Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Major DNS Bug 23.01 with Quad9 on SSL

    Scheduled Pinned Locked Moved General pfSense Questions
    185 Posts 27 Posters 151.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      Jimbohello @stephenw10
      last edited by Jimbohello

      @stephenw10

      Exaclly

      Aliases url ip table

      Host on a web server

      Http://server.com/mydnamicdns.txt

      All my dynamic in that files

      DoT activated

      All good ninja style

      1 Reply Last reply Reply Quote 1
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Ok, good. I thought for a minute it was handling URL aliases incorrectly.

        Well that seems like a clue then. Why is it resolving those entries differently. šŸ¤”

        J 1 Reply Last reply Reply Quote 0
        • J
          Jimbohello @stephenw10
          last edited by Jimbohello

          @stephenw10
          hey that's why i'm doing debugging !
          i'm not pfsene engeenir !
          but i don't let my self goes down until i found solution.
          and for DoT activated with formarding to remote dns ! that's the only solution a found so far
          hope help :)

          have a nice one !

          i know that pfsense aliases HOST/NETWORK seem to use someting call "dns filter"
          maybe when resolving from "URL IP TABLE" it does it using nslookup or dig or something else !

          1 Reply Last reply Reply Quote 0
          • S SteveITS referenced this topic on
          • S SteveITS referenced this topic on
          • J
            joedan @joedan
            last edited by joedan

            @joedan

            I gave DNS over TLS another go after making two adjustments in my environment (under 23.01).

            I unchecked Disable hardware checksum offload
            I unchecked Enable the ALTQ support for hn NICs.

            Not sure why I had the last option ticked given I don't virtualise or use shaping, I use Intel igc / i225 on a dedicated Mini PC. Both these settings were on without issue in 22.05.

            I ran some load testing on my machine and funny enough this thing is now stable, it actually completed.

            348988 queries over 2853 seconds at an average of 120 queries a second way, way more than I normally do. It actually finished and I could WFH comfortable and browse websites whilst this was running. Prior to that dns stopped working after a couple of minutes.

            019f08b4-9443-4445-9385-e610cbf76888-image.png

            I feel more confident I may have finally (fingers crossed) solved my specific config issue.

            GertjanG 1 Reply Last reply Reply Quote 2
            • GertjanG
              Gertjan @joedan
              last edited by Gertjan

              @joedan
              Thanks for the reminder : I completely forgot to re install my munin unbound graphing for unbound. It's up and collecting as from now.

              Nice graph btw !

              I'm still forwarding to 1.1.1.1, actually more using 2606:4700:4700::1111 using TLS.
              pfBlockerng with some classic DNSBL, using python mode of course.

              All seems fine to me.
              The munin charts will give me some visual insights, and is far better as the usual "DNS doesn't work".
              Now I think about it : the built in Status> Monitoring should have some basic DNS activity monitoring.
              And, because its friday : why not a flag on the pfSense dashboard : "You've broken DNS !" ? 😊

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Hmm, that's interesting.

                The ALTQ for hn NICs setting does nothing if you don't have hn NICs.

                Re-enabling hardware checksum offload would do something. Only after a reboot though, I assume you did that?
                It's hard to see how that wouldn't affect a lot more than just DNS over TLS though.
                It would likely also be NIC specific too. Is it possible this only affects igc? That seems unlikely, but possible.

                J 1 Reply Last reply Reply Quote 0
                • J
                  joedan @stephenw10
                  last edited by joedan

                  @stephenw10

                  Yes rebooted immediately after the change.

                  I am the only one with access to pfsense and do so keeping a detailed change log, snapshot and config backup for everything I modify. My last post talks about removing ntopng which may just have taken some load off however that still had issues where dns over tls did eventually stop working, always as the first symptom.

                  During my load testing post before that I did manage to break standard dns forwarding once but it was a lot harder to do after several attempts. Didn’t think much of it because of the huge dns load which seemed excessive anyway. Going back to standard resolving worked even better. When I did load it up with dns requests it wouldn’t break and was rock solid but things did on occasion slow down. Again due to the ridiculous amount of dns requests it was generating that seemed acceptable. I only have a small pipe (80mbit) to the internet and never had any other issues apart from dns over tls resolution on 23.01. Some other testing which I didn’t post about was to change from Cloudflare to Quad9 to Google for dns over tls but that made no difference. Dns over tls would eventually stop with any upstream provider.

                  My machine, ram and ssd are completely oversized running bare metal (specs in my post above) and never broke a sweat. I am just glad it’s fixed for me and was thrilled to see dns over tls back on.

                  I used the same input file for the dns load tester which broke it last time, it was 25MB. When I observed the test finished without issues I reran twice which which just resulted in a lot of cached hits. I then got all of the parts from GitHub and had a 250MB monster. Even this couldn’t break it. Dns over tls has been rock solid since.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Yup, glad it seems good for you and all info is good. šŸ‘

                    J 1 Reply Last reply Reply Quote 0
                    • S SteveITS referenced this topic on
                    • E
                      Enhance2736
                      last edited by

                      Late to the party here guys. I am experiencing DNS resolution issues specifically using quad9 with DoT enabled sporradically throughout the day. If i disable DoT everything works fine. Or if i keep DoT enabled and switch to CloudFlaire then it works throughout the day with no issues.

