I guess that’s where the notion to included the manual static addresses in the list of DHCP leases assigned static addresses came from.
For `nslookup server.office.lan 127.0.0.1`
[admin@server ~]$ sudo tail -F /var/log/messages | grep dnsmasq
Sep 14 16:16:01 server dnsmasq[4215]: reply prod.classify-client.prod.webservices.mozgcp.net is NODATA-IPv6
Sep 14 16:16:05 server dnsmasq[4215]: query[A] bam.nr-data.net from 192.168.1.141
Sep 14 16:16:05 server dnsmasq[4215]: cached bam.nr-data.net is <CNAME>
Sep 14 16:16:05 server dnsmasq[4215]: cached bam.cell.nr-data.net is <CNAME>
Sep 14 16:16:05 server dnsmasq[4215]: cached fastly-tls12-bam.nr-data.net is 162.247.243.29
Sep 14 16:16:05 server dnsmasq[4215]: query[AAAA] bam.nr-data.net from 192.168.1.141
Sep 14 16:16:05 server dnsmasq[4215]: cached bam.nr-data.net is <CNAME>
Sep 14 16:16:05 server dnsmasq[4215]: cached bam.cell.nr-data.net is <CNAME>
Sep 14 16:16:05 server dnsmasq[4215]: cached fastly-tls12-bam.nr-data.net is ::ffff:162.247.243.29
Sep 14 16:16:15 server dnsmasq[4215]: query[A] server.office.lan from 127.0.0.1
Sep 14 16:16:15 server dnsmasq[4215]: /etc/hosts server.office.lan is 192.168.1.40
Sep 14 16:16:15 server dnsmasq[4215]: query[AAAA] server.office.lan from 127.0.0.1
Sep 14 16:16:15 server dnsmasq[4215]: forwarded server.office.lan to 1.1.1.1
Sep 14 16:16:15 server dnsmasq[4215]: forwarded server.office.lan to 1.0.0.1
Sep 14 16:16:15 server dnsmasq[4215]: forwarded server.office.lan to 1.1.1.1
Sep 14 16:16:15 server dnsmasq[4215]: forwarded server.office.lan to 1.0.0.1
Sep 14 16:16:15 server dnsmasq[4215]: query[A] bam.nr-data.net from 192.168.1.141
Sep 14 16:16:15 server dnsmasq[4215]: cached bam.nr-data.net is <CNAME>
Sep 14 16:16:15 server dnsmasq[4215]: cached bam.cell.nr-data.net is <CNAME>
Sep 14 16:16:15 server dnsmasq[4215]: cached fastly-tls12-bam.nr-data.net is 162.247.243.29
Sep 14 16:16:15 server dnsmasq[4215]: query[AAAA] bam.nr-data.net from 192.168.1.141
Sep 14 16:16:15 server dnsmasq[4215]: cached bam.nr-data.net is <CNAME>
Sep 14 16:16:15 server dnsmasq[4215]: cached bam.cell.nr-data.net is <CNAME>
Sep 14 16:16:15 server dnsmasq[4215]: cached fastly-tls12-bam.nr-data.net is ::ffff:162.247.243.29
Sep 14 16:16:16 server dnsmasq[4215]: query[A] location.services.mozilla.com from 192.168.1.141
Sep 14 16:16:16 server dnsmasq[4215]: cached location.services.mozilla.com is <CNAME>
Sep 14 16:16:16 server dnsmasq[4215]: cached prod.classify-client.prod.webservices.mozgcp.net is 35.190.72.216
Sep 14 16:16:16 server dnsmasq[4215]: query[AAAA] location.services.mozilla.com from 192.168.1.141
Sep 14 16:16:16 server dnsmasq[4215]: cached location.services.mozilla.com is <CNAME>
Sep 14 16:16:16 server dnsmasq[4215]: cached prod.classify-client.prod.webservices.mozgcp.net is NODATA-IPv6
Sep 14 16:16:18 server setroubleshoot[100582]: SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t. For complete SELinux messages run: sealert -l 2f365b39-173e-426a-a1c8-4ab80387b92f
Sep 14 16:16:18 server setroubleshoot[100582]: SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that dnsmasq should be allowed create access on socket labeled dnsmasq_t by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'dnsmasq' --raw | audit2allow -M my-dnsmasq#012# semodule -X 300 -i my-dnsmasq.pp#012
