Solved [solved] Portsnap fetch failed too

The problem was fixed.
Thannk you to all.
Please help me change the status! 21/Dec-2014


I found portsnap fetch failed since I moved to Australia from China. I found https://forums.freebsd.org/viewtopic.php?f=7&t=43337 by QuinRiva 19 Nov 2013, thank you, but the problem is different. So,
  1. portsnap fetch
    Code:
    Looking up portsnap.FreeBSD.org mirrors... 7 mirrors found.
    Fetching snapshot tag from ec2-ap-southeast-2.portsnap.freebsd.org... failed.
    Fetching snapshot tag from ec2-ap-northeast-1.portsnap.freebsd.org... failed.
    Fetching snapshot tag from isc.portsnap.freebsd.org... failed.
    Fetching snapshot tag from sourcefire.portsnap.freebsd.org... failed.
    Fetching snapshot tag from your-org.portsnap.freebsd.org... failed.
    Fetching snapshot tag from ec2-eu-west-1.portsnap.freebsd.org... failed.
    Fetching snapshot tag from ec2-sa-east-1.portsnap.freebsd.org... failed.
    No mirrors remaining, giving up.
  2. dig +trace portsnap.freebsd.org
    Code:
    ; <<>> DiG 9.8.3-P4 <<>> +trace portsnap.freebsd.org
    ;; global options: +cmd
    ;; Received 17 bytes from 10.0.0.1#53(10.0.0.1) in 3 ms
  3. dig portsnap.freebsd.org +short
    Code:
    54.252.93.148
  4. portsnap -s 54.252.93,148 fetch
    Code:
    Fetching snapshot tag from 54.252.93,148... failed.
    No mirrors remaining, giving up.
Anybody help me please!

Thank you.

More information:
  1. ifconfig
    Code:
    iwn0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> metric 0 mtu 2290
    	ether 00:21:6b:73:3c:c0
    	nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
    	media: IEEE 802.11 Wireless Ethernet autoselect (autoselect)
    	status: no carrier
    msk0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
    	options=8010a<TXCSUM,VLAN_MTU,TSO4,LINKSTATE>
    	ether 00:24:81:37:25:7f
    	inet6 fe80::224:81ff:fe37:257f%msk0 prefixlen 64 scopeid 0x6 
    	inet 10.0.0.2 netmask 0xffffff00 broadcast 10.0.0.255
    	nd6 options=23<PERFORMNUD,ACCEPT_RTADV,AUTO_LINKLOCAL>
    	media: Ethernet autoselect (100baseTX <full-duplex,flowcontrol,rxpause,txpause>)
    	status: active
    lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
    	options=600003<RXCSUM,TXCSUM,RXCSUM_IPV6,TXCSUM_IPV6>
    	inet6 ::1 prefixlen 128 
    	inet6 fe80::1%lo0 prefixlen 64 scopeid 0xb 
    	inet 127.0.0.1 netmask 0xff000000 
    	nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
  2. netstat -rn
    Code:
    Routing tables
    
    Internet:
    Destination        Gateway            Flags    Refs      Use  Netif Expire
    default            10.0.0.1           UGS         0     2590   msk0
    10.0.0.0/24        link#6             U           0      396   msk0
    10.0.0.2           link#6             UHS         0        0    lo0
    127.0.0.1          link#11            UH          0        0    lo0
    
    Internet6:
    Destination                       Gateway                       Flags      Netif Expire
    ::/96                             ::1                           UGRS        lo0
    ::1                               link#11                       UH          lo0
    ::ffff:0.0.0.0/96                 ::1                           UGRS        lo0
    fe80::/10                         ::1                           UGRS        lo0
    fe80::%msk0/64                    link#6                        U          msk0
    fe80::224:81ff:fe37:257f%msk0     link#6                        UHS         lo0
    fe80::%lo0/64                     link#11                       U           lo0
    fe80::1%lo0                       link#11                       UHS         lo0
    ff01::%msk0/32                    fe80::224:81ff:fe37:257f%msk0 U          msk0
    ff01::%lo0/32                     ::1                           U           lo0
    ff02::/16                         ::1                           UGRS        lo0
    ff02::%msk0/32                    fe80::224:81ff:fe37:257f%msk0 U          msk0
    ff02::%lo0/32                     ::1                           U           lo0
  3. ping -c 3 forums.freebsd.org
    Code:
    PING forums.freebsd.org (149.20.54.209): 56 data bytes
    64 bytes from 149.20.54.209: icmp_seq=0 ttl=49 time=263.536 ms
    64 bytes from 149.20.54.209: icmp_seq=1 ttl=49 time=330.243 ms
    64 bytes from 149.20.54.209: icmp_seq=2 ttl=46 time=262.656 ms
    
    --- forums.freebsd.org ping statistics ---
    3 packets transmitted, 3 packets received, 0.0% packet loss
    round-trip min/avg/max/stddev = 262.656/285.478/330.243/31.655 ms
but when I try this cmd command, it fails. ping -c 3 [url=https://forums.freebsd.org]https://forums.freebsd.org[/url]
Code:
ping: cannot resolve https://forums.freebsd.org: No address associated with name
 
Re: Portsnap fetch failed too

wangzhouang said:
portsnap -s 54.252.93,148 fetch
There's a comma in the IP address.

ping -c 3 [url=https://forums.freebsd.org]https://forums.freebsd.org[/url]
Code:
ping: cannot resolve https://forums.freebsd.org: No address associated with name
You cannot ping a URL, only hostnames or IP addresses. Remove the https://.
 
Re: Portsnap fetch failed too

SirDice said:
wangzhouang said:
portsnap -s 54.252.93,148 fetch
There's a comma in the IP address.

ping -c 3 [url=https://forums.freebsd.org]https://forums.freebsd.org[/url]
Code:
ping: cannot resolve https://forums.freebsd.org: No address associated with name
You cannot ping a URL, only hostnames or IP addresses. Remove the https://.

