[FS#1177] dnsmasq spams syslog on loss of WAN connection

LEDE Bugs lede-bugs at lists.infradead.org
Fri Dec 22 09:39:07 PST 2017


The following task has a new comment added:

FS#1177 - dnsmasq spams syslog on loss of WAN connection
User who did this - Alexei C (Adminiuga)

----------
I can see the same messages from DNSmasq in the snapshot from 12/21/17 
Firmware Version	OpenWrt SNAPSHOT r5597-dda2229 / LuCI Master (git-17.351.54937-a2a1c35)

Only in my case the WAN interface was disabled deliberately, as I'm using it as an AP only. 
Network config

config interface 'loopback'
        option ifname 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fdfe:efa:b00b::/48'

config interface 'lan'
        option type 'bridge'
        option ifname 'eth0.1'
        option proto 'static'
        option ipaddr '192.168.1.3'
        option netmask '255.255.255.0'
        option gateway '192.168.1.254'
        option dns '192.168.1.10 192.168.1.11'
        option stp '1'
        option ip6assign '64'

config interface 'wan'
        option ifname 'eth0.2'
        option _orig_ifname 'eth0.2'
        option _orig_bridge 'false'
        option proto 'none'

config interface 'wan6'
        option ifname 'eth0.2'
        option _orig_ifname 'eth0.2'
        option _orig_bridge 'false'
        option proto 'none'

config switch
        option name 'switch0'
        option reset '1'
        option enable_vlan '1'

config switch_vlan
        option device 'switch0'
        option vlan '1'
        option vid '1'
        option ports '0t 1 2 3'

config switch_vlan
        option device 'switch0'
        option vlan '2'
        option vid '2'
        option ports '0t'

config switch_vlan
        option device 'switch0'
        option vlan '3'
        option vid '8'
        option ports '0t 1t 2t 3t 4 5'

config interface 'WLG'
        option proto 'none'
        option ifname 'eth0.8'
        option type 'bridge'
        option stp '1'


DHCP -- pretty much default configuration. not using as a DHCP/DNS

config dnsmasq
        option domainneeded '1'
        option boguspriv '1'
        option filterwin2k '0'
        option localise_queries '1'
        option rebind_protection '1'
        option rebind_localhost '1'
        option local '/lan/'
        option domain 'lan'
        option expandhosts '1'
        option nonegcache '0'
        option authoritative '1'
        option readethers '1'
        option leasefile '/tmp/dhcp.leases'
        option resolvfile '/tmp/resolv.conf.auto'
        option nonwildcard '1'
        option localservice '1'

config dhcp 'lan'
        option interface 'lan'
        option ignore '1'

config dhcp 'wan'
        option interface 'wan'
        option ignore '1'

config odhcpd 'odhcpd'
        option maindhcp '0'
        option leasefile '/tmp/hosts/odhcpd'
        option leasetrigger '/usr/sbin/odhcpd-update'
        option loglevel '4'



DNSMasq query log

Fri Dec 22 17:28:35 2017 daemon.info dnsmasq[4286]: 20 127.0.0.1/33443 config 192.168.1.10 is NXDOMAIN
Fri Dec 22 17:28:42 2017 daemon.info dnsmasq[4286]: 21 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63711 query[A] wpad.contoso.com from fd7c:86b1:8dce::6d66:307a:eb18:4e70
Fri Dec 22 17:28:42 2017 daemon.info dnsmasq[4286]: 21 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63711 forwarded wpad.contoso.com to 192.168.1.12
Fri Dec 22 17:28:42 2017 daemon.info dnsmasq[4286]: 21 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63711 forwarded wpad.contoso.com to 192.168.1.10
Fri Dec 22 17:28:42 2017 daemon.info dnsmasq[4286]: 22 fd7c:86b1:8dce::6d66:307a:eb18:4e70/49747 query[AAAA] wpad.contoso.com from fd7c:86b1:8dce::6d66:307a:eb18:4e70
Fri Dec 22 17:28:42 2017 daemon.info dnsmasq[4286]: 22 fd7c:86b1:8dce::6d66:307a:eb18:4e70/49747 forwarded wpad.contoso.com to 192.168.1.12
Fri Dec 22 17:28:42 2017 daemon.info dnsmasq[4286]: 22 fd7c:86b1:8dce::6d66:307a:eb18:4e70/49747 forwarded wpad.contoso.com to 192.168.1.10
Fri Dec 22 17:28:42 2017 daemon.warn dnsmasq[4286]: possible DNS-rebind attack detected: wpad.contoso.com
Fri Dec 22 17:28:42 2017 daemon.err dnsmasq[4286]: failed to send packet: Permission denied
Fri Dec 22 17:28:42 2017 daemon.info dnsmasq[4286]: 22 fd7c:86b1:8dce::6d66:307a:eb18:4e70/49747 reply wpad.contoso.com is NODATA-IPv6
Fri Dec 22 17:28:42 2017 daemon.err dnsmasq[4286]: failed to send packet: Permission denied
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 query[A] outlook.office365.com from fd7c:86b1:8dce::6d66:307a:eb18:4e70
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 forwarded outlook.office365.com to 192.168.1.10
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 query[AAAA] outlook.office365.com from fd7c:86b1:8dce::6d66:307a:eb18:4e70
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 forwarded outlook.office365.com to 192.168.1.10
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 reply outlook.office365.com is 
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 reply outlook.ha.office365.com is 
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 reply outlook.office365.com.g.office365.com is 
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 reply outlook-namcentral3.office365.com is 40.97.125.146
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 reply outlook-namcentral3.office365.com is 40.97.41.82
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 reply outlook-namcentral3.office365.com is 40.97.120.162
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 reply outlook-namcentral3.office365.com is 40.97.160.178
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 reply outlook-namcentral3.office365.com is 40.97.169.162
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 reply outlook-namcentral3.office365.com is 40.97.139.114
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 reply outlook-namcentral3.office365.com is 40.97.151.18
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 reply outlook-namcentral3.office365.com is 40.97.134.34
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 23 fd7c:86b1:8dce::6d66:307a:eb18:4e70/55378 reply outlook-namcentral3.office365.com is 40.97.41.66
Fri Dec 22 17:28:54 2017 daemon.err dnsmasq[4286]: failed to send packet: Permission denied
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 reply outlook.office365.com is 
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 reply outlook.ha.office365.com is 
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 reply outlook.office365.com.g.office365.com is 
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 reply outlook-namcentral3.office365.com is 2603:1036:0:24::2
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 reply outlook-namcentral3.office365.com is 2603:1036:804:a::2
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 reply outlook-namcentral3.office365.com is 2603:1036:102:de::2
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 reply outlook-namcentral3.office365.com is 2603:1036:405:2a::2
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 reply outlook-namcentral3.office365.com is 2603:1036:404:f4::2
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 reply outlook-namcentral3.office365.com is 2603:1036:906:72::2
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 reply outlook-namcentral3.office365.com is 2603:1036:902:ca::2
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 reply outlook-namcentral3.office365.com is 2603:1036:101:3a::2
Fri Dec 22 17:28:54 2017 daemon.info dnsmasq[4286]: 24 fd7c:86b1:8dce::6d66:307a:eb18:4e70/63660 reply outlook-namcentral3.office365.com is 2603:1036:0:25::2
Fri Dec 22 17:28:54 2017 daemon.err dnsmasq[4286]: failed to send packet: Permission denied





----------

More information can be found at the following URL:
https://bugs.lede-project.org/index.php?do=details&task_id=1177#comment4015



More information about the lede-bugs mailing list