Hi Herry,
version 2.4.1 is ancient with known problems. Please upgrade to 3.2.0
from out upstream repo:
Upgrade should be fine if you do not use your own modules. Please let us
know if upgrade to 3.2.0 from upstream repo works for you and we will
consider bumping package version in EPEL as well.
Petr Špaček @ CZ.NIC
On 01. 01. 19 21:29, Harry Hoffman wrote:
Hi Folks,
Pretty new to knot-resolver and I've been searching around but haven't
found anyone with the same error.
I'm running CentOS 7 with knot-resolver 2.4.1 from the EPEL
repository. I believe that my config is only slightly modified from an
example config.
[root@usher knot-resolver]# cat kresd.conf
-- Config file example useable for personal resolver.
-- The goal is to have a validating resolver with tiny memory footprint,
-- while actively tracking and refreshing frequent records to lower
user latency.
-- Refer to manual:
https://knot-resolver.readthedocs.io/en/latest/daemon.html#configuration
-- Listen on localhost (default)
-- net = { '127.0.0.1', '::1' }
-- Drop root privileges
-- user('knot-resolver', 'knot-resolver')
-- Auto-maintain root TA
trust_anchors.file = 'root.keys'
-- Load Useful modules
modules = {
'policy', -- Block queries to local zones/bad sites
'hints', -- Load /etc/hosts and allow custom root hints
'stats', -- Track internal statistics
'predict', -- Prefetch expiring/frequent records
}
-- Smaller cache size
cache.size = 10 * MB
verbose(true)
policy.add(policy.all(policy.TLS_FORWARD({
{'9.9.9.9', hostname='dns.quad9.net'},
{'1.1.1.1', hostname='cloudflare-dns.com'},
{'149.112.112.112', hostname='dns.quad9.net'},
{'1.0.0.1', hostname='cloudflare-dns.com'},
})))
When running (either via systemd or at a command line) kresd aborts.
Below are the verbose logs:
[root@usher knot-resolver]# /usr/sbin/kresd
--config=/etc/knot-resolver/kresd.conf --forks=1
[gnutls] (2) Initializing PKCS #11 modules
[gnutls] (2) p11: Initializing module: p11-kit-trust
[gnutls] (3) ASSERT: pkcs11.c:665
[gnutls] (2) p11: No login requested.
[gnutls] (2) p11: No login requested.
[gnutls] (3) ASSERT: pkcs11.c:2664
[gnutls] (3) ASSERT: pkcs11.c:2993
[tls_client] imported 151 certs from system store
[gnutls] (2) p11: No login requested.
[gnutls] (2) p11: No login requested.
[gnutls] (3) ASSERT: pkcs11.c:2664
[gnutls] (3) ASSERT: pkcs11.c:2993
[tls_client] imported 151 certs from system store
[gnutls] (2) p11: No login requested.
[gnutls] (2) p11: No login requested.
[gnutls] (3) ASSERT: pkcs11.c:2664
[gnutls] (3) ASSERT: pkcs11.c:2993
[tls_client] imported 151 certs from system store
[gnutls] (2) p11: No login requested.
[gnutls] (2) p11: No login requested.
[gnutls] (3) ASSERT: pkcs11.c:2664
[gnutls] (3) ASSERT: pkcs11.c:2993
[tls_client] imported 151 certs from system store
[gnutls] (2) p11: No login requested.
[gnutls] (2) p11: No login requested.
[gnutls] (3) ASSERT: pkcs11.c:2664
[gnutls] (3) ASSERT: pkcs11.c:2993
[tls_client] imported 151 certs from system store
[gnutls] (2) p11: No login requested.
[gnutls] (2) p11: No login requested.
[gnutls] (3) ASSERT: pkcs11.c:2664
[gnutls] (3) ASSERT: pkcs11.c:2993
[tls_client] imported 151 certs from system store
[gnutls] (2) p11: No login requested.
[gnutls] (2) p11: No login requested.
[gnutls] (3) ASSERT: pkcs11.c:2664
[gnutls] (3) ASSERT: pkcs11.c:2993
[tls_client] imported 151 certs from system store
[gnutls] (2) p11: No login requested.
[gnutls] (2) p11: No login requested.
