Looks like Google has upped the ante with Chromecasts and it's no
longer sufficient to just block external DNS queries and expect the
Chromecast devices to fall-back to the DHCP supplied local DNS
resolvers.

Looks like we are going to have to up the game to redirecting DNS
requests to the internal server and forging the responses as being from
the external server the queries were directed at.

So I have added a rules entry:

DNS/DNAT loc:!10.75.22.247 $INT_DNS

where 10.75.22.247 is the internal DNS server.

That seems to result in local queries that were going to say, 8.8.8.8
being redirected to the internal server.  But the problem is that the
replies are coming back from the internal server's address and being
rejected by the originator.  The replies need to forge the request
destination address.

Any thoughts on how this can be accomplished?

Cheers,
b.



_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to