Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Slow DNS after 22.05

    Scheduled Pinned Locked Moved DHCP and DNS
    270 Posts 31 Posters 136.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      Kempain @Gertjan
      last edited by Kempain

      @gertjan said in Slow DNS after 22.05:

      sockstat | grep 'unbound'

      c837b6aa-a213-4d99-8a84-8dcce649a55b-image.png

      Potential problem here? I see port 953 for local.

      @gertjan said in Slow DNS after 22.05:

      Serveurs DNS. . . . . . . . . . . . . : 192.168.1.1
      2001:470:1f14:5d0:2::1

      Yup I get back the pfSense IP only (no IPv6) when running this on my client.

      @gertjan said in Slow DNS after 22.05:

      to a lower level, like "1"

      I'll lower the logging level just had it jacked up to capture as much as possible when troubleshooting.

      @johnpoz said in Slow DNS after 22.05:

      @kempain you can not expect to run a good resolver if your avg time to resolve is 9 seconds.. You can't it just not going to work..

      Thanks @johnpoz

      Any ideas how I begin to troubleshoot this issue? I'm running on a Netgate SG-5100 so should be ample resources for what I'm doing with it which is pretty basic stuff.

      I've removed those external NS now so let's see if that improves things.

      I have DNSSEC support enabled but I think we determined that's ok earlier in the thread as long as you're not forwarding DNS?

      johnpozJ GertjanG 3 Replies Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @Kempain
        last edited by johnpoz

        @kempain I would do a dig +trace on you pfsense box - where is having issues talking to in the chain..

        [22.05-RELEASE][admin@sg4860.local.lan]/root: dig www.google.com +trace
        
        ; <<>> DiG 9.16.26 <<>> www.google.com +trace
        ;; global options: +cmd
        .                       26136   IN      NS      d.root-servers.net.
        .                       26136   IN      NS      e.root-servers.net.
        .                       26136   IN      NS      f.root-servers.net.
        .                       26136   IN      NS      g.root-servers.net.
        .                       26136   IN      NS      h.root-servers.net.
        .                       26136   IN      NS      a.root-servers.net.
        .                       26136   IN      NS      i.root-servers.net.
        .                       26136   IN      NS      j.root-servers.net.
        .                       26136   IN      NS      k.root-servers.net.
        .                       26136   IN      NS      l.root-servers.net.
        .                       26136   IN      NS      m.root-servers.net.
        .                       26136   IN      NS      b.root-servers.net.
        .                       26136   IN      NS      c.root-servers.net.
        .                       26136   IN      RRSIG   NS 8 0 518400 20220822170000 20220809160000 20826 . flMR2MvFJojKfO7Ys2tb+EWssvMaUJSejiq3L4Y5Sy288C16sZOrhvdF GWY0+gtUl5C40kBOnkVdqYDgBfSjbpmPn+NWbkJZMTqwjmz2QN+28MsR bplhWzeu8HghrmCLZkBrmLoTe1e1DXNWbvQbQfmLkBSQmwqntw1QX3GZ UleYopxJngO6hdEQOXbsrcdnfSVUOgxf4wwbS9XZugf1xpaSbKIPCBFd 1xGKWFr9MbcIzogRIDKH4RPZAt8aRIkwZMh53ZaZ2Zo+9n63MdI5N6zB WJlNpJqmFxhE8wVEegqm++2lQSsqYmDikIpCxn/+P8FXDr+vc6erU9jT OP9sFw==
        ;; Received 525 bytes from 127.0.0.1#53(127.0.0.1) in 0 ms
        
        com.                    172800  IN      NS      a.gtld-servers.net.
        com.                    172800  IN      NS      b.gtld-servers.net.
        com.                    172800  IN      NS      c.gtld-servers.net.
        com.                    172800  IN      NS      d.gtld-servers.net.
        com.                    172800  IN      NS      e.gtld-servers.net.
        com.                    172800  IN      NS      f.gtld-servers.net.
        com.                    172800  IN      NS      g.gtld-servers.net.
        com.                    172800  IN      NS      h.gtld-servers.net.
        com.                    172800  IN      NS      i.gtld-servers.net.
        com.                    172800  IN      NS      j.gtld-servers.net.
        com.                    172800  IN      NS      k.gtld-servers.net.
        com.                    172800  IN      NS      l.gtld-servers.net.
        com.                    172800  IN      NS      m.gtld-servers.net.
        com.                    86400   IN      DS      30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
        com.                    86400   IN      RRSIG   DS 8 1 86400 20220823050000 20220810040000 20826 . clI/vPSk2t2LVd1WtfHI8VklYtaUPAOK/8Sr30o0VjGp7xZXZ5EhlVRz YarbopAZ+8yOIwwbIl82ByVZFf/qJEprOKW6TiG8goIoPBG6jghCoglV p4IqNUVqqwpJpAxNKbOA0cOeOr6qTwqugtJnU5J7TGG4QBi63KjYBoin gyYxaKkV/fvK9njoqxbn2hzaKB08mLlYj/9TKxS285UaxbMxYfPDJejQ FA+33Y+KjJlGhdYrCFy/o/JW+YKrfmLrMs2C3+6XGUFFDGSN9WUCF59j LMuQ0ZVAmZQkodwaKM0L1dojQtJU73fEnRkm/1ZhhiDYkQv/HPFHM3ur f3bWww==
        ;; Received 1174 bytes from 2001:500:2d::d#53(d.root-servers.net) in 28 ms
        
