Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    HELP: CANNOT BROWSE AFTER INSTALLING PFSENSE

    Scheduled Pinned Locked Moved General pfSense Questions
    36 Posts 4 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      When you tested in Diag > DNS Lookup do you see all configured DNS servers responding?

      If Torbrowser is working from the Kicksecure VM then it must have a route out. Pings to an external IP should also work?

      T 1 Reply Last reply Reply Quote 0
      • T
        TheWall2 @stephenw10
        last edited by

        @stephenw10 I entered 8.8.8.8 and google.com in Diag > DNS Lookup and this is the result:

        • 127.0.0.1, 10.0.0.243 and 192.168.1.1 DNS servers responded
        • 8.8.8.8 and 8.8.4.4 DNS servers didn't respond

        I didn't change any settings in Tor nor in the other browsers, nevertheless Tor seems to have a route out. Any idea?

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Tor doesn't rely on the system DNS servers.

          But it still needs a valid route. Did you try to ping out from Kicksecure to an external IP as I asked? That should also work. Try 1.1.1.1 since you have added static roues for google's DNS servers.

          Did Diag > DNS Lookup show valid responses for the query for the servers that did respond.

          T stephenw10S 2 Replies Last reply Reply Quote 0
          • T
            TheWall2 @stephenw10
            last edited by TheWall2

            @stephenw10 I went to Diag > Ping and pinged 1.1.1.1, it worked. I'm not sure if this is what you asked me to do.

            In Diag > DNS Lookup I made a DNS lookup for 1.1.1.1, it showed valid responses for the query for the 3 servers that did respond (query time 2 msec, 32 msec and 2 msec). 8.8.8.8 and 8.8.4.4 did not respond.

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator @stephenw10
              last edited by

              @stephenw10 said in HELP: CANNOT BROWSE AFTER INSTALLING PFSENSE:

              Did you try to ping out from Kicksecure to an external IP as I asked?

              Test pings from he Kicksecure VM not from pfSense, we know it works from pfSense.

              @TheWall2 said in HELP: CANNOT BROWSE AFTER INSTALLING PFSENSE:

              In Diag > DNS Lookup I made a DNS lookup for 1.1.1.1,

              You need to query an FQDN like google.com not an IP address.

              T 1 Reply Last reply Reply Quote 0
              • T
                TheWall2 @stephenw10
                last edited by TheWall2

                @stephenw10 Sorry, I pinged now 1.1.1.1 from the terminal window of Kicksecure VM and it worked.

                In Diag > DNS Lookup I made a DNS lookup for proton.me, it showed valid responses for the query for the 3 servers that did respond (query time 4 msec, 55 msec and 3 msec). 8.8.8.8 and 8.8.4.4 did not respond.

                In Firefox's network settings the "Use system's proxy settings" option is selected, I've never changed it since Firefox has been installed.

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Hmm, OK.
                  So why are 8.8.8.8 and 8.8.4.4 not responding.... though it shouldn't matter because by default pfSense resolves dircetly with Unbound and passes that to clients to use.

                  Did you enter a gateway for those DNS servers in System > General Setup?

                  However the actual problem here appears to be that the Kicksecure VM has no DNS. Which is odd because, as I say, pfSense will have passed it 192.168.1.1 to use for DNS.

                  Does Kicksecure use it's own DNS or something weird?

                  Try to resolve something from a terminal there like:

                  steve@steve-NUC9i9QNX:~$ dig netgate.com
                  
                  ; <<>> DiG 9.18.18-0ubuntu0.22.04.2-Ubuntu <<>> netgate.com
                  ;; global options: +cmd
                  ;; Got answer:
                  ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15033
                  ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
                  
                  ;; OPT PSEUDOSECTION:
                  ; EDNS: version: 0, flags:; udp: 65494
                  ;; QUESTION SECTION:
                  ;netgate.com.			IN	A
                  
                  ;; ANSWER SECTION:
                  netgate.com.		2	IN	A	199.60.103.104
                  netgate.com.		2	IN	A	199.60.103.4
                  
                  ;; Query time: 8 msec
                  ;; SERVER: 127.0.0.53#53(127.0.0.53) (UDP)
                  ;; WHEN: Fri May 10 17:06:58 BST 2024
                  ;; MSG SIZE  rcvd: 72
                  

                  That's in Mint where (unfortunately) systemd caches everything locally so you can see 127.0.0.1 as the reported server.

                  T 1 Reply Last reply Reply Quote 0
                  • T
                    TheWall2 @stephenw10
                    last edited by TheWall2

                    @stephenw10 In System > General Setup I didn't enter any gateway since no default values have been modified.

                    I don't know if Kicksecure uses its own DNS. I know for sure that, when making updates to its packages, it connects through Tor.

                    I forgot to say that the host system runs a VPN and Kicksecure VM uses that VPN when it's in NAT mode. However now it's set to intnet.

                    I found this link:

                    https://www.kicksecure.com/wiki/DNS_Security#Browser_Tests

                    and in Kicksecure terminal window I entered "dig +multiline . DNSKEY", the result is:

                    ; <<>> DiG 9.18.24-1-Debian <<>> +multiline . DNSKEY
                    ;; global options: +cmd
                    ;; Got answer:
                    ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 51152
                    ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

                    ;; OPT PSEUDOSECTION:
                    ; EDNS: version: 0, flags:; udp: 512
                    ;; QUESTION SECTION:
                    ;. IN DNSKEY

                    ;; Query time: 0 msec
                    ;; SERVER: 192.168.1.1#53(192.168.1.1) (UDP)
                    ;; WHEN: Fri May 10 16:19:20 UTC 2024
                    ;; MSG SIZE rcvd: 28

                    I've tried to enter also "dig netgate.com", this is the result:

                    ; <<>> DiG 9.18.24-1-Debian <<>> netgate.com
                    ;; global options: +cmd
                    ;; Got answer:
                    ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 2721
                    ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

                    ;; OPT PSEUDOSECTION:
                    ; EDNS: version: 0, flags:; udp: 512
                    ;; QUESTION SECTION:
                    ;netgate.com. IN A

                    ;; Query time: 4 msec
                    ;; SERVER: 192.168.1.1#53(192.168.1.1) (UDP)
                    ;; WHEN: Fri May 10 16:39:46 UTC 2024
                    ;; MSG SIZE rcvd: 40

                    I entered "dig +dnssec nic.cz @localhost" and this is the result:

                    ;; communications error to ::1#53: connection refused
                    ;; communications error to ::1#53: connection refused
                    ;; communications error to ::1#53: connection refused
                    ;; communications error to 127.0.0.1#53: connection refused

                    ; <<>> DiG 9.18.24-1-Debian <<>> +dnssec nic.cz @localhost
                    ;; global options: +cmd
                    ;; no servers could be reached

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      @TheWall2 said in HELP: CANNOT BROWSE AFTER INSTALLING PFSENSE:

                      https://www.kicksecure.com/wiki/DNS_Security#Browser_Tests

                      Oh so it's configured to use DNSSec by default?

                      Ok I would install Ubuntu in a new VM and test that first. Kicksecure has a bunch of features that are getting in the way and just confusing the testing.

                      I think in fact pfSense is working fine. Though it's unclear why 8.8.8.8/8.8.4.4 will not resolve.

                      T 1 Reply Last reply Reply Quote 0
                      • T
                        TheWall2 @stephenw10
                        last edited by

                        @stephenw10 I will do it, thanks a lot for your patience and your help

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.