Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FR] distinguish Do53, DoT and DoH in the logs #969

Closed
andreasschulze opened this issue Nov 24, 2023 · 6 comments
Closed

[FR] distinguish Do53, DoT and DoH in the logs #969

andreasschulze opened this issue Nov 24, 2023 · 6 comments

Comments

@andreasschulze
Copy link

the Problem is discussed in the list archive: https://lists.nlnetlabs.nl/pipermail/unbound-users/2023-November/008188.html

Yorgos suggested to open a FR ticket here. I like his idea to simply log the destination port and
suggest to append that information to the current log. for example here:

log_reply_info(enum verbosity_value v, struct query_info *qinf,

@andreasschulze
Copy link
Author

while "my" use-case would be solved by logging a destination port, other users may see benefits if the destination address is logged. It may make sense to log both if an new option log-destaddr: yes is set (or split in log-destaddr and log-destport)

@renaudallard
Copy link

It would also be useful to log the protocol (TCP/UDP).
In the end, we have 53 udp or tcp. 853 tcp for DoT and 853 udp for DoQ. 443 tcp for DoH.

@pemensik
Copy link
Contributor

I have found by mistake unbound supports also DTLS on port 853, not necessary reserved for DoQ. Socket stream/datagram indication should be present, but I think indication of protocol used to receive query would be the best. You can still configure to accept DoT on port 443, at least dnssec-trigger uses that.

@wcawijngaards
Copy link
Member

The option log-destaddr: yes can be used print the destination address, port and type, for the log-replies output. It is implemented in the commit to the repository.

The fix adds this type of output to the log replies: 127.0.0.1 localhost. A IN NOERROR 0.000000 1 54 on tcp 127.0.0.1 53.

@andreasschulze
Copy link
Author

andreasschulze commented Feb 21, 2024

Hello Wouter, looks like the commit didn't found a way into release 1.19.1. Was this intentional?

@wcawijngaards
Copy link
Member

The 1.19.1 release is a security release, and contains the security fixes only. The code is there waiting for a next release, in the code repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants