• 0 Votes
    2 Posts
    593 Views
    R

    Solved! I found another thread discussing this problem, and the original poster tracked it down to a virtual IP that was on the wrong interface. Sure enough, I had a virtual IP on the LAN interface pointing to an address on the DMZ interface.

    How bizarre!

  • Accessing a site - DNS flush

    2
    0 Votes
    2 Posts
    311 Views
    S

    @jlee_eye link.nyulangone.org has a 30 second TTL so any DNS problems can break/resolve every few seconds.

    If you try nslookup does that work during an "outage"?

    nslookup link.nyulangone.org your_pfsense_ip

    Are your PCs using pfSense for DNS?

    It's also very possible your browser is using DNS over HTTPS and not using pfSense for DNS at all. Many default to that nowadays.

  • 0 Votes
    1 Posts
    414 Views
    No one has replied
  • pfSense sending out rdnss advertisement when not DHCP server...why?

    4
    0 Votes
    4 Posts
    513 Views
    D

    @jknott Hi, yes, LAN is dual stacked. I just want all clients to get an IPv4 DNS address and no IPv6 address as I am using PiHole and DNS requests made via IPv6 make it difficult to identify clients. I have switched off "Provide DNS configuration via radvd" and that has solved the problem.

  • No DNS Unless Set In DHCP

    5
    0 Votes
    5 Posts
    890 Views
    J

    @johnpoz I'm going to sound like I'm losing my mind. Had to run some errands for a few hours. I removed the DNS entry from the DHCP config a bit ago to run the tests you suggested and now they work just fine.
    I have no explanation... I'm speechless.
    Thank you for your time troubleshooting with me.

  • ISP went down and now dhcp doesn’t seem to work.

    13
    0 Votes
    13 Posts
    1k Views
    johnpozJ

    @rh128 that is good news! yeah not good idea to just pull the power plug on pfsense. You running ZFS - that is suppose to be better than UFS..

  • OpenDnS not working

    25
    0 Votes
    25 Posts
    11k Views
    Cloudless Smart HomeC

    this helped me, the last few entries, but here is what fixed it for me in
    2023...

    Services > DNS Resolver > Advanced Settings > Left it checked
    Services > DNS Resolver > Check DNS Query Forwarding

    seems like I am using OpenDNS, like I wanted, but still able to use my dns resolver so I can do host overrides and anything else I want to do in DNS.

  • DNS Resolver / General settings | Unable to save changes

    7
    0 Votes
    7 Posts
    968 Views
    S

    @ic_attila said in DNS Resolver / General settings | Unable to save changes:

    jostle-timeout: 200
    infra-keep-probing: yes
    infra-host-ttl: 900

    I have all of those lines in the router I just pulled up.

    re: bmeeks' suggestion, see https://docs.netgate.com/pfsense/en/latest/troubleshooting/disk-lifetime.html

  • Namecheap Dynamic DNS cached ip 0.0.0.0 issue

    19
    0 Votes
    19 Posts
    3k Views
    S

    @aheadalarmroom On 22.05 I have applied:
    Namecheap DDNS on 22.05

    Ensure you have the latest Patches package. They add patches via a package update as opposed to an external list.

  • Problem with DNS over TLS

    28
    0 Votes
    28 Posts
    4k Views
    P

    Thanks everybody,
    I founded my error : a typo in the Dnsname!
    This case can be closed.

  • Some TLDs not resolving in pfSense

    3
    0 Votes
    3 Posts
    751 Views
    A

    Mine has intermittent issues resolving yelp.to. and forums.lawrencesystems.com. If I wait a bit it will resolve eventually. Not sure what's causing this...

