jetzt mache ich doch noch ein Thema zu der Namensauflösung auf. Mittlerweile hatten wir ja herausgefunden, dass das ein Firewall-Problem ist. Leider komme ich doch nicht alleine weiter.
Ich habe hier einen PVE-Host in einem Datacenter, das Infrastrukur für eigene Hardware zur Verfügung stellt, also kein Standardprovider wie Hetzner, Inos etc. Ich selber komme nicht an die Hardware heran, ausser über eine KVM-Konsole.
Problembeschreibung:
Auf dem PVE-Host mit Promox 8.2.2 läuft im Moment nur eine VM mit Debian Linux 12.5. Auf dem PVE-Host läuft eine IPtables-Firewall über UFW. Und unter diesen Umständen kann die VM keine Namensauflösung machen, der PVE-Host sehr wohl. Schalte ich die Firewall auf dem PVE-Host aus, funktioniert die Namensauflösung auch auf der VM problemlos.
Ich hatte jetzt die UFW auf dem PVE-Host - die VM hat noch keine Firewall - komplett gelöscht und deinstalliert. Dann hatte ich UFW wieder neu installiert und eine SSH-Regel eingebaut. Mit der Aktivierung der Firewall auf dem PVE-Host tritt das Problem der Namensauflösung an der VM wieder auf - wie gesagt der PVE-Host hat dieses Problem nicht.
Mittlerweile habe ich auch wieder die anderen Regeln in die Firewall eingebaut, weil ich sie für NFS-Shares und Monitoring an anderen Servern benötige. Für mich spielt das jetzt keine Rolle, ob da nur eine oder 19 Regeln drin stehen, denn alleine das Aktivieren der Firewall auf dem PVE-Host verursacht das Problem. Und das möchte ich nicht nur lösen, sondern auch verstehen können, was da schiefläuft.
Szenario PVE-Host
Dieser PVE-Host hängt an einem Switch, bei dem das Netzwerk aufgeteilt wird wie bei Hetzner-Online, womit 192.110.55.249 und 192.110.55.250 Richtung Internet angeschlossen sind. Die IP-Adressen ab 192.110.55.66 stehen dann einzelnen VMs zur Verfügung.
Netzwerkkonfiguration
Code: Alles auswählen
# ip a show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host noprefixroute
valid_lft forever preferred_lft forever
2: enp49s0f0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000
link/ether ac:1f:6b:26:70:78 brd ff:ff:ff:ff:ff:ff
3: enp49s0f1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc mq state DOWN group default qlen 1000
link/ether ac:1f:6b:26:70:79 brd ff:ff:ff:ff:ff:ff
inet 192.168.3.1/30 scope global enp49s0f1
valid_lft forever preferred_lft forever
4: eno1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether ac:1f:6b:62:15:68 brd ff:ff:ff:ff:ff:ff
altname enp1s0f0
inet 192.110.55.250 peer 192.110.55.249/32 scope global eno1
valid_lft forever preferred_lft forever
inet6 fe80::ae1f:6bff:fe62:1568/64 scope link
valid_lft forever preferred_lft forever
5: eno2: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000
link/ether ac:1f:6b:62:15:69 brd ff:ff:ff:ff:ff:ff
altname enp1s0f1
6: vmbr0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
link/ether aa:5e:30:5b:7d:26 brd ff:ff:ff:ff:ff:ff
inet 192.110.55.65/26 scope global vmbr0
valid_lft forever preferred_lft forever
inet6 fe80::2426:37ff:feec:eabf/64 scope link
valid_lft forever preferred_lft forever
7: vmbr1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
link/ether 2e:0d:94:45:36:2c brd ff:ff:ff:ff:ff:ff
inet 192.168.1.65/24 scope global vmbr1
valid_lft forever preferred_lft forever
inet6 fe80::740a:9aff:fe72:8a10/64 scope link
valid_lft forever preferred_lft forever
8: tap101i0: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast master vmbr0 state UNKNOWN group default qlen 1000