Sep 14 16:16:20 server dnsmasq[4215]: query[AAAA] server.office.lan from 127.0.0.1
Sep 14 16:16:20 server dnsmasq[4215]: forwarded server.office.lan to 1.1.1.1
Sep 14 16:16:20 server dnsmasq[4215]: forwarded server.office.lan to 1.0.0.1
Sep 14 16:16:20 server dnsmasq[4215]: forwarded server.office.lan to 1.1.1.1
Sep 14 16:16:20 server dnsmasq[4215]: forwarded server.office.lan to 1.0.0.1
Sep 14 16:16:21 server setroubleshoot[100582]: SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t. For complete SELinux messages run: sealert -l 2f365b39-173e-426a-a1c8-4ab80387b92f
Sep 14 16:16:21 server setroubleshoot[100582]: SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that dnsmasq should be allowed create access on socket labeled dnsmasq_t by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'dnsmasq' --raw | audit2allow -M my-dnsmasq#012# semodule -X 300 -i my-dnsmasq.pp#012
Sep 14 16:16:22 server dnsmasq[4215]: query[A] discussion.fedoraproject.org from 192.168.1.141
Sep 14 16:16:22 server dnsmasq[4215]: cached discussion.fedoraproject.org is <CNAME>
Sep 14 16:16:22 server dnsmasq[4215]: cached fedoraproject.hosted-by-discourse.com is 184.105.99.43
Sep 14 16:16:22 server dnsmasq[4215]: query[AAAA] discussion.fedoraproject.org from 192.168.1.141
Sep 14 16:16:22 server dnsmasq[4215]: cached discussion.fedoraproject.org is <CNAME>
Sep 14 16:16:22 server dnsmasq[4215]: cached fedoraproject.hosted-by-discourse.com is 2602:fd3f:3:ff01::2b
Sep 14 16:16:25 server dnsmasq[4215]: query[AAAA] server.office.lan from 127.0.0.1
Sep 14 16:16:25 server dnsmasq[4215]: forwarded server.office.lan to 1.1.1.1
Sep 14 16:16:25 server dnsmasq[4215]: forwarded server.office.lan to 1.0.0.1
Sep 14 16:16:25 server dnsmasq[4215]: forwarded server.office.lan to 1.1.1.1
Sep 14 16:16:25 server dnsmasq[4215]: forwarded server.office.lan to 1.0.0.1
Sep 14 16:16:25 server dnsmasq[4215]: query[A] bam.nr-data.net from 192.168.1.141
Sep 14 16:16:25 server dnsmasq[4215]: cached bam.nr-data.net is <CNAME>
Sep 14 16:16:25 server dnsmasq[4215]: cached bam.cell.nr-data.net is <CNAME>
Sep 14 16:16:25 server dnsmasq[4215]: cached fastly-tls12-bam.nr-data.net is 162.247.243.29
Sep 14 16:16:25 server dnsmasq[4215]: query[AAAA] bam.nr-data.net from 192.168.1.141
Sep 14 16:16:25 server dnsmasq[4215]: cached bam.nr-data.net is <CNAME>
Sep 14 16:16:25 server dnsmasq[4215]: cached bam.cell.nr-data.net is <CNAME>
Sep 14 16:16:25 server dnsmasq[4215]: cached fastly-tls12-bam.nr-data.net is ::ffff:162.247.243.29
Sep 14 16:16:26 server dnsmasq[4215]: query[A] discussion.fedoraproject.org from 192.168.1.141
Sep 14 16:16:26 server dnsmasq[4215]: cached discussion.fedoraproject.org is <CNAME>
Sep 14 16:16:26 server dnsmasq[4215]: cached fedoraproject.hosted-by-discourse.com is 184.105.99.43
Sep 14 16:16:26 server dnsmasq[4215]: query[AAAA] discussion.fedoraproject.org from 192.168.1.141
Sep 14 16:16:26 server dnsmasq[4215]: cached discussion.fedoraproject.org is <CNAME>
Sep 14 16:16:26 server dnsmasq[4215]: cached fedoraproject.hosted-by-discourse.com is 2602:fd3f:3:ff01::2b
^C
[admin@server ~]$
[admin@server ~]$ nslookup server.office.lan 127.0.0.1
Server: 127.0.0.1
Address: 127.0.0.1#53
Name: server.office.lan
Address: 192.168.1.40
;; connection timed out; no servers could be reached
[admin@server ~]$
(Back on the horse...)