        google.com.             172800  IN      NS      ns2.google.com.
        google.com.             172800  IN      NS      ns1.google.com.
        google.com.             172800  IN      NS      ns3.google.com.
        google.com.             172800  IN      NS      ns4.google.com.
        CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q2D6NI4I7EQH8NA30NS61O48UL8G5 NS SOA RRSIG DNSKEY NSEC3PARAM
        CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20220815042401 20220808031401 32298 com. If06bSVXL7llnV+iyjrWR5yStSfeLZzeCKgsfVsqNQKKnP35dCsaGffz dRWOIGK+WzMKxVCiJZLiNyG5iYR9RybjH9jXMhDyYqro3M8eplcZtHnd DN0XXqhP/UDjMThDkJHxFERmmzraaU1wQLMcse/uOLMzmZVmOalWkbC+ TtXIfd8f4KB+h/M6X23C9UZ7oyYI78gqwS3Rq0fKInDxXA==
        S84BKCIBC38P58340AKVNFN5KR9O59QC.com. 86400 IN NSEC3 1 1 0 - S84BUO64GQCVN69RJFUO6LVC7FSLUNJ5 NS DS RRSIG
        S84BKCIBC38P58340AKVNFN5KR9O59QC.com. 86400 IN RRSIG NSEC3 8 2 86400 20220816051414 20220809040414 32298 com. BI5XFgxbzwBugDjaV04ygejNaUOMRGmTaJvdufqfRnJPaDEHLnqVpw7p 8UdjQnXLbtO4Fns2BpPOTD9DSSaWGRjxeZxlb6Rwxw1n4RGmJGe9QyaI f/zBXzn69uRXpgeRP6FFBmUuFCb7OQTBqoReLat+3fwKkebSv7epenW1 SvO4dXilsSZzTAUN8RvIdz9SgkBe+QxG8TiioAFYuTqdkw==
        ;; Received 840 bytes from 192.5.6.30#53(a.gtld-servers.net) in 13 ms
        
        www.google.com.         300     IN      A       142.251.32.4
        ;; Received 59 bytes from 216.239.34.10#53(ns2.google.com) in 22 ms
        
        [22.05-RELEASE][admin@sg4860.local.lan]/root: 
        

        Notice the times to get answers from the different NS in the chain - they are only a few ms..

        Here with almost 80k queries my avg is less than 0.1 of a second.

        total.recursion.time.avg=0.088754
        total.recursion.time.median=0.0410133
        

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        K 1 Reply Last reply Reply Quote 0
        • GertjanG
          Gertjan @Kempain
          last edited by Gertjan

          @kempain said in Slow DNS after 22.05:

          Potential problem here? I see port 953 for local.

          Looks fine.

          unbound is listing on all interfaces, using port 53,, TCP and UDP.

          @kempain said in Slow DNS after 22.05:

          Yup I get back the pfSense IP only (no IPv6)

          No IPv6 on LAN => Consider what @johnpoz proposed :

          e95819ae-682f-4840-bda6-790b6a597eff-image.png

          Just make a note : the day IPv6 becomes a thing for you, you have to remove this option.
          ( see other unbound threads for the "why" part )

          @kempain said in Slow DNS after 22.05:

          I have DNSSEC support enabled but I think

          Mine is activated since day 1 ( many years ago ).
          DNSSEC is only useful if your are resolving, not forwarding.
          For myself, I even went haywire buy activating this :

          339bdb67-4f17-47a4-b15d-3fac7edaacba-image.png

          but I would activate these only if you have nothing else to debug / to do.
          I don't recall what the default values are.

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @Kempain
            last edited by johnpoz

            @kempain could you do a simple test to see if your dns queries are being messed with.

            if you do a directed query to something that shouldn't answer and you get an answer - then your dns is being intercepted.

            example..