link/ether aa:5e:30:5b:7d:26 brd ff:ff:ff:ff:ff:ff
9: tap101i1: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast master vmbr1 state UNKNOWN group default qlen 1000
link/ether 2e:0d:94:45:36:2c brd ff:ff:ff:ff:ff:ff
Code: Alles auswählen
# cat /etc/network/interfaces
auto lo
iface lo inet loopback
auto eno1
iface eno1 inet static
address 192.110.55.250
netmask 255.255.255.255
gateway 192.110.55.249
pointopoint 192.110.55.249
dns-nameservers 192.55.48.84 9.9.9.9 8.8.8.8 8.8.4.4
dns-search germany.com
auto vmbr0
iface vmbr0 inet static
address 192.110.55.65/26
bridge-ports none
bridge-stp off
bridge-fd 0
auto vmbr1
iface vmbr1 inet static
address 192.168.1.65/24
bridge-ports none
bridge-stp off
bridge-fd 0
dns-nameservers 192.55.48.84
auto enp49s0f1
iface enp49s0f1 inet static
address 192.168.3.1/30
iface enp49s0f0 inet manual
iface eno2 inet manual
Code: Alles auswählen
# route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
default 192.110.55.249 0.0.0.0 UG 0 0 0 eno1
192.110.55.64 0.0.0.0 255.255.255.192 U 0 0 0 vmbr0
192.110.55.249 0.0.0.0 255.255.255.255 UH 0 0 0 eno1
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 vmbr1
192.168.3.0 0.0.0.0 255.255.255.252 U 0 0 0 enp49s0f1
Code: Alles auswählen
# iptables -nvx -L
Chain INPUT (policy DROP 16 packets, 742 bytes)
pkts bytes target prot opt in out source destination
164550 11760787 ufw-before-logging-input 0 -- * * 0.0.0.0/0 0.0.0.0/0
164550 11760787 ufw-before-input 0 -- * * 0.0.0.0/0 0.0.0.0/0
11203 709085 ufw-after-input 0 -- * * 0.0.0.0/0 0.0.0.0/0
10314 667253 ufw-after-logging-input 0 -- * * 0.0.0.0/0 0.0.0.0/0
10314 667253 ufw-reject-input 0 -- * * 0.0.0.0/0 0.0.0.0/0
10314 667253 ufw-track-input 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 487 packets, 22420 bytes)
pkts bytes target prot opt in out source destination
61999 2893321 ufw-before-logging-forward 0 -- * * 0.0.0.0/0 0.0.0.0/0
61999 2893321 ufw-before-forward 0 -- * * 0.0.0.0/0 0.0.0.0/0
58896 2780543 ufw-after-forward 0 -- * * 0.0.0.0/0 0.0.0.0/0
58896 2780543 ufw-after-logging-forward 0 -- * * 0.0.0.0/0 0.0.0.0/0
58896 2780543 ufw-reject-forward 0 -- * * 0.0.0.0/0 0.0.0.0/0
58896 2780543 ufw-track-forward 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
190717 14942070 ufw-before-logging-output 0 -- * * 0.0.0.0/0 0.0.0.0/0
190717 14942070 ufw-before-output 0 -- * * 0.0.0.0/0 0.0.0.0/0
2742 282613 ufw-after-output 0 -- * * 0.0.0.0/0 0.0.0.0/0
2742 282613 ufw-after-logging-output 0 -- * * 0.0.0.0/0 0.0.0.0/0
2742 282613 ufw-reject-output 0 -- * * 0.0.0.0/0 0.0.0.0/0
2742 282613 ufw-track-output 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain ufw-after-forward (1 references)
pkts bytes target prot opt in out source destination
Chain ufw-after-input (1 references)
pkts bytes target prot opt in out source destination
0 0 ufw-skip-to-policy-input 17 -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:137
0 0 ufw-skip-to-policy-input 17 -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:138
0 0 ufw-skip-to-policy-input 6 -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:139
2 104 ufw-skip-to-policy-input 6 -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:445
0 0 ufw-skip-to-policy-input 17 -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:67
0 0 ufw-skip-to-policy-input 17 -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:68