Many Thanks. I corrected the command, but it still does not work. Here is the result:
portsnap -s 54.252.93.148 fetch
Code:
Looking up 54.252.93.148 mirrors... none found.
Fetching snapshot tag from 54.252.93.148... failed.
No mirrors remaining, giving up.

Any suggestion? :q
 
Re: Portsnap fetch failed too

I'm not sure if it's going to help but have you tried cleaning /var/db/portsnap/? rm -rf /var/db/portsnap/*
 
Re: Portsnap fetch failed too

Thank you, I tried, and failed. portsnap -s 54.252.93.148 fetch

Code:
Looking up 54.252.93.148 mirrors... none found.
Fetching public key from 54.252.93.148... failed.
No mirrors remaining, giving up.
and portsnap fetch
Code:
Looking up portsnap.FreeBSD.org mirrors... 7 mirrors found.
Fetching public key from ec2-ap-southeast-2.portsnap.freebsd.org... failed.
Fetching public key from ec2-ap-northeast-1.portsnap.freebsd.org... failed.
Fetching public key from isc.portsnap.freebsd.org... failed.
Fetching public key from sourcefire.portsnap.freebsd.org... failed.
Fetching public key from your-org.portsnap.freebsd.org... failed.
Fetching public key from ec2-eu-west-1.portsnap.freebsd.org... failed.
Fetching public key from ec2-sa-east-1.portsnap.freebsd.org... failed.
No mirrors remaining, giving up.

Thank you @SirDice!
 
Last edited by a moderator:
Re: Portsnap fetch failed too

Can you run fetch [url=http://portsnap.freebsd.org/pub.ssl]http://portsnap.freebsd.org/pub.ssl[/url] manually? What does it say if it fails?
 
Re: Portsnap fetch failed too

junovitch said:
Can you run fetch [url=http://portsnap.freebsd.org/pub.ssl]http://portsnap.freebsd.org/pub.ssl[/url] manually? What does it say if it fails?

Code:
fetch: http://portsnap.freebsd.org/pub.ssl: Connection refused
 
Re: Portsnap fetch failed too

Well, the fact that the connection is refused is telling. That means something is actively stopping this. Better than a connection timing out leaving you wondering where your packets are getting dropped. Do you have any kind of firewall blocking outbound port 80 from your network? Can you get a "local" website, like fetch [url=http://www.smh.com.au/index.html]http://www.smh.com.au/index.html[/url]?
 
Re: Portsnap fetch failed too

junovitch said:
Do you have any kind of firewall blocking outbound port 80 from your network?
It's most likely somthing is blocking at the gatway level.
When you dig +trace you are only receiving from 10.0.0.1#53(10.0.0.1), your default gateway.
wangzhouang said:
[*] dig +trace portsnap.freebsd.org
Code:
; <<>> DiG 9.8.3-P4 <<>> +trace portsnap.freebsd.org
;; global options: +cmd
;; Received 17 bytes from 10.0.0.1#53(10.0.0.1) in 3 ms
It should look similar to this:

$ dig +trace portsnap.freebsd.org
Code:
; <<>> DiG 9.8.4-P2 <<>> +trace portsnap.freebsd.org
;; global options: +cmd
.			394706	IN	NS	f.root-servers.net.
.			394706	IN	NS	a.root-servers.net.
.			394706	IN	NS	e.root-servers.net.
.			394706	IN	NS	d.root-servers.net.
.			394706	IN	NS	g.root-servers.net.
.			394706	IN	NS	b.root-servers.net.
.			394706	IN	NS	h.root-servers.net.
.			394706	IN	NS	m.root-servers.net.
.			394706	IN	NS	k.root-servers.net.
.			394706	IN	NS	j.root-servers.net.
.			394706	IN	NS	l.root-servers.net.
.			394706	IN	NS	c.root-servers.net.
.			394706	IN	NS	i.root-servers.net.
;; Received 512 bytes from 85.214.20.141#53(85.214.20.141) in 96 ms

org.			172800	IN	NS	a0.org.afilias-nst.info.
org.			172800	IN	NS	a2.org.afilias-nst.info.
org.			172800	IN	NS	b0.org.afilias-nst.org.
org.			172800	IN	NS	b2.org.afilias-nst.org.
org.			172800	IN	NS	c0.org.afilias-nst.info.
org.			172800	IN	NS	d0.org.afilias-nst.org.
;; Received 440 bytes from 198.41.0.4#53(198.41.0.4) in 51 ms

freebsd.org.		86400	IN	NS	ns2.isc-sns.com.
freebsd.org.		86400	IN	NS	ns3.isc-sns.info.
freebsd.org.		86400	IN	NS	ns1.isc-sns.net.
;; Received 126 bytes from 199.19.56.1#53(199.19.56.1) in 81 ms

portsnap.freebsd.org.	3600	IN	NS	ns-1184.awsdns-20.org.
portsnap.freebsd.org.	3600	IN	NS	ns-20.awsdns-02.com.
portsnap.freebsd.org.	3600	IN	NS	ns-836.awsdns-40.net.
portsnap.freebsd.org.	3600	IN	NS	ns-1954.awsdns-52.co.uk.
;; Received 174 bytes from 63.243.194.1#53(63.243.194.1) in 87 ms

portsnap.freebsd.org.	300	IN	A	46.137.83.240
portsnap.freebsd.org.	172800	IN	NS	ns-1184.awsdns-20.org.
portsnap.freebsd.org.	172800	IN	NS	ns-1954.awsdns-52.co.uk.
portsnap.freebsd.org.	172800	IN	NS	ns-20.awsdns-02.com.
portsnap.freebsd.org.	172800	IN	NS	ns-836.awsdns-40.net.
;; Received 190 bytes from 205.251.195.68#53(205.251.195.68) in 102 ms
 
