Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Host Overrides doesn't override

    Scheduled Pinned Locked Moved DHCP and DNS
    19 Posts 6 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @sensei-two
      last edited by

      @sensei-two ah ok..

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      S 1 Reply Last reply Reply Quote 1
      • S
        Summer @johnpoz
        last edited by Summer

        @sensei-two did you solved?

        I'm trying now with pfsense 23.05.1 but looking at host-overrides

        Warning
        
        Do not use DNS override functionality as the only means of blocking access to sites.
        

        With DNS Forward (deprecated package) this feature was working fine, with DNS Resolver(unbound) seems to run fine too.

        gig@robot:~# nslookup acciaio.internal
        Server:		PFSENSELAN
        Address:	PFSENSELAN#53
        
        Name: acciaio.internal
        Address: 192.168.22.3
        

        Now my question is I can safely use this or should expect some side effect?

        i.e. over OPENVPN I cannot resolve acciaio.internal, even if with on server Custom option: push "dhcp-option DNS LAN.LAN.LAN.DNS"

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @Summer
          last edited by johnpoz

          @Summer said in Host Overrides doesn't override:

          Warning

          There is a warning because dns overrides only work if the client is using pfsense as its dns, what if using other dns, what if using doh in their browser. etc...

          dns filtering of any kind is only good if the client can not use any other form of dns. Even then - maybe they will just go to the IP directly.

          It states the reason why it might not work - right there in the article

          warning.jpg

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          S 1 Reply Last reply Reply Quote 1
          • S
            Summer @johnpoz
            last edited by Summer

            @johnpoz thanks for clarification, that's ok.

            I'm trying from a OVPN client:
            checked on ovpnconnect log the DNS is pfsense but:

            gig@robot:~# nslookup acciaio.internal
            Server:		8.8.8.8
            Address:	8.8.8.8#53
            
            Name: acciaio.internal
            ** server can't find note.tb: NXDOMAIN
            

            could it be Android issue that goes to google instead to pfsenseDNS?

            gig@robot:~# nslookup PFSENSEDNS - acciaio.internal
            Server:		PFSENSEDNS
            Address:	PFSENSEDNS#53
            
            Name: acciaio.internal
            Address: 192.168.22.3
            
            johnpozJ GertjanG 2 Replies Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @Summer
              last edited by

              @Summer said in Host Overrides doesn't override:

              could it be Android issue that goes to google instead to pfsenseDNS?

              If your openvpn client isn't asking pfsense dns - then no its not going to be able to resolve stuff that is in pfsense dns only.

              If your client is trying to use some other dns, make sure all traffic flows through the vpn, and do dns redirection.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan @Summer
                last edited by Gertjan

                @Summer said in Host Overrides doesn't override:

                could it be Android issue that goes to google instead to pfsenseDNS?

                You've created a host override @pfsensation
                Then an android comes into play - and now, you tell me : you did't know that android always phones to home = uses 8.8.8.8 ?
                Anyway, this android uses 8.8.8.8 as it DNS source.
                With other words : this android connects to 8.8.8.8 and does the DNS requests.
                This means that pfSense will never see/smell/be aware of this DNS request.
                So you can place whatever host override on pfSense what you want, it doesn't matter.

                For host overrides to work in such a situation, make a list of them, call Google (8.8.8.8) and give them your host override list.
                This is a joke of course.

                edit :
                Let me rephrase the subject :

                Host Overrides (registred on pfSense) doesn't override (when the LAN device uses another DNS like 8.8.8.8

                Get it ?

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                S 1 Reply Last reply Reply Quote 1
                • S
                  Summer @Gertjan
                  last edited by

                  @Gertjan said in Host Overrides doesn't override:

                  Host Overrides (registred on pfSense) doesn't override (when the LAN device uses another DNS

                  That's fine but how can it be changed that DNS?

