Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense, Unbound & Netflix = No go...

    Scheduled Pinned Locked Moved DHCP and DNS
    22 Posts 5 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @furom
      last edited by

      @furom said in pfSense, Unbound & Netflix = No go...:

      But the DNS-rule on netflix network creates no states...

      The one to pfsense IP? That would point to devices not using pfsense for dns.. Maybe they using doh?

      Even if they are redirecting you should see a state..

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      F 1 Reply Last reply Reply Quote 0
      • F
        furom @johnpoz
        last edited by

        @johnpoz said in pfSense, Unbound & Netflix = No go...:

        Even if they are redirecting you should see a state..

        After unchecking the option above it works great again... :) Time fo celebrate with an episode of something I suppose. :)

        Would be grand to know if this option should work with Unbound, or is it my player that has a problem with it? It does use the pfSense DNS btw, or at least states that it does...

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @furom
          last edited by

          @furom said in pfSense, Unbound & Netflix = No go...:

          And yes, it says quite clear that it may break a lot, but worked fine with Quad9 so why suspect it...

          Why would you think that would work when you forward.. That is a resolver option.. Forwarding isn't going to use min name - how would that work?

          If you are resolving - yeah strict is going to break quite a bit of shit that can tell you for sure..

          I don't see how that could work if you were forwarding at all to be honest.. I have never tested what exactly would happen when forwarding.. Well because it would be pointless to try and do qname minimization if you were forwarding..

          But I might see what unbound actually does with qname on and forwarding.. I don't see how that is a valid configuration to be honest.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          F 2 Replies Last reply Reply Quote 1
          • F
            furom @johnpoz
            last edited by

            @johnpoz said in pfSense, Unbound & Netflix = No go...:

            Why would you think that would work when you forward.

            I thought I used the Resolver? I only said I fell back on forwarding as I didn't get Unbound Resolving to work initially. Sorry if it was confusing. It has been a bit for for me, but finally works now

            1 Reply Last reply Reply Quote 0
            • F
              furom @johnpoz
              last edited by

              @johnpoz said in pfSense, Unbound & Netflix = No go...:

              I don't see how that could work if you were forwarding at all to be honest..

              I wouldn't be surprised if it just "tolerated" it then. I have once set it and then changed to forward-mode after that I suppose, it never complained :)

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @furom
                last edited by

                @furom said in pfSense, Unbound & Netflix = No go...:

                have once set it and then changed to forward-mode after that I suppose

                yeah I would think it forwarder mode it would be ignored.. But moving back to resolver mode it would use it, but strict is going to fail on all kinds of stuff that is for sure.. There is blog about it on cloudflare I think.

                If I get a chance later today document what happens when you use when resolving, non strict and then see what it does if switch over to forwarder mode.. Does it send a shit ton of extra queries or just ignore it?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                1 Reply Last reply Reply Quote 1
                • M
                  MoonKnight @johnpoz
                  last edited by

                  @johnpoz
                  Hi,

                  I belive this is the right way to do DNS redirect?

                  fe046166-84f2-4c3c-ac35-e6b0e71daf9d-image.png

                  --- 24.11 ---
                  Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
                  Kingston DDR4 2666MHz 16GB ECC
                  2 x HyperX Fury SSD 120GB (ZFS-mirror)
                  2 x Intel i210 (ports)
                  4 x Intel i350 (ports)

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @MoonKnight
                    last edited by

                    @moonknight sure - but what is the 853 for... Did you have your clients using dot to talk to unbound? I don't see any point to that on your local network that is for sure.

                    And the redirect of dot isn't going to work.. Not with any client that actually validates who they are talking to for dot, because that is like one of the important aspects of dot or doh, validation of who your getting your dns from.

                    Also clients don't really do dot they do doh, so no port 853.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    M 1 Reply Last reply Reply Quote 1
                    • M
                      MoonKnight @johnpoz
                      last edited by

                      @johnpoz
                      yeah you are right. I probably don't need the DoT (853) rule, since the unbound is handling DoT.

                      389eb3da-73bf-48d1-ba86-5215244642b1-image.png

                      I'm blocking DoH anyways from floating rule.

                      982e0d94-c496-4502-840b-72db4f87f0b1-image.png

                      Thanks, then i can remove the 853 rules from my local networks :)

                      --- 24.11 ---
                      Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
                      Kingston DDR4 2666MHz 16GB ECC
                      2 x HyperX Fury SSD 120GB (ZFS-mirror)
                      2 x Intel i210 (ports)
                      4 x Intel i350 (ports)

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @MoonKnight
                        last edited by

                        @moonknight said in pfSense, Unbound & Netflix = No go...:

                        then i can remove the 853 rules from my local networks :)

                        Sure - while sure you could setup some client on your network to use dot to talk to unbound.. I just don't see the point/value of such a setup.. I mean it is your network, who would be hostile on your network sniffing for your dns traffic? ;)

                        Now if this unbound was out on the net somewhere, and you wanted to forward your local dns to it via dot then that could make sense.

                        But redirection of dot would be designed to fail redirection. Because the dot client should validate the cert is for the fqdn or IP the client is setup to talk to.. So for example if suppose to be talking to quad9.dns.net or whatever your unbound sure would not be able to return a cert for that that the client trusted as you being quad9.dns.net..

                        Now you could actually do that - but how do you know what your client might be wanting to talk to - you would have to be able to generate the correct cert on the fly, and then your client would also have to trust your CA you were signing the cert with, etc.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        M 1 Reply Last reply Reply Quote 1
                        • M
                          MoonKnight @johnpoz
                          last edited by

                          @johnpoz said in pfSense, Unbound & Netflix = No go...:

                          @moonknight said in pfSense, Unbound & Netflix = No go...:

                          then i can remove the 853 rules from my local networks :)

                          Sure - while sure you could setup some client on your network to use dot to talk to unbound.. I just don't see the point/value of such a setup.. I mean it is your network, who would be hostile on your network sniffing for your dns traffic? ;)

                          Well, maybe my wife or kids ๐Ÿ˜€

                          Now if this unbound was out on the net somewhere, and you wanted to forward your local dns to it via dot then that could make sense.

                          But redirection of dot would be designed to fail redirection. Because the dot client should validate the cert is for the fqdn or IP the client is setup to talk to.. So for example if suppose to be talking to quad9.dns.net or whatever your unbound sure would not be able to return a cert for that that the client trusted as you being quad9.dns.net..

                          Now you could actually do that - but how do you know what your client might be wanting to talk to - you would have to be able to generate the correct cert on the fly, and then your client would also have to trust your CA you were signing the cert with, etc.

                          I do use Quad9 DNS servers. I just like to have little bit more control of all the DNS traffics leaving my pfsense.
                          There is so many devices that have hardcoded DNS, you know, smart thigs, SmartTV, browsers, cell phones etc. I don't see the point why they use hardcoded DNS or DNS over HTTPS... It's my fu...... network ๐Ÿ˜‚
                          71a73a3e-e039-4073-999c-c075b35f9c6e-image.png

                          Thanks again for your Informations @johnpoz ๐Ÿ‘ ๐Ÿ˜

                          --- 24.11 ---
                          Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
                          Kingston DDR4 2666MHz 16GB ECC
                          2 x HyperX Fury SSD 120GB (ZFS-mirror)
                          2 x Intel i210 (ports)
                          4 x Intel i350 (ports)

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.