Re: Portsnap fetch failed too

Almost there this time!! Thanks to junovitch and T-Daemon, you are right! There must be something wrong in these three files: /etc/namedb/named.conf, /etc/resolv.conf and /etc/rc.conf. I add the Google DNS in theresolv.conf, dig +trace portsnap.freebsd.org result seems normal this time.
Code:
; <<>> DiG 9.8.3-P4 <<>> +trace portsnap.freebsd.org
;; global options: +cmd
.			7557	IN	NS	a.root-servers.net.
.			7557	IN	NS	b.root-servers.net.
.			7557	IN	NS	c.root-servers.net.
.			7557	IN	NS	d.root-servers.net.
.			7557	IN	NS	e.root-servers.net.
.			7557	IN	NS	f.root-servers.net.
.			7557	IN	NS	g.root-servers.net.
.			7557	IN	NS	h.root-servers.net.
.			7557	IN	NS	i.root-servers.net.
.			7557	IN	NS	j.root-servers.net.
.			7557	IN	NS	k.root-servers.net.
.			7557	IN	NS	l.root-servers.net.
.			7557	IN	NS	m.root-servers.net.
;; Received 228 bytes from 8.8.4.4#53(8.8.4.4) in 2212 ms

org.			172800	IN	NS	a2.org.afilias-nst.info.
org.			172800	IN	NS	d0.org.afilias-nst.org.
org.			172800	IN	NS	a0.org.afilias-nst.info.
org.			172800	IN	NS	b2.org.afilias-nst.org.
org.			172800	IN	NS	c0.org.afilias-nst.info.
org.			172800	IN	NS	b0.org.afilias-nst.org.
;; Received 440 bytes from 202.12.27.33#53(202.12.27.33) in 1145 ms

freebsd.org.		86400	IN	NS	ns3.isc-sns.info.
freebsd.org.		86400	IN	NS	ns2.isc-sns.com.
freebsd.org.		86400	IN	NS	ns1.isc-sns.net.
;; Received 126 bytes from 199.19.57.1#53(199.19.57.1) in 667 ms

portsnap.freebsd.org.	3600	IN	NS	ns-20.awsdns-02.com.
portsnap.freebsd.org.	3600	IN	NS	ns-836.awsdns-40.net.
portsnap.freebsd.org.	3600	IN	NS	ns-1954.awsdns-52.co.uk.
portsnap.freebsd.org.	3600	IN	NS	ns-1184.awsdns-20.org.
;; Received 174 bytes from 72.52.71.1#53(72.52.71.1) in 1542 ms

portsnap.freebsd.org.	300	IN	A	54.252.93.148
portsnap.freebsd.org.	172800	IN	NS	ns-1184.awsdns-20.org.
portsnap.freebsd.org.	172800	IN	NS	ns-1954.awsdns-52.co.uk.
portsnap.freebsd.org.	172800	IN	NS	ns-20.awsdns-02.com.
portsnap.freebsd.org.	172800	IN	NS	ns-836.awsdns-40.net.
;; Received 190 bytes from 205.251.195.68#53(205.251.195.68) in 198 ms


But when I try "fetch" fetch [url=http://www.smh.com.au/index.html]http://www.smh.com.au/index.html[/url], there is the same error: "Connection refused" .
Code:
fetch: http://portsnap.freebsd.org/pub.ssl: Connection refused
-----------------------------------------
1) named.conf
Code:
// $FreeBSD: release/9.1.0/etc/namedb/named.conf 224125 2011-07-17 06:20:47Z dougb $
//
// Refer to the named.conf(5) and named(8) man pages, and the documentation
// in /usr/share/doc/bind9 for more details.
//
// If you are going to set up an authoritative server, make sure you
// understand the hairy details of how DNS works.  Even with
// simple mistakes, you can break connectivity for affected parties,
// or cause huge amounts of useless Internet traffic.

options {
	// All file and path names are relative to the chroot directory,
	// if any, and should be fully qualified.
	directory	"/etc/namedb/working";
	pid-file	"/var/run/named/pid";
	dump-file	"/var/dump/named_dump.db";
	statistics-file	"/var/stats/named.stats";

// If named is being used only as a local resolver, this is a safe default.
// For named to be accessible to the network, comment this option, specify
// the proper IP address, or delete this option.
//	listen-on	{ 127.0.0.1; };

// If you have IPv6 enabled on this system, uncomment this option for
// use as a local resolver.  To give access to the network, specify
// an IPv6 address, or the keyword "any".
//        listen-on-v6	{ ::1; };

// These zones are already covered by the empty zones listed below.
// If you remove the related empty zones below, comment these lines out.
	disable-empty-zone "255.255.255.255.IN-ADDR.ARPA";
	disable-empty-zone "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";
	disable-empty-zone "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";

// If you've got a DNS server around at your upstream provider, enter
// its IP address here, and enable the line below.  This will make you
// benefit from its cache, thus reduce overall DNS traffic in the Internet.

	forwarders {
                127.0.0.1;
                8.8.4.4;
                8.8.8.8;
	};

// If the 'forwarders' clause is not empty the default is to 'forward first'
// which will fall back to sending a query from your local server if the name
// servers in 'forwarders' do not have the answer.  Alternatively you can
// force your name server to never initiate queries of its own by enabling the
// following line:
//	forward only;

// If you wish to have forwarding configured automatically based on
// the entries in /etc/resolv.conf, uncomment the following line and
// set named_auto_forward=yes in /etc/rc.conf.  You can also enable
// named_auto_forward_only (the effect of which is described above).
//	include "/etc/namedb/auto_forward.conf";

	/*
	   Modern versions of BIND use a random UDP port for each outgoing
	   query by default in order to dramatically reduce the possibility
	   of cache poisoning.  All users are strongly encouraged to utilize
	   this feature, and to configure their firewalls to accommodate it.

	   AS A LAST RESORT in order to get around a restrictive firewall
	   policy you can try enabling the option below.  Use of this option
	   will significantly reduce your ability to withstand cache poisoning
	   attacks, and should be avoided if at all possible.

	   Replace NNNNN in the example with a number between 49160 and 65530.
	*/
	// query-source address * port NNNNN;
};

// If you enable a local name server, don't forget to enter 127.0.0.1
// first in your /etc/resolv.conf so this server will be queried.
// Also, make sure to enable it in /etc/rc.conf.

