Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Major DNS Bug 23.01 with Quad9 on SSL

    Scheduled Pinned Locked Moved General pfSense Questions
    185 Posts 27 Posters 150.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JeGrJ
      JeGr LAYER 8 Moderator @Cylosoft
      last edited by

      @cylosoft We have clients that use the option just fine. So is it a 23.01 problem or a "your configuration/setup" problem?
      Besides - that isn't the context of this thread where it's about a forwarding DNS problem that seems to disappear when I read those responses and seems more related to problems of Quad9.

      But if that's the biggest problem you see, I'd say let's open a separate thread for the DHCP-register / crash problem. Last time I looked at those reports here, most cases where related to pfBlocker+Unbound in combination though. You're running pfB in those configs, too? Just trying to analyze the context/root of the problem :)

      Cheers

      Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

      If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

      C 1 Reply Last reply Reply Quote 0
      • C
        Cylosoft @JeGr
        last edited by

        @jegr said in Major DNS Bug 23.01 with Quad9 on SSL:

        @cylosoft We have clients that use the option just fine. So is it a 23.01 problem or a "your configuration/setup" problem?
        Besides - that isn't the context of this thread where it's about a forwarding DNS problem that seems to disappear when I read those responses and seems more related to problems of Quad9.

        But if that's the biggest problem you see, I'd say let's open a separate thread for the DHCP-register / crash problem. Last time I looked at those reports here, most cases where related to pfBlocker+Unbound in combination though. You're running pfB in those configs, too? Just trying to analyze the context/root of the problem :)

        Cheers

        Yeah I've gone down this road. I understand all the context. I've been on a bunch of these threads posting including this one. We have "fixed" all of our customer configurations except the DHCP. I think the main issue is that the defaults don't work with forwarding and TLS. So generally speaking everyone with forwarding likely has a similar config and now is going down slightly different variations trying to find stable.

        We had a lot of customers with Quad9, TLS, forwarding. As in 24+ customers when we paused the v23 upgrades. We thought it was Quad9 originally. But switching to CF DNS didn't fix it. We also have some customers running Quad9 with TLS on a stand alone DNS server taking most of the DNS traffic and the PF box doing Quad9 with TLS. The PF box will stop and the stand alone DNS box has no issues while using the same IP, and literally traffic going out through the PF box.

        Turning off forwarding or disable TLS with forwarding seems to be a fix. But for those that want forwarding and TLS we have had to disable DNSSEC, enable serve expired, and increase the message cache size. We had several customers where unbound would completely crash about once a week up until we increased message cache size.

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Hmm, something odd there. I use DoT forwarding to Google DNS on my own firewall and I've not seen any issues. 🤔

          C 1 Reply Last reply Reply Quote 0
          • S
            SteveITS Galactic Empire @Gertjan
            last edited by

            @gertjan said in Major DNS Bug 23.01 with Quad9 on SSL:

            What settings ?

            https://forum.netgate.com/post/1091473

            If you're trying to test with forwarding enabled, leave it on for a few days. It doesn't happen immediately. In the past couple months several have said they have to turn off TLS as well but that was not my experience, nor is that noted in the Quad9 KB...however I do not recall to where they were forwarding.

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote 👍 helpful posts!

            S 1 Reply Last reply Reply Quote 0
            • C
              Cylosoft @stephenw10
              last edited by

              @stephenw10 said in Major DNS Bug 23.01 with Quad9 on SSL:

              Hmm, something odd there. I use DoT forwarding to Google DNS on my own firewall and I've not seen any issues. 🤔

              It's not easy to troubleshoot. Especially when customers have limited patience because it will essentially take the internet down for users. It doesn't show up right away. Most seem to be with-in a day or two. But a few customers it would take a week. We haven't sorted out if it's volume based or if it's time based or what.

              If you were doing home network volume and had 15 min outages of DNS every couple of days I'm not sure most people would notice. Spin up a docker of uptime kuma or something similar and have it generate DNS queries and see if you really are up 100%.

              We did add DNS check monitoring and more logging to a bunch of customer locations so we can try to sort things out better.

              1 Reply Last reply Reply Quote 0
              • S
                SteveITS Galactic Empire @SteveITS
                last edited by

                @steveits I'm just going to point out, if this takes a while to appear then on any router where unbound IS restarting regularly, that may hide it. At my home the pfBlocker overnight update restarts it because DNSBL is on.

