• Can't add entries to Domain Overrides under DNS Forwarder

    7
    0 Votes
    7 Posts
    830 Views
    S
    @dlreid Well with that error you may not be able to upgrade either. You might try https://docs.netgate.com/pfsense/en/latest/troubleshooting/upgrades.html#rewrite-repository-information. But that topic may be a separate thread. :)
  • DNS Resolver starts rejecting requests over IPv6 after a couple of weeks

    4
    0 Votes
    4 Posts
    600 Views
    J
    @Gertjan said in DNS Resolver starts rejecting requests over IPv6 after a couple of weeks: What version ? 2.7.2 When the issue happens, was unbound listening on IPv6 LAN interfaces ? Yes, I can confirm it was listening because the query is explicitly rejected, not timed-out. [25.03-BETA][root@pfSense.bhf.tld]/root: sockstat -6 | grep ":53" unbound unbound 53479 3 udp6 *:53 : unbound unbound 53479 4 tcp6 *:53 : means "all exiting interfaces", for TCP and UDP. I recently restarted it because the problem recurred, next time it happens I will run tcpdump and upload a capture of the transaction(s). When you raise the resolver (unbound) log setting to 'very verbose', can you see the IPv6 request arriving @unbound ? Don't forget to set the log setting back, as it produces a lot of info. Next time it happens I'll also do this.
  • KEA DHCP Client ID

    1
    0 Votes
    1 Posts
    335 Views
    No one has replied
  • 0 Votes
    8 Posts
    1k Views
    S
    @ChrisJenk Hmm, I have: [image: 1748888778169-c06f7223-67d7-46cb-ad56-915fdb1fe82b-image.png] and [image: 1748888797563-f9bd11e6-ab0c-48d9-8f27-57acbfc3d64f-image.png] and see an active lease: [image: 1748888860742-1a3af71f-5ca6-4a00-882f-fbb8b7315889-image.png]
  • How to Pass Kea DHCP Hostnames/Descriptions into Pihole??

    21
    0 Votes
    21 Posts
    2k Views
    B
    @johnpoz hmm ok i thought i was done but maybe not. I have a bunch of smart bulbs. ive gone through and renamed them [ Services -> DHCP Server -> LAN] [image: 1748887094356-98966f2f-72e1-4ccc-bea6-85d2eddbdca9-image.png] but they still come through to pihole with their default names: [image: 1748887043486-4f474660-139b-4a4b-ab80-cec37f44af2e-image.png] How do i get pihole to pickup (pfsense to broadcast?) the hostname/description ive assigned it? EDIT: disregard, turns out it was a simple as giving it a few min to update
  • LAN interface and DHCP issues, phone it taking the LAN IP.

    22
    0 Votes
    22 Posts
    2k Views
    canadianllamaC
    @johnpoz Yes we have them as static DHCP reservation on the router. But I removed them from that when we tried to fix this issue. All the devices (WAPs and network switches) went to the IP of 192.168.1.20... every single one of them. (We could see that on the cloud key, so we still had cloud key access somehow, but basically the entire network went down and just stopped working). We can try set the cloudkey IP static on the device, ill look into doing that. Im assuming the unifi devices talk to the router first to get their IP's, then talk to the cloudkey for other stuff, as you can run the equipment without the cloudkey. We are setting up a test lab today so hopefully can figure it out.
  • DNS - Bind Redirect Error - Rebinding settings

    3
    0 Votes
    3 Posts
    442 Views
    penguinpagesP
    @tinfoilmatt Thanks for response but no. The issue is that pfsense was redirecting URLs and proxing them to some form of page it managed vs resolving the hostname provided and redirecting what is a CNAME in the public cloud as a form of resolution for "internet" sessions (such as ACME validation) but also an intranet IP/host. Within a SOA zone it manages Ex: Intranet test correct: dig +short traefik.core.acme.net shuffleboard01.core.acme.net 172.16.100.120 172.16.100.120 curl -k https://shuffleboard01.core.acme.net/index.html <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>Shuffleboard Game</title> Internet test dig +short traefik.core.acme.net shuffleboard01.core.acme.net penguinpages.net. 18.234.137.234 penguinpages.net. 18.234.137.234 curl -k https://shuffleboard01.core.acme.net/index.html <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>Shuffleboard Game</title> What I am stuggling with now is that along the way I was root causing acme HTTP-01 Cert setup with letsencrypt, and the current "fix" is to disable my enhanced firewalling "pfBlockerNG" [image: 1748865415665-c32d5c46-3018-4a6d-80a7-4aec67f1c313-image.png] but this is not sustainable. And I need to figure out means to ??? Whitelist" any letsencypt server, world wide. Then I assume I will have to return back to this URL redirect issue.
  • 0 Votes
    4 Posts
    524 Views
    GertjanG
    @smk Read "Kea DHCPv6 Static Mapping issues" : same thing ?
  • How do I wildcard forward a subdomain to HAProxy?