// The traditional root hints mechanism. Use this, OR the slave zones below.
zone "." { type hint; file "/etc/namedb/named.root"; };

/*	Slaving the following zones from the root name servers has some
	significant advantages:
	1. Faster local resolution for your users
	2. No spurious traffic will be sent from your network to the roots
	3. Greater resilience to any potential root server failure/DDoS

	On the other hand, this method requires more monitoring than the
	hints file to be sure that an unexpected failure mode has not
	incapacitated your server.  Name servers that are serving a lot
	of clients will benefit more from this approach than individual
	hosts.  Use with caution.

	To use this mechanism, uncomment the entries below, and comment
	the hint zone above.

	As documented at http://dns.icann.org/services/axfr/ these zones:
	"." (the root), ARPA, IN-ADDR.ARPA, IP6.ARPA, and ROOT-SERVERS.NET
	are availble for AXFR from these servers on IPv4 and IPv6:
	xfr.lax.dns.icann.org, xfr.cjr.dns.icann.org
*/
/*
zone "." {
	type slave;
	file "/etc/namedb/slave/root.slave";
	masters {
		192.5.5.241;	// F.ROOT-SERVERS.NET.
	};
	notify no;
};
zone "arpa" {
	type slave;
	file "/etc/namedb/slave/arpa.slave";
	masters {
		192.5.5.241;	// F.ROOT-SERVERS.NET.
	};
	notify no;
};
*/

/*	Serving the following zones locally will prevent any queries
	for these zones leaving your network and going to the root
	name servers.  This has two significant advantages:
	1. Faster local resolution for your users
	2. No spurious traffic will be sent from your network to the roots
*/
// RFCs 1912, 5735 and 6303 (and BCP 32 for localhost)
zone "localhost"	{ type master; file "/etc/namedb/master/localhost-forward.db"; };
zone "127.in-addr.arpa"	{ type master; file "/etc/namedb/master/localhost-reverse.db"; };
zone "255.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// RFC 1912-style zone for IPv6 localhost address (RFC 6303)
zone "0.ip6.arpa"	{ type master; file "/etc/namedb/master/localhost-reverse.db"; };

// "This" Network (RFCs 1912, 5735 and 6303)
zone "0.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// Private Use Networks (RFCs 1918, 5735 and 6303)
zone "10.in-addr.arpa"	   { type master; file "/etc/namedb/master/empty.db"; };
zone "16.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "17.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "18.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "19.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "20.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "21.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "22.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "23.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "24.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "25.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "26.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "27.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "28.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "29.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "30.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "31.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "168.192.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };

// Link-local/APIPA (RFCs 3927, 5735 and 6303)
zone "254.169.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };

// IETF protocol assignments (RFCs 5735 and 5736)
zone "0.0.192.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };

// TEST-NET-[1-3] for Documentation (RFCs 5735, 5737 and 6303)
zone "2.0.192.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "100.51.198.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "113.0.203.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };

// IPv6 Example Range for Documentation (RFCs 3849 and 6303)
zone "8.b.d.0.1.0.0.2.ip6.arpa" { type master; file "/etc/namedb/master/empty.db"; };

// Domain Names for Documentation and Testing (BCP 32)
zone "test" { type master; file "/etc/namedb/master/empty.db"; };
zone "example" { type master; file "/etc/namedb/master/empty.db"; };
zone "invalid" { type master; file "/etc/namedb/master/empty.db"; };
zone "example.com" { type master; file "/etc/namedb/master/empty.db"; };
zone "example.net" { type master; file "/etc/namedb/master/empty.db"; };
zone "example.org" { type master; file "/etc/namedb/master/empty.db"; };

// Router Benchmark Testing (RFCs 2544 and 5735)
zone "18.198.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "19.198.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };

// IANA Reserved - Old Class E Space (RFC 5735)
zone "240.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "241.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "242.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "243.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "244.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "245.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "246.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "247.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "248.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "249.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "250.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "251.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "252.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "253.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "254.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// IPv6 Unassigned Addresses (RFC 4291)
zone "1.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "3.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "4.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "5.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "6.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "7.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "8.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "9.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "a.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "b.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "c.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "d.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "e.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "0.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "1.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "2.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "3.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "4.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "5.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "6.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "7.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "8.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "9.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "a.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "b.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "0.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "1.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "2.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "3.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "4.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "5.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "6.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "7.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// IPv6 ULA (RFCs 4193 and 6303)
zone "c.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "d.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// IPv6 Link Local (RFCs 4291 and 6303)
zone "8.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "9.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "a.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "b.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// IPv6 Deprecated Site-Local Addresses (RFCs 3879 and 6303)
zone "c.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "d.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "e.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "f.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// IP6.INT is Deprecated (RFC 4159)
zone "ip6.int"		{ type master; file "/etc/namedb/master/empty.db"; };

// NB: Do not use the IP addresses below, they are faked, and only
// serve demonstration/documentation purposes!
//
// Example slave zone config entries.  It can be convenient to become
// a slave at least for the zone your own domain is in.  Ask
// your network administrator for the IP address of the responsible
// master name server.
//
// Do not forget to include the reverse lookup zone!
// This is named after the first bytes of the IP address, in reverse
// order, with ".IN-ADDR.ARPA" appended, or ".IP6.ARPA" for IPv6.
//
// Before starting to set up a master zone, make sure you fully
// understand how DNS and BIND work.  There are sometimes
// non-obvious pitfalls.  Setting up a slave zone is usually simpler.
//
// NB: Don't blindly enable the examples below. :-)  Use actual names
// and addresses instead.