                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                Upvote 👍 helpful posts!

                1 Reply Last reply Reply Quote 0
                • J
                  joedan
                  last edited by joedan

                  Well unfortunately this is still an issue for me despite my efforts to change ISP and restore / rebuild my configuration.

                  Although I am not using Quad9 but Cloudflare DNS over TLS (without DNSSEC enabled).

                  So back to plain old port 53 forwarding to Cloudflare.

                  Whilst I had some quiet time I did run some dnsperf load testing with an average of 81 queries per second from an Ubuntu VM and managed to recreate what I intermittently see when this issue occurs. DNS over TLS breaks fairly quickly and completely stops DNS queries. I have to restart unbound to fix it.

                  Errors in the syslog are as before when it occurred randomly..

                  [54217:3] debug: tcp error for address 1.1.1.1 port 853
                  [54217:0] debug: outnettcp got tcp error -1

                  I did bump up some of the unbound cache settings, buffers and queries per thread but it still borks up quite quickly.

                  Running the same forwarding to Cloudflare without DNS over TLS I can run around 165 queries per second, it eventually slows down but out of the 3 or 4 times I only managed to break it once where DNS just stopped, otherwise it appeared to recover.

                  If there is anything I can adjust or commands run, I am happy to give it a go if this test can lead us closer to figuring out what’s going on?

                  GertjanG stephenw10S 2 Replies Last reply Reply Quote 0
                  • GertjanG
                    Gertjan @joedan
                    last edited by

                    @joedan

                    Interesting.

                    The common factor is "1.1.1.1".
                    'Normal' DNS uses port 53, most probably most traffic is UDP. Request and answer will always fit in just one Ethernet packet.
                    When using port 853, it uses DNS over TLS, so traffic can only be TCP. I wonder if just one ethernet pack can handle the entire DNS sequence.
                    Still, both methods used would be a fraction of your your WAN throughput.

                    When you visit with your PC a web site, or your mail client drop a mail into your SMTP mail server, or when it retrieves a mail, all traffic will use TLS also.
                    Small difference : this traffic isn't generated by pfSense, pfSense just passes the 'packets' not knowing that it is 'TLS' stuff

                    Did someone do this test :
                    Instead of having pfSense being the forwarder, contact "1.1.1.1" on behalf of the entire LAN, what about setting up the DNS (statically) so they all get their DNS from "1.1.1.1" using TLS (port 853) ? I understood that Windows 11 can do DNS over TLS (Windows 10 needs an extra program to be able to do DNS over TLS).
                    If the issue isn't local or 'pfSense' but somewhere on the link (ISP) or with "1.1.1.1", the issue should be the same.
                    If the issue goes away : that a big finger pointing to pfSense::Unbound.

                    I tend to think : no way .... as me using unbound 1.17.1 (pfSense 23.01) as a forwarder too 1.1.1.1:853 works just fine. Maybe my LANs are to small / not enough devices hammering out enough DNS requests ( a hotel, with many clients connected on the captive portal all day long ) to make the issue show up ?

                    @steveits said in Major DNS Bug 23.01 with Quad9 on SSL:

                    It was working in 22.05 and earlier for me but problematic in 23.01.

                    Humm, I didn't test that.
                    I followed a long and tedious seminar years ago, to learn about DNSSEC, as I wanted to make my own DNS server DNSSEC 'ready'. It was pure pain. I really had the impression that they just made world's most used Internet service (DNS) also the most complicated one.
                    But it worked out : https://dnsviz.net/d/brit-hotel-fumel.fr/dnssec/
                    I admit, I don't know what what unbound does if it was asked to do 'dnnsec' while forwarding.
                    Does it, at first, just get the DNS request and forward "what is the A of 'www.google.com'" to "1.1.1.1" and waits for an answer. And then, in paralellel ( ?) it also gets the RSIG DNSSEC records of the TLD of dot com and then the RSIG records of the DNS name server of google.com to re create from the root key (preloaded and initialized unbound startup - its the upper "DNSKEYalg=8, id=20326 - 2048 bits" key you can see at the DNSSEC trust chain, see my link) to bottom the validity of the chain ? ?
                    I don't know if 1.1.1.1 will honor these RSIG DNSSEC requests.
                    No ... wait ....
                    These RSIG will get send over '53' to the corresponding zone ...they can't be send to 1.1.1.1.
                    And if they ware, 1.1.1.1 would surely ditch them.