    [22.05-RELEASE][admin@pf]/root: dig yelp.to +trace ; <<>> DiG 9.16.26 <<>> yelp.to +trace ;; global options: +cmd . 83331 IN NS m.root-servers.net. . 83331 IN NS a.root-servers.net. . 83331 IN NS b.root-servers.net. . 83331 IN NS c.root-servers.net. . 83331 IN NS d.root-servers.net. . 83331 IN NS e.root-servers.net. . 83331 IN NS f.root-servers.net. . 83331 IN NS g.root-servers.net. . 83331 IN NS h.root-servers.net. . 83331 IN NS i.root-servers.net. . 83331 IN NS j.root-servers.net. . 83331 IN NS k.root-servers.net. . 83331 IN NS l.root-servers.net. . 83331 IN RRSIG NS 8 0 518400 20230204050000 20230122040000 951 . kgDwg7Khx9LoLCgFrS84CkJLkSDNOuBqtLAMat2craBdop37SNc716B3 g31YTlQxXL/y3vnRaxukwEk6MeC/ITL+YR+A3yzaiatUxg/+MacqmkGj m2F2TJ51Qem2yFHQJpiWwD6AWrfE2y2Volt4TAU6np9QkFVEBkcZzVp/ sGF89zD1frlpoZpnjaIXTI6R7vMb7yN1QXi7G6Jnp2f9b5gNU+3WaCU9 eDatxWHltAxh/3szYS2T7nbrkx35KuY2QkyGUZLEz+rSHgQ1AeCqvkBY oNTW/GJ7+V17xjpRgMcZumW9LDl544pheMs/fvaj+JRsFYfBbI1GmmEU v81cow== ;; Received 525 bytes from 127.0.0.1#53(127.0.0.1) in 0 ms to. 172800 IN NS colo.tonic.to. to. 172800 IN NS tonic.to. to. 172800 IN NS sydney.tonic.to. to. 172800 IN NS newyork.tonic.to. to. 172800 IN NS helsinki.tonic.to. to. 172800 IN NS frankfurt.tonic.to. to. 172800 IN NS singapore.tonic.to. to. 86400 IN NSEC today. NS RRSIG NSEC to. 86400 IN RRSIG NSEC 8 1 86400 20230204050000 20230122040000 951 . nGj5h4bpgG1raL4+Tu/h065iVwAs8EWsQ8EKR+63cAxzPmGwYtiMgWr0 x/gMZYV89+DRqLRmeHVrHNgCeLCMhkoteqcLOjovfMiFCgVhUuGKN7qg OcqO1yrig2tn6n3H3OQh5T5iICC8WPhMCUgou0INmdM9RDO8Iavx4bv7 dRsZFy/m8Mw9D3n6IOUvRJXmtuSvgmtGiSQyWttaz35ZkVR0STK8Sr5v dYM5iW37qmqO3uatOipxefMS87F+z+v+yqQGpgdWxqulmPzFO3Tuk41L nbbiB+8uwAhvyZTfAs22izl+avw0X1fG34kB9WkS0l6fRp0XYCD/uxEe qnrZWA== couldn't get address for 'colo.tonic.to': not found couldn't get address for 'tonic.to': not found couldn't get address for 'sydney.tonic.to': not found couldn't get address for 'newyork.tonic.to': not found couldn't get address for 'helsinki.tonic.to': not found couldn't get address for 'frankfurt.tonic.to': not found couldn't get address for 'singapore.tonic.to': not found dig: couldn't get address for 'colo.tonic.to': no more [22.05-RELEASE][admin@pf]/root: dig forums.lawrencesystems.com. +trace ; <<>> DiG 9.16.26 <<>> forums.lawrencesystems.com. +trace ;; global options: +cmd . 83286 IN NS i.root-servers.net. . 83286 IN NS j.root-servers.net. . 83286 IN NS k.root-servers.net. . 83286 IN NS l.root-servers.net. . 83286 IN NS m.root-servers.net. . 83286 IN NS a.root-servers.net. . 83286 IN NS b.root-servers.net. . 83286 IN NS c.root-servers.net. . 83286 IN NS d.root-servers.net. . 83286 IN NS e.root-servers.net. . 83286 IN NS f.root-servers.net. . 83286 IN NS g.root-servers.net. . 83286 IN NS h.root-servers.net. . 