[gnutls] (3) ASSERT: pkcs11.c:2664
[gnutls] (3) ASSERT: pkcs11.c:2993
[tls_client] imported 151 certs from system store
[tls_client] error: hostname 'dns.quad9.net' for address
'9.9.9.9#00853' already was set, ignoring
[tls_client] error: system ca for address '9.9.9.9#00853' already was
set, ignoring
[tls_client] error: hostname 'cloudflare-dns.com' for address
'1.0.0.1#00853' already was set, ignoring
[tls_client] error: system ca for address '1.0.0.1#00853' already was
set, ignoring
[tls_client] error: hostname 'dns.quad9.net' for address
'149.112.112.112#00853' already was set, ignoring
[tls_client] error: system ca for address '149.112.112.112#00853'
already was set, ignoring
[tls_client] error: hostname 'cloudflare-dns.com' for address
'1.1.1.1#00853' already was set, ignoring
[tls_client] error: system ca for address '1.1.1.1#00853' already was
set, ignoring
[ 0][plan] plan '.' type 'NS'
[50114][iter] '.' type 'NS' id was assigned, parent id 0
[50114][plan] plan '.' type 'DNSKEY'
[26197][iter] '.' type 'DNSKEY' id was assigned, parent id 50114
[ ][nsre] score 1 for 9.9.9.9; cached RTT: -1
[ ][nsre] score 1 for 1.1.1.1; cached RTT: -1
[ ][nsre] score 1 for 149.112.112.112; cached RTT: -1
[ ][nsre] score 1 for 1.0.0.1; cached RTT: -1
[gnutls] (5) REC[0x55801d4242b0]: Allocating epoch #0
[26197][wrkr] => connecting to: '9.9.9.9'
[ 0][plan] plan '.' type 'NS'
[38655][iter] '.' type 'NS' id was assigned, parent id 0
[ ][nsre] score 1 for 9.9.9.9; cached RTT: -1
[ ][nsre] score 1 for 1.1.1.1; cached RTT: -1
[ ][nsre] score 1 for 149.112.112.112; cached RTT: -1
[ ][nsre] score 1 for 1.0.0.1; cached RTT: -1
[26197][wrkr] => connected to '9.9.9.9'
[gnutls] (3) ASSERT: gnutls_constate.c:586
[gnutls] (5) REC[0x55801d4242b0]: Allocating epoch #1
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256 (C0.86)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384 (C0.87)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256 (C0.72)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_AES_128_GCM_SHA256 (00.9C)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_AES_256_GCM_SHA384 (00.9D)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_CAMELLIA_128_GCM_SHA256 (C0.7A)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_CAMELLIA_256_GCM_SHA384 (C0.7B)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_AES_128_CBC_SHA1 (00.2F)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_AES_128_CBC_SHA256 (00.3C)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_AES_256_CBC_SHA1 (00.35)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_AES_256_CBC_SHA256 (00.3D)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_CAMELLIA_128_CBC_SHA1 (00.41)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_CAMELLIA_128_CBC_SHA256 (00.BA)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_CAMELLIA_256_CBC_SHA1 (00.84)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_CAMELLIA_256_CBC_SHA256 (00.C0)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
RSA_3DES_EDE_CBC_SHA1 (00.0A)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_AES_128_GCM_SHA256 (00.9E)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_AES_256_GCM_SHA384 (00.9F)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.7C)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.7D)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_AES_128_CBC_SHA1 (00.33)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_AES_128_CBC_SHA256 (00.67)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_AES_256_CBC_SHA1 (00.39)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_AES_256_CBC_SHA256 (00.6B)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_CAMELLIA_128_CBC_SHA256 (00.BE)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_CAMELLIA_256_CBC_SHA256 (00.C4)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_RSA_3DES_EDE_CBC_SHA1 (00.16)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_AES_128_GCM_SHA256 (00.A2)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_AES_256_GCM_SHA384 (00.A3)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_CAMELLIA_128_GCM_SHA256 (C0.80)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_CAMELLIA_256_GCM_SHA384 (C0.81)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_AES_128_CBC_SHA1 (00.32)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_AES_128_CBC_SHA256 (00.40)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_AES_256_CBC_SHA1 (00.38)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_AES_256_CBC_SHA256 (00.6A)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_CAMELLIA_128_CBC_SHA1 (00.44)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_CAMELLIA_128_CBC_SHA256 (00.BD)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_CAMELLIA_256_CBC_SHA1 (00.87)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_CAMELLIA_256_CBC_SHA256 (00.C3)
[gnutls] (4) HSK[0x55801d4242b0]: Keeping ciphersuite:
DHE_DSS_3DES_EDE_CBC_SHA1 (00.13)
[gnutls] (4) EXT[0x55801d4242b0]: Sending extension STATUS REQUEST (5 bytes)
[gnutls] (4) EXT[0x55801d4242b0]: Sending extension SAFE RENEGOTIATION (1 bytes)
[gnutls] (4) EXT[0x55801d4242b0]: Sending extension SESSION TICKET (0 bytes)
[gnutls] (4) EXT[0x55801d4242b0]: Sending extension SUPPORTED ECC (8 bytes)
[gnutls] (4) EXT[0x55801d4242b0]: Sending extension SUPPORTED ECC
POINT FORMATS (2 bytes)
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (4.1) RSA-SHA256
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (4.2) DSA-SHA256
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (4.3) ECDSA-SHA256
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (5.1) RSA-SHA384
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (5.3) ECDSA-SHA384
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (6.1) RSA-SHA512
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (6.3) ECDSA-SHA512
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (3.1) RSA-SHA224
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (3.2) DSA-SHA224
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (3.3) ECDSA-SHA224
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (2.1) RSA-SHA1
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (2.2) DSA-SHA1
[gnutls] (4) EXT[0x55801d4242b0]: sent signature algo (2.3) ECDSA-SHA1
[gnutls] (4) EXT[0x55801d4242b0]: Sending extension SIGNATURE
ALGORITHMS (28 bytes)
[gnutls] (4) HSK[0x55801d4242b0]: CLIENT HELLO was queued [227 bytes]
[gnutls] (5) REC[0x55801d4242b0]: Preparing Packet Handshake(22) with
length: 227 and min pad: 0
[gnutls] (5) REC[0x55801d4242b0]: Sent Packet[1] Handshake(22) in
epoch 0 and length: 232
[ 0][wrkr] [tls_client] push 232 <0x55801d3f4400>
[gnutls] (3) ASSERT: gnutls_buffers.c:1139
[gnutls] (2) The pull function has been replaced but not the pull
timeout.[gnutls] (3) ASSERT: gnutls_buffers.c:731
[gnutls] (3) ASSERT: gnutls_buffers.c:332
[gnutls] (3) ASSERT: gnutls_buffers.c:572
[gnutls] (3) ASSERT: gnutls_record.c:1063
[gnutls] (3) ASSERT: gnutls_record.c:1184
[gnutls] (3) ASSERT: gnutls_buffers.c:1393
[gnutls] (3) ASSERT: gnutls_handshake.c:1440
[gnutls] (3) ASSERT: gnutls_handshake.c:2739
[tls_client] handshake failed (Error in the pull function.)
[ 0][resl] AD: request NOT classified as SECURE
[26197][resl] finished: 0, queries: 0, mempool: 81952 B
[priming] cannot resolve '.' NS, next priming query in 10 seconds
[ 0][resl] AD: request NOT classified as SECURE
[38655][resl] finished: 0, queries: 0, mempool: 81952 B
[detect_time_skew] cannot resolve '.' NS
[gnutls] (5) REC[0x55801d4242b0]: Start of epoch cleanup
[gnutls] (5) REC[0x55801d4242b0]: End of epoch cleanup
[gnutls] (5) REC[0x55801d4242b0]: Epoch #0 freed
[gnutls] (5) REC[0x55801d4242b0]: Epoch #1 freed
[ 0][plan] plan '.' type 'DNSKEY'
[35791][iter] '.' type 'DNSKEY' id was assigned, parent id 0
[ ][nsre] score 1 for 9.9.9.9; cached RTT: -1
[ ][nsre] score 1 for 1.1.1.1; cached RTT: -1
[ ][nsre] score 1 for 149.112.112.112; cached RTT: -1
[ ][nsre] score 1 for 1.0.0.1; cached RTT: -1
kresd: daemon/worker.c:1691: qr_task_step: Assertion `session->outgoing' failed.
Aborted