                    What I do know : this means unbound is still resolving .... while forwarding, and that doesn't make sens.
                    Also : the root key "20326 " is already known at unbound start, it doesn't change often ( key roll over is a admin's DNS nightmare )
                    But when unbound contacts the TLD domain server (like dot com) it will ask for a NS record of the google.com domain name server AND the zone RSIG at signs the dot come zone at the same moment.
                    The same thing will happen when the domain name server is asked for a A for the ending google.com. The entire trust chain is calculated from top to bottom, and if ok, the answer, the A record is made available for the requesting client.

                    So, yeah, doing DNSSEC while forwarding is like putting gasoline in a Tesla.
                    You would still be able to drive the Tesla, but thinks would become very stinky at the long run.
                    I even wonder where you would put the gasoline.
                    The slights spark would even explode the car as their is not a gas tank to hold it.

                    It doesn't make sense to use DNSSSEC when forwarding, as all these RSIG requests will totally annihilate the gain of time. All DNSSEC traffic is 'non TLS' (DNSSEC isn't available over TLS).
                    When forwarding, you chose to trust the upstream DNS - "no matter what".

                    I will re activate forwarding to 1.1.1.1 over TLS (853) WITH DNSSEC enabled.
                    All bets are open
                    Will useless DNS traffic sky rocket ? Will my pfSense take fire ?

                    Extra : and will unbound really do these RSIG lookup directly to the implicated TLDs and domain name servers, completely bypassing 1.1.1.1 ? I have to check that.

                    ....
                    Sorry for the complicated rent.
                    All I know is that I don't know everything 😊

                    No "help me" PM's please. Use the forum, the community will thank you.
                    Edit : and where are the logs ??

                    S 2 Replies Last reply Reply Quote 1
                    • S
                      SteveITS Galactic Empire @Gertjan
                      last edited by

                      @gertjan Note I’m not saying DNSSEC is supposed to work just that it didn’t have failures for me in earlier versions and does now. Netgate says
                      https://docs.netgate.com/pfsense/en/latest/services/dns/resolver-config.html
                      “DNSSEC works best when using the root servers directly, unless the forwarding servers support DNSSEC. Even if the forwarding DNS servers support DNSSEC, the response cannot be fully validated.

                      If upstream DNS servers do not support DNSSEC in forwarding mode or with domain overrides, DNS queries are known to be intercepted upstream, or clients have issues with large DNS responses, DNSSEC may need to be disabled.”

                      Quad9’s setup doc says
                      https://support.quad9.net/hc/en-us/articles/4433380601229-Setup-pfSense-and-DNS-over-TLS
                      “DNSSEC is already enforced by Quad9, and enabling DNSSEC at the forwarder level can cause false DNSSEC failures.”

                      All I’m saying is I’ve suggested to maybe 15-20 (a guess) people here having DNS problems after upgrading to 23.01, to disable DNSSEC. I’d guess 2/3 said it fixed their issue and 1/3 had to disable TLS also. (Note that Quad9 doc is how to set up TLS…)

                      And yes it seems weird any rate limiting on the remote server end would be related to upgrading pfSense, but it’s unlikely multiple DNS providers set up rate limits all at the same time. So I’m guessing probably some change in unbound is related. Which is of course not very scientific! But the tests above do seem to indicate some sort of issue.

                      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                      Upvote 👍 helpful posts!

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator @joedan
                        last edited by

                        @joedan said in Major DNS Bug 23.01 with Quad9 on SSL:

                        Errors in the syslog are as before when it occurred randomly..
                        [54217:3] debug: tcp error for address 1.1.1.1 port 853
                        [54217:0] debug: outnettcp got tcp error -1

                        What logging level do you have set in Unbound when you see that?

                        I would expect to be able to see additional logging with those sorts of errors.

                        J 1 Reply Last reply Reply Quote 0
                        • J
                          joedan @stephenw10
                          last edited by joedan

                          @stephenw10

                          Unbound Logging Level 3 (although I did manage to change it to 4 very briefly but had to stop due to the amount of data). Snippet of Level 3 logging downloaded from graylog below.
                          Hopefully I am ingesting everything.

                          7d561b20-c471-495c-b820-816c040e107e-image.png

                          J 1 Reply Last reply Reply Quote 0
                          • bmeeksB
                            bmeeks
                            last edited by

                            There is a closed bug report on the unbound Github site with this exact same TCP error here: https://github.com/NLnetLabs/unbound/issues/535. The unbound developer attributed the TCP error to the other end of the connection (meaning not the unbound side) closing the TCP socket. Maybe this is a clue ???