/* An example dynamic zone
key "exampleorgkey" {
	algorithm hmac-md5;
	secret "sf87HJqjkqh8ac87a02lla==";
};
zone "example.org" {
	type master;
	allow-update {
		key "exampleorgkey";
	};
	file "/etc/namedb/dynamic/example.org";
};
*/

/* Example of a slave reverse zone
zone "1.168.192.in-addr.arpa" {
	type slave;
	file "/etc/namedb/slave/1.168.192.in-addr.arpa";
	masters {
		192.168.1.1;
	};
};
*/

2) resolv.conf

Code:
# Generated by resolvconf
nameserver 8.8.4.4
nameserver 8.8.8.8
nameserver 127.0.0.1

3) rc.conf

Code:
  1 hostname="wangxs_laptop"
  2 keymap="us.iso.kbd"
  3 ifconfig_msk0="DHCP"
  4 ifconfig_msk0_ipv6="inet6 accept_rtadv"
  5 sshd_enable="YES"
  6 powerd_enable="YES"
  7 # Set dumpdev to "AUTO" to enable crash dumps, "NO" to disable
  8 #dumpdev="AUTO"
  9 dumpdev="NO"
 10 hald_enable="YES"
 11 dbus_enable="YES"
 12 #wlans_iwn0="wlan0"
 13 #ifconfig_wlan0="WPA DHCP"
 14 cupsd_enable="YES"
 15 samba_enable="YES"
 16 #gdm_enable="YES"
 17 linux_enable="YES"
 18 sendmail_enable="NONE"
 19 fusefs_enable="YES"
 20 webcamd_enable="YES"
 21 devd_enable="YES"
 22 devfs_system_ruleset="system"
 
Re: Portsnap fetch failed too

If you make named use only the google resolvers in named.conf
Like this:
Code:
   forwarders {
                8.8.4.4;
                8.8.8.8;
   };
Does it work better?
 
Re: Portsnap fetch failed too

wangzhouang said:
1) named.conf
Code:
	forwarders {
                127.0.0.1;
                8.8.4.4;
                8.8.8.8;
	};
127.0.0.1 is never going to work here. You're basically telling BIND to forward requests back to itself.
 
Re: Portsnap fetch failed too

And if you want to run that local name server that will be using that named.conf, you will need to add
Code:
named_enable=YES
to rc.conf
 
Re: Portsnap fetch failed too

I deleted 127.0.0.1 in /etc/resolv.conf and named.conf. It does not work. I can do dig +trace portsnap.freebsd.org, and get reasonable result as before.

Code:
; <<>> DiG 9.8.3-P4 <<>> +trace portsnap.freebsd.org
;; global options: +cmd
.			13745	IN	NS	k.root-servers.net.
.			13745	IN	NS	b.root-servers.net.
.			13745	IN	NS	j.root-servers.net.
.			13745	IN	NS	a.root-servers.net.
.			13745	IN	NS	h.root-servers.net.
.			13745	IN	NS	m.root-servers.net.
.			13745	IN	NS	i.root-servers.net.
.			13745	IN	NS	c.root-servers.net.
.			13745	IN	NS	l.root-servers.net.
.			13745	IN	NS	d.root-servers.net.
.			13745	IN	NS	g.root-servers.net.
.			13745	IN	NS	f.root-servers.net.
.			13745	IN	NS	e.root-servers.net.
;; Received 228 bytes from 8.8.8.8#53(8.8.8.8) in 913 ms

org.			172800	IN	NS	a0.org.afilias-nst.info.
org.			172800	IN	NS	a2.org.afilias-nst.info.
org.			172800	IN	NS	b0.org.afilias-nst.org.
org.			172800	IN	NS	b2.org.afilias-nst.org.
org.			172800	IN	NS	c0.org.afilias-nst.info.
org.			172800	IN	NS	d0.org.afilias-nst.org.
;; Received 440 bytes from 128.63.2.53#53(128.63.2.53) in 1051 ms

freebsd.org.		86400	IN	NS	ns2.isc-sns.com.
freebsd.org.		86400	IN	NS	ns1.isc-sns.net.
freebsd.org.		86400	IN	NS	ns3.isc-sns.info.
;; Received 126 bytes from 199.19.54.1#53(199.19.54.1) in 750 ms

portsnap.freebsd.org.	3600	IN	NS	ns-836.awsdns-40.net.
portsnap.freebsd.org.	3600	IN	NS	ns-1954.awsdns-52.co.uk.
portsnap.freebsd.org.	3600	IN	NS	ns-20.awsdns-02.com.
portsnap.freebsd.org.	3600	IN	NS	ns-1184.awsdns-20.org.
;; Received 174 bytes from 38.103.2.1#53(38.103.2.1) in 396 ms

portsnap.freebsd.org.	300	IN	A	54.252.93.148
portsnap.freebsd.org.	172800	IN	NS	ns-1184.awsdns-20.org.
portsnap.freebsd.org.	172800	IN	NS	ns-1954.awsdns-52.co.uk.
portsnap.freebsd.org.	172800	IN	NS	ns-20.awsdns-02.com.
portsnap.freebsd.org.	172800	IN	NS	ns-836.awsdns-40.net.
;; Received 190 bytes from 205.251.192.20#53(205.251.192.20) in 138 ms
portsnap fetch failed.
Code:
Looking up portsnap.FreeBSD.org mirrors... 7 mirrors found.
Fetching snapshot tag from ec2-ap-northeast-1.portsnap.freebsd.org... failed.
Fetching snapshot tag from ec2-ap-southeast-2.portsnap.freebsd.org... failed.
Fetching snapshot tag from isc.portsnap.freebsd.org... failed.
Fetching snapshot tag from sourcefire.portsnap.freebsd.org... failed.
Fetching snapshot tag from your-org.portsnap.freebsd.org... failed.
Fetching snapshot tag from ec2-eu-west-1.portsnap.freebsd.org... failed.
Fetching snapshot tag from ec2-sa-east-1.portsnap.freebsd.org... failed.
No mirrors remaining, giving up.

It seems fetch is not allowed, when I fetch fetch [url=http://www.smh.com.au/index.html]http://www.smh.com.au/index.html[/url]
Code:
fetch: http://www.smh.com.au/index.html: Connection refused
.