            [22.05-RELEASE][admin@sg4860.local.lan]/root: dig @1.2.3.4 www.google.com
            
            ; <<>> DiG 9.16.26 <<>> @1.2.3.4 www.google.com
            ; (1 server found)
            ;; global options: +cmd
            ;; connection timed out; no servers could be reached
            
            [22.05-RELEASE][admin@sg4860.local.lan]/root: 
            

            1.2.3.4 doesn't answer dns - if you query it and you get an answer than your dns is being intercepted.. Much like you can do on your own dns queries with pfsense.. And send them somewhere else.. Like when a client tries to query 8.8.8.8 and you directed to your own dns..

            Other than horrible internet connection, or bad peering with where the NS are - there should be no reason your queries take so long.. Are you on a sat connection or something? What is typical ping times for say www.google.com

            $ ping www.google.com
            
            Pinging www.google.com [142.251.32.4] with 32 bytes of data:
            Reply from 142.251.32.4: bytes=32 time=12ms TTL=116
            Reply from 142.251.32.4: bytes=32 time=12ms TTL=116
            Reply from 142.251.32.4: bytes=32 time=10ms TTL=116
            

            A couple ms, or even a few hundred ms would be fine - but your avg was 9 seconds?? Yeah that is not going to work for reliable dns resolving.

            Typical client timeout would be 2 seconds.. Even with 3 attempts - you would completely time out before an answer was gotten with a 9 second avg query time.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            K 1 Reply Last reply Reply Quote 0
            • K
              Kempain @johnpoz
              last edited by

              Thanks @johnpoz

              Ran a dig and apart from the initial figures being higher than yours 85775 vs 26136, and root servers taking 64ms rather than 28ms which is a bit of a bump the rest appears ok for this particularly dig?

              I'll try and capture one that's slower for a different address.

              [22.05-RELEASE]/root: dig www.google.com +trace
              
              ; <<>> DiG 9.16.26 <<>> www.google.com +trace
              ;; global options: +cmd
              .                       85775   IN      NS      c.root-servers.net.
              .                       85775   IN      NS      m.root-servers.net.
              .                       85775   IN      NS      f.root-servers.net.
              .                       85775   IN      NS      b.root-servers.net.
              .                       85775   IN      NS      l.root-servers.net.
              .                       85775   IN      NS      d.root-servers.net.
              .                       85775   IN      NS      e.root-servers.net.
              .                       85775   IN      NS      j.root-servers.net.
              .                       85775   IN      NS      h.root-servers.net.
              .                       85775   IN      NS      g.root-servers.net.
              .                       85775   IN      NS      i.root-servers.net.
              .                       85775   IN      NS      a.root-servers.net.
              .                       85775   IN      NS      k.root-servers.net.
              .                       85775   IN      RRSIG   NS 8 0 518400 20220823050000 20220810040000 20826 . ldBIj1Q5BNWr/TNFQ/RebaJR/2ss3M1NFtp9BVvF8c0oBqYtsYE5lXdh x5SyEQNaY0TQedI0sUYGH1mxbb8do4TGvHlt/cHqdZlR0C4iQJZh1E2J hW7jvykFTd+GvcxoT4pd27WAKcphMxjMV0kv/nJ/R62py40o/x0q4MEh qOOX9xaXXrk9LE8+kF/xH6Hzk/FP1Tvqky5wYq3zu+0GRAGg6Ykornbd 48YZHrK4p4hMwmCfc+rqq2GA1qI///C8yE+c3JbZzMqpnA/Fd1ki7OPa uC4rdZBRTjffHYrHvPm4JQexycKi2yk1p3Zd4VUV5TXso6bQumLIMOuL w+8gXw==
              ;; Received 525 bytes from 127.0.0.1#53(127.0.0.1) in 0 ms
              
              com.                    172800  IN      NS      e.gtld-servers.net.
              com.                    172800  IN      NS      b.gtld-servers.net.
              com.                    172800  IN      NS      j.gtld-servers.net.
              com.                    172800  IN      NS      m.gtld-servers.net.
              com.                    172800  IN      NS      i.gtld-servers.net.
              com.                    172800  IN      NS      f.gtld-servers.net.
              com.                    172800  IN      NS      a.gtld-servers.net.
              com.                    172800  IN      NS      g.gtld-servers.net.
              com.                    172800  IN      NS      h.gtld-servers.net.
              com.                    172800  IN      NS      l.gtld-servers.net.
              com.                    172800  IN      NS      k.gtld-servers.net.
              com.                    172800  IN      NS      c.gtld-servers.net.
              com.                    172800  IN      NS      d.gtld-servers.net.
              com.                    86400   IN      DS      30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
              com.                    86400   IN      RRSIG   DS 8 1 86400 20220823050000 20220810040000 20826 . clI/vPSk2t2LVd1WtfHI8VklYtaUPAOK/8Sr30o0VjGp7xZXZ5EhlVRz YarbopAZ+8yOIwwbIl82ByVZFf/qJEprOKW6TiG8goIoPBG6jghCoglV p4IqNUVqqwpJpAxNKbOA0cOeOr6qTwqugtJnU5J7TGG4QBi63KjYBoin gyYxaKkV/fvK9njoqxbn2hzaKB08mLlYj/9TKxS285UaxbMxYfPDJejQ FA+33Y+KjJlGhdYrCFy/o/JW+YKrfmLrMs2C3+6XGUFFDGSN9WUCF59j LMuQ0ZVAmZQkodwaKM0L1dojQtJU73fEnRkm/1ZhhiDYkQv/HPFHM3ur f3bWww==
              ;; Received 1174 bytes from 192.58.128.30#53(j.root-servers.net) in 64 ms
              
