: address in a --dhcp-host configuration. This tells dnsmasq that it
! 356: should use the specified IP for any of the specified MAC addresses,
! 357: and furthermore it gives dnsmasq permission to sumarily abandon a
! 358: lease to one of the MAC addresses if another one comes along. Note
! 359: that this will work fine only as longer as only one interface is
! 360: up at any time. There is no way for dnsmasq to enforce this
! 361: constraint: if you configure multiple MAC addresses and violate
! 362: this rule, bad things will happen.
! 363:
! 364: Q: Can dnsmasq do DHCP on IP-alias interfaces?
! 365:
! 366: A: Yes, from version-2.21. The support is only available running under
! 367: Linux, on a kernel which provides the RT-netlink facility. All 2.4
! 368: and 2.6 kernels provide RT-netlink and it's an option in 2.2
! 369: kernels.
! 370:
! 371: If a physical interface has more than one IP address or aliases
! 372: with extra IP addresses, then any dhcp-ranges corresponding to
! 373: these addresses can be used for address allocation. So if an
! 374: interface has addresses 192.168.1.0/24 and 192.168.2.0/24 and there
! 375: are DHCP ranges 192.168.1.100-192.168.1.200 and
! 376: 192.168.2.100-192.168.2.200 then both ranges would be used for host
! 377: connected to the physical interface. A more typical use might be to
! 378: have one of the address-ranges as static-only, and have known
! 379: hosts allocated addresses on that subnet using dhcp-host options,
! 380: while anonymous hosts go on the other.
! 381:
! 382:
! 383: Q: Dnsmasq sometimes logs "nameserver xxx.xxx.xxx.xxx refused
! 384: to do a recursive query" and DNS stops working. What's going on?
! 385:
! 386: A: Probably the nameserver is an authoritative nameserver for a
! 387: particular domain, but is not configured to answer general DNS
! 388: queries for an arbitrary domain. It is not suitable for use by
! 389: dnsmasq as an upstream server and should be removed from the
! 390: configuration. Note that if you have more than one upstream
! 391: nameserver configured dnsmasq will load-balance across them and
! 392: it may be some time before dnsmasq gets around to using a
! 393: particular nameserver. This means that a particular configuration
! 394: may work for sometime with a broken upstream nameserver
! 395: configuration.
! 396:
! 397:
! 398: Q: Does the dnsmasq DHCP server probe addresses before allocating
! 399: them, as recommended in RFC2131?
! 400:
! 401: A: Yes, dynamically allocated IP addresses are checked by sending an
! 402: ICMP echo request (ping). If a reply is received, then dnsmasq
! 403: assumes that the address is in use, and attempts to allocate an
! 404: different address. The wait for a reply is between two and three
! 405: seconds. Because the DHCP server is not re-entrant, it cannot serve
! 406: other DHCP requests during this time. To avoid dropping requests,
! 407: the address probe may be skipped when dnsmasq is under heavy load.
! 408:
! 409:
! 410: Q: I'm using dnsmasq on a machine with the Firestarter firewall, and
! 411: DHCP doesn't work. What's the problem?
! 412:
! 413: A: This a variant on the iptables problem. Explicit details on how to
! 414: proceed can be found at
! 415: http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2005q3/000431.html
! 416:
! 417:
! 418: Q: I'm using dnsmasq on a machine with the shorewall firewall, and
! 419: DHCP doesn't work. What's the problem?
! 420:
! 421: A: This a variant on the iptables problem. Explicit details on how to
! 422: proceed can be found at
! 423: http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2007q4/001764.html
! 424:
! 425:
! 426: Q: Dnsmasq fails to start up with a message about capabilities.
! 427: Why did that happen and what can do to fix it?
! 428:
! 429: A: Change your kernel configuration: either deselect CONFIG_SECURITY
! 430: _or_ select CONFIG_SECURITY_CAPABILITIES. Alternatively, you can
! 431: remove the need to set capabilities by running dnsmasq as root.
! 432:
! 433:
! 434: Q: Where can I get .rpms Suitable for openSUSE/SLES?
! 435:
! 436: A: Dnsmasq is in openSUSE itself, and the latest releases are also
! 437: available at http://download.opensuse.org/repositories/network/
! 438:
! 439:
! 440: Q: Can I run dnsmasq in a Linux vserver?
! 441:
! 442: A: Yes, as a DNS server, dnsmasq will just work in a vserver.
! 443: To use dnsmasq's DHCP function you need to give the vserver
! 444: extra system capabilities. Please note that doing so will lesser
! 445: the overall security of your system. The capabilities
! 446: required are NET_ADMIN and NET_RAW. NET_ADMIN is essential, NET_RAW
! 447: is required to do an ICMP "ping" check on newly allocated
! 448: addresses. If you don't need this check, you can disable it with
! 449: --no-ping and omit the NET_RAW capability.
! 450: Adding the capabilities is done by adding them, one per line, to
! 451: either /etc/vservers/<vservername>/ccapabilities for a 2.4 kernel or
! 452: /etc/vservers/<vservername>/bcapabilities for a 2.6 kernel (please
! 453: refer to the vserver documentation for more information).
! 454:
! 455:
! 456: Q: What's the problem with syslog and dnsmasq?
! 457:
! 458: A: In almost all cases: none. If you have the normal arrangement with
! 459: local daemons logging to a local syslog, which then writes to disk,
! 460: then there's never a problem. If you use network logging, then
! 461: there's a potential problem with deadlock: the syslog daemon will
! 462: do DNS lookups so that it can log the source of log messages,
! 463: these lookups will (depending on exact configuration) go through
! 464: dnsmasq, which also sends log messages. With bad timing, you can
! 465: arrive at a situation where syslog is waiting for dnsmasq, and
! 466: dnsmasq is waiting for syslog; they will both wait forever. This
! 467: problem is fixed from dnsmasq-2.39, which introduces asynchronous
! 468: logging: dnsmasq no longer waits for syslog and the deadlock is
! 469: broken. There is a remaining problem in 2.39, where "log-queries"
! 470: is in use. In this case most DNS queries generate two log lines, if
! 471: these go to a syslog which is doing a DNS lookup for each log line,
! 472: then those queries will in turn generate two more log lines, and a
! 473: chain reaction runaway will occur. To avoid this, use syslog-ng
! 474: and turn on syslog-ng's dns-cache function.
! 475:
! 476:
! 477: Q: DHCP doesn't work with windows Vista, but everything else is fine.
! 478:
! 479: A: The DHCP client on windows Vista (and possibly later versions)
! 480: demands that the DHCP server send replies as broadcasts. Most other
! 481: clients don't do this. The broadcasts are send to
! 482: 255.255.255.255. A badly configured firewall which blocks such
! 483: packets will show exactly these symptoms (Vista fails, others
! 484: work).
! 485:
! 486:
! 487: Q: DHCP doesn't work with windows 7 but everything else is fine.
! 488:
! 489: A: There seems to be a problem if Windows 7 doesn't get a value for
! 490: DHCP option 252 in DHCP packets it gets from the server. The
! 491: symtoms have beeen variously reported as continual DHCPINFORM
! 492: requests in an attempt to get an option-252, or even ignoring DHCP
! 493: offers completely (and failing to get an IP address) if there is no
! 494: option-252 supplied. DHCP option 252 is for WPAD, WWW Proxy
! 495: Auto Detection and if you don't want or need to use that, then
! 496: simplest fix seems to be to supply an empty option with:
! 497:
! 498: dhcp-option=252,"\n"
! 499:
! 500:
! 501:
! 502:
! 503:
! 504:
! 505:
! 506:
! 507:
! 508:
! 509:
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>