After rebooting from the relabel - there was a bit of relabelling - and then going away… I came back to discover the bridge had collapsed; fought for hours, but finally got it back up and stable when I ran back through the dnsmasq
howto in the OP and realised I hadn’t reconfigured the firewall when I moved the WAN device to a bond (of two devices) and the LAN device to a bridge (of 4 devices)… One thing I noticed was that the howto says to enable masquerading on both the WAN and LAN, but previously it was only on the WAN. Looking at the policies I did wonder if adding masquerading to the policy would negate the need to add masquarding to ether WAN or LAN? Anyway…
For `nslookup printer.office.lan 127.0.0.1`
[admin@server ~]$ sudo tail -F /var/log/messages | grep dnsmasq
Sep 16 19:59:19 server dnsmasq[22282]: cached meta.discourse.org is <CNAME>
Sep 16 19:59:19 server dnsmasq[22282]: forwarded meta.discourse.org to 1.1.1.1
Sep 16 19:59:19 server dnsmasq[22282]: query[AAAA] meta.discourse.org from 192.168.1.141
Sep 16 19:59:19 server dnsmasq[22282]: forwarded meta.discourse.org to 1.1.1.1
Sep 16 19:59:19 server dnsmasq[22282]: reply meta.discourse.org is <CNAME>
Sep 16 19:59:19 server dnsmasq[22282]: reply app-cname-target.cdck-prod-meta.discourse.cloud is 52.53.108.46
Sep 16 19:59:19 server dnsmasq[22282]: reply app-cname-target.cdck-prod-meta.discourse.cloud is 52.52.206.48
Sep 16 19:59:19 server dnsmasq[22282]: reply meta.discourse.org is <CNAME>
Sep 16 19:59:19 server dnsmasq[22282]: reply app-cname-target.cdck-prod-meta.discourse.cloud is 2600:1f1c:f40:2402:c8ae:f804:ced7:3ed4
Sep 16 19:59:19 server dnsmasq[22282]: reply app-cname-target.cdck-prod-meta.discourse.cloud is 2600:1f1c:f40:2401:b296:9e45:2b97:d407
Sep 16 19:59:21 server dnsmasq[22282]: query[A] printer.office.lan from 127.0.0.1
Sep 16 19:59:21 server dnsmasq[22282]: DHCP printer.office.lan is 192.168.1.120
Sep 16 19:59:21 server dnsmasq[22282]: query[AAAA] printer.office.lan from 127.0.0.1
Sep 16 19:59:21 server dnsmasq[22282]: forwarded printer.office.lan to 1.1.1.1
Sep 16 19:59:21 server dnsmasq[22282]: forwarded printer.office.lan to 1.0.0.1
Sep 16 19:59:24 server setroubleshoot[133836]: SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t. For complete SELinux messages run: sealert -l 2f365b39-173e-426a-a1c8-4ab80387b92f
Sep 16 19:59:24 server setroubleshoot[133836]: SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that dnsmasq should be allowed create access on socket labeled dnsmasq_t by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'dnsmasq' --raw | audit2allow -M my-dnsmasq#012# semodule -X 300 -i my-dnsmasq.pp#012
Sep 16 19:59:25 server dnsmasq[22282]: query[A] rms.api.bbc.co.uk from 192.168.1.141
Sep 16 19:59:25 server dnsmasq[22282]: forwarded rms.api.bbc.co.uk to 1.1.1.1
Sep 16 19:59:25 server dnsmasq[22282]: query[AAAA] rms.api.bbc.co.uk from 192.168.1.141
Sep 16 19:59:25 server dnsmasq[22282]: forwarded rms.api.bbc.co.uk to 1.1.1.1
Sep 16 19:59:25 server dnsmasq[22282]: query[A] rms.api.bbc.co.uk from 192.168.1.141
Sep 16 19:59:25 server dnsmasq[22282]: reply rms.api.bbc.co.uk is <CNAME>
Sep 16 19:59:25 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 18.154.84.108
Sep 16 19:59:25 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 18.154.84.85
Sep 16 19:59:25 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 18.154.84.36
Sep 16 19:59:25 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 18.154.84.29