              google.com.             172800  IN      NS      ns2.google.com.
              google.com.             172800  IN      NS      ns1.google.com.
              google.com.             172800  IN      NS      ns3.google.com.
              google.com.             172800  IN      NS      ns4.google.com.
              CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q2D6NI4I7EQH8NA30NS61O48UL8G5 NS SOA RRSIG DNSKEY NSEC3PARAM
              CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20220815042401 20220808031401 32298 com. If06bSVXL7llnV+iyjrWR5yStSfeLZzeCKgsfVsqNQKKnP35dCsaGffz dRWOIGK+WzMKxVCiJZLiNyG5iYR9RybjH9jXMhDyYqro3M8eplcZtHnd DN0XXqhP/UDjMThDkJHxFERmmzraaU1wQLMcse/uOLMzmZVmOalWkbC+ TtXIfd8f4KB+h/M6X23C9UZ7oyYI78gqwS3Rq0fKInDxXA==
              S84BKCIBC38P58340AKVNFN5KR9O59QC.com. 86400 IN NSEC3 1 1 0 - S84BUO64GQCVN69RJFUO6LVC7FSLUNJ5 NS DS RRSIG
              S84BKCIBC38P58340AKVNFN5KR9O59QC.com. 86400 IN RRSIG NSEC3 8 2 86400 20220816051414 20220809040414 32298 com. BI5XFgxbzwBugDjaV04ygejNaUOMRGmTaJvdufqfRnJPaDEHLnqVpw7p 8UdjQnXLbtO4Fns2BpPOTD9DSSaWGRjxeZxlb6Rwxw1n4RGmJGe9QyaI f/zBXzn69uRXpgeRP6FFBmUuFCb7OQTBqoReLat+3fwKkebSv7epenW1 SvO4dXilsSZzTAUN8RvIdz9SgkBe+QxG8TiioAFYuTqdkw==
              ;; Received 840 bytes from 192.35.51.30#53(f.gtld-servers.net) in 20 ms
              
              www.google.com.         300     IN      A       142.250.200.4
              ;; Received 59 bytes from 216.239.32.10#53(ns1.google.com) in 20 ms
              
              

              Things do seem to have improved after dropping logging level (assume to be expected) but still very slow:
              4b6b5481-cd7d-4280-876b-2e26c01843e1-image.png

              @gertjan said in Slow DNS after 22.05:

              No IPv6 on LAN => Consider what @johnpoz proposed :

              Updated this now. I plan on sorting out IPv6 in future but it's way over my head atm.

              Early days but this setting might have had a dramatic effect?

              089d45b0-e68c-4b5c-8012-47f77488ec1d-image.png

              GertjanG 1 Reply Last reply Reply Quote 0
              • K
                Kempain @johnpoz
                last edited by

                @johnpoz said in Slow DNS after 22.05:

                dig @1.2.3.4 www.google.com

                Ran this and get the same results as you thankfully but this is really good to know.

                It may be that disabling IPv6 has resolved it but I'm keeping an eye on it and will report back.

                Pings seem decent:
                3df8fa9b-838f-44f7-a4cb-0f1c59e2d8de-image.png

                That's from a client and directly from pfSense is even faster averaging 13ms.

                1 Reply Last reply Reply Quote 0
                • K
                  Kempain
                  last edited by Kempain

                  Would urge others experiencing the issue to try this and report back as so far everything is MUCH faster now. Even though it's early days I haven't received any DNS issues / timeouts yet.

                  Seems like user error IPv6 mis-config 😧

                  @gertjan said in Slow DNS after 22.05:

                  No IPv6 on LAN => Consider what @johnpoz proposed :

                  fd58af9f-94da-4ede-b3f4-b9e27d826e1b-image.png

                  dd96fdf8-3810-4d9d-849b-c6e40a0916ba-image.png

                  M 1 Reply Last reply Reply Quote 0
                  • M
                    Mikymike82 @Kempain
                    last edited by

                    @kempain I’m gonna try this by reverting my forward and adding this option.

