-
Notifications
You must be signed in to change notification settings - Fork 854
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
failure because TXT dns records are sometimes filtered #423
Comments
I receive the same error with 2021.7.3 (with both that Could this be related to I'm running |
@benbalter can you show the cloudflared command and config that you are running with that broke with 2021.7.1 onwards? |
@Zibri and @benbalter can you run the following command in the environment where cloudflared is failing?
|
This is the same as #388 |
it does not return anything and times out. |
SRV queries are not blocked. and a few other types too. |
Thanks for poiting this out.
|
About the lookup TXT problem, we haven't yet addressed, and will soon. About the "quick tunnel" (i.e., a no-login tunnel) causing the lookup TXT --- that seems to fail on rare situations such as those described here --- we have reverted that logic in 2021.7.4, meaning it will no longer cause that lookup. |
I have a service defined to run proxy-dns: true
proxy-dns-port: 5053
proxy-dns-upstream:
- https://XXX.cloudflare-gateway.com/dns-query
proxy-dns-bootstrap:
- https://1.1.1.2/dns-query
With cloudflared running (2021.7.0), I get the Before cloudflared bootstraps, the
It seems 2021.7.1's quick channels default introduced a dependency on being able to query that TXT record during the bootstrap process, but does so in a way that uses the system resolver, rather than the designated bootstrap resolver / DNS over HTTPS. Similar to the discussion in #388 and above, on my network, non-DoH DNS queries are blocked entirely, meaning as before 2021.7.1, in order to maintain backwards compatibility, the bootstrap process should allow use of DoH for its initial resolution, not the system resolver. All that said, thank you for your quick response and for maintaining such a great project! 🎉 |
Hi @benbalter! Can you share the stdout logs when you run the same command with v2021.7.0 please?
This should still happen if you were to use the command |
Of course. Thanks for the quick reply. Here's the output on 2021.7.0:
And if I were to query cloudflared directly (bypassing the downstream pi-hole DNS server), here's the result:
|
The 2021.7.4 bootstraps as expected, both via the |
Oops. I misspoke. Can you also do me the favour of trying
Thanks for this. Can you also share the output of your cloudflared command please? |
So I think we've understood this a bit better now.
This second case therefore starts a tunnel, besides starting the dns proxy. It's very likely that you are not even using that tunnel at all. So you can just run the first case above and therefore skip the tunnel logic. The reason why the behaviour changed is because we changed those "account-less tunnels" (where no --hostname is provided, and no tunnel is pre-created with a login) to no longer use our legacy tunnels infrastructure, and use the new one for named tunnels. This new one looks up a TXT record, and that's what you noticed. |
We've uncovered that this different behaviour (of running a tunnel next to the proxy-dns) was a regression/accidental recent change due to some bad argument handling. FYI, we will revert that |
Came here to post the stdout requested above, and arrived at a similar conclusion. That said, I may have found another bug (happy to move this to a new issue, if unrelated), in that either I don't believe Output of cloudflared on 2021.7.3:
Output of cloudflared proxy-dns with a Cloudflare gateway upstream (duplicate log entries removed)
I get similar output for Is my understanding incorrect in that If instead I use the following config (moving 1.1.1.2 to a second upstream), when the first DNS lookup fails, it falls back to 1.1.1.2 (I believe, only for that request. since the first resolver could then be used), and resolves/proxies requests as expected: proxy-dns: true
proxy-dns-port: 5053
proxy-dns-upstream:
- https://XXX.cloudflare-gateway.com/dns-query
- https://1.1.1.2/dns-query Again, very grateful for your time and thoughtfulness here, and glad to hear that I found at least one bug, and it wasn't entirely my fault. Eager to hear your thoughts on the bootstrap issue, and again, if unrelated, happy to move it to a new issue. Thanks again! |
One minor note, in case it impacts the above, Placing the To be clear, I'm not seeking to complain (easy enough to pass as command line vars), but wanted to share in case the change in behavior was helpful. |
Sorry for getting back a bit late here guys. These issues should be fixed in the newest release. Give it a go and let us know what you think. |
yesterday it was working poerfectly on ubuntu 18.04
today it fails with this error:
same goes if I change dns
note: the machine is a VM inside my main pc.
on my windows host pc I can do:
cloudflared tunnel --url http://192.168.1.104:XXXX
yesterday the same command worked on the guest machine (192.168.1.104)
today gives that error.
any clue?
The text was updated successfully, but these errors were encountered: