Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfsense blocking certain/some sites

    Scheduled Pinned Locked Moved General pfSense Questions
    74 Posts 7 Posters 14.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      Mmm, it's just this one VM.

      Still does it with DNSSec disabled...

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @stephenw10
        last edited by johnpoz

        @stephenw10 what I can tell what is wrong with their ns, is they do not answer via tcp

        So normal via udp works fine.

        So like to see a +trace from pfsense

        ; <<>> DiG 9.16.26 <<>> portal.bsnl.in +trace
        ;; global options: +cmd
        .                       45761   IN      NS      j.root-servers.net.
        .                       45761   IN      NS      k.root-servers.net.
        .                       45761   IN      NS      l.root-servers.net.
        .                       45761   IN      NS      m.root-servers.net.
        .                       45761   IN      NS      a.root-servers.net.
        .                       45761   IN      NS      b.root-servers.net.
        .                       45761   IN      NS      c.root-servers.net.
        .                       45761   IN      NS      d.root-servers.net.
        .                       45761   IN      NS      e.root-servers.net.
        .                       45761   IN      NS      f.root-servers.net.
        .                       45761   IN      NS      g.root-servers.net.
        .                       45761   IN      NS      h.root-servers.net.
        .                       45761   IN      NS      i.root-servers.net.
        .                       45761   IN      RRSIG   NS 8 0 518400 20221016050000 20221003040000 18733 . YIXaa/EBSQVICUNPRhTRK21PwpQy6pk6zgrYeokFCUG6pPKmfn+7gOiq k12OWXOTYRguXIWv0YauJlYZlRJFOucvxIWI2hE8oeppc5bCDBXUwZ2V 6GDOEYnCkk/8Bh7QgaAGpBYeNbuPj2TD1bDX1dHKOZ/PIOoXeSxAOuAi xkZzEi4/zXqDWmeDA7CVq74qNvVgfkVg0NXDxqFtmJH/cXwvdGsWbeaZ gu95le0xD12RbYGoxfzM06DT4YLJMPJ4evH26D2xnUolBqZ9tbqjAxcv AdnAllbVw5AcuaYQMCqn3qy/x+M4rJKmExFughKCvnZWXxTlGcZDRDt1 0VFw0g==
        ;; Received 525 bytes from 127.0.0.1#53(127.0.0.1) in 0 ms
        
        in.                     172800  IN      NS      ns1.registry.in.
        in.                     172800  IN      NS      ns2.registry.in.
        in.                     172800  IN      NS      ns3.registry.in.
        in.                     172800  IN      NS      ns4.registry.in.
        in.                     172800  IN      NS      ns5.registry.in.
        in.                     172800  IN      NS      ns6.registry.in.
        in.                     86400   IN      DS      54739 8 1 2B5CA455A0E65769FF9DF9E75EC40EE1EC1CDCA9
        in.                     86400   IN      DS      54739 8 2 9F122CFD6604AE6DEDA0FE09F27BE340A318F06AFAC11714A73409D4 3136472C
        in.                     86400   IN      RRSIG   DS 8 1 86400 20221016170000 20221003160000 18733 . MH2IwInVoatMPeKOq084SdgHwlSAZxwSKLePZKNixFq/k5B9sjPwTPg2 sD9QebL9yV/nXQQkwouIpWrIk825ZZYSu+jqfPqX+orjMzlD1Md1EVZc TqWf+JqTTmMzGGnocx7ZswBFhTAXn5/g3enPXZqUyyvaxTVJ3QpWe7TQ ZAvK0hVSWRqcYaCJTyblVRB7X64DgiTuU5JBRVSVqcsqGtN2YIPZETlQ Y2deLx2TsaiDhF1YMKUfGVrji9/N3wGn90FGKNXPEOuLxmf4n/tshoaK 0CzachAt5++rERjalNoZjKCBmFF1o2eRi8DCD5Uqi4+qyeHvRTtJrr6d 48Txwg==
        ;; Received 795 bytes from 198.97.190.53#53(h.root-servers.net) in 58 ms
        