4 200 ufw-skip-to-policy-input 0 -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
Chain ufw-after-logging-forward (1 references)
pkts bytes target prot opt in out source destination
13 580 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
Chain ufw-after-logging-input (1 references)
pkts bytes target prot opt in out source destination
13 618 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
Chain ufw-after-logging-output (1 references)
pkts bytes target prot opt in out source destination
Chain ufw-after-output (1 references)
pkts bytes target prot opt in out source destination
Chain ufw-before-forward (1 references)
pkts bytes target prot opt in out source destination
12 432 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT 1 -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 3
0 0 ACCEPT 1 -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 11
0 0 ACCEPT 1 -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 12
30 1084 ACCEPT 1 -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 8
490 22544 ufw-user-forward 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain ufw-before-input (1 references)
pkts bytes target prot opt in out source destination
1008 64008 ACCEPT 0 -- lo * 0.0.0.0/0 0.0.0.0/0
627 66482 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ufw-logging-deny 0 -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
0 0 ACCEPT 1 -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 3
0 0 ACCEPT 1 -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 11
0 0 ACCEPT 1 -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 12
15 1056 ACCEPT 1 -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 8
0 0 ACCEPT 17 -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:67 dpt:68
27 1326 ufw-not-local 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT 17 -- * * 0.0.0.0/0 224.0.0.251 udp dpt:5353
0 0 ACCEPT 17 -- * * 0.0.0.0/0 239.255.255.250 udp dpt:1900
27 1326 ufw-user-input 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain ufw-before-logging-forward (1 references)
pkts bytes target prot opt in out source destination
Chain ufw-before-logging-input (1 references)
pkts bytes target prot opt in out source destination
Chain ufw-before-logging-output (1 references)
pkts bytes target prot opt in out source destination
Chain ufw-before-output (1 references)
pkts bytes target prot opt in out source destination
1008 64008 ACCEPT 0 -- * lo 0.0.0.0/0 0.0.0.0/0
895 145382 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ufw-user-output 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain ufw-logging-allow (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW ALLOW] "
Chain ufw-logging-deny (2 references)
pkts bytes target prot opt in out source destination
0 0 RETURN 0 -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID limit: avg 3/min burst 10
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
Chain ufw-not-local (1 references)
pkts bytes target prot opt in out source destination
21 1022 RETURN 0 -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL
0 0 RETURN 0 -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type MULTICAST
6 304 RETURN 0 -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
0 0 ufw-logging-deny 0 -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain ufw-reject-forward (1 references)
pkts bytes target prot opt in out source destination
Chain ufw-reject-input (1 references)
pkts bytes target prot opt in out source destination