                            1 Reply Last reply Reply Quote 0
                            • S
                              SteveITS Galactic Empire @Gertjan
                              last edited by

                              @gertjan said in Major DNS Bug 23.01 with Quad9 on SSL:

                              what about setting up the DNS (statically) so they all get their DNS from "1.1.1.1" using TLS (port 853)

                              @joedan Can you run your test against 1.1.1.1 directly, not using pfSense as the DNS server?

                              Quoting from @bmeeks' referenced link, "This is normal if the other server restarts for example, or maybe because it wants to manage the TCP connections that it has; possibly with timeouts for how long they can be used."

                              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                              Upvote 👍 helpful posts!

                              1 Reply Last reply Reply Quote 0
                              • GertjanG
                                Gertjan
                                last edited by

                                I've activated these again :

                                c95fd7f6-3ab4-4da7-9660-58cc2ae5b399-image.png

                                with :

                                a180a64a-3b95-4dc6-bf2d-239d1200f6a5-image.png

                                When the log level was set to 3, I saw some

                                debug: tcp error for address 2606:4700:4700::1111 port 853
                                and
                                debug: tcp error for address 2606:4700:4700::1001 port 853
                                and
                                debug: tcp error for address 1.1.1.1 port 853
                                and
                                debug: tcp error for address 1.0.0.1 port 853

                                Also some repeating :
                                ....
                                outnettcp got tcp error -1
                                outnettcp got tcp error -1
                                outnettcp got tcp error -1
                                outnettcp got tcp error -1
                                ....

                                Recent reading makes me think these are rather harmless.

                                I'll leave it for the weekend.

                                When DNSSEC was activated, I saw a lot of DS and other DNSSEC related records were requested. DNS resolving worked just fine, though.

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                M 1 Reply Last reply Reply Quote 0
                                • GertjanG Gertjan referenced this topic on
                                • GertjanG Gertjan referenced this topic on
                                • GertjanG Gertjan referenced this topic on
                                • GertjanG Gertjan referenced this topic on
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Mmm, it looks like log level 4 might be needed to see any additional logging associated with those errors.

                                  GertjanG 1 Reply Last reply Reply Quote 0
                                  • GertjanG
                                    Gertjan @stephenw10
                                    last edited by

                                    @stephenw10 said in Major DNS Bug 23.01 with Quad9 on SSL:

                                    level 4

                                    4f3f6ec1-db21-46fb-bf4e-68654c213535-image.png

                                    shows 'nothing' special.
                                    And what you can't see doesn't exist ;)
                                    I'm forwarding right now to 1.1.1.1 etc using 853 - see setup above.
                                    I even have DNSSEC activated + "Harden DNSSEC Data" (on the Resolver Advanced Settings page) .... because, as Clause Kellerman always says : "why not !!".
                                    I'll leave it like this for the weekend. I'll get back on this monday morning.

                                    I'm banking, send some mails, received a ton of mail, all my colleges are also doing their toktok things, and no one came complaining to me (they know who to look) to tell me that I have to stop with "messing with the connection".

                                    No "help me" PM's please. Use the forum, the community will thank you.
                                    Edit : and where are the logs ??

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      MoonKnight @Gertjan
                                      last edited by MoonKnight

                                      @gertjan
                                      Hi, I don't see those errors here. I activated log level 4.
                                      I use Cloudflare DNS servers. 1.1.1.1 and 1.0.0.1
                                      But I use another hostname for the TLS verification.

                                      39aee25c-2a8a-43f3-81e1-ee17fdb38fb3-image.png

                                      3fbb3faa-bccf-4549-9eda-0dfb43c513f8-image.png

                                      Sorry, I take it back. It was on Log level 3.