Sep 16 19:59:25 server dnsmasq[22282]: reply rms.api.bbc.co.uk is <CNAME>
Sep 16 19:59:25 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 2600:9000:2680:e00:1d:51f8:6200:93a1
Sep 16 19:59:25 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 2600:9000:2680:5a00:1d:51f8:6200:93a1
Sep 16 19:59:25 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 2600:9000:2680:9e00:1d:51f8:6200:93a1
Sep 16 19:59:25 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 2600:9000:2680:1400:1d:51f8:6200:93a1
Sep 16 19:59:25 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 2600:9000:2680:f200:1d:51f8:6200:93a1
Sep 16 19:59:25 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 2600:9000:2680:600:1d:51f8:6200:93a1
Sep 16 19:59:25 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 2600:9000:2680:9c00:1d:51f8:6200:93a1
Sep 16 19:59:25 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 2600:9000:2680:6a00:1d:51f8:6200:93a1
Sep 16 19:59:25 server dnsmasq[22282]: query[A] discussion.fedoraproject.org from 192.168.1.141
Sep 16 19:59:25 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 19:59:25 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 184.105.99.43
Sep 16 19:59:25 server dnsmasq[22282]: query[AAAA] discussion.fedoraproject.org from 192.168.1.141
Sep 16 19:59:25 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 19:59:25 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 2602:fd3f:3:ff01::2b
Sep 16 19:59:26 server dnsmasq[22282]: query[AAAA] printer.office.lan from 127.0.0.1
Sep 16 19:59:26 server dnsmasq[22282]: forwarded printer.office.lan to 1.1.1.1
Sep 16 19:59:26 server dnsmasq[22282]: forwarded printer.office.lan to 1.0.0.1
Sep 16 19:59:31 server dnsmasq[22282]: query[AAAA] printer.office.lan from 127.0.0.1
Sep 16 19:59:31 server dnsmasq[22282]: forwarded printer.office.lan to 1.1.1.1
Sep 16 19:59:31 server dnsmasq[22282]: forwarded printer.office.lan to 1.0.0.1
Sep 16 19:59:32 server setroubleshoot[133836]: SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t. For complete SELinux messages run: sealert -l 2f365b39-173e-426a-a1c8-4ab80387b92f
Sep 16 19:59:32 server setroubleshoot[133836]: SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that dnsmasq should be allowed create access on socket labeled dnsmasq_t by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'dnsmasq' --raw | audit2allow -M my-dnsmasq#012# semodule -X 300 -i my-dnsmasq.pp#012
Sep 16 19:59:35 server dnsmasq[22282]: query[A] discussion.fedoraproject.org from 192.168.1.141
Sep 16 19:59:35 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 19:59:35 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 184.105.99.43
Sep 16 19:59:35 server dnsmasq[22282]: query[AAAA] discussion.fedoraproject.org from 192.168.1.141
Sep 16 19:59:35 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 19:59:35 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 2602:fd3f:3:ff01::2b
^C
[admin@server ~]$
[admin@server ~]$ nslookup printer.office.lan 127.0.0.1
Server: 127.0.0.1
Address: 127.0.0.1#53
Name: printer.office.lan
Address: 192.168.1.120
;; connection timed out; no servers could be reached
[admin@server ~]$
For `nslookup fritzbox.office.lan 127.0.0.1`
[admin@server ~]$ sudo tail -F /var/log/messages | grep dnsmasq
Sep 16 20:11:30 server dnsmasq[22282]: reply ichef.bbci.co.uk is <CNAME>
Sep 16 20:11:30 server dnsmasq[22282]: reply ichef.bbci.co.uk.edgekey.net is <CNAME>
Sep 16 20:11:30 server dnsmasq[22282]: reply e3891.dscg.akamaiedge.net is 2a02:26f0:fd00:1195::f33