83286 IN RRSIG NS 8 0 518400 20230204050000 20230122040000 951 . kgDwg7Khx9LoLCgFrS84CkJLkSDNOuBqtLAMat2craBdop37SNc716B3 g31YTlQxXL/y3vnRaxukwEk6MeC/ITL+YR+A3yzaiatUxg/+MacqmkGj m2F2TJ51Qem2yFHQJpiWwD6AWrfE2y2Volt4TAU6np9QkFVEBkcZzVp/ sGF89zD1frlpoZpnjaIXTI6R7vMb7yN1QXi7G6Jnp2f9b5gNU+3WaCU9 eDatxWHltAxh/3szYS2T7nbrkx35KuY2QkyGUZLEz+rSHgQ1AeCqvkBY oNTW/GJ7+V17xjpRgMcZumW9LDl544pheMs/fvaj+JRsFYfBbI1GmmEU v81cow== ;; Received 525 bytes from 127.0.0.1#53(127.0.0.1) in 0 ms com. 172800 IN NS a.gtld-servers.net. com. 172800 IN NS b.gtld-servers.net. com. 172800 IN NS c.gtld-servers.net. com. 172800 IN NS d.gtld-servers.net. com. 172800 IN NS e.gtld-servers.net. com. 172800 IN NS f.gtld-servers.net. com. 172800 IN NS g.gtld-servers.net. com. 172800 IN NS h.gtld-servers.net. com. 172800 IN NS i.gtld-servers.net. com. 172800 IN NS j.gtld-servers.net. com. 172800 IN NS k.gtld-servers.net. com. 172800 IN NS l.gtld-servers.net. com. 172800 IN NS m.gtld-servers.net. com. 86400 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766 com. 86400 IN RRSIG DS 8 1 86400 20230204050000 20230122040000 951 . D9wfP4fjVUFOevkn3EmmvrjEwNcfNsIVQnMpQ07PJ1DNXM0XDMfTtUkI zBJPRG+tPrk186yy0F2VOeh3200WZiSVALd3JSq79ieZWUSDCQ/EzVBq +CgSQkJjmPm47u7FPK4fFmTL2BP1nv7Bwuxu5zQMa5WEjABQVWqGTmry Fcg7Z4omeIAgb5SiR+sFQuXlbA7fCqlsHK4coNvYsAXnuJEEKSAZ/oUN WigITLfgaJ6qHandU44wi8XHTMp33L+54Uy25PsTizyH8zc6QE3/+QN7 W/yaEn85ra0YVOIzExvs0/j769wXx+WSXcuU9JfDbYegkk3TvvtS/W1O gE/nQQ== ;; Received 1186 bytes from 193.0.14.129#53(k.root-servers.net) in 153 ms lawrencesystems.com. 172800 IN NS ns1.lawrence.technology. lawrencesystems.com. 172800 IN NS ns2.lawrence.technology. lawrencesystems.com. 172800 IN NS ns3.lawrence.technology. lawrencesystems.com. 172800 IN NS ns4.lawrence.technology. CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q2D6NI4I7EQH8NA30NS61O48UL8G5 NS SOA RRSIG DNSKEY NSEC3PARAM CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20230126052302 20230119041302 36739 com. jU0jDdLit4qUktHrFwTh+jVxOYvRWcbFuSbj/IE2LkQ7FMcmUETuXuDV NZcBXYqVwxSiWjo38Q/x4o84qu10aLafUtUXlCe3uS8Ogkz9YWi9QEuh XmQmhYX9c0RIb0oKg/EGx5K6MflaG2aANx0QZCKefO0w0ejXTrzjXjUW Nhfb8NqRD4c2M1Sw4kdaUhBfiuq/rW2fL8WvyVEH3baXrw== U6O0OCQU8V5GTBRGTLMHBJ4G87A1EE0L.com. 86400 IN NSEC3 1 1 0 - U6O18CIKNDUF3GMAVN7R2VOV25LFBOK3 NS DS RRSIG U6O0OCQU8V5GTBRGTLMHBJ4G87A1EE0L.com. 86400 IN RRSIG NSEC3 8 2 86400 20230127063104 20230120052104 36739 com. pyXaWNOuNrS0orReEht37LeN6mqL0N1cnh/sA+EPdoqsJvDkuiBMpG3L anzx2jeVxtpYKL8PcAVFZ6/BOsgwL8gDZvOx8Zy9MLp4umRsyD78LnXn ytjok7zgJFSLV5WVrVZ/iF2Px3H+97wHovxiZ9S59v/2JKW8+JA+IU1s 3YA8BvwA+Qd3XLKxURK5UcLTytxTM/r727t21eMcQMKBsg== couldn't get address for 'ns1.lawrence.technology': not found couldn't get address for 'ns2.lawrence.technology': not found couldn't get address for 'ns3.lawrence.technology': not found couldn't get address for 'ns4.lawrence.technology': not found dig: couldn't get address for 'ns1.lawrence.technology': no more
  • Mystery Wifi Leases - Apple Private Wifi Mac

