Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Setting low TTL to fix Squid issue

    Scheduled Pinned Locked Moved General pfSense Questions
    23 Posts 4 Posters 2.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JonathanLeeJ
      JonathanLee @michmoor
      last edited by JonathanLee

      @michmoor

      Screenshot 2023-09-18 at 7.33.02 PM.png
      (I had to add specific DNS resolver settings to get around the issue you are having as my ISP as it does not provide ipv6)

      Items kept requesting AAAA over just ipv4 records

      Screenshot 2023-09-18 at 7.35.05 PM.png
      (I also had to add a some Squidguard target categories to block DoH)

      Screenshot 2023-09-18 at 7.36.34 PM.png
      (I also added specific HTTPS blocks to the DNS resolvers I use)

      Screenshot 2023-09-18 at 7.37.19 PM.png
      (I also use port 853 for my resolver DNS over TLS SSL)

      Screenshot 2023-09-18 at 7.40.36 PM.png
      (Last I added a NAT for all DNS requests to send them to the fire wall)

      Ref:
      https://docs.netgate.com/pfsense/en/latest/recipes/dns-over-tls.html

      This fixed all Google trying to bypass the proxy issues

      ps.
      Unbound resolver can also be configured to perform DoH resolving manually with advanced options as the GUI has not added it yet. Again, you have to point users to it. I got it running for a bit a while back on my 2100.

      Ref:
      https://unbound.docs.nlnetlabs.nl/en/latest/topics/privacy/dns-over-https.html
      https://forum.netgate.com/topic/181338/feature-request-gui-options-to-unbound-resolver-s-new-doh-abilities
      https://redmine.pfsense.org/issues/14558

      Make sure to upvote

      1 Reply Last reply Reply Quote 1
      • JonathanLeeJ
        JonathanLee @michmoor
        last edited by JonathanLee

        @michmoor did you manually block https for the DNS servers you use on the firewall?

        Screenshot 2023-09-18 at 7.47.15 PM.png

        Please let me know how you got around this firewall puzzle if you found another way with Squid / Squidguard use. I changed mine to stare all over stare step 2 bump step 3 it seemed to help. As I learned its essentially the same thing from our last research on Squid.

        Screenshot 2023-09-18 at 7.54.41 PM.png

        Make sure to upvote

        M 1 Reply Last reply Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @JonathanLee
          last edited by michmoor

          @JonathanLee I block as much DoH as i can based on the pfblocker filter ive applied.
          My upstream DNS is CloudFlare. I am not using my ISP dns servers.
          I am already blocking external DNS and DoT.

          I created a floating rule
          c76c7af4-df3f-4e5d-8cad-b3243ba4ca4d-image.png

          I created an alias deny
          effa6878-b42b-4974-bfd8-60c74524d400-image.png

          Custom Unbound settings
          61581350-be56-46ca-8023-d3c97ebd679e-image.png

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          M 1 Reply Last reply Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @michmoor
            last edited by michmoor

            @michmoor said in Setting low TTL to fix Squid issue:
            @JonathanLee

            So a common problem which i really dont know why it happens is why there is a problem specifically with Chrome.
            Chrome will clearly be in conflict with whats in the dns cache and here are the errors
            For example, if i visit Twitter (X) i am unable to load any pictures or video.
            Wireshark reveals the reason why.
            Its always DNS. :)

            Problem outlined: https://www.squid-cache.org/Doc/config/host_verify_strict/
            Dont really know how to implement this host verify strict command..

            f060a6f3-6d37-4163-a49e-5b1c8111cd60-image.png

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            JonathanLeeJ 1 Reply Last reply Reply Quote 1
            • JonathanLeeJ
              JonathanLee @michmoor
              last edited by JonathanLee

              @michmoor

              http://www.squid-cache.org/Doc/config/host_verify_strict/

              Have you attempted to set this in advanced options to on or off? It's default is off. I am having this same issue with Apple music and mzstatic making it's own get requests.

              https://forum.netgate.com/topic/182866/universal-procedure-pointers-upp-mzstatic-com-s-mode-of-access-redirector-question/

              I am having the opposite it's apparently approving connection as splice with the same IP sometimes.

              I think under advanced options is where it needs to be.

              host_verify_strict on
              host_verify_strict off

              Make sure to upvote

              M 1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @JonathanLee
                last edited by michmoor

                @JonathanLee I did apply it under advanced options but doesnt seem to have any impact. I still get the /409 errors.
                Do you know where the squid conf file is? I wonder if its really set..

                i got so desperate i set it in each box lol

                c02fba43-5e3b-4f16-bbd6-94f2921484a6-image.png

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                M JonathanLeeJ 2 Replies Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @michmoor
                  last edited by

                  But to my point about devices with hard coded dns servers

                  Look at this. My IoT television gets its DHCP from my pfsenese. Pfsense hands its IP out as the DNS server yet as you can see from pfblocker its still requesting a google dns.
                  Its hard coded in a lot of these devices which is an issue but dont think thats why squid breaks.