        bsnl.in.                86400   IN      NS      ns11.bsnl.in.
        bsnl.in.                86400   IN      NS      ns12.bsnl.in.
        u7smslveus494o8dr4h483un5spuc1tu.in. 1800 IN NSEC3 1 1 0 - U7T80A19T7AQCC0P8AMD1AC4SCNB2DG5 NS SOA RRSIG DNSKEY NSEC3PARAM TYPE65534
        u7smslveus494o8dr4h483un5spuc1tu.in. 1800 IN RRSIG NSEC3 8 2 1800 20221029024156 20220929023509 65169 in. OhLJIY+hNU2Iba31vmFAZmg83NwqnSy5kTbfU8cZYFG663HzbGHhdv/K GuGaRoYkqyEPpWfBF/VbAKHWi6F9fIGPR2+P2rKgD2eCzcuttKmq9bhX 4uHehoh+Qr06klPyF+TGp/iQvxyKJIMX0c/AFM2bbG4y/D7qO/5j0cK8 qheSA/XC8aOj/yRrY23Q84506B9plijHJfG3M+/T5qBjCA==
        cpcirneso3q726baurorn492qjc704f7.in. 1800 IN NSEC3 1 1 0 - CPDC4IU515A25D00VQOT9RS8DOGC39NO NS DS RRSIG
        cpcirneso3q726baurorn492qjc704f7.in. 1800 IN RRSIG NSEC3 8 2 1800 20221029024559 20220929023325 65169 in. d+tE+NTWj1j/jbF2vO1vjtwPcxNDdJFFk2VWc3ijj6q/utOfqL/wtZUv tZd6ofRu+M0SHvxGzjJcZpiqMf9HaMOkGKLXfXO1sohlJLqNuQgs4RTr 9VjO1qnfnXZNkSP2aDP9KdnKcwcHHQv4cR6J5hPi7XOaURTIM3kI5YkC yq4rdXQIxtkWC0D+aOUP+mpHrm4+27qbSbYoqOCDDRE9+Q==
        ;; Received 724 bytes from 156.154.100.20#53(ns5.registry.in) in 58 ms
        
        portal.bsnl.in.         10800   IN      A       117.255.216.68
        portal.bsnl.in.         10800   IN      RRSIG   A 7 3 10800 20221010221608 20221003211608 51428 bsnl.in. Vlc2csKOp69KSqiKUQl6iIAzgycNTMj1Oj+84dyYtjatWlBHMvtjkUMK XjhfLoI4RVZkaZgd20KNKddNKwId8Qs+kOH0fYSS4jAkEB+llzt5pOdN 8jYweG5dLFjgZmH67oUDLEjemO7PQiWduPOB7tXU5NukoKqjpD1HtL7m 8qI=
        bsnl.in.                10800   IN      NS      ns12.bsnl.in.
        bsnl.in.                10800   IN      NS      ns11.bsnl.in.
        bsnl.in.                10800   IN      RRSIG   NS 7 2 10800 20221010221602 20221003211602 51428 bsnl.in. XGHAXve5mEGouSP3gISD3XJp3lQnQsk+qSdzm2UHsOlEcvNj0kyNwRl/ 1etqIKNnzByXhh3spngJdOlyMvsrlZfodsviJ/6v3VzlmJoawlUZuLov UddqQmq15Xnj7S3Hi5xPq8rTXIAXvqGSpjUifZDCFlUcmY89iTwpI9Sb FAo=
        ;; Received 797 bytes from 218.248.240.209#53(ns12.bsnl.in) in 334 ms
        