By the way, It really worked one time。 To figure out the reason, I made some changes in the resolv.conf, named.conf, rc.conf, and /etc/hosts).

Unfortunately, sometimes it works, sometimes failed, but finally It failed.

-----hosts & resolv.conf & named.conf -----------------
Code:
# $FreeBSD: release/9.1.0/etc/hosts 109997 2003-01-28 21:29:23Z dbaker $
#
# Host Database
#
# This file should contain the addresses and aliases for local hosts that
# share this file.  Replace 'my.domain' below with the domainname of your
# machine.
#
# In the presence of the domain name service or NIS, this file may
# not be consulted at all; see /etc/nsswitch.conf for the resolution order.
#
#
::1                     localhost localhost.my.domain
127.0.0.1               localhost localhost.my.domain
#
# Imaginary network.
#10.0.0.2               myname.my.domain myname
#10.0.0.3               myfriend.my.domain myfriend
#
# According to RFC 1918, you can use the following IP networks for
# private nets which will never be connected to the Internet:
#
#       10.0.0.0        -   10.255.255.255
#       172.16.0.0      -   172.31.255.255
#       192.168.0.0     -   192.168.255.255
#
# In case you want to be able to connect to the Internet, you need
# real official assigned numbers.  Do not try to invent your own network
# numbers but instead get one from your network provider (if any) or
# from your regional registry (ARIN, APNIC, LACNIC, RIPE NCC, or AfriNIC.)
#
~
Code:
# Generated by resolvconf
nameserver 8.8.8.8
nameserver 8.8.4.4

Code:
// $FreeBSD: release/9.1.0/etc/namedb/named.conf 224125 2011-07-17 06:20:47Z dougb $
//
// Refer to the named.conf(5) and named(8) man pages, and the documentation
// in /usr/share/doc/bind9 for more details.
//
// If you are going to set up an authoritative server, make sure you
// understand the hairy details of how DNS works.  Even with
// simple mistakes, you can break connectivity for affected parties,
// or cause huge amounts of useless Internet traffic.

options {
	// All file and path names are relative to the chroot directory,
	// if any, and should be fully qualified.
	directory	"/etc/namedb/working";
	pid-file	"/var/run/named/pid";
	dump-file	"/var/dump/named_dump.db";
	statistics-file	"/var/stats/named.stats";

// If named is being used only as a local resolver, this is a safe default.
// For named to be accessible to the network, comment this option, specify
// the proper IP address, or delete this option.
//	listen-on	{ 127.0.0.1; };

// If you have IPv6 enabled on this system, uncomment this option for
// use as a local resolver.  To give access to the network, specify
// an IPv6 address, or the keyword "any".
//        listen-on-v6	{ ::1; };

// These zones are already covered by the empty zones listed below.
// If you remove the related empty zones below, comment these lines out.
	disable-empty-zone "255.255.255.255.IN-ADDR.ARPA";
	disable-empty-zone "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";
	disable-empty-zone "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";

// If you've got a DNS server around at your upstream provider, enter
// its IP address here, and enable the line below.  This will make you
// benefit from its cache, thus reduce overall DNS traffic in the Internet.

	forwarders {
                8.8.8.8;
                8.8.4.4;
	};

// If the 'forwarders' clause is not empty the default is to 'forward first'
// which will fall back to sending a query from your local server if the name
// servers in 'forwarders' do not have the answer.  Alternatively you can
// force your name server to never initiate queries of its own by enabling the
// following line:
//	forward only;

// If you wish to have forwarding configured automatically based on
// the entries in /etc/resolv.conf, uncomment the following line and
// set named_auto_forward=yes in /etc/rc.conf.  You can also enable
// named_auto_forward_only (the effect of which is described above).
//	include "/etc/namedb/auto_forward.conf";

	/*
	   Modern versions of BIND use a random UDP port for each outgoing
	   query by default in order to dramatically reduce the possibility
	   of cache poisoning.  All users are strongly encouraged to utilize
	   this feature, and to configure their firewalls to accommodate it.

	   AS A LAST RESORT in order to get around a restrictive firewall
	   policy you can try enabling the option below.  Use of this option
	   will significantly reduce your ability to withstand cache poisoning
	   attacks, and should be avoided if at all possible.

	   Replace NNNNN in the example with a number between 49160 and 65530.
	*/
	// query-source address * port NNNNN;
};

// If you enable a local name server, don't forget to enter 127.0.0.1
// first in your /etc/resolv.conf so this server will be queried.
// Also, make sure to enable it in /etc/rc.conf.

// The traditional root hints mechanism. Use this, OR the slave zones below.
zone "." { type hint; file "/etc/namedb/named.root"; };

/*	Slaving the following zones from the root name servers has some
	significant advantages:
	1. Faster local resolution for your users
	2. No spurious traffic will be sent from your network to the roots
	3. Greater resilience to any potential root server failure/DDoS

	On the other hand, this method requires more monitoring than the
	hints file to be sure that an unexpected failure mode has not
	incapacitated your server.  Name servers that are serving a lot
	of clients will benefit more from this approach than individual
	hosts.  Use with caution.

	To use this mechanism, uncomment the entries below, and comment
	the hint zone above.