                    What ISP are you running btw?

                    K 1 Reply Last reply Reply Quote 0
                    • K
                      Kempain @Mikymike82
                      last edited by Kempain

                      @mikymike82 said in Slow DNS after 22.05:

                      What ISP are you running btw?

                      I'm in the UK with Virgin. They do issue IPv6 as far as I know so I think I can do full IPv6 if I knew what I was doing.

                      1 Reply Last reply Reply Quote 0
                      • Cool_CoronaC
                        Cool_Corona
                        last edited by

                        unbound unbound 44545 3 udp4 *:53 :
                        unbound unbound 44545 4 tcp4 *:53 :
                        unbound unbound 44545 5 udp4 *:853 :
                        unbound unbound 44545 6 tcp4 *:853 :
                        unbound unbound 44545 7 tcp4 127.0.0.1:953 :
                        unbound unbound 44545 8 dgram -> /var/run/logpriv
                        unbound unbound 44545 10 stream -> ??
                        unbound unbound 44545 11 stream -> ??
                        unbound unbound 44545 13 stream -> ??
                        unbound unbound 44545 14 stream -> ??
                        unbound unbound 44545 15 stream -> ??
                        unbound unbound 44545 16 stream -> ??
                        unbound unbound 44545 17 stream -> ??
                        unbound unbound 44545 18 stream -> ??
                        unbound unbound 44545 19 stream -> ??
                        unbound unbound 44545 20 stream -> ??
                        unbound unbound 44545 21 stream -> ??
                        unbound unbound 44545 22 stream -> ??
                        unbound unbound 44545 23 stream -> ??
                        unbound unbound 44545 24 stream -> ??
                        unbound unbound 44545 25 stream -> ??
                        unbound unbound 44545 26 stream -> ??

                        dig @1.2.3.4 www.google.com

                        ; <<>> DiG 9.16.16 <<>> @1.2.3.4 www.google.com
                        ; (1 server found)
                        ;; global options: +cmd
                        ;; connection timed out; no servers could be reached

                        ; <<>> DiG 9.16.16 <<>> www.google.com +trace
                        ;; global options: +cmd
                        . 238 IN NS e.root-servers.net.
                        . 238 IN NS f.root-servers.net.
                        . 238 IN NS g.root-servers.net.
                        . 238 IN NS h.root-servers.net.
                        . 238 IN NS a.root-servers.net.
                        . 238 IN NS i.root-servers.net.
                        . 238 IN NS j.root-servers.net.
                        . 238 IN NS k.root-servers.net.
                        . 238 IN NS l.root-servers.net.
                        . 238 IN NS m.root-servers.net.
                        . 238 IN NS b.root-servers.net.
                        . 238 IN NS c.root-servers.net.
                        . 238 IN NS d.root-servers.net.
                        . 238 IN RRSIG NS 8 0 518400 20220823050000 20220810040000 20826 . ldBIj1Q5BNWr/TNFQ/RebaJR/2ss3M1NFtp9BVvF8c0oBqYtsYE5lXdh x5SyEQNaY0TQedI0sUYGH1mxbb8do4TGvHlt/cHqdZlR0C4iQJZh1E2J hW7jvykFTd+GvcxoT4pd27WAKcphMxjMV0kv/nJ/R62py40o/x0q4MEh qOOX9xaXXrk9LE8+kF/xH6Hzk/FP1Tvqky5wYq3zu+0GRAGg6Ykornbd 48YZHrK4p4hMwmCfc+rqq2GA1qI///C8yE+c3JbZzMqpnA/Fd1ki7OPa uC4rdZBRTjffHYrHvPm4JQexycKi2yk1p3Zd4VUV5TXso6bQumLIMOuL w+8gXw==
                        ;; Received 525 bytes from 127.0.0.1#53(127.0.0.1) in 1 ms