        But notice when you try it via tcp

        
        [22.05-RELEASE][admin@sg4860.local.lan]/root: dig portal.bsnl.in +trace +tcp
        
        ; <<>> DiG 9.16.26 <<>> portal.bsnl.in +trace +tcp
        ;; global options: +cmd
        .                       45742   IN      NS      l.root-servers.net.
        .                       45742   IN      NS      m.root-servers.net.
        .                       45742   IN      NS      a.root-servers.net.
        .                       45742   IN      NS      b.root-servers.net.
        .                       45742   IN      NS      c.root-servers.net.
        .                       45742   IN      NS      d.root-servers.net.
        .                       45742   IN      NS      e.root-servers.net.
        .                       45742   IN      NS      f.root-servers.net.
        .                       45742   IN      NS      g.root-servers.net.
        .                       45742   IN      NS      h.root-servers.net.
        .                       45742   IN      NS      i.root-servers.net.
        .                       45742   IN      NS      j.root-servers.net.
        .                       45742   IN      NS      k.root-servers.net.
        .                       45742   IN      RRSIG   NS 8 0 518400 20221016050000 20221003040000 18733 . YIXaa/EBSQVICUNPRhTRK21PwpQy6pk6zgrYeokFCUG6pPKmfn+7gOiq k12OWXOTYRguXIWv0YauJlYZlRJFOucvxIWI2hE8oeppc5bCDBXUwZ2V 6GDOEYnCkk/8Bh7QgaAGpBYeNbuPj2TD1bDX1dHKOZ/PIOoXeSxAOuAi xkZzEi4/zXqDWmeDA7CVq74qNvVgfkVg0NXDxqFtmJH/cXwvdGsWbeaZ gu95le0xD12RbYGoxfzM06DT4YLJMPJ4evH26D2xnUolBqZ9tbqjAxcv AdnAllbVw5AcuaYQMCqn3qy/x+M4rJKmExFughKCvnZWXxTlGcZDRDt1 0VFw0g==
        ;; Received 525 bytes from 127.0.0.1#53(127.0.0.1) in 0 ms
        
        in.                     172800  IN      NS      ns1.registry.in.
        in.                     172800  IN      NS      ns2.registry.in.
        in.                     172800  IN      NS      ns3.registry.in.
        in.                     172800  IN      NS      ns4.registry.in.
        in.                     172800  IN      NS      ns5.registry.in.
        in.                     172800  IN      NS      ns6.registry.in.
        in.                     86400   IN      DS      54739 8 1 2B5CA455A0E65769FF9DF9E75EC40EE1EC1CDCA9
        in.                     86400   IN      DS      54739 8 2 9F122CFD6604AE6DEDA0FE09F27BE340A318F06AFAC11714A73409D4 3136472C
        in.                     86400   IN      RRSIG   DS 8 1 86400 20221016170000 20221003160000 18733 . MH2IwInVoatMPeKOq084SdgHwlSAZxwSKLePZKNixFq/k5B9sjPwTPg2 sD9QebL9yV/nXQQkwouIpWrIk825ZZYSu+jqfPqX+orjMzlD1Md1EVZc TqWf+JqTTmMzGGnocx7ZswBFhTAXn5/g3enPXZqUyyvaxTVJ3QpWe7TQ ZAvK0hVSWRqcYaCJTyblVRB7X64DgiTuU5JBRVSVqcsqGtN2YIPZETlQ Y2deLx2TsaiDhF1YMKUfGVrji9/N3wGn90FGKNXPEOuLxmf4n/tshoaK 0CzachAt5++rERjalNoZjKCBmFF1o2eRi8DCD5Uqi4+qyeHvRTtJrr6d 48Txwg==
        ;; Received 795 bytes from 193.0.14.129#53(k.root-servers.net) in 42 ms
        