                                      49071888-e2cc-4f06-94df-24f428d1ab60-image.png

                                      --- 24.11 ---
                                      Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
                                      Kingston DDR4 2666MHz 16GB ECC
                                      2 x HyperX Fury SSD 120GB (ZFS-mirror)
                                      2 x Intel i210 (ports)
                                      4 x Intel i350 (ports)

                                      J 1 Reply Last reply Reply Quote 0
                                      • S SteveITS referenced this topic on
                                      • S SteveITS referenced this topic on
                                      • S SteveITS referenced this topic on
                                      • J
                                        Jimbohello @MoonKnight
                                        last edited by Jimbohello

                                        As far as i’m concern, quad9, google, whatever you use. 23.01 has a outstanding bug base on DoT using forwarding mode (dnssec uncheck) what ever config you use you will get « FAILED TO RESOLVE HOST » in DoT mode. For all alias that has to resolve to dynamic dns (xxxx.dyndns.org)

                                        J 1 Reply Last reply Reply Quote 0
                                        • J Jimbohello referenced this topic on
                                        • J Jimbohello referenced this topic on
                                        • J Jimbohello referenced this topic on
                                        • J
                                          Jimbohello @Jimbohello
                                          last edited by Jimbohello

                                          here log level 3

                                          from pfsense resolution imself for ALIASES with dynamic dns (xxxx.dyndns.org)
                                          Apr 7 21:33:30 unbound 88702 [88702:0] info: finishing processing for vrac-nicolas.dyndns.org.jimbohello.arpa. AAAA IN
                                          Apr 7 21:33:30 unbound 88702 [88702:0] info: query response was NXDOMAIN ANSWER
                                          Apr 7 21:33:30 unbound 88702 [88702:0] info: reply from <.> 1.1.1.1#853
                                          Apr 7 21:33:30 unbound 88702 [88702:0] info: response for vrac-nicolas.dyndns.org.jimbohello.arpa. AAAA IN
                                          Apr 7 21:33:30 unbound 88702 [88702:0] info: iterator operate: query vrac-nicolas.dyndns.org.jimbohello.arpa. AAAA IN
                                          Apr 7 21:33:30 unbound 88702 [88702:0] debug: iterator[module 0] operate: extstate:module_wait_reply event:module_event_reply

                                          From the client side (lan)

                                          Apr 7 21:38:42 unbound 88702 [88702:0] info: finishing processing for vrac-nicolas.dyndns.org. A IN
                                          Apr 7 21:38:42 unbound 88702 [88702:0] info: query response was ANSWER
                                          Apr 7 21:38:42 unbound 88702 [88702:0] info: reply from <.> 8.8.8.8#853
                                          Apr 7 21:38:42 unbound 88702 [88702:0] info: response for vrac-nicolas.dyndns.org. A IN
                                          Apr 7 21:38:42 unbound 88702 [88702:0] info: iterator operate: query vrac-nicolas.dyndns.org. A IN

                                          JESUS I FOUND THE ISSUE I GUEST :
                                          WHY IS PFSENSE ITSELF TRY TO RESOLVE
                                          vrac-nicolas.dyndns.org.jimbohello.arpa
                                          when it suppose to be vrac-nicolas.dyndns.org

                                          pfsense is adding the domain part of itself ! no wonder why it can't resolve

                                          GertjanG 1 Reply Last reply Reply Quote 0
                                          • GertjanG
                                            Gertjan @Jimbohello
                                            last edited by Gertjan

                                            @jimbohello said in Major DNS Bug 23.01 with Quad9 on SSL:

                                            vrac-nicolas.dyndns.org.jimbohello.arpa
                                            when it suppose to be vrac-nicolas.dyndns.org
                                            pfsense is adding the domain part of itself ! no wonder why it can't resolve

                                            Your Windows PC is doing the same thing ...

                                            Have a look what 'nslookup' does :

                                            C:\Users\Gauche>nslookup
                                            Serveur par defaut :   pfSense.mydomain.tld
                                            Address:  2a01:cb19:beef:a6dc::1
                                            
                                            > set debug
                                            > google.com
                                            Serveur :   pfSense.mydomain.tld
                                            Address:  2a01:cb19:beef:a6dc::1
                                            
                                            ------------
                                            Got answer:
                                                HEADER:
                                                    opcode = QUERY, id = 2, rcode = NXDOMAIN
                                                    header flags:  response, want recursion, recursion avail.
                                                    questions = 1,  answers = 0,  authority records = 1,  additional = 0
                                            
                                                QUESTIONS:
                                                    google.com.mydomain.tld, type = A, class = IN
                                                AUTHORITY RECORDS:
                                                ->  mydomain.tld
                                                    ttl = 446 (7 mins 26 secs)
                                                    primary name server = ns1.mydomain.tld
                                                    responsible mail addr = postmaster.mydomain.tld
                                                    serial  = 2023020723
                                                    refresh = 14400 (4 hours)
                                                    retry   = 3600 (1 hour)
                                                    expire  = 1209600 (14 days)
                                                    default TTL = 10800 (3 hours)
                                            