	As documented at http://dns.icann.org/services/axfr/ these zones:
	"." (the root), ARPA, IN-ADDR.ARPA, IP6.ARPA, and ROOT-SERVERS.NET
	are availble for AXFR from these servers on IPv4 and IPv6:
	xfr.lax.dns.icann.org, xfr.cjr.dns.icann.org
*/
/*
zone "." {
	type slave;
	file "/etc/namedb/slave/root.slave";
	masters {
		192.5.5.241;	// F.ROOT-SERVERS.NET.
	};
	notify no;
};
zone "arpa" {
	type slave;
	file "/etc/namedb/slave/arpa.slave";
	masters {
		192.5.5.241;	// F.ROOT-SERVERS.NET.
	};
	notify no;
};
*/

/*	Serving the following zones locally will prevent any queries
	for these zones leaving your network and going to the root
	name servers.  This has two significant advantages:
	1. Faster local resolution for your users
	2. No spurious traffic will be sent from your network to the roots
*/
// RFCs 1912, 5735 and 6303 (and BCP 32 for localhost)
zone "localhost"	{ type master; file "/etc/namedb/master/localhost-forward.db"; };
zone "127.in-addr.arpa"	{ type master; file "/etc/namedb/master/localhost-reverse.db"; };
zone "255.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// RFC 1912-style zone for IPv6 localhost address (RFC 6303)
zone "0.ip6.arpa"	{ type master; file "/etc/namedb/master/localhost-reverse.db"; };

// "This" Network (RFCs 1912, 5735 and 6303)
zone "0.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// Private Use Networks (RFCs 1918, 5735 and 6303)
zone "10.in-addr.arpa"	   { type master; file "/etc/namedb/master/empty.db"; };
zone "16.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "17.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "18.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "19.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "20.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "21.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "22.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "23.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "24.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "25.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "26.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "27.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "28.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "29.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "30.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "31.172.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "168.192.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };

// Link-local/APIPA (RFCs 3927, 5735 and 6303)
zone "254.169.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };

// IETF protocol assignments (RFCs 5735 and 5736)
zone "0.0.192.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };

// TEST-NET-[1-3] for Documentation (RFCs 5735, 5737 and 6303)
zone "2.0.192.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "100.51.198.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "113.0.203.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };

// IPv6 Example Range for Documentation (RFCs 3849 and 6303)
zone "8.b.d.0.1.0.0.2.ip6.arpa" { type master; file "/etc/namedb/master/empty.db"; };

// Domain Names for Documentation and Testing (BCP 32)
zone "test" { type master; file "/etc/namedb/master/empty.db"; };
zone "example" { type master; file "/etc/namedb/master/empty.db"; };
zone "invalid" { type master; file "/etc/namedb/master/empty.db"; };
zone "example.com" { type master; file "/etc/namedb/master/empty.db"; };
zone "example.net" { type master; file "/etc/namedb/master/empty.db"; };
zone "example.org" { type master; file "/etc/namedb/master/empty.db"; };

// Router Benchmark Testing (RFCs 2544 and 5735)
zone "18.198.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };
zone "19.198.in-addr.arpa" { type master; file "/etc/namedb/master/empty.db"; };

// IANA Reserved - Old Class E Space (RFC 5735)
zone "240.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "241.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "242.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "243.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "244.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "245.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "246.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "247.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "248.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "249.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "250.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "251.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "252.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "253.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "254.in-addr.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// IPv6 Unassigned Addresses (RFC 4291)
zone "1.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "3.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "4.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "5.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "6.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "7.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "8.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "9.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "a.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "b.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "c.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "d.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "e.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "0.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "1.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "2.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "3.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "4.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "5.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "6.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "7.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "8.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "9.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "a.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "b.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "0.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "1.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "2.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "3.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "4.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "5.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "6.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "7.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// IPv6 ULA (RFCs 4193 and 6303)
zone "c.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "d.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// IPv6 Link Local (RFCs 4291 and 6303)
zone "8.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "9.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "a.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "b.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// IPv6 Deprecated Site-Local Addresses (RFCs 3879 and 6303)
zone "c.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "d.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "e.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };
zone "f.e.f.ip6.arpa"	{ type master; file "/etc/namedb/master/empty.db"; };

// IP6.INT is Deprecated (RFC 4159)
zone "ip6.int"		{ type master; file "/etc/namedb/master/empty.db"; };

// NB: Do not use the IP addresses below, they are faked, and only
// serve demonstration/documentation purposes!
//
// Example slave zone config entries.  It can be convenient to become
// a slave at least for the zone your own domain is in.  Ask
// your network administrator for the IP address of the responsible
// master name server.
//
// Do not forget to include the reverse lookup zone!
// This is named after the first bytes of the IP address, in reverse
// order, with ".IN-ADDR.ARPA" appended, or ".IP6.ARPA" for IPv6.
//
// Before starting to set up a master zone, make sure you fully
// understand how DNS and BIND work.  There are sometimes
// non-obvious pitfalls.  Setting up a slave zone is usually simpler.
//
// NB: Don't blindly enable the examples below. :-)  Use actual names
// and addresses instead.

/* An example dynamic zone
key "exampleorgkey" {
	algorithm hmac-md5;
	secret "sf87HJqjkqh8ac87a02lla==";
};
zone "example.org" {
	type master;
	allow-update {
		key "exampleorgkey";
	};
	file "/etc/namedb/dynamic/example.org";
};
*/

/* Example of a slave reverse zone
zone "1.168.192.in-addr.arpa" {
	type slave;
	file "/etc/namedb/slave/1.168.192.in-addr.arpa";
	masters {
		192.168.1.1;
	};
};
*/
 
Re: Portsnap fetch failed too

It is so wired, when I do "make install", it work for one time.
Code:
root@wangxs_laptop:/usr/ports/security/nss # make install clean
=> nss-3.15.2.tar.gz doesn't seem to exist in /usr/ports/distfiles/.
=> Attempting to fetch https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_15_2_RTM/src/nss-3.15.2.tar.gz
nss-3.15.2.tar.gz                             100% of 6141 kB  857 kBps
===> Fetching all distfiles required by nss-3.15.2 for building
===>  Extracting for nss-3.15.2
=> SHA256 Checksum OK for nss-3.15.2.tar.gz.
===>  Patching for nss-3.15.2
===>  Applying FreeBSD patches for nss-3.15.2
/usr/bin/find /usr/ports/security/nss/work/nss-3.15.2/nss/tests -name '*.sh' | /usr/bin/xargs /usr/bin/grep -l -F '/bin/bash' |  /usr/bin/xargs /usr/bin/sed -i.bak -e 's|#! */bin/bash|#!/bin/sh|'
===>   nss-3.15.2 depends on executable: zip - found
===>   nss-3.15.2 depends on package: nspr>=4.10 - found
===>   nss-3.15.2 depends on package: sqlite3>=3.7.15 - not found
===>   Found sqlite3-3.7.14.1, but you need to upgrade to sqlite3>=3.7.15.
*** [build-depends] Error code 1

