Originally posted by q2dg
View Post
Announcement
Collapse
No announcement yet.
Fedora 33 Planning To Enable Systemd-Resolved By Default
Collapse
X
-
Originally posted by CommunityMember View Post
So it has been resolve(d).
No, it hasn't. OpenDNS name resolution is totally broken by default on Ubuntu 19.10 for my corporate VPN. The "solutions" presented in this thread either don't work or work temporarily and unreliably for some minutes or until the next reboot: https://askubuntu.com/questions/1032...ted-to-openvpn
Of course the old and expected behavior of editing resolv.conf and adding a nameserver at the top could fix it (if systemd-resolved didn't auto-manage it), but systemd guys couldn't restrain themselves in order not to break the simple and sane behavior of true and tested Linux tools.
- Likes 1
Comment
-
Originally posted by CommunityMember View Post
systemd-resolved supports using your own DNS server(s), and can be configured to not cache anything if you so wish. The problem may be that systemd-resolved supports so many options that one can easily get overwhelmed in all the choices you might want to make (and I seem to recall there were some combinations of options that were technically legal, but almost certainly were not what you really wanted).
- Likes 1
Comment
-
Originally posted by Mark Rose View PostI had to disable systemd-resolved because it won't consistently resolve DNS over OpenVPN connections.
Comment
-
Originally posted by starshipeleven View PostAfaik it's a drop-in replacement as it's taking the DNS/domain list from /etc/resolv.conf, which is the standard way used by NetworkManager and others (also by systemd-networkd) to interact with current DNS daemons.
systemd-resolved taking the list of nameservers from pre-existing resolv.conf is not a recommended mode of operation. In this case you get all the downsides and almost no benefits because resolved is then constrained by the limitations of resolv.conf syntax (and getting around those limitations is what drove the development of resolved in the first place).
- Likes 1
Comment
-
Originally posted by usta View Post
and in which version of systemd and when you had that problems ? Did you have any chance to give it a try to test if the problems still exist?
Originally posted by intelfx View Post
It’s quite the inverse. systemd-resolved (when paired with an intelligent enough network tool, e. g. NetworkManager) is the only Linux software in existence that will do the right thing by default when you have multiple interfaces each with its own internal DNS.
Comment
-
Originally posted by loinad View Post
No, it hasn't. OpenDNS name resolution is totally broken by default on Ubuntu 19.10 for my corporate VPN. The "solutions" presented in this thread either don't work or work temporarily and unreliably for some minutes or until the next reboot: https://askubuntu.com/questions/1032...ted-to-openvpn
Of course the old and expected behavior of editing resolv.conf and adding a nameserver at the top could fix it (if systemd-resolved didn't auto-manage it), but systemd guys couldn't restrain themselves in order not to break the simple and sane behavior of true and tested Linux tools.
Submission type Request for enhancement (RFE) systemd version the issue has been seen with systemd 232 +PAM +AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL...
Originally posted by Mark Rose View Post
Ubuntu 18.04's packages, so systemd 237 and network-manager 1.10.6-2ubuntu1.4. It exists with the latest packages, and myself and coworkers have reproduced the bug on at least five different machines. https://bugs.launchpad.net/ubuntu/+s...r/+bug/1851407
Basically resolved makes a fairly hidden bug caused by miss configuration happen really commonly and it cause is still miss configuration expect now people want to blame resolved instead of waking up o crap our configuration as been wrong all this time.
Comment
Comment