                                            ------------
                                            ------------
                                            Got answer:
                                                HEADER:
                                                    opcode = QUERY, id = 3, rcode = NXDOMAIN
                                                    header flags:  response, want recursion, recursion avail.
                                                    questions = 1,  answers = 0,  authority records = 1,  additional = 0
                                            
                                                QUESTIONS:
                                                    google.com.mydomain.tld.net, type = AAAA, class = IN
                                                AUTHORITY RECORDS:
                                                ->  mydomain.tld
                                                    ttl = 446 (7 mins 26 secs)
                                                    primary name server = ns1.mydomain.tld
                                                    responsible mail addr = postmaster.mydomain.tld
                                                    serial  = 2023020723
                                                    refresh = 14400 (4 hours)
                                                    retry   = 3600 (1 hour)
                                                    expire  = 1209600 (14 days)
                                                    default TTL = 10800 (3 hours)
                                            
                                            ------------
                                            ------------
                                            Got answer:
                                                HEADER:
                                                    opcode = QUERY, id = 4, rcode = NOERROR
                                                    header flags:  response, want recursion, recursion avail.
                                                    questions = 1,  answers = 1,  authority records = 0,  additional = 0
                                            
                                                QUESTIONS:
                                                    google.com, type = A, class = IN
                                                ANSWERS:
                                                ->  google.com
                                                    internet address = 142.250.74.238
                                                    ttl = 30 (30 secs)
                                            
                                            ------------
                                            Réponse ne faisant pas autorité :
                                            ------------
                                            Got answer:
                                                HEADER:
                                                    opcode = QUERY, id = 5, rcode = NOERROR
                                                    header flags:  response, want recursion, recursion avail.
                                                    questions = 1,  answers = 1,  authority records = 0,  additional = 0
                                            
                                                QUESTIONS:
                                                    google.com, type = AAAA, class = IN
                                                ANSWERS:
                                                ->  google.com
                                                    AAAA IPv6 address = 2a00:1450:4007:80c::200e
                                                    ttl = 30 (30 secs)
                                            
                                            ------------
                                            Nom :    google.com
                                            Addresses:  2a00:1450:4007:80c::200e
                                                      142.250.74.238
                                            
                                            >
                                            

                                            You saw what happened ?
                                            I wanted details (fact checking) so I used 'set debug' first.

                                            Then it showed that when I look up a domain, it adds the local PC domain first, mydomain.tld.

                                            Because ..... we (me and you) are doing it wrong 😊

                                            When you want to do a DNS lookup, you have to ask :
                                            google.com.
                                            The final dot is important.

                                            It's not really an issue.

                                            If I wanted to look up the IP of my PC, called 'gauche2' :
                                            ( which is just the host name, not the FQDN !)
                                            nslookup adds again mydomain.tld. and this time and asks pfSense
                                            gauche2.mydomain.tld

                                            and that is a 'good' question :
                                            I got an IPv4 and IPv6 as nslookup asks both by default.

                                            So, not really an error, and you could consider adding a final dot if the GUI accepts it (it does, I guess).

                                            Btw : when unbound receives "google.com.mydomain.tld." as the request, it knows that it is authoritative for "mydomain.tld." so it isn't going to ask upstream details about "mydomain.tld." : after all "unbound handles "mydomain.tld" and the upstream resolver doesn't know anything about local domains and resources (normally).

                                            I'm not going to ask 9.9.9.9 or 1.1.1.1 about FQDN info for the device in my LAN, that's not logic.

                                            Btw : I have the resolvers/unound "System Domain Local Zone Type" set to "Static", not to the (default?) "Transparant".
                                            When set to "Transparant", unbound will ask 9.9.9.9 to resolve "vrac-nicolas.dyndns.org.jimbohello.arpa." which ... no surprise, will give no answer or a "NXDOMAIN" as this domain is unknown or "new ?" to 9.9.9.9

                                            edit : since yesterday, I'm doing the forward thing : DoT to :

                                            58815cb5-4a85-426f-b947-cc2085760d0e-image.png

                                            No issues what so ever.

                                            No "help me" PM's please. Use the forum, the community will thank you.
                                            Edit : and where are the logs ??

                                            J 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.