Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unable to load OCSP response upon pfSense reboot

    Scheduled Pinned Locked Moved General pfSense Questions
    16 Posts 3 Posters 1.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      SundwichBread
      last edited by

      Tried with the following settings but it still results in the same error upon reboot.

      DNS Server Settings.PNG

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        If you set the behaviour there to 'use remote servers', does that allow it?

        It seems likely that otherwise it is trying to resolve it before Unbound has started and fails.

        1 Reply Last reply Reply Quote 0
        • S
          SundwichBread
          last edited by

          Setting it to use remote DNS servers only does not work as well.

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Huh. So maybe it tries to resolve before it has connectivity. Where is the logs does that error appear at boot/?

            1 Reply Last reply Reply Quote 0
            • S
              SundwichBread
              last edited by

              The logs for nginx failing to resolve r3.o.lencr.org is located at /var/log/nginx/error.log

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Sorry I meant where in time does it occur? Does the timestamp put it late in boot process?

                I would expect it to be after most services have started.

                1 Reply Last reply Reply Quote 0
                • S
                  SundwichBread
                  last edited by

                  The nginx error is logged at 20:49:02. Looking at my system logs, it does seem that the WAN link is up before the error happens.

                  Logs.PNG

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Yes basically at the end of boot. After Unbound has started. Hmm 🤔

                    1 Reply Last reply Reply Quote 0
                    • S
                      SundwichBread
                      last edited by SundwichBread

                      As a side note, I have HAproxy configured to load the OCSP response for my frontend as well. The system logs also show that it fails to resolve the hostname at 20:49:09

                      HAProxy.PNG

                      The cronjob that HAproxy configures to run every hour to update the OCSP response does successfully complete although this is well after pfsense has booted at 21:01:00

                      HAProxy 2.PNG

                      GertjanG 1 Reply Last reply Reply Quote 0
                      • GertjanG
                        Gertjan @SundwichBread
                        last edited by

                        @SundwichBread

                        b825ac6d-cd65-41df-9b86-39c6bf5a7a32-image.png

                        At that moment, unbound was opening shop, but wasn't ready to take orders. Hence the "Name does not resolve".

                        It isn't hard to create a slow starting unbound : you need pfBlockerng - do not use the Python mode for best (very slow) result - and use many DNSBL.
                        Now unbound needs minutes to start up, and all resolving will fail, until its done.

                        Or : another reason, as unbound is interface trigger happy : if another interface comes up, like the VPN interface : unbound restarts .... and if haproxy was also starting also at that moment : bingo.
                        We all love them, these race conditions ^^

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        1 Reply Last reply Reply Quote 0
                        • S
                          SundwichBread
                          last edited by

                          Hi Gertjan, I did try to configure pfSense to use remote DNS servers only but it still results in the same error. Wouldn't configuring pfSense to use remote DNS servers only avoid the the use of the local unbound resolver and hence those race conditions stated would not apply?

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Yes I would certainly have thought so.

                            You should check that fqdn does actually resolve against all configured servers in Diag > DNS Lookup though.

                            1 Reply Last reply Reply Quote 0
                            • S
                              SundwichBread
                              last edited by

                              DNS Lookup under Diagnostics does successfully resolve the r3.o.lencr.org FQDN.

                              DNS Lookup 2.PNG

                              This is using Google DNS with the option use remote DNS servers only. Could it be an issue with outbound NAT rules not loading before pfSense attempts to resolve the hostname? I am not too familiar on when the firewall rules are loaded during the boot up process.

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                Connections from the firewall itself should not need NAT. But it would be loaded by that point anyway.

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.