    4
    0 Votes
    4 Posts
    719 Views
    johnpozJ

    @jpvonhemel its a random one - it will change as you change wifi networks.. And can change on its own on new connection.. Not a Fan to be honest that is for sure.

    https://support.apple.com/en-us/HT211227
    Use private Wi-Fi addresses on iPhone, iPad, iPod touch, and Apple Watch

    The only good thing about it - is it is easy enough to turn off ;)

    It should from my understanding use that same random mac on your network, unless you reset it or forget that network... But then there is always this "if your device hasn’t joined the network in 6 weeks, it uses a different private address the next time it connects to that network"

    So if your device hasn't been on your network in a while, and it reconnects will use a different mac.. So yeah it can be problematic trying to create specific firewall rules for specific devices with such a "feature" ;)

  • DNS Resolver Not Working/Logging

    7
    0 Votes
    7 Posts
    925 Views
    J

    @steveits said in DNS Resolver Not Working/Logging:

    @johnsoga so it needed an ACL? Does that interface have a gateway? Internal interfaces should be allowed.
    https://docs.netgate.com/pfsense/en/latest/services/dns/resolver-acls.html

    Not sure about the log Q, sorry.

    Hmmm good catch I see what you mean from the documentation:

    "By default, IPv4 and IPv6 networks residing on internal interfaces of this firewall are permitted. Additional networks must be allowed manually."

    I would think this interface would considered internal idk how/where that configuration is made, but to answer your question, nope, no gateway.

    Screen Shot 2023-01-16 at 10.42.50 PM.png

  • 0 Votes
    18 Posts
    2k Views
    cmcdonaldC

    This has been addressed in the latest snapshots.

    We are testing the changes and will include them in 23.01 which is due soon.

    The issue is multifaceted.

    I've submitted upstream patches to both Unbound and the MaxMind DB Python module.

    The MaxMindDB Python module had several issues. The major issue though was a reference counting bug causing the Python garbage collector to prematurely free a heap-allocated structure. This led to a use-after-free causing Unbound to segfault.

    Unbound reloads the built-in Python interpreter every time Unbound is reloaded either by a SIGHUP signal or using the unbound-control interface. Python was not designed to be reloaded like that in the same process.

    I've fixed the refcounting bug in Maxmind, and patched Unbound so Python is only initialized and unwound once. I've also upgraded Python from 3.9 to 3.11.

    The memory usage should be significantly improved.

    The next improvement would be to rewrite the integration with ISC DHPCD to use a better interface with Unbound. That likely will have to wait until 23.05

  • 0 Votes
    10 Posts
    907 Views
    J

    @pgomes2000 Let's say you use vlan 10 for the WAN and VLAN 11 for the LAN. You can use any number you want between 2 and 4093.

    You would connect the nic from the laptop to one port on the switch. This port will need both vlans tagged on it. It's called a "trunk" port.
    Then you would untag vlan 10 on another port. That port will connect to your internet.
    Untag vlan 11 on any other ports you want to be LAN ports.

  • DHCP PXE configuration on multiple LANs - wrong filename (Bug?)

    1
    0 Votes
    1 Posts
    396 Views
    No one has replied
  • DHCP from freeRadius and daloRadius.

    1
    0 Votes
    1 Posts
    372 Views
    No one has replied
  • Problem in host override in DNS resolver

    4
    0 Votes
    4 Posts
    579 Views
    johnpozJ

    @gulzoa712 no they wouldn't answer ping.. they are not valid fqdn..

    Your kmaster.home.arpa would resolve - but not going to resolve with just kmaster unless your search suffix on your client is actually set to home.arpa

    searchsuffix.jpg

    is 15.213 and .212 actually DNS? Why are you pointing pfsense to those for dns? Are you even forwarding - unless your forwarding there is almost no reason to set dns in general. Out of the box pfsense resolves, it does not need you to set any dns unless your going to forward to them.

  • Wireguard as DHCP server

    1
    0 Votes
    1 Posts
    396 Views
    No one has replied
  • PFSense unable to resolve cloudflare entries when not proxied?

    5
    0 Votes
    5 Posts
    396 Views
    C

    @johnpoz I know, I just needed to test this out, it will be removed and a local zone will end up being used on the network as an override.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.