Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Public mesh subdomain availability #157

Open
clehner opened this issue May 6, 2022 · 2 comments
Open

Public mesh subdomain availability #157

clehner opened this issue May 6, 2022 · 2 comments

Comments

@clehner
Copy link

clehner commented May 6, 2022

The DNS page says that .mesh.nycmesh.net is a public equivalent of the .mesh internal TLD, and is supposed to be "available on the entire internet": https://github.com/nycmeshnet/docs/blob/6ed7b1cea987f333d2c919e611c4255408bac978/content/networking/dns.md#top-level-domains
I see that the subdomains resolve from the mesh. However, they do not resolve from the outside Internet. The NS record for mesh.nycmesh.net is ns.mesh.nycmesh.net, which has a single A record, 10.10.10.11.

Some possible solutions to this issue:

  1. Update the page to clarify that mesh.nycmesh.net subdomains only resolve from the mesh.
  2. Add a public IPv4 (A) and/or IPv6 (AAAA) address for ns.mesh.nycmesh.net (in https://github.com/nycmeshnet/nycmesh-dns)
    a. 199.167.59.10 would seem to be a candidate for this, depending on Public DNS resolver availability #156.
  3. Add a NS record for mesh.nycmesh.net that resolves to a public IP address.
@zgiles
Copy link
Contributor

zgiles commented Oct 14, 2022

Hello there. Thanks for the report.
I think either due to age of the report, or perhaps something else, this issue might not be quite accurate anymore.
I'm able to resolve the domain well; In fact it is in-use by many people for their VPN access.
See below for some specific examples, especially even with a private IP returned via the public resolver, and a trace..

First some good old fashioned digging:

$ dig +short l2tpvpn.sn1.mesh.nycmesh.net
199.167.59.6
$ dig +short l2tpvpn.sn3.mesh.nycmesh.net
199.170.132.6
$ dig +short mail.mesh.nycmesh.net
10.70.140.70

So that's working, but where is it coming from?

$ dig +trace mail.mesh.nycmesh.net
...
net.			172800	IN	NS	e.gtld-servers.net....
;; Received 1178 bytes from 192.58.128.30#53(j.root-servers.net) in 35 ms

nycmesh.net.		172800	IN	NS	ns1dhq.name.com.
....
mesh.nycmesh.net.	300	IN	NS	nycmesh-375p-dns1-authoritative.nycmesh.net.
;; Received 112 bytes from 2402:cf80:107::1#53(ns2fjz.name.com) in 11 ms

mail.mesh.nycmesh.net.	3600	IN	A	10.70.140.70
;; Received 66 bytes from 199.167.59.11#53(nycmesh-375p-dns1-authoritative.nycmesh.net) in 20 ms

So it's working and coming in via the 199.167.59.11 authoritative nameserver.

We can also get this data via the public resolver:

$ nslookup mail.mesh.nycmesh.net 199.167.59.10
Server:		199.167.59.10
Address:	199.167.59.10#53

Non-authoritative answer:
Name:	mail.mesh.nycmesh.net
Address: 10.70.140.70

Let me know if this doesnt work for you, or if there's something else to replicate the issue.

@clehner
Copy link
Author

clehner commented Oct 14, 2022 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants