Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Microsoft Updates Not Progressing

    Scheduled Pinned Locked Moved General pfSense Questions
    53 Posts 5 Posters 9.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GertjanG
      Gertjan @StormGate
      last edited by

      @stormgate said in Microsoft Updates Not Progressing:

      Unbound Mode only

      Using this mode, after sorting, removing the doubles, all DNSBL info is placed in one file ( see it here - it(s the 'biggest' file ) and unbound is informed to read it during startup.
      Unbound isn't fast at reading these files, so on every restart, it will take time, timing during your network has no DNS.

      The "python mode" is using a python script ( as the developers of unbound chose python as a script/API access for unbound ) : unbound loads the small python script, and can continue.
      This python scripts handles the big DNSBL file access, and also adds some new features, like regex filtering, AAAA filtering, and gives you a way to exclude some LAN devices from being DNSBL filtered.
      Python mode is well tested by now.

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      S 1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Hmm, so your test was using python mode and it still caused huge delays with that massive list @Gertjan?

        GertjanG 1 Reply Last reply Reply Quote 0
        • S
          StormGate @Gertjan
          last edited by

          @gertjan Thank you, I will give it a try, as the issue with microsoft updates is far from fixed. One PC has been running since 5PM yesterday to get its updates and its at 20% on only one of them. So simply changing the mode is all I need to do to implement python?

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Yup. See: https://forum.netgate.com/post/947354

            1 Reply Last reply Reply Quote 0
            • GertjanG
              Gertjan @stephenw10
              last edited by

              @stephenw10 said in Microsoft Updates Not Progressing:

              Hmm, so your test was using python mode and it still caused huge delays with that massive list @Gertjan?

              Yep, I'm using python mode.
              Most of the 'huge file' treatment doesn't change, as pfblockerng still has to download de DNSBL file.
              Sort it.
              Adding it to the 'main' DNSBL file, while taking care of 'doubles'.
              This is done using PHP, and has nothing to with the 'Python mode" which is actually just a set of function used in the resolve process within unbound.

              PHP isn't famous for it text file parse power ;)

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              stephenw10S 1 Reply Last reply Reply Quote 1
              • stephenw10S
                stephenw10 Netgate Administrator @Gertjan
                last edited by

                @gertjan said in Microsoft Updates Not Progressing:

                PHP isn't famous for it text file parse power ;)

                Ha! Indeed.

                S 1 Reply Last reply Reply Quote 0
                • S
                  StormGate @stephenw10
                  last edited by

                  @stephenw10 Yeah I am starting to wonder if I have a DNS setup issue cause nothing seems to be work correct. Its not really blocking sites, even adult sites should be blocked regardless of pfblockerng because I am using cloudflares malware and adult site DNS values but they all still go thru. I followed so many different tutorials on DNS over TLS and making sure the devices only get their DNS form pfsense starting to question it.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    If you have just entered cloudflare DNS in System > General Setup that will only do anything for clients if Unbound is set in forwarding mode. Otherwise it resolves dircetly and ignore those settings.

                    S 1 Reply Last reply Reply Quote 0
                    • S
                      StormGate @stephenw10
                      last edited by

                      @stephenw10 Like this you mean.
                      dnsforward.PNG

                      S 1 Reply Last reply Reply Quote 0
                      • S
                        StormGate @StormGate
                        last edited by

                        @stormgate But I don't have this checked.
                        dnsunchecked.PNG

                        GertjanG 1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Yup, like that. In forwarding mode you should usually disable DNSSec also.

                          You don't need to have Unbound respond to DoT queries internally.

                          S 2 Replies Last reply Reply Quote 0
                          • S
                            StormGate @stephenw10
                            last edited by

                            @stephenw10 Thanks yes DNSsec is unchecked.

