!tCyGickeVqkHsYjWnh:nixos.org

NixOS Networking

894 Members
Declaratively manage your switching, routing, wireless, tunneling and more.261 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
10 Jul 2025
@hexa:lossy.networkhexagiven that the resolver can be on the local machine (preferable) or not this seems a bit difficult to assert on ðŸĪŠ14:22:50
@emilazy:matrix.orgemilyseems like not really something you can detect before runtime14:23:05
@sandro:supersandro.deSandro 🐧within reason probably not at all14:23:10
@hexa:lossy.networkhexaso I'm wondering what the right approximation would be14:23:11
@sandro:supersandro.deSandro 🐧You could check if kresd is used with dnssec checks on14:23:24
@emilazy:matrix.orgemily I would just do nothing or have services.X.yesIPromiseImUsingDNSSec 14:23:25
@emilazy:matrix.orgemilyespecially for remote it's hopeless, but even locally there can be all kinds of layers between an enabled service and what actually ends up being used for DNS resolution14:23:49
@hexa:lossy.networkhexa so one thing I could do is check for networking.resolvconf.useLocalResolver 14:24:14
@hexa:lossy.networkhexa

the other thing, that I found super awful was

         lib.any (with config; [
          services.bind.enable
          services.dnsmasq.enable
          services.kresd.enable
          services.unbound.enable
          services.pdns-recursor.enable
        ]);
14:25:03
@hexa:lossy.networkhexa *

the other thing, that I found super awful was

        lib.any (with config; [
          services.bind.enable
          services.dnsmasq.enable
          services.kresd.enable
          services.unbound.enable
          services.pdns-recursor.enable
        ]);
14:25:05
@emilazy:matrix.orgemilythat would (sorry) break resolved with DNSSEC14:25:24
@hexa:lossy.networkhexabut then I found people used dnscrypt2-proxy and other weird stuff14:25:28
@emilazy:matrix.orgemily dnscrypt-proxy2 doesn't do DNSSEC validation 14:25:42
@hexa:lossy.networkhexaresolved is fucked for this use case, I don't care 🙂 14:25:47
@emilazy:matrix.orgemilyI think it'll pass on the bit from the upstream resolver and that's all14:25:52
@emilazy:matrix.orgemilyI don't really think asserting on dynamic network conditions is something a module should be doing at all tbh. if the software absolutely needs the DNSSEC validation bit in responses it should be checking for it itself14:26:32
@hexa:lossy.networkhexaoh, it does14:27:32
@hexa:lossy.networkhexathe software is postfix for example14:27:36
@hexa:lossy.networkhexa
postfix/smtp[2110025]: warning: DNSSEC validation may be unavailable
postfix/smtp[2110025]: warning: reason: dnssec_probe 'ns:.' received a response that is not DNSSEC validated
14:28:05
@hexa:lossy.networkhexathat's what you get with resolved fwiw14:28:10
@k900:0upti.meK900Then just let it fail IMO14:28:15
@hexa:lossy.networkhexaRedacted or Malformed Event14:29:59
@emilazy:matrix.orgemilycan't shift everything left :)14:37:18
@k900:0upti.meK900shift everything left :)can't14:42:45
@sandro:supersandro.deSandro 🐧maybe add a systemd unit which watches the log for that message and fails if it appears?14:45:19
@hexa:lossy.networkhexainstructions unclear, multiplied by 214:45:27
@maciel310:matrix.orgmaciel310Ugh, yeah, you were right. Port config on the Unifi Flex Mini is a bit confusing/limited, and tagged vlans were getting blocked. I'd just assumed that since the Nix network config was the new bit that it was where I was messing something up. Thanks for taking a look!14:47:58
11 Jul 2025
@maxyw:envs.netmaxyw joined the room.10:28:38

Show newer messages


Back to Room ListRoom Version: 6