Chain ufw-reject-output (1 references)
pkts bytes target prot opt in out source destination
Chain ufw-skip-to-policy-forward (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain ufw-skip-to-policy-input (7 references)
pkts bytes target prot opt in out source destination
6 304 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain ufw-skip-to-policy-output (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain ufw-track-forward (1 references)
pkts bytes target prot opt in out source destination
Chain ufw-track-input (1 references)
pkts bytes target prot opt in out source destination
Chain ufw-track-output (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 6 -- * * 0.0.0.0/0 0.0.0.0/0 ctstate NEW
0 0 ACCEPT 17 -- * * 0.0.0.0/0 0.0.0.0/0 ctstate NEW
Chain ufw-user-forward (1 references)
pkts bytes target prot opt in out source destination
Chain ufw-user-input (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 6 -- * * 0.0.0.0/0 192.110.55.250 tcp dpt:52022
0 0 ACCEPT 6 -- * * 192.168.1.0/24 0.0.0.0/0 tcp dpt:52022
0 0 ACCEPT 6 -- * * 192.55.48.71 0.0.0.0/0 tcp dpt:2049
0 0 ACCEPT 17 -- * * 192.55.48.71 0.0.0.0/0 udp dpt:2049
0 0 ACCEPT 6 -- * * 192.55.48.72 0.0.0.0/0 tcp dpt:2049
0 0 ACCEPT 17 -- * * 192.55.48.72 0.0.0.0/0 udp dpt:2049
0 0 ACCEPT 6 -- * * 192.55.48.75 0.0.0.0/0 tcp dpt:2049
0 0 ACCEPT 17 -- * * 192.55.48.75 0.0.0.0/0 udp dpt:2049
0 0 ACCEPT 6 -- * * 192.55.48.80 0.0.0.0/0 tcp dpt:2049
0 0 ACCEPT 17 -- * * 192.55.48.80 0.0.0.0/0 udp dpt:2049
0 0 ACCEPT 6 -- * * 192.55.48.84 0.0.0.0/0 tcp dpt:2049
0 0 ACCEPT 17 -- * * 192.55.48.84 0.0.0.0/0 udp dpt:2049
0 0 ACCEPT 6 -- * * 192.55.48.85 0.0.0.0/0 tcp dpt:2049
0 0 ACCEPT 17 -- * * 192.55.48.85 0.0.0.0/0 udp dpt:2049
0 0 ACCEPT 6 -- * * 192.55.48.79 0.0.0.0/0 tcp dpt:2049
0 0 ACCEPT 17 -- * * 192.55.48.79 0.0.0.0/0 udp dpt:2049
0 0 ACCEPT 6 -- * * 192.55.48.250 0.0.0.0/0 tcp dpt:2049
0 0 ACCEPT 17 -- * * 192.55.48.250 0.0.0.0/0 udp dpt:2049
0 0 ACCEPT 6 -- * * 192.55.48.76 0.0.0.0/0 tcp dpt:2049
0 0 ACCEPT 17 -- * * 192.55.48.76 0.0.0.0/0 udp dpt:2049
0 0 ACCEPT 6 -- * * 192.168.1.86 0.0.0.0/0 tcp dpt:2049
0 0 ACCEPT 17 -- * * 192.168.1.86 0.0.0.0/0 udp dpt:2049
2 120 ACCEPT 6 -- * * 192.55.48.72 0.0.0.0/0 tcp dpt:6556
2 120 ACCEPT 6 -- * * 192.146.57.85 0.0.0.0/0 tcp dpt:6556
0 0 ACCEPT 6 -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
0 0 ACCEPT 17 -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
Chain ufw-user-limit (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 LOG flags 0 level 4 prefix "[UFW LIMIT BLOCK] "
0 0 REJECT 0 -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
Chain ufw-user-limit-accept (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain ufw-user-logging-forward (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-user-logging-input (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-user-logging-output (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-user-output (1 references)
pkts bytes target prot opt in out source destination
Code: Alles auswählen
# ufw status verbose
Status: active
Logging: on (low)
Default: deny (incoming), allow (outgoing), deny (routed)
New profiles: skip
To Action From
-- ------ ----
192.110.55.250 52022/tcp ALLOW IN Anywhere # SSH from Internet
52022/tcp ALLOW IN 192.168.1.0/24 # SSH from intern network
2049 ALLOW IN 192.55.48.71 # Allow NFS
2049 ALLOW IN 192.55.48.72 # Allow NFS
