Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Need help troubleshooting DNS after upgrade to 22.05

    Scheduled Pinned Locked Moved DHCP and DNS
    10 Posts 6 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      vbredjp
      last edited by vbredjp

      Situation:
      After upgrading to 22.05 from 22.01, having intermittent DNS problems.

      Problem description:
      DNS will work generally but sometimes stop resolving certain domains for example yahoo.co.jp, bricklink.com, ghacks.net, dynatron.co etc. (just few examples I noticed). not all at the same time or consistency and so it is hard to detect when the problem occurring because it will stop resolving only certain domain names, not always same domains and what seems to be random times, noticed that problem sometimes fixes by itself in time (30min to 2 hours)
      The problem is 100% with pfsense DNS resolver as restarting unbound service fixes the problem, also manually changing DNS to something else on client fixes the problem.

      Unbound logs does not show anything unusual.

      Diagnostics directly from pfsense DNS lookup menu also cant find problematic host names so it's not client problem, also it occurs on entire network multiple clients different OS (windows, linux, android, ios).

      There were other topics about slow dns or dns problems in 22.05 with various suggestions
      things I tried:
      Disabling DHCP registration (did not help)
      Disabling DNSSEC (seems to have reduced occurrences but did not solve problem)
      putting in custom option
      server:
      do-ip6: no
      did not help.

      any tips for diagnosing this problem that would provide useful diagnostics when problem occurring? to help troubleshooting and finding root cause.

      1 Reply Last reply Reply Quote 1
      • C
        camg
        last edited by

        I am getting this same issue after the exact same upgrade. I have a Netgate 2100.
        I am starting to look at packet captures but have not discovered anything yet.
        Please let me know if you found a fix.

        V 1 Reply Last reply Reply Quote 0
        • V
          vbjp @camg
          last edited by vbjp

          @camg there's no fix it seems that it's bug in this particular version of unbound used in 22.05. this bug seems to be somewhat fixed in latest version of unbound but for that you will need to wait for either new version of pfsense or for netgate to allow unbound update in current version. 22.01 or 2.6 not affected by this so there is also downgrade option.

          C 1 Reply Last reply Reply Quote 1
          • S SteveITS referenced this topic on
          • C
            camg @vbjp
            last edited by

            @vbjp I switched the resolver off and the dns forwarder on (using my ISP's DNS servers) and everything on my network functions again. I'm wondering how this isn't a larger problem and why a fix hasn't been pushed out to netgate users.

            bingo600B 1 Reply Last reply Reply Quote 0
            • bingo600B
              bingo600 @camg
              last edited by bingo600

              @camg @vbjp

              We had a weird issue with unbound, a short time ago.
              See : https://forum.netgate.com/post/1064550

              There it seemed like the "Unbound EDNS Buffer Size" was set to :
              512 , and that created an issue with some sites,

              Changing it to 4096 - Unbound default, solved the issue for the poster.

              9282e8c1-86b1-4574-a433-212bfb7e91b3-image.png

              To change goto : Services --> DNS resolver --> Advanced

              0bc4d4a4-7271-4551-aaa1-ba2708e598b7-image.png

              Scroll down to

              9840a922-0528-44c4-a73d-e88e56b5d40f-image.png

              And if not set to 4096 Unbound default , change it to that value.
              It's worth a try.

              The OP in the other thread could also solve it by changing to the forwarder, but that was a circumvention. Not a solution.

              Edit:
              According to this
              https://forum.netgate.com/post/1064607
              The new "Install" default should be : Automatic based on interface MTU

              What is your value set to, right now ??

              /Bingo

              If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

              pfSense+ 23.05.1 (ZFS)

              QOTOM-Q355G4 Quad Lan.
              CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
              LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

              V V 2 Replies Last reply Reply Quote 0
              • V
                vaidas @bingo600
                last edited by

                @bingo600
                hmm I wonder if problem was with MTU all along my WAN interface is
                PPPoE (lots of ISPs in Japan uses this if you want IPv4) and require MTU of 1454

                changed EDNS buffer size setting to 4096 Unbound default

                need to wait to confirm if this fixed it as problem was intermittent but it happened at least 3-6 times per day so in next 24 hour I will know.

                1 Reply Last reply Reply Quote 0
                • V
                  vbjp @bingo600
                  last edited by vbjp

                  @bingo600 changed setting Unbound EDNS Buffer Size to Unbound default and at least for now the problem seems to be gone. need longer time to say for sure but results seems promising.

                  C 1 Reply Last reply Reply Quote 0
                  • C
                    camg @vbjp
                    last edited by

                    @vbjp I tried this. It reduced the occurrence somewhat but not completely. I switched back to the DNS forwarder and everything resolved quickly and completely again.

                    V M 2 Replies Last reply Reply Quote 0
                    • V
                      vbjp @camg
                      last edited by vbjp

                      @camg sorry to hear that. For me it has been running without any problems after changing buffer size. I also have ipv6 disabled.

                      1 Reply Last reply Reply Quote 0
                      • M
                        markster @camg
                        last edited by markster

                        @camg
                        If you can run your own Unbound DNS on separate machine you will not be having all these issues.
                        I have Synology NAS and I compile and build my Unbound straight from Unbound repo. Current version 1.17.
                        It is a solid solution is you can do this.

                        Problem with pfsense including Unbound is that there is no way a user can update just Unbound itself. Over this year Unbound released 4 version. You are always behind if you use supplied Unbound binaries with pfsense.

                        I have used that typo of architecture (separating Unbound DNS) for years. Never had any issues. For these people that use pfBlocker - you can do all domain blocking just using Unbound RPZ. Its easy .

                        1 Reply Last reply Reply Quote 0
                        • GertjanG Gertjan referenced this topic on
                        • GertjanG Gertjan referenced this topic on
                        • S scottlindner referenced this topic on
                        • S scottlindner referenced this topic on
                        • S scottlindner referenced this topic on
                        • S scottlindner referenced this topic on
                        • S scottlindner referenced this topic on
                        • S scottlindner referenced this topic on
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.