Sep 16 20:11:30 server dnsmasq[22282]: reply e3891.dscg.akamaiedge.net is 2a02:26f0:fd00:11a5::f33
Sep 16 20:11:30 server dnsmasq[22282]: reply e3891.dscg.akamaiedge.net is 2a02:26f0:fd00:118e::f33
Sep 16 20:11:30 server dnsmasq[22282]: reply e3891.dscg.akamaiedge.net is 2a02:26f0:fd00:1193::f33
Sep 16 20:11:30 server dnsmasq[22282]: reply e3891.dscg.akamaiedge.net is 2a02:26f0:fd00:119a::f33
Sep 16 20:11:30 server dnsmasq[22282]: reply ichef.bbci.co.uk is <CNAME>
Sep 16 20:11:30 server dnsmasq[22282]: reply ichef.bbci.co.uk.edgekey.net is <CNAME>
Sep 16 20:11:30 server dnsmasq[22282]: reply e3891.dscg.akamaiedge.net is 2.23.160.114
Sep 16 20:11:41 server dnsmasq[22282]: query[A] fritzbox.office.lan from 127.0.0.1
Sep 16 20:11:41 server dnsmasq[22282]: /etc/hosts fritzbox.office.lan is 192.168.1.30
Sep 16 20:11:41 server dnsmasq[22282]: query[AAAA] fritzbox.office.lan from 127.0.0.1
Sep 16 20:11:41 server dnsmasq[22282]: forwarded fritzbox.office.lan to 1.1.1.1
Sep 16 20:11:41 server dnsmasq[22282]: forwarded fritzbox.office.lan to 1.0.0.1
Sep 16 20:11:44 server setroubleshoot[134823]: SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t. For complete SELinux messages run: sealert -l 2f365b39-173e-426a-a1c8-4ab80387b92f
Sep 16 20:11:44 server setroubleshoot[134823]: SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that dnsmasq should be allowed create access on socket labeled dnsmasq_t by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'dnsmasq' --raw | audit2allow -M my-dnsmasq#012# semodule -X 300 -i my-dnsmasq.pp#012
Sep 16 20:11:46 server dnsmasq[22282]: query[AAAA] fritzbox.office.lan from 127.0.0.1
Sep 16 20:11:46 server dnsmasq[22282]: forwarded fritzbox.office.lan to 1.1.1.1
Sep 16 20:11:46 server dnsmasq[22282]: forwarded fritzbox.office.lan to 1.0.0.1
Sep 16 20:11:47 server setroubleshoot[134823]: SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t. For complete SELinux messages run: sealert -l 2f365b39-173e-426a-a1c8-4ab80387b92f
Sep 16 20:11:47 server setroubleshoot[134823]: SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that dnsmasq should be allowed create access on socket labeled dnsmasq_t by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'dnsmasq' --raw | audit2allow -M my-dnsmasq#012# semodule -X 300 -i my-dnsmasq.pp#012
Sep 16 20:11:50 server dnsmasq[22282]: query[A] discussion.fedoraproject.org from 192.168.1.141
Sep 16 20:11:50 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 20:11:50 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 184.105.99.43
Sep 16 20:11:50 server dnsmasq[22282]: query[AAAA] discussion.fedoraproject.org from 192.168.1.141
Sep 16 20:11:50 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 20:11:50 server dnsmasq[22282]: forwarded discussion.fedoraproject.org to 1.0.0.1
Sep 16 20:11:50 server dnsmasq[22282]: forwarded discussion.fedoraproject.org to 1.1.1.1
Sep 16 20:11:50 server dnsmasq[22282]: forwarded discussion.fedoraproject.org to 1.1.1.1
Sep 16 20:11:50 server dnsmasq[22282]: forwarded discussion.fedoraproject.org to 1.0.0.1
Sep 16 20:11:50 server dnsmasq[22282]: reply discussion.fedoraproject.org is <CNAME>
Sep 16 20:11:50 server dnsmasq[22282]: reply fedoraproject.hosted-by-discourse.com is 2602:fd3f:3:ff01::2b
Sep 16 20:11:51 server dnsmasq[22282]: query[AAAA] fritzbox.office.lan from 127.0.0.1
Sep 16 20:11:51 server dnsmasq[22282]: forwarded fritzbox.office.lan to 1.1.1.1
Sep 16 20:11:51 server dnsmasq[22282]: forwarded fritzbox.office.lan to 1.0.0.1