                        com. 172800 IN NS a.gtld-servers.net.
                        com. 172800 IN NS b.gtld-servers.net.
                        com. 172800 IN NS c.gtld-servers.net.
                        com. 172800 IN NS d.gtld-servers.net.
                        com. 172800 IN NS e.gtld-servers.net.
                        com. 172800 IN NS f.gtld-servers.net.
                        com. 172800 IN NS g.gtld-servers.net.
                        com. 172800 IN NS h.gtld-servers.net.
                        com. 172800 IN NS i.gtld-servers.net.
                        com. 172800 IN NS j.gtld-servers.net.
                        com. 172800 IN NS k.gtld-servers.net.
                        com. 172800 IN NS l.gtld-servers.net.
                        com. 172800 IN NS m.gtld-servers.net.
                        com. 86400 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
                        com. 86400 IN RRSIG DS 8 1 86400 20220823050000 20220810040000 20826 . clI/vPSk2t2LVd1WtfHI8VklYtaUPAOK/8Sr30o0VjGp7xZXZ5EhlVRz YarbopAZ+8yOIwwbIl82ByVZFf/qJEprOKW6TiG8goIoPBG6jghCoglV p4IqNUVqqwpJpAxNKbOA0cOeOr6qTwqugtJnU5J7TGG4QBi63KjYBoin gyYxaKkV/fvK9njoqxbn2hzaKB08mLlYj/9TKxS285UaxbMxYfPDJejQ FA+33Y+KjJlGhdYrCFy/o/JW+YKrfmLrMs2C3+6XGUFFDGSN9WUCF59j LMuQ0ZVAmZQkodwaKM0L1dojQtJU73fEnRkm/1ZhhiDYkQv/HPFHM3ur f3bWww==
                        ;; Received 1174 bytes from 193.0.14.129#53(k.root-servers.net) in 16 ms

                        google.com. 172800 IN NS ns2.google.com.
                        google.com. 172800 IN NS ns1.google.com.
                        google.com. 172800 IN NS ns3.google.com.
                        google.com. 172800 IN NS ns4.google.com.
                        CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q2D6NI4I7EQH8NA30NS61O48UL8G5 NS SOA RRSIG DNSKEY NSEC3PARAM
                        CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20220815042401 20220808031401 32298 com. If06bSVXL7llnV+iyjrWR5yStSfeLZzeCKgsfVsqNQKKnP35dCsaGffz dRWOIGK+WzMKxVCiJZLiNyG5iYR9RybjH9jXMhDyYqro3M8eplcZtHnd DN0XXqhP/UDjMThDkJHxFERmmzraaU1wQLMcse/uOLMzmZVmOalWkbC+ TtXIfd8f4KB+h/M6X23C9UZ7oyYI78gqwS3Rq0fKInDxXA==
                        S84BKCIBC38P58340AKVNFN5KR9O59QC.com. 86400 IN NSEC3 1 1 0 - S84BUO64GQCVN69RJFUO6LVC7FSLUNJ5 NS DS RRSIG
                        S84BKCIBC38P58340AKVNFN5KR9O59QC.com. 86400 IN RRSIG NSEC3 8 2 86400 20220816051414 20220809040414 32298 com. BI5XFgxbzwBugDjaV04ygejNaUOMRGmTaJvdufqfRnJPaDEHLnqVpw7p 8UdjQnXLbtO4Fns2BpPOTD9DSSaWGRjxeZxlb6Rwxw1n4RGmJGe9QyaI f/zBXzn69uRXpgeRP6FFBmUuFCb7OQTBqoReLat+3fwKkebSv7epenW1 SvO4dXilsSZzTAUN8RvIdz9SgkBe+QxG8TiioAFYuTqdkw==
                        ;; Received 840 bytes from 192.54.112.30#53(h.gtld-servers.net) in 12 ms

                        www.google.com. 300 IN A 142.250.181.196
                        ;; Received 59 bytes from 216.239.36.10#53(ns3.google.com) in 8 ms

                        K 1 Reply Last reply Reply Quote 0
                        • K
                          Kempain @Cool_Corona
                          last edited by

                          @cool_corona

                          All seems ok as far as I know.

                          Key metric seems to be total recursion time so try:

                          unbound-control -c /var/unbound/unbound.conf stats_noreset | grep total
                          
                          Cool_CoronaC 1 Reply Last reply Reply Quote 0
                          • Cool_CoronaC
                            Cool_Corona @Kempain
                            last edited by

                            @kempain said in Slow DNS after 22.05:

                            unbound-control -c /var/unbound/unbound.conf stats_noreset | grep total

                            total.num.queries=516
                            total.num.queries_ip_ratelimited=0
                            total.num.cachehits=312
                            total.num.cachemiss=204
                            total.num.prefetch=7
                            total.num.expired=0
                            total.num.recursivereplies=204
                            total.requestlist.avg=0.412322
                            total.requestlist.max=8
                            total.requestlist.overwritten=0
                            total.requestlist.exceeded=0
                            total.requestlist.current.all=0
                            total.requestlist.current.user=0
                            total.recursion.time.avg=0.688891
                            total.recursion.time.median=0.073533
                            total.tcpusage=0

                            1 Reply Last reply Reply Quote 0
                            • GertjanG
                              Gertjan @Kempain
                              last edited by

                              @kempain said in Slow DNS after 22.05:

                              root servers taking 64ms rather than 28ms which is a bit of a bump

                              Don't worry.
                              I have

                              in 89 ms
                              

                              as I'm still using a VDSL - 23 Mbits down 2 Mbits up.
                              John is probably using fibre.