    5
    0 Votes
    5 Posts
    612 Views
    A
    @viragomann I didn't even think of checking the browser's debug mode. It does look like the host header is being attached actually. But for some reason HAProxy isn't picking up on it. I do have HAProxy redirecting HTTPS to HTTPS, and it seems like that might be where the problem is. I disable that and just use HTTP, and it works. I do want to stick to HTTPS though. This does work for host overrides, but not DNS redirects. I have HAProxy listening on 80, with the action "http-request redirect scheme https code 301 !{ssl_fc}". Then I have an HTTPS frontend listening on 443. I also have a certificate for the wildcard subdomain. This has always worked in the past with host overrides. But now it won't with domain redirects, and I'm not sure why
  • Adguard Home can't connect to Unbound after upgrade to pfSense 2.8.0

    15
    0 Votes
    15 Posts
    2k Views
    B
    I believe I've found the issue causing the weird behavior. In looking at the MAC addresses captured, I can see that the "wrong" address is 02:42:0a:08:08:02 When using macvlan, the MAC always defaults to matching the specified IP address, but the incorrect address above doesn't. So I then took a look at the lease table and saw this: [image: 1748792919895-screenshot-2025-06-01-at-11.13.53-am.png] Hmm... That's not right. But it's the same wrong number. Looks like it's ignored in 2.7.2 and not ignored in 2.8.0 I made an edit to the reservation, put the correct 0A in there and... Look at that, MAC comes up to match in 2.8.0 and replies start working. SonofA.... Now I can probably get going on the meat of this update (for me), migrating from ISC to KEA and the new if_pppoe.
  • Dashboard difference on DNS servers between pfS 2.8.0 and 2.7.2

    3
    0 Votes
    3 Posts
    454 Views
    QinnQ
    Thanks for clearing that one out, never came up to think of ipv6 localhost!
  • BIND /DHCP Server with TSIG Signature

    2
    0 Votes
    2 Posts
    307 Views
    penguinpagesP
    @penguinpages i poked around a bit and tried to figure this out. still not clear at all what to do to enable TSIG for DNS and then enable local subnets to update DDNS and DHCP also to make updates. So far I think I have tried a few dozen ways to change.. and if you don't use GUI.. any GUI change just overwrites. So here is what I have so far Step 6: BIND DNS Create TSIG vi command line [2.7.2-RELEASE][admin@rt1.core.penguinpages.net]/root: tsig-keygen -a hmac-sha256 ddns-update key "ddns-update" { algorithm hmac-sha256; secret "wn6G9qxOZhDpfn+SUUeEX<snip>k51Tc="; }; Copy output stanza and paste in : service -> bind -> Settings -> advanced -> Custom Options: <paste key standza in box> Validate service restarted Now check if DDNS update via remote host will work export BIND_SERVER=172.16.100.1 export CERTBOT_DOMAIN=shuffleboard01.core.acme.net export CERTBOT_TOKEN="example-token-12345" # Replace with actual Certbot token echo 'key "ddns-update" { algorithm hmac-sha256; secret "wn6G9qxOZhDpfn+SUUeEX<snip>k51Tc="; };' > /tmp/ddns-update.key chmod 600 /tmp/ddns-update.key nsupdate -k /tmp/ddns-update.key <<EOF server $BIND_SERVER zone $CERTBOT_DOMAIN update add _acme-challenge.$CERTBOT_DOMAIN 300 IN TXT "$CERTBOT_TOKEN" send EOF update failed: NOTAUTH Baseline that use to work before update TSIG then after.. I can do updates and not pass key so.. meh.. its not working nsupdate <<EOF server 172.16.100.1 zone core.acme.net update add _acme-challenge.shuffleboard01.core.acme.net. 300 IN TXT 12345 send EOF dig -t TXT _acme-challenge.shuffleboard01.core.acme.net. @172.16.100.1 nsupdate -k ddns-update.key <<EOF server 172.16.100.1 zone core.acme.net update add _acme-challenge.shuffleboard01.core.acme.net. 300 IN TXT 12221 send EOF dig -t TXT _acme-challenge.shuffleboard01.core.acme.net. @172.16.100.1 <snip> _acme-challenge.shuffleboard01.core.acme.net. 300 IN TXT "12221" _acme-challenge.shuffleboard01.core.acme.net. 300 IN TXT "111111" _acme-challenge.shuffleboard01.core.acme.net. 300 IN TXT "43441" _acme-challenge.shuffleboard01.core.acme.net. 300 IN TXT "12345" so that TSIG stanza posted in Advanced -> Global Settings. Is being ignored.
  • Question about DHCPv6 Static Mappings