                  300774ee-c795-47c6-b678-521e0f52bc5d-image.png

                  343efe68-9721-4072-910a-411822704b8b-image.png

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  JonathanLeeJ 2 Replies Last reply Reply Quote 0
                  • JonathanLeeJ
                    JonathanLee @michmoor
                    last edited by

                    @michmoor

                    Try

                    /usr/local/etc/squid/squid.conf
                    Screenshot 2023-09-19 201027.jpg

                    Make sure to upvote

                    1 Reply Last reply Reply Quote 1
                    • JonathanLeeJ
                      JonathanLee @michmoor
                      last edited by

                      @michmoor

                      I wanted to check with you on Netflix, I forgot to mention I have Hulu and other streaming services set to no cache. Are you attempting to cache Netflix?

                      I set them to never cache on Squid

                      de20a524-8627-487e-afc7-abc2854f1122-image.png

                      Did you set a NAT for the DNS rules to force all devices to use the firewall?

                      That should help if you NAT it.

                      Make sure to upvote

                      1 Reply Last reply Reply Quote 0
                      • JonathanLeeJ
                        JonathanLee @michmoor
                        last edited by JonathanLee

                        @michmoor Are you blocking port 53 for 8.8.8.8? it shows a red lock, it should only block port 443 for 8.8.8.8, 53 is the standard or if you use dns over tls ssl 853 that might be the issue, TheGreatWall_DoH is blocking standard port 53 over just the 443 DoH access.

                        Create a NAT rule for all DNS requests that are not being sent to the firewall or it's loopback. And force it to go to the firewall.

                        Make sure to upvote

                        M 1 Reply Last reply Reply Quote 0
                        • NollipfSenseN
                          NollipfSense
                          last edited by

                          Interesting conversation here, indeed...thanks for sharing!

                          pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                          pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                          1 Reply Last reply Reply Quote 2
                          • M
                            michmoor LAYER 8 Rebel Alliance @JonathanLee
                            last edited by

                            @JonathanLee
                            Im blocking 53 and 443
                            The red lock in pfblocker should indicate that traffic is being blocked - sinkholed so dont think theres any worry about that.

                            bb79dc10-6d56-43a9-96d5-bfe3fee06db6-image.png

                            Floating Rule

                            8d7a1bfc-c955-4df9-83ee-d8b7b27e4d2e-image.png

                            So in my case theres no reason i can think of to use Port Forards.

                            Firewall: NetGate,Palo Alto-VM,Juniper SRX
                            Routing: Juniper, Arista, Cisco
                            Switching: Juniper, Arista, Cisco
                            Wireless: Unifi, Aruba IAP
                            JNCIP,CCNP Enterprise

                            JonathanLeeJ 1 Reply Last reply Reply Quote 0
                            • JonathanLeeJ
                              JonathanLee @michmoor
                              last edited by

                              @michmoor with pfBlocker don't you still need to redirect the clients that are ignoring the DNS settings still? That is interesting, I always have clients that will attempt to use a different DNS all the time with NAT it doesn't matter they go where I configured them too unless they use some new experimental protocol.

                              Make sure to upvote

                              M 1 Reply Last reply Reply Quote 0
                              • M
                                michmoor LAYER 8 Rebel Alliance @JonathanLee
                                last edited by

                                @JonathanLee I will try adding a nat redirect just to test to see if it makes things better.

                                To your other question, i am not using Squid Proxy to cache anything.

                                7f3a6c1f-bc5a-4ab2-afa2-f2a3996eccb2-image.png

                                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                Routing: Juniper, Arista, Cisco
                                Switching: Juniper, Arista, Cisco
                                Wireless: Unifi, Aruba IAP
                                JNCIP,CCNP Enterprise

                                JonathanLeeJ 1 Reply Last reply Reply Quote 0
                                • JonathanLeeJ
                                  JonathanLee @michmoor
                                  last edited by

                                  @michmoor I love the cache I have DSL/ copper it acts as an accelerator

                                  Make sure to upvote

                                  M 1 Reply Last reply Reply Quote 0
                                  • M
                                    michmoor LAYER 8 Rebel Alliance @JonathanLee
                                    last edited by

                                    @JonathanLee ahhh
                                    Im on 500/500 Fiber.

                                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                    Routing: Juniper, Arista, Cisco
                                    Switching: Juniper, Arista, Cisco
                                    Wireless: Unifi, Aruba IAP
                                    JNCIP,CCNP Enterprise

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.