Sep 16 20:11:53 server dnsmasq[22282]: query[A] play.googleapis.com from 127.0.0.1
Sep 16 20:11:53 server dnsmasq[22282]: forwarded play.googleapis.com to 1.1.1.1
Sep 16 20:11:53 server dnsmasq[22282]: reply play.googleapis.com is 216.239.34.223
Sep 16 20:11:53 server dnsmasq[22282]: reply play.googleapis.com is 216.239.38.223
Sep 16 20:11:53 server dnsmasq[22282]: reply play.googleapis.com is 216.239.32.223
Sep 16 20:11:53 server dnsmasq[22282]: reply play.googleapis.com is 216.239.36.223
Sep 16 20:11:55 server dnsmasq[22282]: query[A] discussion.fedoraproject.org from 192.168.1.141
Sep 16 20:11:55 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 20:11:55 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 184.105.99.43
Sep 16 20:11:55 server dnsmasq[22282]: query[AAAA] discussion.fedoraproject.org from 192.168.1.141
Sep 16 20:11:55 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 20:11:55 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 2602:fd3f:3:ff01::2b
^C
[admin@server ~]$
[admin@server ~]$ nslookup fritzbox.office.lan 127.0.0.1
Server: 127.0.0.1
Address: 127.0.0.1#53
Name: fritzbox.office.lan
Address: 192.168.1.30
;; connection timed out; no servers could be reached
[admin@server ~]$
So, after the relabel and in permissive mode, nslookup was returning an A record immediately, but then timing out waiting for AAAA record - but before, it ‘felt’ like it wasn’t returning the A record until after timing out waiting for the AAAA record. BUT, this could just be my imagination, because I missed all the elephants…
Here’s:
[admin@server ~]$ sudo journalctl -b _AUDIT_TYPE_NAME=AVC
-- No entries --
[admin@server ~]$
And, I have:
dnsmasq-2.85-16.el9_4.x86_64
Ah!!! Busted! Cheap assed rhel user squatting on fedora discussion… 
[admin@server ~]$ dnsmasq --version
Dnsmasq version 2.85 Copyright (c) 2000-2021 Simon Kelley
Compile time options: IPv6 GNU-getopt DBus no-UBus no-i18n IDN2 DHCP DHCPv6 no-Lua TFTP no-conntrack ipset auth cryptohash DNSSEC loop-detect inotify dumpfile
This software comes with ABSOLUTELY NO WARRANTY.
Dnsmasq is free software, and you are welcome to redistribute it
under the terms of the GNU General Public License, version 2 or 3.
[admin@server ~]$
Here's `sealert -l 2f365b39-173e-426a-a1c8-4ab80387b92f`
[admin@server ~]$ sealert -l 2f365b39-173e-426a-a1c8-4ab80387b92f
SELinux is preventing /usr/sbin/dnsmasq from create access on the socket labeled dnsmasq_t.
***** Plugin catchall (100. confidence) suggests **************************
If you believe that dnsmasq should be allowed create access on socket labeled dnsmasq_t by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'dnsmasq' --raw | audit2allow -M my-dnsmasq
# semodule -X 300 -i my-dnsmasq.pp
Additional Information:
Source Context system_u:system_r:dnsmasq_t:s0
Target Context system_u:system_r:dnsmasq_t:s0
Target Objects Unknown [ socket ]
Source dnsmasq
Source Path /usr/sbin/dnsmasq
Port <Unknown>
Host server
Source RPM Packages dnsmasq-2.85-16.el9_4.x86_64
Target RPM Packages
SELinux Policy RPM selinux-policy-targeted-38.1.35-2.el9_4.2.noarch
Local Policy RPM selinux-policy-targeted-38.1.35-2.el9_4.2.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Permissive
Host Name server
Platform Linux server 5.14.0-427.31.1.el9_4.x86_64 #1 SMP
PREEMPT_DYNAMIC Fri Aug 9 14:06:03 EDT 2024 x86_64
x86_64
Alert Count 25742
First Seen 2024-07-14 14:12:08 BST
Last Seen 2024-09-16 19:00:28 BST
Local ID 2f365b39-173e-426a-a1c8-4ab80387b92f
Raw Audit Messages