2049 ALLOW IN 192.55.48.75 # Allow NFS
2049 ALLOW IN 192.55.48.80 # Allow NFS
2049 ALLOW IN 192.55.48.84 # Allow NFS
2049 ALLOW IN 192.55.48.85 # Allow NFS
2049 ALLOW IN 192.55.48.79 # Allow NFS
2049 ALLOW IN 192.55.48.250 # Allow NFS
2049 ALLOW IN 192.55.48.76 # Allow NFS
2049 ALLOW IN 192.168.1.86 # Allow NFS
6556/tcp ALLOW IN 192.55.48.72 # Allow CheckMK monitoring
6556/tcp ALLOW IN 192.146.57.85 # Allow CheckMK monitoring
53/tcp ALLOW IN Anywhere # Allow DNS traffic
53/udp ALLOW IN Anywhere # Allow DNS traffic
53/tcp (v6) ALLOW IN Anywhere (v6) # Allow DNS traffic
53/udp (v6) ALLOW IN Anywhere (v6) # Allow DNS traffic
Szenario am VM-Gast
Netzwerkkonfiguration
Code: Alles auswählen
# ip a show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host noprefixroute
valid_lft forever preferred_lft forever
2: ens18: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
link/ether bc:24:11:95:b5:34 brd ff:ff:ff:ff:ff:ff
altname enp0s18
inet 192.110.55.86 peer 192.110.55.65/32 brd 192.110.55.86 scope global ens18
valid_lft forever preferred_lft forever
inet6 fe80::be24:11ff:fe95:b534/64 scope link
valid_lft forever preferred_lft forever
3: ens19: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
link/ether bc:24:11:10:f1:8a brd ff:ff:ff:ff:ff:ff
altname enp0s19
inet 192.168.1.86/24 brd 192.168.1.255 scope global ens19
valid_lft forever preferred_lft forever
inet6 fe80::be24:11ff:fe10:f18a/64 scope link
valid_lft forever preferred_lft forever
Code: Alles auswählen
# cat /etc/network/interfaces
source /etc/network/interfaces.d/*
# The loopback network interface
auto lo
iface lo inet loopback
# The primary network interface
allow-hotplug ens18
iface ens18 inet static
address 192.110.55.86
netmask 255.255.255.255
pointopoint 192.110.55.65
gateway 192.110.55.250
dns-nameservers 9.9.9.9 8.8.8.8 8.8.4.4
dns-search germany.com
# The intern network interface
allow-hotplug ens19
iface ens19 inet static
address 192.168.1.86/24
# dns-* options are implemented by the resolvconf package, if installed
dns-nameservers 9.9.9.9 8.8.8.8 8.8.4.4
dns-search germany.com
Code: Alles auswählen
# route
Kernel-IP-Routentabelle
Ziel Router Genmask Flags Metric Ref Use Iface
default 192.110.55.250 0.0.0.0 UG 0 0 0 ens18
192.110.55.65 0.0.0.0 255.255.255.255 UH 0 0 0 ens18
localnet 0.0.0.0 255.255.255.0 U 0 0 0 ens19
Test für die Namensauflösung an der VM bei aktiver Firewall auf PVE-Host
Code: Alles auswählen
# ping -c3 www.google.com
ping: www.google.com: Temporärer Fehler bei der Namensauflösung
Code: Alles auswählen
# nslookup -query=A www.google.de 9.9.9.9
;; communications error to 9.9.9.9#53: timed out
;; communications error to 9.9.9.9#53: timed out
;; communications error to 9.9.9.9#53: timed out
;; no servers could be reached
Code: Alles auswählen
ping -c3 www.google.com
PING www.google.com (216.58.206.68) 56(84) bytes of data.
64 bytes from tzfraa-aa-in-f4.1e100.net (216.58.206.68): icmp_seq=1 ttl=118 time=7.65 ms
64 bytes from tzfraa-aa-in-f4.1e100.net (216.58.206.68): icmp_seq=2 ttl=118 time=7.63 ms
64 bytes from tzfraa-aa-in-f4.1e100.net (216.58.206.68): icmp_seq=3 ttl=118 time=7.71 ms
--- www.google.com ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2004ms
rtt min/avg/max/mdev = 7.632/7.663/7.713/0.035 ms
Code: Alles auswählen
# nslookup -query=A www.google.de 9.9.9.9
Server: 9.9.9.9
Address: 9.9.9.9#53
Non-authoritative answer:
Name: www.google.de
Address: 142.250.184.227
Viele Grüße
Njuguna