        bsnl.in.                86400   IN      NS      ns12.bsnl.in.
        bsnl.in.                86400   IN      NS      ns11.bsnl.in.
        u7smslveus494o8dr4h483un5spuc1tu.in. 1800 IN NSEC3 1 1 0 - U7T80A19T7AQCC0P8AMD1AC4SCNB2DG5 NS SOA RRSIG DNSKEY NSEC3PARAM TYPE65534
        u7smslveus494o8dr4h483un5spuc1tu.in. 1800 IN RRSIG NSEC3 8 2 1800 20221029024156 20220929023509 65169 in. OhLJIY+hNU2Iba31vmFAZmg83NwqnSy5kTbfU8cZYFG663HzbGHhdv/K GuGaRoYkqyEPpWfBF/VbAKHWi6F9fIGPR2+P2rKgD2eCzcuttKmq9bhX 4uHehoh+Qr06klPyF+TGp/iQvxyKJIMX0c/AFM2bbG4y/D7qO/5j0cK8 qheSA/XC8aOj/yRrY23Q84506B9plijHJfG3M+/T5qBjCA==
        cpcirneso3q726baurorn492qjc704f7.in. 1800 IN NSEC3 1 1 0 - CPDC4IU515A25D00VQOT9RS8DOGC39NO NS DS RRSIG
        cpcirneso3q726baurorn492qjc704f7.in. 1800 IN RRSIG NSEC3 8 2 1800 20221029024559 20220929023325 65169 in. d+tE+NTWj1j/jbF2vO1vjtwPcxNDdJFFk2VWc3ijj6q/utOfqL/wtZUv tZd6ofRu+M0SHvxGzjJcZpiqMf9HaMOkGKLXfXO1sohlJLqNuQgs4RTr 9VjO1qnfnXZNkSP2aDP9KdnKcwcHHQv4cR6J5hPi7XOaURTIM3kI5YkC yq4rdXQIxtkWC0D+aOUP+mpHrm4+27qbSbYoqOCDDRE9+Q==
        ;; Received 724 bytes from 2001:502:2eda::20#53(ns5.registry.in) in 54 ms
        
        ;; Connection to 218.248.240.178#53(218.248.240.178) for portal.bsnl.in failed: connection refused.
        ;; Connection to 218.248.240.209#53(218.248.240.209) for portal.bsnl.in failed: connection refused.
        [22.05-RELEASE][admin@sg4860.local.lan]/root: 
        

        And you get the same warning here
        https://dnsviz.net/d/portal.bsnl.in/dnssec/

        tcp.jpg

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        bingo600B 1 Reply Last reply Reply Quote 1
        • bingo600B
          bingo600 @johnpoz
          last edited by

          @johnpoz
          Nice detective work šŸ‘ šŸ‘

          Now i have to read up on the various dig features 😊

          /Bingo

          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

          pfSense+ 23.05.1 (ZFS)

          QOTOM-Q355G4 Quad Lan.
          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @bingo600
            last edited by johnpoz

            @bingo600 why he would be trying tcp and not udp, not sure. But not answering tcp can cause issues for sure..

            Sometimes it is just crazy to me the lack of any understanding of dns for companies that provide servers like websites.. And control their own dns.

            Notice the ns are ns11 and ns12 bsnl.in its not like they are having their dns hosted by someone - they have registered their own name servers..

            If your going to to do - please have some clue to how to setup and manage dns ;) And if your going to use dnssec - read the rfcs for gosh sake ;) Notice the 11 warnings where they are using the the wrong algo.

            Notice this sort of error, when set the limit to 512, which was old limit without edns etc. that would for move to tcp from udp.. You can for sure exceed 512 when doing dnssec

            $ dig @ns11.bsnl.in portal2.bsnl.in +dnssec +bufsize=512
            ;; Truncated, retrying in TCP mode.
            ;; Connection to 218.248.240.178#53(218.248.240.178) for portal2.bsnl.in failed: connection refused.
            

            see msg size when I ask for dnssec info

            ;; Query time: 309 msec
            ;; SERVER: 218.248.240.178#53(218.248.240.178)
            ;; WHEN: Mon Oct 03 23:08:30 Central Daylight Time 2022
            ;; MSG SIZE  rcvd: 798
            

            If I set bufsize to 798 it works, if set to 797 is fails because its trying to fall back to tcp, which isn't working.. So yeah I could see lots of problems with this domain for sure. If for whatever reason the connection to the NSers are being limited to the udp msg size. below the size of what that server is sending back.