type=AVC msg=audit(1726509628.210:3386): avc: denied { create } for pid=22282 comm="dnsmasq" scontext=system_u:system_r:dnsmasq_t:s0 tcontext=system_u:system_r:dnsmasq_t:s0 tclass=socket permissive=1
type=SYSCALL msg=audit(1726509628.210:3386): arch=x86_64 syscall=socket success=no exit=EAFNOSUPPORT a0=0 a1=2 a2=0 a3=560db2b41960 items=0 ppid=22094 pid=22282 auid=4294967295 uid=996 gid=992 euid=996 suid=996 fsuid=996 egid=992 sgid=992 fsgid=992 tty=(none) ses=4294967295 comm=dnsmasq exe=/usr/sbin/dnsmasq subj=system_u:system_r:dnsmasq_t:s0 key=(null)
Hash: dnsmasq,dnsmasq_t,dnsmasq_t,socket,create
[admin@server ~]$
I did:
[admin@server ~]$ sudo su
[sudo] password for admin:
[root@server admin]# ausearch -c 'dnsmasq' --raw | audit2allow -M my-dnsmasq
******************** IMPORTANT ***********************
To make this policy package active, execute:
semodule -i my-dnsmasq.pp
[root@server admin]# semodule -X 300 -i my-dnsmasq.pp
[root@server admin]#
And now, no more selinux denials
[admin@server ~]$ sudo tail -F /var/log/messages | grep dnsmasq
Sep 16 21:25:42 server dnsmasq[22282]: cached d27609m9be2rgo.cloudfront.net is 2600:9000:2680:6000:1d:51f8:6200:93a1
Sep 16 21:25:42 server dnsmasq[22282]: cached d27609m9be2rgo.cloudfront.net is 2600:9000:2680:e800:1d:51f8:6200:93a1
Sep 16 21:25:42 server dnsmasq[22282]: cached d27609m9be2rgo.cloudfront.net is 2600:9000:2680:ba00:1d:51f8:6200:93a1
Sep 16 21:25:42 server dnsmasq[22282]: cached d27609m9be2rgo.cloudfront.net is 2600:9000:2680:1400:1d:51f8:6200:93a1
Sep 16 21:25:42 server dnsmasq[22282]: cached d27609m9be2rgo.cloudfront.net is 2600:9000:2680:ee00:1d:51f8:6200:93a1
Sep 16 21:25:42 server dnsmasq[22282]: reply rms.api.bbc.co.uk is <CNAME>
Sep 16 21:25:42 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 18.154.84.29
Sep 16 21:25:42 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 18.154.84.108
Sep 16 21:25:42 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 18.154.84.36
Sep 16 21:25:42 server dnsmasq[22282]: reply d27609m9be2rgo.cloudfront.net is 18.154.84.85
Sep 16 21:25:48 server dnsmasq[22282]: query[A] fritzbox.office.lan from 127.0.0.1
Sep 16 21:25:48 server dnsmasq[22282]: /etc/hosts fritzbox.office.lan is 192.168.1.30
Sep 16 21:25:48 server dnsmasq[22282]: query[AAAA] fritzbox.office.lan from 127.0.0.1
Sep 16 21:25:48 server dnsmasq[22282]: forwarded fritzbox.office.lan to 1.1.1.1
Sep 16 21:25:48 server dnsmasq[22282]: forwarded fritzbox.office.lan to 1.0.0.1
Sep 16 21:25:52 server dnsmasq[22282]: query[A] as-dash-uk-live.akamaized.net from 192.168.1.141
Sep 16 21:25:52 server dnsmasq[22282]: forwarded as-dash-uk-live.akamaized.net to 1.0.0.1
Sep 16 21:25:52 server dnsmasq[22282]: query[AAAA] as-dash-uk-live.akamaized.net from 192.168.1.141
Sep 16 21:25:52 server dnsmasq[22282]: forwarded as-dash-uk-live.akamaized.net to 1.0.0.1
Sep 16 21:25:52 server dnsmasq[22282]: reply as-dash-uk-live.akamaized.net is <CNAME>
Sep 16 21:25:52 server dnsmasq[22282]: reply a901.w5.akamai.net is NODATA-IPv6
Sep 16 21:25:52 server dnsmasq[22282]: reply as-dash-uk-live.akamaized.net is <CNAME>
Sep 16 21:25:52 server dnsmasq[22282]: reply a901.w5.akamai.net is 92.123.142.145
Sep 16 21:25:52 server dnsmasq[22282]: reply a901.w5.akamai.net is 92.123.143.243
Sep 16 21:25:53 server dnsmasq[22282]: query[AAAA] fritzbox.office.lan from 127.0.0.1
Sep 16 21:25:53 server dnsmasq[22282]: forwarded fritzbox.office.lan to 1.1.1.1
Sep 16 21:25:53 server dnsmasq[22282]: forwarded fritzbox.office.lan to 1.0.0.1