                              My google name servers ns1 to ns4 tell me

                              in 55 ms
                              

                              One of yhem gave me an IP :

                              in 26 ms
                              

                              @kempain said in Slow DNS after 22.05:

                              Key metric seems to be total recursion time so try:

                              I've

                              total.num.queries=17629
                              total.num.queries_ip_ratelimited=0
                              total.num.cachehits=11918
                              total.num.cachemiss=5711
                              total.num.prefetch=6157
                              total.num.expired=5857
                              total.num.recursivereplies=5711
                              total.requestlist.avg=3.53632
                              total.requestlist.max=62
                              total.requestlist.overwritten=0
                              total.requestlist.exceeded=0
                              total.requestlist.current.all=0
                              total.requestlist.current.user=0
                              total.recursion.time.avg=0.437151
                              total.recursion.time.median=0.105229
                              total.tcpusage=0
                              

                              and guess what : I don't care.
                              I've activated

                              935f7441-cd0b-4fd9-b4d2-f39fe22dc360-image.png

                              so, ones in the unbound cache, unbound gets a fresh copy of that host when it times (TTL) out, ready to be served on my local lans if needed == no more waiting. I keep the initial '100 ms' delay' and then it's over for that host.

                              No "help me" PM's please. Use the forum, the community will thank you.
                              Edit : and where are the logs ??

                              johnpozJ 1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @Gertjan
                                last edited by

                                @gertjan fiber I wish ;) just cable connection

                                I keep checking for fiber options - what I would really like is the symmetrical connection. Limited to 50mbps up vs my 500 down. More up would help with my plex server to friends and family.. They have a gig plan but it doesn't get you more up, so not worth the extra money - 500 is more than adequate for down for my needs.

                                Yeah the prefetch option can help especially if your having longer resolve times than typical. I think it ties really good with the serve 0 option.. I am not a fan of these really short ttls many records are going with 30 seconds, 60 seconds - get out of here, there is no need for that other than you wanting to track something.. I have my min ttl set for 3600 seconds (1 hour) and have never ran into any issues with it.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • P
                                  PCOL IT Admin
                                  last edited by

                                  Another report of DNS resolving prob's after 22.05-RELEASE upgrade (on a 3100 unit)... Had absolutely no issues before the upgrade (did last weekend); after the upgrade, many issues with slow/failed website rendering, app launch failures, etc. -- finally yesterday I applied the "DNS Query Forwarding > Enable Forwarding Mode = yes" option in the Services > DNS Resolver > General Settings GUI, and boom - problem gone... Will try the do-ip6: no server option and undo the forwarding, and see how I make out. But I do think some problem got introduced in the 22.05 version of unbound (1.15.0) that got shipped, perhaps only affecting the ARM platform.

                                  K GertjanG 2 Replies Last reply Reply Quote 0
                                  • K
                                    Kempain
                                    last edited by

                                    Really appreciate all the help, thanks @johnpoz , @Gertjan and others.

                                    Still going strong here with really low recursion averages and speedy response times now so fingers and toes crossed it seems to be resolved for me at least.

                                    b013ab41-1c97-4ae7-a340-b4c6067e18fb-image.png

                                    Still a question as to why it was fine in the previous version but it was probably caused by me mis-configuring IPv6 and not disabling it fully. Need to spend some time learning about IPv6 as I initially disabled it so I didn't have to worry about IPv6 firewall rules between VLANS that I'm trying to segregate. Assume there will be some things that may require IPv6 these days so I probably shouldn't be blocking it anyway.

                                    johnpozJ 1 Reply Last reply Reply Quote 0
                                    • K
                                      Kempain @PCOL IT Admin
                                      last edited by

                                      @pcol-it-admin said in Slow DNS after 22.05:

                                      perhaps only affecting the ARM platform

                                      I'm on intel and it impacted me

                                      1 Reply Last reply Reply Quote 0
                                      • johnpozJ
                                        johnpoz LAYER 8 Global Moderator @Kempain
                                        last edited by johnpoz

                                        @kempain yeah those times look way way better.

                                        There are so many variables at play here, its quite possible there is something in this version that presents itself different with some flaky IPv6 setup.. There was a thread posted by I believe bmeeks that mentioned the do-ip6 no setting related to what others (non pfsense users) were seeing with this version of unbound.