            As a hack/workaround to getting this to work, you could forward to say one of the big boys, google, quad9, 1111 etc.. You could setup a domain override for this specific domain, so that when you ask unbound for this specific domain, it forwards to say 8.8.8.8

            The correct thing to do would be to figure out why this site isn't answering on tcp and have them fix that, or figure out exactly why there is a limit in the udp size going on..

            Maybe his isp is limiting it? And works on other sites because they answer on the tcp fallback, but this site fails because its its not answering on tcp..

            edit: see here when I set udp 512 limit, in my query.. It sends back hey this is Truncated the answer will not fit in that size. So the client asks via tcp, but the server not answering on tcp.

            TC.jpg

            I don't know why pfsense would be limiting its size in its query, not exactly sure why client would be doing that either, so the limit has to be happening somewhere between I would think.

            Would be interesting to see the query that is leaving pfsense.. Sniff on the wan while your client asks for the portal.bsnl.in would be good info. See in my sniff, I can tell if a payload size is limited by pfsense. Notice when I just ask, does it ask if a directed query from the client asks ns11 or ns12 directly?

            For pfsense to ask, you might have to flush cache of pfsense between queries for it, etc.

            Normally should look like this.

            udppayload.jpg

            edit2:

            Has the advanced edns options in unbound been messed with?

            unbound.jpg

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            bingo600B G 3 Replies Last reply Reply Quote 2
            • bingo600B
              bingo600 @johnpoz
              last edited by

              @johnpoz said in pfsense blocking certain/some sites:

              Has the advanced edns options in unbound been messed with?

              I doubt it had been messed with by OP

              Nice debugging

              I'm forwarding pfSense (unbound) DNS queries to my local bind9 server(s).
              Primarily because i already had that in place, with working DDNS registration for my home domain.

              And i made dual secondary DNS servers in the summerhouse (blush), that my summerhouse pfS is using as forwarders. Summerhouse DNS'es are also registering DDNS on the primary DNS, making all DDNS to replicate via primary to secondaries , and available on both sites.

              So any queries from me would be done by bind9.

              Btw:
              That https://dnsviz.net/ is quite revealing.
              Now i have to look into the possibility of RR sigs on my "public domain" (hosted) 😧 - Thanx or ..... Now i can't get that out of my head šŸ¤•

              /Bingo

              If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

              pfSense+ 23.05.1 (ZFS)

              QOTOM-Q355G4 Quad Lan.
              CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
              LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

              johnpozJ 1 Reply Last reply Reply Quote 0
              • G
                Gurveer @johnpoz
                last edited by

                @johnpoz how to forward this portal2.bsnl.in or portal.bsnl.in to 8.8.8.8 or 1.1.1.1? Please help

                GertjanG 1 Reply Last reply Reply Quote 0
                • GertjanG
                  Gertjan @Gurveer
                  last edited by

                  @gurveer

                  First :

                  4fb71672-570d-4fd1-92ba-1192faa78a38-image.png

                  Then :

                  2b85bd4a-ed9b-40fd-83da-de4750aeb443-image.png

                  Save and then Apply.

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  1 Reply Last reply Reply Quote 0
                  • G
                    Gurveer @johnpoz
                    last edited by

                    @johnpoz @bingo600 @Gertjan @rcoleman-netgate @stephenw10 @viragomann thanks mine was set to automatic value based interface mtu changed to unbound default sites started working flawlessly after which i enabled dns forwarding too. Huge thanks you guys

                    bingo600B 1 Reply Last reply Reply Quote 0
                    • bingo600B
                      bingo600 @Gurveer
                      last edited by bingo600

                      @gurveer
                      Why do you use forward, and not just let pfSense resolve ???
                      Any specific reason or ???

                      Another +1 for @johnpoz šŸ‘

                      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                      pfSense+ 23.05.1 (ZFS)

                      QOTOM-Q355G4 Quad Lan.
                      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                      GertjanG G 2 Replies Last reply Reply Quote 0
                      • GertjanG
                        Gertjan @bingo600
                        last edited by

                        @bingo600 said in pfsense blocking certain/some sites:

                        Any specific reason or ???

