From owner-freebsd-stable@freebsd.org Sun Aug 16 21:17:00 2015 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CA0369BB5FB for ; Sun, 16 Aug 2015 21:17:00 +0000 (UTC) (envelope-from ck-lists@cksoft.de) Received: from mx1.cksoft.de (mx1.cksoft.de [IPv6:2001:67c:24f8:1::25:1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.cksoft.de", Issuer "CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 7E4851370 for ; Sun, 16 Aug 2015 21:17:00 +0000 (UTC) (envelope-from ck-lists@cksoft.de) Received: from m.cksoft.de (unknown [IPv6:2a01:170:1110:8001::25:1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.cksoft.de (Postfix) with ESMTPSA id 72B6C1E9E6E; Sun, 16 Aug 2015 23:16:58 +0200 (CEST) Received: from amavis.cksoft.de (unknown [IPv6:2a01:170:1110:8001::25:a1]) by m.cksoft.de (Postfix) with ESMTP id A303E62F88; Sun, 16 Aug 2015 23:15:56 +0200 (CEST) X-Virus-Scanned: amavisd-new at cksoft.de Received: from m.cksoft.de ([192.168.64.93]) by amavis.cksoft.de (amavis.cksoft.de [192.168.64.94]) (amavisd-new, port 10041) with ESMTP id 7Xx4QarYvAtS; Sun, 16 Aug 2015 23:15:56 +0200 (CEST) Received: from noc1.cksoft.de (noc1.cksoft.de [IPv6:2a01:170:1110:8001::53:1]) by m.cksoft.de (Postfix) with ESMTP id CAADB62ECF; Sun, 16 Aug 2015 23:15:55 +0200 (CEST) Received: by noc1.cksoft.de (Postfix, from userid 1000) id E103C13BC9; Sun, 16 Aug 2015 23:16:56 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by noc1.cksoft.de (Postfix) with ESMTP id DA0D713A0B; Sun, 16 Aug 2015 23:16:56 +0200 (CEST) Date: Sun, 16 Aug 2015 23:16:56 +0200 (CEST) From: Christian Kratzer X-X-Sender: ck@noc1.cksoft.de Reply-To: Christian Kratzer To: Kurt Jaeger cc: Kimmo Paasiala , "freebsd-stable@freebsd.org" Subject: Re: freebsd-update to 10.2-RELEASE broken ? In-Reply-To: <20150816200703.GN40589@home.opsec.eu> Message-ID: References: <2C3CC22D-749A-4B92-885C-D73311997050@gid.co.uk> <20150816180715.GM40589@home.opsec.eu> <20150816200703.GN40589@home.opsec.eu> User-Agent: Alpine 2.20 (BSF 67 2015-01-07) X-Spammer-Kill-Ratio: 75% MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 16 Aug 2015 21:17:00 -0000 Hi, On Sun, 16 Aug 2015, Kurt Jaeger wrote: > Hi! > >> It could be the classic fall back to TCP on SRV records problem on >> your upstream DNS forwarder if you're using one: >> >> http://lists.freebsd.org/pipermail/freebsd-ports/2012-May/074801.html > > If I query that same DNS resolver using the line from > the script, it works every time. It's a 10.1p16 host with > a very recent ports build, and directly connected (no NAT, no > fw etc). > > If that would be the problem, how could I diagnose it in depth ? freebsd-update upgrade just failed on 3 other vm even when I explicitly specified the server using freebsd-update -s. I had success on another vm when I changed to using google dns. I am not aware that anything would be blocking tcp dns in my setups. Must be something else dns related. Perhaps I will run a local resolver in a vm and logg all queries and dns traffic. Greetings Christian -- Christian Kratzer CK Software GmbH Email: ck@cksoft.de Wildberger Weg 24/2 Phone: +49 7032 893 997 - 0 D-71126 Gaeufelden Fax: +49 7032 893 997 - 9 HRB 245288, Amtsgericht Stuttgart Mobile: +49 171 1947 843 Geschaeftsfuehrer: Christian Kratzer Web: http://www.cksoft.de/