Swistheater
Very Senior Member
Okay log back into putty and type in cat /proc/sys/net/ipv6/conf/eth0/accept_raYes native ipv6 feature is enabled
All one line and report back what response it says
Okay log back into putty and type in cat /proc/sys/net/ipv6/conf/eth0/accept_raYes native ipv6 feature is enabled
Okay trypermission denied
You should be getting ipv6 if you got a 1 backWith /proc/sys/net/ipv6/conf/eth0/accept_ra permission denied with cat /proc/sys/net/ipv6/conf/eth0/accept_ra I get 1
your resolver doesn't validate those signatures via upstream before sending them to dnsmasq to be cached so, so dnsmasq blocks the replies.Had an issue tonight where my network wouldn't resolve www.youtube.com . RT-AC86U running 384.11 Beta2. I had DoT on with the two cloudfare servers (1.1.1.1 and 1.0.0.1).. with DNSSEC to yes and "Validate unsigned DNSSEC replies" to yes. This setup worked fine for about 4 hours. Then I tried to get to youtube and found it wouldn't resolve. When I set "Validate unsigned DNSSEC replies" to no it worked again. I can get it to fail again by just setting "Validate unsigned DNSSEC replies" back to yes.
thoughts?
it is probably going to have to wait for asus to finish their handy work as merlin has no way to really test it if he attempts to fix it. It is better not to muck around to much when asus hasn't fully finished what they are attempting to do.That didn't work either thanks for the try i'll have to wait for merlin's fix.
your resolver doesn't validate those signatures via upstream before sending them to dnsmasq to be cached so, so dnsmasq blocks the replies.
no - turn off validate unsigned replies.So what do I need to do to prevent it ? turn on "Forward local domain queries to upstream DNS"?
no - turn off validate unsigned replies.
Alternatively you could turn off dnssec on the router and make two scripts using ssh and puttySo what do I need to do to prevent it ? turn on "Forward local domain queries to upstream DNS"?
cat << EOF > /jffs/configs/dnsmasq.conf.add
#
proxy-dnssec
EOF
cat << EOF > /jffs/scripts/stubby.postconf
#
#!/bin/sh
CONFIG=$1
source /usr/sbin/helper.sh
pc_insert " - GETDNS_TRANSPORT_TLS" "dnssec_return_status: GETDNS_EXTENSION_TRUE" $CONFIG
EOF
no, the options you tried would be erased after you tell it to format jffs on the administration page. and then things would be put back to the way it was after a reboot.do you think i mucked up my router then?
this may also require you to doAlternatively you could turn off dnssec on the router and make two scripts using ssh and putty
Code:cat << EOF > /jffs/configs/dnsmasq.conf.add # proxy-dnssec EOF
and
Code:cat << EOF > /jffs/scripts/stubby.postconf # #!/bin/sh CONFIG=$1 source /usr/sbin/helper.sh pc_insert " - GETDNS_TRANSPORT_TLS" "dnssec_return_status: GETDNS_EXTENSION_TRUE" $CONFIG EOF
and type service restart_stubby
into putty terminal
then run your dnssec test - this should provide enough dnssec.
*note it will still show you fail the cloudflare test page because of their lack of dnssec support.
Alternatively you could turn off dnssec on the router and make two scripts using ssh and putty
Code:cat << EOF > /jffs/configs/dnsmasq.conf.add # proxy-dnssec EOF
and
Code:cat << EOF > /jffs/scripts/stubby.postconf # #!/bin/sh CONFIG=$1 source /usr/sbin/helper.sh pc_insert " - GETDNS_TRANSPORT_TLS" "dnssec_return_status: GETDNS_EXTENSION_TRUE" $CONFIG EOF
and type service restart_stubby
into putty terminal
then run your dnssec test - this should provide enough dnssec.
*note it will still show you fail the cloudflare test page because of their lack of dnssec support.
the built in method tells dnsmasq to do the dnssec validation downstream- the issue is if your server(cloudflare) does not resolve certain signatures- dnsmasq will see it as a no go. where as if you let stubby do dnssec then it happens there at the connection point allowing the page to load- it just does not get flagged as invalid, just because cloudflare doesn't validate that type of signature.So this is not a bug? We need to script around this?
the built in method tells dnsmasq to do the dnssec validation downstream- the issue is if your server(cloudflare) does not resolve certain signatures- dnsmasq will see it as a no go. where as if you let stubby do dnssec then it happens there at the connection point allowing the page to load- it just does not get flagged as invalid, just because cloudflare doesn't validate that type of signature.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!