                                        Keep in mind the old version was like 1.13 or 1.12, or it was 1.13 and then backed off to 1.12 again, etc. And now currently its 1.15.0 I believe - while I believe current unbound is like 1.16.2

                                        Hopefully we have gotten you to a stable config that works for your environment. IPv6 can introduce more variables into network, you mention firewall for example - there is a learning curve for sure, and things are done differently to be sure. Clients love to use temp IPv6 for their outbound connections, that can be trickier to firewall than just single IPv4 being used, etc.

                                        I do believe IPv6 is the future, and yes sure it would behoove you to get familiar with it - but its not something that you have to understand today, or even tmrw or next month even. I have yet to have anyone provide a single example of HAVING to have IPv6 on their network - many an ISP don't even support it, mine doesn't - I have to get my IPv6 via a HE tunnel for example because my isp doesn't offer it, and have not even seen it mentioned as coming soon, etc.

                                        You deciding not to use it at this time, sure isn't going to hold up the global deployment schedule ;) hehehe I have been tinkering with it for like 12 years.. And do have it available on my network - but in a limited fashion for limited devices that I want to play with it on..

                                        Keep in mind setting unbound to not use IPv6 as a transport for doing dns queries or serving dns to your clients does not prevent you from using IPv6 on your clients.. Its just unbound won't use it as a transport is all - it can still serve up AAAA records just fine. For your clients to use IPv6 with.

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                                        K 1 Reply Last reply Reply Quote 1
                                        • K
                                          Kempain @johnpoz
                                          last edited by Kempain

                                          @johnpoz said in Slow DNS after 22.05:

                                          Keep in mind setting unbound to not use IPv6 as a transport for doing dns queries or serving dns to your clients does not prevent you from using IPv6 on your clients.. Its just unbound won't use it as a transport is all - it can still serve up AAAA records just fine. For your clients to use IPv6 with.

                                          Good to know cheers John 😄

                                          It has been interesting working through this and I'm definitely going to f'up my config in the future!
                                          As long as I'm learning in the process that's fine, and I definitely learnt a few things here so thanks for sharing your knowledge.

                                          1 Reply Last reply Reply Quote 0
                                          • GertjanG
                                            Gertjan @PCOL IT Admin
                                            last edited by

                                            @pcol-it-admin said in Slow DNS after 22.05:

                                            yesterday I applied the "DNS Query Forwarding > Enable Forwarding Mode = yes" option in the Services > DNS Resolver > General Settings GUI, and boom - problem gone...

                                            Before, you, that is, unbound, was questioning of the 13 world wide root servers.
                                            If one doesn't work, or was slower, the other was used.

                                            So, initially, my unbound talks to (I'll pick one out of 13) : 192.58.128.30 or j.root-servers.net.
                                            As this is the closest to me.

                                            Now, you're sending all your DNS request to an upstream resolver.
                                            This upstream resolver doesn't exactly what unbound could be doing in the first place.
                                            With four new possibilities :

                                            1. Your upstream resolver decides what IP gets send back - it could be anything from the correct IP to a spoofed one. You will never know.
                                            2. A resolver can have a safety net for spoofing (DNSSEC) - a forwarder can not.
                                            3. single point of failure ! When 8.8.8.8 goes down (to name a known one) your network DNS goes out. This actually happened ..... just 48 hours ago.
                                            4. you become a product.

                                            Internet itself, works only with resolvers. Forwarders were useful in the past as our ISP could not give us expensive ISP routers with processors that could run local resolvers. So, every SOHO connection was forwarding.
                                            Those who use pfSense do not have (small) SO HO connections. They, the admins, want the real thing.

                                            IMHO : why does 8.8.8.8 1.1.1.1 etc etc exist today ?
                                            Because root, tld and domain DNS servers are not reachable ? If that's the case, consider (a part of) Internet down? That would be world wide news.
                                            So, no.
                                            You know why they (still) exist.
                                            It's a big money question for them - and yes, I know, their usage is free ;)

                                            @pcol-it-admin said in Slow DNS after 22.05:

                                            and boom

                                            The boom was probably that you restarted unbound.
                                            And you changed from resolver to forward mode.
                                            I nice test would be : go back to resolver mode - this will restart unbound ones more.

                                            Does it still work ? If so : you have now solid proof that "resolver" or "forward" mode wasn't the issue, so neither the solution.
                                            Resolving doesn't work ? So root servers etc are not reachable ? Some one is doing MITM above your head ? For me, I would go in mayday mode if resolver OR forward mode doesn't work. Both should work out of the box, and if not, I have an urgent issue - or a very .doubtful ISP or whatever else is happening above my connection.

                                            No "help me" PM's please. Use the forum, the community will thank you.
                                            Edit : and where are the logs ??

                                            P 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.