From owner-freebsd-stable@freebsd.org Mon Aug 17 12:15:39 2015 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 354E09B960B for ; Mon, 17 Aug 2015 12:15:39 +0000 (UTC) (envelope-from ck-lists@cksoft.de) Received: from mx1.cksoft.de (mx1.cksoft.de [IPv6:2001:67c:24f8:1::25:1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.cksoft.de", Issuer "CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id E3F341CD1 for ; Mon, 17 Aug 2015 12:15:38 +0000 (UTC) (envelope-from ck-lists@cksoft.de) Received: from m.cksoft.de (unknown [IPv6:2a01:170:1110:8001::25:1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.cksoft.de (Postfix) with ESMTPSA id 706F21E9E6E; Mon, 17 Aug 2015 14:15:35 +0200 (CEST) Received: from amavis.cksoft.de (unknown [IPv6:2a01:170:1110:8001::25:a1]) by m.cksoft.de (Postfix) with ESMTP id 5150262F88; Mon, 17 Aug 2015 14:14:33 +0200 (CEST) X-Virus-Scanned: amavisd-new at cksoft.de Received: from m.cksoft.de ([192.168.64.93]) by amavis.cksoft.de (amavis.cksoft.de [192.168.64.94]) (amavisd-new, port 10041) with ESMTP id as8lBfmAOYck; Mon, 17 Aug 2015 14:14:32 +0200 (CEST) Received: from noc1.cksoft.de (noc1.cksoft.de [IPv6:2a01:170:1110:8001::53:1]) by m.cksoft.de (Postfix) with ESMTP id 46C0662ECF; Mon, 17 Aug 2015 14:14:32 +0200 (CEST) Received: by noc1.cksoft.de (Postfix, from userid 1000) id BC91213BBF; Mon, 17 Aug 2015 14:15:33 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by noc1.cksoft.de (Postfix) with ESMTP id 87FE313B1F; Mon, 17 Aug 2015 14:15:33 +0200 (CEST) Date: Mon, 17 Aug 2015 14:15:33 +0200 (CEST) From: Christian Kratzer X-X-Sender: ck@noc1.cksoft.de Reply-To: Christian Kratzer To: Bob Bishop cc: "Bjoern A. Zeeb" , "freebsd-stable@freebsd.org" Subject: Re: freebsd-update to 10.2-RELEASE broken ? In-Reply-To: <37B04206-8CC2-4FD5-BF11-19073BAAC36C@gid.co.uk> Message-ID: References: <2C3CC22D-749A-4B92-885C-D73311997050@gid.co.uk> <20150816180715.GM40589@home.opsec.eu> <20150816200703.GN40589@home.opsec.eu> <37B04206-8CC2-4FD5-BF11-19073BAAC36C@gid.co.uk> User-Agent: Alpine 2.20 (BSF 67 2015-01-07) X-Spammer-Kill-Ratio: 75% MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Aug 2015 12:15:39 -0000 Hi, On Mon, 17 Aug 2015, Bob Bishop wrote: >> Or run tcpdump for port 53; also curious if it might be an IPv4 vs. IPv6 issue? > > I saw the issue on machines with IPv4/IPv6 and IPv4 only. i have tried with preference set to ipv4 and ipv6. Both fail similarly. Have not tried ipv4 or ipv6 only though. I had success with using google dns 8.8.8.8 as revolver on two machines/VM. But this hack has also since failed on other machines/VM. Greetings Christian -- Christian Kratzer CK Software GmbH Email: ck@cksoft.de Wildberger Weg 24/2 Phone: +49 7032 893 997 - 0 D-71126 Gaeufelden Fax: +49 7032 893 997 - 9 HRB 245288, Amtsgericht Stuttgart Mobile: +49 171 1947 843 Geschaeftsfuehrer: Christian Kratzer Web: http://www.cksoft.de/