Sep 16 21:25:58 server dnsmasq[22282]: query[AAAA] fritzbox.office.lan from 127.0.0.1
Sep 16 21:25:58 server dnsmasq[22282]: forwarded fritzbox.office.lan to 1.1.1.1
Sep 16 21:25:58 server dnsmasq[22282]: forwarded fritzbox.office.lan to 1.0.0.1
Sep 16 21:25:58 server dnsmasq[22282]: query[A] discussion.fedoraproject.org from 192.168.1.141
Sep 16 21:25:58 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 21:25:58 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 184.105.99.43
Sep 16 21:25:58 server dnsmasq[22282]: query[AAAA] discussion.fedoraproject.org from 192.168.1.141
Sep 16 21:25:58 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 21:25:58 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 2602:fd3f:3:ff01::2b
Sep 16 21:26:03 server dnsmasq[22282]: query[A] discussion.fedoraproject.org from 192.168.1.141
Sep 16 21:26:03 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 21:26:03 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 184.105.99.43
Sep 16 21:26:03 server dnsmasq[22282]: query[AAAA] discussion.fedoraproject.org from 192.168.1.141
Sep 16 21:26:03 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 21:26:03 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 2602:fd3f:3:ff01::2b
Sep 16 21:26:06 server dnsmasq[22282]: query[A] discussion.fedoraproject.org from 192.168.1.141
Sep 16 21:26:06 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 21:26:06 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 184.105.99.43
Sep 16 21:26:06 server dnsmasq[22282]: query[AAAA] discussion.fedoraproject.org from 192.168.1.141
Sep 16 21:26:06 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 21:26:06 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 2602:fd3f:3:ff01::2b
^[cSep 16 21:26:08 server dnsmasq[22282]: query[A] discussion.fedoraproject.org from 192.168.1.141
Sep 16 21:26:08 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 21:26:08 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 184.105.99.43
Sep 16 21:26:08 server dnsmasq[22282]: query[AAAA] discussion.fedoraproject.org from 192.168.1.141
Sep 16 21:26:08 server dnsmasq[22282]: cached discussion.fedoraproject.org is <CNAME>
Sep 16 21:26:08 server dnsmasq[22282]: cached fedoraproject.hosted-by-discourse.com is 2602:fd3f:3:ff01::2b
^C
[admin@server ~]$
But, the delay persists… EXCEPT for ping
with host name only - without the local domain name (I added some timeings):
[21:46:28] [admin@server ~]$ ping server
PING server (192.168.1.40) 56(84) bytes of data.
64 bytes from server (192.168.1.40): icmp_seq=1 ttl=64 time=0.074 ms
64 bytes from server (192.168.1.40): icmp_seq=2 ttl=64 time=0.091 ms
64 bytes from server (192.168.1.40): icmp_seq=3 ttl=64 time=0.086 ms
^C
--- server ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2032ms
rtt min/avg/max/mdev = 0.074/0.083/0.091/0.007 ms
[21:46:34] [admin@server ~]$ ping server.office.lan
PING server.office.lan (192.168.1.40) 56(84) bytes of data.
64 bytes from server (192.168.1.40): icmp_seq=1 ttl=64 time=0.079 ms
64 bytes from server (192.168.1.40): icmp_seq=2 ttl=64 time=0.082 ms
64 bytes from server (192.168.1.40): icmp_seq=3 ttl=64 time=0.094 ms
^C
--- server.office.lan ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2033ms
rtt min/avg/max/mdev = 0.079/0.085/0.094/0.006 ms
[21:47:02] [admin@server ~]$
Also, pinging from my oldmachine from the network is delayed for both host name only and host with domain name…
That’s be more than one post. [Oh, no it won’t.]
Thanks!