    9
    0 Votes
    9 Posts
    881 Views
    B
    @Gertjan Thanks for the suggestion, but I unfortunately have no way to try this right now because I'm running CE 2.7.2. I see it's also in CE 2.8.0, but my test system running that version is virtual, so I won't be able to try it until I upgrade my main system to 2.8.0, which won't be until it gets released.
  • 0 Votes
    2 Posts
    345 Views
    GertjanG
    @lef Check if unbound is listening on 127.0.0.1 (and ::1) etc : [25.03-BETA][root@pfSense.bhf.tld]/root: sockstat | grep 'unbound' unbound unbound 45089 3 udp6 *:53 *:* unbound unbound 45089 4 tcp6 *:53 *:* unbound unbound 45089 5 udp4 *:53 *:* unbound unbound 45089 6 tcp4 *:53 *:* ..... This means : unbound listens on all activated interfaces, this includes the two "localhost". This is the default unbound (resolver behavior) : [image: 1748255802423-72425bdd-a09d-49ab-9e33-aadf1514ba9a-image.png] And, sorry, have to ask : firewall rules aren't blocking DNS traffic ? ^^
  • Kea DHCP4 lease file cleanup failed and crashed pfSense

    3
    0 Votes
    3 Posts
    423 Views
    T
    The 600 sec came from an ISP DHCP server. After I studied logs and SIEM events it turned out that the crash was caused by some sort of DDoS. Just before the crash occurred, there were plenty of blocked ingress WAN packets coming from multiple malicious or suspective IP-adddresses as tagged by Virustotal. So, eventually this might have been a "normal DDoS" and not a pfSense software problem.
  • 0 Votes
    1 Posts
    195 Views
    No one has replied
  • 0 Votes
    2 Posts
    309 Views
    V
    @ajperson1927 Are your locations not separated clearly in the public DNS? Just to start, I'm trying to get firstlocation.example.com working within the first location. I have created a domain override in the DNS resolver. A domain override means, that DNS request for firstlocation.example.com are forwarded to the stated IP address. You will need to create host overrides for this.
  • 0 Votes
    9 Posts
    4k Views
    R
    I had the same issue, several of my device went poof with their static IP and when I see the DHCP logs this what shows me. WARN [kea-dhcp4.alloc-engine.0x3088dc017b00] ALLOC_ENGINE_V4_DISCOVER_ADDRESS_CONFLICT [hwtype=1 xx:xx:xx:xx:xx:xx], cid=[ff:3e:43:3a:49:00:02:00:00:ab:11:35:39:77:96:62:6d:b5:73], tid=0x98a5560c: conflicting reservation for address 172.16.0.4 with existing lease Address: 172.16.0.4 Valid life: 7200 Cltt: 1747537583 Hardware addr: xx:xx:xx:xx:xx:xx Client id: ff:3e:43:3a:49:00:02:00:00:ab:11:37:60:a1:7d:6d:07:47:d8 Subnet ID: 1 Pool ID: 0 State: default Relay ID: (none) Remote ID: (none) Yeah that assigned it a different IP address for a reason that it had conflicting IP address. went back the ISC because of this. I hope the upcoming 2.8 have a fix for this.
  • Strange DNS issue for internal clients...

    14
    0 Votes
    14 Posts
    1k Views
    johnpozJ
    @ericwentz and the dhcp lease time has zero to do with a dns ttl on a record.. The default is 7200 seconds, or 2 hours. Which per the rfc Gertjan pointed out the registration of that in dns should be like 1/3 of the lease and not shorter than 10 minutes.. My issue is what you showed in the log of kea was it was writing a record with a ttl of 5 minutes - which to be honest on a local network is insanely low.. Make zero sense to me and clearly not following the rfc.
  • Correct DNS Configuration (OpenVPN issue)

    1
    0 Votes
    1 Posts
    188 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.