                      Running netgate 6100Max, using pfBlockerng with DNSBL and unbound resolver in python mode.

                      Disable hardware checksum offload was already unchecked and I unchecked Enable the ALTQ support for hn NICs and rebooted.

                      Hope this helps.

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Are you using one of the igc ports as WAN?

                        E 1 Reply Last reply Reply Quote 0
                        • E
                          Enhance2736 @stephenw10
                          last edited by

                          @stephenw10 Yes sir igc3 needed 2.5G configured so i can reuse 10G ix0 for lan.

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Hmm.

                            Ok just for sanity can anyone confirm they are hitting this on some interface other than igc?

                            It seems very unlikely it would be that but....

                            C 1 Reply Last reply Reply Quote 0
                            • E
                              Enhance2736
                              last edited by

                              I'll switch to ix on Wednesday and will report back just incase no none would confirm by then.

                              1 Reply Last reply Reply Quote 1
                              • C
                                Cylosoft @stephenw10
                                last edited by

                                @stephenw10 We have several with WAN on ix0 and LAN on ix1. They stall out just like the others.

                                1 Reply Last reply Reply Quote 1
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Ok, thanks.

                                  And just to confirm that's to Quad9 specifically?

                                  C 1 Reply Last reply Reply Quote 0
                                  • C
                                    Cylosoft @stephenw10
                                    last edited by

                                    @stephenw10 Yes. They all started out with Quad9 and TLS.

                                    1 Reply Last reply Reply Quote 1
                                    • E
                                      Enhance2736
                                      last edited by

                                      yessir, Quad9 in System > General Setup > DNS Server Settings

                                      Below settings are causing intermittend DNS resolution issues described above by others (can't resolve anything for few minutes then eventually starts resolving):

                                      Address: 9.9.9.9 Hostname for TLS Verification: dns.quad9.net 
                                      Address: 149.112.112.112 Hostname for TLS Verification: dns.quad9.net 
                                      

                                      When I change above settings to use CloudFlare infont of Quad9 then resolves without issues:

                                      Address: 1.1.1.1 Hostname for TLS Verification: cloudflare-dns.com 
                                      
                                      1 Reply Last reply Reply Quote 0
                                      • E
                                        Enhance2736
                                        last edited by

                                        I am testing now on Quad9 with DoT and it is falilng right now:

                                        āÆ ping github.com
                                        ping: cannot resolve github.com: Unknown host
                                        
                                        āÆ dig github.com
                                        
                                        ; <<>> DiG 9.10.6 <<>> github.com
                                        ;; global options: +cmd
                                        ;; Got answer:
                                        ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 40969
                                        ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
                                        
                                        ;; OPT PSEUDOSECTION:
                                        ; EDNS: version: 0, flags:; udp: 1432
                                        ;; QUESTION SECTION:
                                        ;github.com.                    IN      A
                                        
                                        ;; Query time: 27 msec
                                        ;; SERVER: 10.11.100.1#53(10.11.100.1)
                                        ;; WHEN: Mon Apr 17 18:17:08 EDT 2023
                                        ;; MSG SIZE  rcvd: 39
                                        

                                        pfSense UI opened and it sat on main page. Then unbound started to resolve:

                                        āÆ dig github.com
                                        
                                        ; <<>> DiG 9.10.6 <<>> github.com
                                        ;; global options: +cmd
                                        ;; Got answer:
                                        ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25085
                                        ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
                                        
                                        ;; OPT PSEUDOSECTION:
                                        ; EDNS: version: 0, flags:; udp: 1432
                                        ;; QUESTION SECTION:
                                        ;github.com.                    IN      A
                                        
                                        ;; ANSWER SECTION:
                                        github.com.             39      IN      A       140.82.112.3
                                        
                                        ;; Query time: 38 msec
                                        ;; SERVER: 10.11.100.1#53(10.11.100.1)
                                        ;; WHEN: Mon Apr 17 18:21:11 EDT 2023
                                        ;; MSG SIZE  rcvd: 55
                                        

                                        What i noticed too is that it was failing until i opened pfSense UI and it started to resolve. No idea what is going on lol

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Still nothing logged in the resolver log?

                                          That's weird that it started after you logged in. What widgets do you have on the dashboard?

                                          w0wW E 2 Replies Last reply Reply Quote 0
                                          • w0wW
                                            w0w @stephenw10
                                            last edited by

                                            After changes made and posted https://forum.netgate.com/post/1094989 I do have fewer problems with DNS responses, but like somebody said it mostly appears when using a mobile device and trying to load some page with a bunch of images and scripts, for example reddit. I see previews but when trying to open large image by clicking on preview, not opening post, it can load it immediately or just hangs and give no output, showing broken image icon. This happens randomly. I am also using pfBlocker-NG, suricata and python mode. All found reddit domains are whitelisted. Nothing unusual in the pfBlocker or suricata logs. Forwarding to Cloudflare and Google servers, using TLS / SSL, using both IPV4 and IPv6 services. Also using multiwan setup. Planning to disable IPv6 and one of the two gateways just to test it again.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.