Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PFSENSE + 23.01

    General pfSense Questions
    5
    16
    1.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      Jimbohello @Gertjan
      last edited by

      @gertjan

      hum strange !
      i test out something !
      disable dns over TLS in the dns resolver !
      put it back to standard 53, seem to resolved the issue !
      pretty strange !

      C S 2 Replies Last reply Reply Quote 0
      • C
        Cylosoft @Jimbohello
        last edited by

        @jimbohello at this point every issue we have with v23 seems to come back to some unbound DNS issue. You might check the other threads about getting DNS with TLS working.

        1 Reply Last reply Reply Quote 0
        • S
          SteveITS Galactic Empire @Jimbohello
          last edited by

          @jimbohello said in PFSENSE + 23.01:

          disable dns over TLS in the dns resolver

          As Clyosoft indicates there are a few threads about DNS not working. Disabling DNSSEC while forwarding seems to be required now (and reportedly all along was known to sometimes cause failures when forwarding), but several have said they also need to disable DNS over TLS. See for instance:

          https://forum.netgate.com/topic/178413/major-dns-bug-23-01-with-quad9-on-ssl/

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote 👍 helpful posts!

          J 2 Replies Last reply Reply Quote 0
          • J
            Jimbohello @SteveITS
            last edited by Jimbohello

            @steveits

            DNSSEC was already disable !
            i do not use quad9
            opendns
            cloudflare
            google

            il just turn off TLS for now :)

            1 Reply Last reply Reply Quote 1
            • J
              Jimbohello @SteveITS
              last edited by Jimbohello

              @steveits

              i don't know if this help, but i did some testing,

              if i remove in tab - /system/general
              use remote dns serveur , ignore local dns

              the problem is solve using DNS OVER TLS

              when i put back "use local dns, ignore remote dns " problem occur

              S 1 Reply Last reply Reply Quote 0
              • S
                SteveITS Galactic Empire @Jimbohello
                last edited by

                @jimbohello said in PFSENSE + 23.01:

                when i put back "use local dns, ignore remote dns " problem occur

                This setting affects how pfSense itself does DNS. So again it sounds like DNS is not working on your router, for some reason.
                https://docs.netgate.com/pfsense/en/latest/config/general.html#dns-resolution-behavior

                Is the DNS Resolver service running? If you try to start it, or restart it, are there errors shown in the system log or DNS Resolver log? Test DNS using Diagnostics/DNS Lookup.

                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                Upvote 👍 helpful posts!

                J 2 Replies Last reply Reply Quote 0
                • J
                  Jimbohello @SteveITS
                  last edited by Jimbohello

                  @steveits

                  Listen my friend , yesterday before my upgrade 23.01 my setup was the same for several years

                  Never had ans issue

                  23.01 is the issue in DoT
                  I have zero problem on dns resolution for my local lan client.
                  The problem is only in alias fetching xxxx.dyndns.org ip

                  Same issue on all my appliance

                  LOG/ dns resolver /. FAILED TO RESOLVE HOST

                  If i go back to standard dns(53). Work like luky charm. :)

                  It exacly this problem

                  https://forum.netgate.com/topic/178413/major-dns-bug-23-01-with-quad9-on-ssl

                  quad9, google, opendns, cloudflare or whatever is issue

                  All my appliance 23.01 are doing this issue
                  All my appliance 22.05 are doing good

                  They have the same setup everywhere.

                  1 Reply Last reply Reply Quote 0
                  • J
                    Jimbohello @SteveITS
                    last edited by

                    @steveits

                    here log level 3
                    from pfsense resolution imself
                    Apr 7 21:33:30 unbound 88702 [88702:0] info: finishing processing for vrac-nicolas.dyndns.org.jimbohello.arpa. AAAA IN
                    Apr 7 21:33:30 unbound 88702 [88702:0] info: query response was NXDOMAIN ANSWER
                    Apr 7 21:33:30 unbound 88702 [88702:0] info: reply from <.> 1.1.1.1#853
                    Apr 7 21:33:30 unbound 88702 [88702:0] info: response for vrac-nicolas.dyndns.org.jimbohello.arpa. AAAA IN
                    Apr 7 21:33:30 unbound 88702 [88702:0] info: iterator operate: query vrac-nicolas.dyndns.org.jimbohello.arpa. AAAA IN
                    Apr 7 21:33:30 unbound 88702 [88702:0] debug: iterator[module 0] operate: extstate:module_wait_reply event:module_event_reply

                    From the client side (lan)

                    Apr 7 21:38:42 unbound 88702 [88702:0] info: finishing processing for vrac-nicolas.dyndns.org. A IN
                    Apr 7 21:38:42 unbound 88702 [88702:0] info: query response was ANSWER
                    Apr 7 21:38:42 unbound 88702 [88702:0] info: reply from <.> 8.8.8.8#853
                    Apr 7 21:38:42 unbound 88702 [88702:0] info: response for vrac-nicolas.dyndns.org. A IN
                    Apr 7 21:38:42 unbound 88702 [88702:0] info: iterator operate: query vrac-nicolas.dyndns.org. A IN

                    JESUS I FOUND THE ISSUE I GUEST :
                    WHY IS PFSENSE ITSELF TRY TO RESOLVE
                    vrac-nicolas.dyndns.org.jimbohello.arpa
                    when it suppose to be vrac-nicolas.dyndns.org

                    pfsense is hading the domain part of itself ! no wonder why it can't resolve

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Hmm, I only expect to see that if it has already failed to resolve the fqdn without the domain appended.

                      J 1 Reply Last reply Reply Quote 0
                      • J
                        Jimbohello @stephenw10
                        last edited by Jimbohello

                        @stephenw10

                        When following DoT procedure base on netgate.
                        All alliases having dynamic name to resolve, get an response from dnsfilter « failed to resolve host - will retry again later ». Some of them does resolve bost most part failed completly ans then, at a point failed all.

                        When chanching aliases to url ip table , no problem occur.

                        If i remove all DoT everything work as expected

                        Note : i have arround 140 dynamic name to resolve.

                        Hope help

                        Behavior apper on sg-3100, sg-8200 pro max. And all other device

                        Version 22.05 not affected
                        Version 23.01 affected

                        Thank’s

                        Hope helps

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.