                        Something like : The name servers involved being unable to communicate over TCP (so these names servers 'break' DNS) + a total fxckxd up DNSSEC = his unbound resolver refuses to work.

                        All this said, something amazing is happening : I can look at the site :

                        d6864732-d28d-404e-8183-549be0a2981e-image.png

                        and I'm not forwarding, I'm using the pfSense resolver unbound with default settings + dnssec hardening.
                        So, I tend to think 'something' is not good on @Gurveer's side.
                        If my pfSense + unbound resolvers works
                        It should also work for @Gurveer.

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        bingo600B 1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          I think Johnpoz meant to add a domain override for bsnl.in to 8.8.8.8 or similar so everything else is still resolved directly rather than use forwarding mode.

                          johnpozJ 1 Reply Last reply Reply Quote 1
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @stephenw10
                            last edited by

                            @stephenw10 exactly..

                            But did he mess with his udp size? If he did he prob doesn't need to forward and this domain would work.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • G
                              Gurveer @bingo600
                              last edited by

                              @bingo600 nothing just did on whim it is fine to run forwarder ?

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @bingo600
                                last edited by

                                @bingo600 said in pfsense blocking certain/some sites:

                                I doubt it had been messed with by OP

                                You would think that huh - but I find that quite often users click on shit all the time.. Until actually see screenshot or a sniff showing it using 4096, etc. You have no idea what is actually happening other than that ns isn't answering on tcp, and it sends back large info that could exceed 512, etc.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Well I have two machines here hitting this and I'm pretty certain I never changed the buffer size. Both are set to the default (auto based on MTU). Both have 1500B WANs.

                                  Just digging to see what the actual buffer size is but I don't know where that is...yet

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    Looks to be 512 in unbound.conf...

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Mmm, and on working devices:

                                      edns-buffer-size: 1432
                                      

                                      That's in 22.11 so newer Unbound version

                                      johnpozJ 1 Reply Last reply Reply Quote 1
                                      • johnpozJ
                                        johnpoz LAYER 8 Global Moderator @stephenw10
                                        last edited by

                                        @stephenw10 that was changed from default, see my screenshot shows 4096 as default.. on 22.05

                                        I had not read that unbound was changing their default settings. But sure pfsense could, default for unbound I think is 1232, I think that came out of a flag day for dns back a couple of years ago.

                                        But that can be overridden with that actual bufsize setting, etc. But the max-udp-size: I believe defaults to 4096.

                                        But if your having issues with a NS that is not answering on tcp, it would behoove you to validate what your settings are, etc. To make sure they are appropriate for your network connection.

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                                        1 Reply Last reply Reply Quote 1
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          That isn't the pfSense default config though. At least not any longer. It should be Auto based on MTU there since 2.5 https://redmine.pfsense.org/issues/10293
                                          If that's a machine that was upgraded from before that it might still be 'Unbound default'. Several of mine are which is why they weren't hitting it.
                                          Still can;t see why these two machines I have ended up at 512 when all their interfaces are 1500B MTU. However I'm not seeing it on any 22.11 test box so it might be moot.

                                          Steve

                                          johnpozJ 1 Reply Last reply Reply Quote 1
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator @stephenw10
                                            last edited by

                                            @stephenw10 I agree with a setting based on mtu is prob the best scenario..

                                            IMHO the problem here is that the NS for this domain doesn't answer on tcp - which is going to cause problems for sure..

                                            I see a few options here, make sure unbound is using an appropriate size for your network and its connection. If settings are correct, and still having issue then the hack/workaround for such a domain would be to forward for that "specific" domain to remove your connections issue with large udp.

                                            The nuclear option sure is to forward all your queries and let them worry about it ;) But to me that is burning down the house to kill a spider..

                                            spider.jpg

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                                            1 Reply Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.