                  If client get in it's log:

                  [dhcp-option][DOMAIN][internal]
                  [register-dns]
                  [redirect-gateway][def1]
                  

                  And on server:
                  1c28d9e5-5bb6-412a-9f68-15f9220ab75d-image.png

                  592349e2-24c2-40db-95ae-93144ca7584e-image.png

                  GertjanG johnpozJ 2 Replies Last reply Reply Quote 0
                  • GertjanG
                    Gertjan @Summer
                    last edited by

                    @Summer

                    I have :

                    [Aug 25, 2023, 15:45:55] OPTIONS:
                    0 [dhcp-option] [DOMAIN] [bhf.net]
                    1 [dhcp-option] [DNS] [192.168.3.1]
                    2 [block-outside-dns]
                    3 [register-dns]
                    4 [redirect-gateway] [def1]
                    5 [route-gateway] [192.168.3.1]
                    6 [topology] [subnet]
                    7 [ping] [10]
                    8 [ping-restart] [60]
                    9 [ifconfig] [192.168.3.2] [255.255.255.0]
                    10 [peer-id] [0]
                    11 [cipher] [AES-256-GCM]
                    12 [key-derivation] [tls-ekm]
                    

                    Server side :

                    82cbd959-e121-4f96-b496-1e273565ca50-image.png

                    and I've set the DNS as :

                    17edba8c-c2eb-41da-bdd3-943e3cf731dc-image.png

                    and, unbound listens on "All" interface, which includes my "OPENVPN" interface (which uses 192.168.3.1/24 - which is the tunnel) :

                    4ec329d0-292e-42c2-affe-0bf773f4bc26-image.png

                    A test on my Phone, connected uing the OpenVPN Client app :

                    4e178e73-8bc6-4b77-9c54-eaab50c54b34-image.png

                    as you can see, it uses 192.168.3.1 as it's DNS. That unbound. And unbound knows about my host overrides.

                    Lets that : I create a very special host name :

                    71c42776-04dd-4d60-8a17-600eff547a76-image.png

                    I pre test that AAAABBBBCDDDDDEEEEE.bhf.net on my pfSense LAN connected PC :

                    Microsoft Windows [version 10.0.22621.2215]
                    (c) Microsoft Corporation. Tous droits réservés.
                    
                    C:\Users\Gauche>nslookup AAAABBBBCDDDDDEEEEE.bhf.net
                    Serveur :   pfSense.bhf.net
                    Address:  2a01:cb19:907:a6dc:92ec:77ff:fe29:392c
                    
                    Nom :    AAAABBBBCDDDDDEEEEE.bhf.net
                    Address:  1.2.3.4
                    

                    So, that works.

                    Now my Phone :

                    0623c54b-53c9-4f18-a87e-5d81768856dd-image.png

                    1.2.3.4 also.

                    Now : your turn.

                    No "help me" PM's please. Use the forum, the community will thank you.
                    Edit : and where are the logs ??

                    1 Reply Last reply Reply Quote 1
                    • GertjanG Gertjan referenced this topic on
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @Summer
                      last edited by

                      @Summer if you have some app or browser or whatever on your phone that is wanting to use some hard coded dns.. and not doh like in a browser. One way to work around that could be dns redirection.

                      So if your phone insists on using 8.8.8.8 for example - you could on pfsense do a dns redirection so when it tries to talk to some dns, you redirect it to use unbound on pfsense.

                      https://docs.netgate.com/pfsense/en/latest/recipes/dns-redirect.html

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      S 1 Reply Last reply Reply Quote 1
                      • S
                        Summer @johnpoz
                        last edited by

                        Thanks @johnpoz you've made it!
                        Finally it works!

                        c5233be1-e970-493b-b6fb-1789f7f85c7b-image.png

                        S 1 Reply Last reply Reply Quote 0
                        • S
                          SteveITS Galactic Empire @Summer
                          last edited by

                          @Summer You may also want to block DoH, where (many) browsers bypass DNS to connect out to their DNS over HTTPS service. This page has a pfSense PDF that is very detailed but thorough.
                          https://github.com/jpgpi250/piholemanual#doh

                          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                          Upvote 👍 helpful posts!

                          1 Reply Last reply Reply Quote 1
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.