                            1 Reply Last reply Reply Quote 0
                            • S
                              StormGate @stephenw10
                              last edited by

                              @stephenw10 And these are the rules I was told to setup to make this all happen.
                              rules.PNG

                              1 Reply Last reply Reply Quote 0
                              • GertjanG
                                Gertjan @StormGate
                                last edited by

                                @stormgate said in Microsoft Updates Not Progressing:

                                @stormgate But I don't have this checked.
                                dnsunchecked.PNG

                                @stormgate said in Microsoft Updates Not Progressing:

                                @stormgate But I don't have this checked.
                                dnsunchecked.PNG

                                Windows 11 Pro might handle DNS over TLS port 853.
                                Windows 10 : no-go (but you could install an add-in utility).

                                Btw : You only need to encrypt your own local DNS traffic if you do not trust your own wiring ;)

                                This :

                                950bc967-716b-486e-b30a-223186c9789b-image.png

                                only works if you set up each LAN client individually.
                                It's TLS - so you can't use a an IP, you need a fqdn, and this fqdn must be part of he certificate unbound uses to initiate the TLS traffic.
                                Like https..... (which is http over tls).

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                1 Reply Last reply Reply Quote 1
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Those rules are on LAN I assume?

                                  That will prevent clients using external DNS and DNSoverTLS servers.

                                  A rule with destination 127.0.0.1 can never match anything. Localhost like that is only valid on the host itself. Unless you have already added a port forward to redirect.

                                  Those rules don't block DNSoverHTTPS so clients that use that will get real results.

                                  You are ofetn better off redirecting DNS traffic to pfSense. That way anything hard coded with an external server, like 8.8.8.8, will still be able to resolve:
                                  https://docs.netgate.com/pfsense/en/latest/recipes/dns-redirect.html

                                  Steve

                                  S 2 Replies Last reply Reply Quote 1
                                  • S
                                    StormGate @stephenw10
                                    last edited by

                                    @stephenw10 Headed to work and will have a look, too me it didn't look right but not being an expert I took the recommendations on the rules. What is the best method on this device to take when it comes to up a secure DNS environment that works and allows the categories to be blocked correctly. I'll look at that link.

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      StormGate @stephenw10
                                      last edited by

                                      @stephenw10 I think I may see the issue, I do have the DNS over TLS NAT rule but I guess I need one for each VLAN, its only only setup on the Default Vlan. But maybe the rules themselves need some work also.

                                      dnstlsnat.PNG

                                      GertjanG 1 Reply Last reply Reply Quote 0
                                      • GertjanG
                                        Gertjan @StormGate
                                        last edited by Gertjan

                                        @stormgate
                                        Why would you want to use DNS over TLS on the pfSense LAN side & VLAN side ?
                                        You will be one of the first to do so among the pfSense user base, over 100 000 (this is very IMHO).
                                        Again : you will have to configure every LAN/VLAN device ! See [https://en.wikipedia.org/wiki/DNS_over_TLS](https://en.wikipedia.org/wiki/DNS_over_TLS.

                                        It can be done of course.
                                        I've installed a Windows 10 Pro DNS-over-TLS client just a couple of days ago.

                                        If you want to make your traffic invisible, go for the much simpler VPN tunnel.

                                        Or do you really want to MITM with pfSense ? ;)

                                        No "help me" PM's please. Use the forum, the community will thank you.
                                        Edit : and where are the logs ??

                                        S 1 Reply Last reply Reply Quote 0
                                        • S
                                          StormGate @Gertjan
                                          last edited by

                                          @gertjan Only because I thought DNS over TLS was a better secure setup, but I have no other reason. I would be prefer to set it up so its reliable and works for everything and yet secure. Would you simply recommend setting up DNS (53) with a some rules? This system is going to be thousands of kms away so I have no margin for error, so the most recommended setup is what I will adhere too. Thanks

                                          GertjanG 1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            Category based DNS filtering on the firewall can only be done via pfBlocker like that.

                                            You can block DoH using IP lists in pfBlocker. Obviously that's not 100%

                                            Firefox will look for a specific domain locally and not use DoH if it finds it. But users can still force it to use DoH.
                                            https://support.mozilla.org/en-US/kb/configuring-networks-disable-dns-over-https

                                            Steve

                                            S 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.