Stop in /usr/ports/security/nss.
When I tried this command
[coderoot@wangxs_laptop:/usr/ports/security/nss # cd ../../databases/sqlite3 && make install clean
][/code]
The "Connection refused" appeared.
Code:
  ┌────────────────────────── sqlite3-3.8.0.2 ─────────────────────────────┐
  │ ┌────────────────────────────────────────────────────────────────────┐ │  
  │ │ [ ] DIRECT_READ    File is read directly from disk                 │ │  
  │ │ [x] EXTENSION      Allow loadable extensions                       │ │  
  │ │ [x] FTS3           Enable FTS3/4 (Full Text Search) module         │ │  
  │ │ [ ] ICU            Enable built with ICU                           │ │  
  │ │ [ ] MEMMAN         Allows it to release unused memory              │ │  
  │ │ [x] METADATA       Enable column metadata                          │ │  
  │ │ [ ] RAMTABLE       Store temporary tables in RAM =                 │ │  
  │ │ [ ] RTREE          Enable R*Tree module ()                         │ │  
  │ │ [x] SECURE_DELETE  Overwrite deleted information with zeros        │ │  
  │ │ [ ] SOUNDEX        Enables the soundex() SQL function              │ │  
  │ │ [ ] STAT3          Help SQLite to chose a better query plan        │ │  
  │ │ [x] THREADSAFE     Build thread-safe library                       │ │  
  │ │ [x] UNLOCK_NOTIFY  Enable notification on unlocking                │ │  
  │ │ [ ] UPD_DEL_LIMIT  ORDER BY and LIMIT on UPDATE and DELETE         │ │  
  │ └─────↓(+)───────────────────────────────────────────────────87%─────┘ │  
  ├────────────────────────────────────────────────────────────────────────┤  
  │                     <  OK  >           <Cancel>                        │  
  └────────────────────────────────────────────────────────────────────────┘  
                                                                              


===>  License public accepted by the user
===>  Found saved configuration for sqlite3-3.8.0.2
=> sqlite-autoconf-3080002.tar.gz doesn't seem to exist in /usr/ports/distfiles/.
=> Attempting to fetch http://www.sqlite.org/2013/sqlite-autoconf-3080002.tar.gz
fetch: http://www.sqlite.org/2013/sqlite-autoconf-3080002.tar.gz: Connection refused
=> Attempting to fetch http://www2.sqlite.org/2013/sqlite-autoconf-3080002.tar.gz
fetch: http://www2.sqlite.org/2013/sqlite-autoconf-3080002.tar.gz: Connection refused
=> Attempting to fetch http://www3.sqlite.org/2013/sqlite-autoconf-3080002.tar.gz
fetch: http://www3.sqlite.org/2013/sqlite-autoconf-3080002.tar.gz: Connection refused
=> Attempting to fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/sqlite-autoconf-3080002.tar.gz
fetch: ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/sqlite-autoconf-3080002.tar.gz: Connection refused
=> Couldn't fetch it - please try to retrieve this
=> port manually into /usr/ports/distfiles/ and try again.
*** [do-fetch] Error code 1

Stop in /usr/ports/databases/sqlite3.
*** [install] Error code 1

Stop in /usr/ports/databases/sqlite3.
I do nothing about the net, whereas now it doesnot work again!!


Code:
 make install clean
===>   thunderbird-24.1.0 depends on package: nspr>=4.10 - found
===>   thunderbird-24.1.0 depends on package: nss>=3.15 - not found
===>    Verifying install for nss>=3.15 in /usr/ports/security/nss
===>   nss-3.15.2 depends on executable: zip - found
===>   nss-3.15.2 depends on package: nspr>=4.10 - found
===>   nss-3.15.2 depends on package: sqlite3>=3.7.15 - not found
===>    Verifying install for sqlite3>=3.7.15 in /usr/ports/databases/sqlite3
===>  License public accepted by the user
===>  Found saved configuration for sqlite3-3.8.0.2
=> sqlite-autoconf-3080002.tar.gz doesn't seem to exist in /usr/ports/distfiles/.
=> Attempting to fetch http://www.sqlite.org/2013/sqlite-autoconf-3080002.tar.gz
fetch: http://www.sqlite.org/2013/sqlite-autoconf-3080002.tar.gz: Connection refused
=> Attempting to fetch http://www2.sqlite.org/2013/sqlite-autoconf-3080002.tar.gz
fetch: http://www2.sqlite.org/2013/sqlite-autoconf-3080002.tar.gz: Connection refused
=> Attempting to fetch http://www3.sqlite.org/2013/sqlite-autoconf-3080002.tar.gz
fetch: http://www3.sqlite.org/2013/sqlite-autoconf-3080002.tar.gz: Connection refused
=> Attempting to fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/sqlite-autoconf-3080002.tar.gz
fetch: ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/sqlite-autoconf-3080002.tar.gz: Connection refused
=> Couldn't fetch it - please try to retrieve this
=> port manually into /usr/ports/distfiles/ and try again.
*** [do-fetch] Error code 1

Stop in /usr/ports/databases/sqlite3.
*** [install] Error code 1

Stop in /usr/ports/databases/sqlite3.
*** [build-depends] Error code 1

Stop in /usr/ports/security/nss.
*** [build-depends] Error code 1

Stop in /usr/ports/mail/thunderbird.
*** [install] Error code 1

Stop in /usr/ports/mail/thunderbird.
root@wangxs_laptop:/usr/ports/mail/thunderbird #
 
Re: Portsnap fetch failed too

Finally, it works. The reason is the http_proxy I set in "profile" before I move here in Austrilia.
After I delete it, everything becomes normal.
Thank you for all!
How to change the status? Please help!
 
Re: Portsnap fetch failed too

Edit your first post and then change the topic. Just add something like [solved] or such in front of it.
 
Back
Top