Hello, Vladimir
Thank you for answering.
As I advised, I added policy, but it seems that I can not reverse lookup it again.
kometch@dns02:/etc/knot-resolver$ drill -x 192.168.122.223
;; ->>HEADER<<- opcode: QUERY, rcode: NXDOMAIN, id: 16206
;; flags: qr rd ra ; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;; 223.122.168.192.in-addr.arpa. IN PTR
;; ANSWER SECTION:
;; AUTHORITY SECTION:
168.192.in-addr.arpa. 604038 IN SOA prisoner.iana.org. hostmaster.root-servers.org. 1 604800 60 604800 604800
;; ADDITIONAL SECTION:
;; Query time: 1 msec
;; SERVER: 192.168.122.223
;; WHEN: Tue Apr 18 20:51:11 2017
;; MSG SIZE rcvd: 123
I checked the port(10053) with tcpdump, but it seems that no inquiries from kresd have been done.
Best regards.
On 2017/04/18 20:40:56, Vladimír Čunát <vladimir.cunat@nic.cz> wrote:
On 04/18/2017 01:33 PM, Horigome Yoshihito wrote:
> As you say, adding policy.del(0) no longer gets blocked.
> However, it is as follows and ANSWER is not returned.
The config you sent did not forward any reverse address ranges. Adding
rule for that should do what you want, if I guess your intentions correctly:
policy.add(policy.suffix(policy.FORWARD('192.168.122.223@10053',
'192.168.122.224@10053'), '168.192.in-addr.arpa'))
--Vladimir