-
-
Notifications
You must be signed in to change notification settings - Fork 197
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
conditional forwarding with non-natural CIDR block #1534
Comments
This issue has been mentioned on Pi-hole Userspace. There might be relevant details there: https://discourse.pi-hole.net/t/conditional-forwarding-issues-w-tailscale/61522/16 |
This bug was introduced in |
My proposed bugfix has been merged (see https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q1/016913.html). You could change to the bleeding-edge
Please make sure to go back to
after the next release to ensure you are back in sync with the releases. You could also stay on the branch but please be aware that things may break here as it follows |
Amazing. Can I test it using docker? Would the same commands work? I'm guessing they would not inside the container. |
You should be able to run |
Can confirm it worked for me!
Reverse DNS requests are answered as expected by |
Another confirmation that this worked for the same issue. Thanks for the fix @DL6ER ! I'll revert to the master branch and wait for the next release. |
The next version of FTL has been released. Please update and run
to get back on-track. The fix/feature branch you switched to will not receive any further updates. Thanks for helping us to make Pi-hole better for us all! If you have any issues, please either reopen this ticket or (preferably) create a new ticket describing the issues in further detail and only reference this ticket. This will help us to help you best. |
Updated to docker tag |
Versions
Platform
Expected behavior
Using a conditional forwarding server of 100.64.0.0/10 should add all the corresponding /16 domains
Actual behavior / bug
dnsmasq only outputs for 100.64.0.0/16
dnsmasq[2003181]: using nameserver 100.100.100.100#53 for domain 64.100.in-addr.arpa
Steps to reproduce
Add an additional file to
/etc/dnsmasq.d
directory98-custom-options.conf
Include
rev-server=100.64.0.0/10
Start pihole.
Debug Token
No specific debug token, but issue is outlined in detail here:
https://discourse.pi-hole.net/t/conditional-forwarding-issues-w-tailscale/61522
Additional context
This issue was resolved in the dnsmasq program with revision 2.87. Docker tag 2022.10 has the dnsmasq version where the update occurred
The addtional dnsmasq config file with rev-server=100.64.0.0/10,100.100.100.100 using docker 2022.10 works as expected. The pihole.log output is as expected using this image.
Each needed /24 block is added individually.
2022.11 uses the next tagged dnsmasq version and does not work. It goes back to the wrong reverse server as shown in the actual behavior above.
This may be a dnsmasq bug, not pihole, but additional testing that I'm not sure how to do would be needed.
The text was updated successfully, but these errors were encountered: