• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Redirected all DNS to pihole using pfSense. Pihole still showing some hosts as not using the DNS ?

Scheduled Pinned Locked Moved Firewalling
54 Posts 10 Posters 3.3k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A
    abesh @Raffi_
    last edited by Oct 25, 2024, 4:14 PM

    @Raffi_ That was actually the first setup that I ran and I moved on to this :)

    R 1 Reply Last reply Oct 25, 2024, 4:16 PM Reply Quote 0
    • R
      Raffi_ @abesh
      last edited by Raffi_ Oct 25, 2024, 4:19 PM Oct 25, 2024, 4:16 PM

      @abesh And we're still talking about brown or red entries? I saw all brown on your screen shot.

      And to be clear, you had the same exact issue with that original setup which prompted you to try something else or were you trying to address something else? In my experience there might be a couple of devices which do not use pi-hole. How many exactly are you noticing?

      A 1 Reply Last reply Oct 25, 2024, 4:22 PM Reply Quote 0
      • A
        abesh @Raffi_
        last edited by Oct 25, 2024, 4:22 PM

        @Raffi_ Yeah, let me wait and observe a bit.

        1 Reply Last reply Reply Quote 0
        • V
          viragomann @abesh
          last edited by Oct 25, 2024, 4:29 PM

          @abesh said in Redirected all DNS to pihole using pfSense. Pihole still showing some hosts as not using the DNS ?:

          Pihole thinks it is coming from pfSense and not the device itself.

          @Raffi_ said in Redirected all DNS to pihole using pfSense. Pihole still showing some hosts as not using the DNS ?:

          Have you tried my original suggestion of allowing pfsense to run unbound and then point pi-hole to it?

          I don't expect, that this makes any difference on the pihole seeing requests coming from pfSense.(?)

          @abesh
          If you want to see the origin client IPs, you have put the pihole into a separated network segment on a different interface, so that you can get rid of the masquerading rule.

          A 2 Replies Last reply Oct 25, 2024, 4:31 PM Reply Quote 0
          • A
            abesh @viragomann
            last edited by Oct 25, 2024, 4:31 PM

            @viragomann That makes a lot of sense. Thank you :)

            1 Reply Last reply Reply Quote 0
            • A
              abesh @viragomann
              last edited by Oct 25, 2024, 4:35 PM

              @viragomann Would I get anything else other than local domain name resolution for forwarded queries if I move the pihole to a different subnet ? If not I would just like to keep it as is :)

              V 1 Reply Last reply Oct 25, 2024, 4:41 PM Reply Quote 0
              • V
                viragomann @abesh
                last edited by Oct 25, 2024, 4:41 PM

                @abesh
                There is no benefit else, I can think of at the moment.

                A 1 Reply Last reply Oct 25, 2024, 4:46 PM Reply Quote 0
                • A
                  abesh @viragomann
                  last edited by Oct 25, 2024, 4:46 PM

                  @viragomann Thank you so much !!!

                  1 Reply Last reply Reply Quote 0
                  • A
                    AndyRH @abesh
                    last edited by Oct 25, 2024, 6:34 PM

                    @abesh said in Redirected all DNS to pihole using pfSense. Pihole still showing some hosts as not using the DNS ?:

                    How do I configure pfSense so that it also send the device hostnames when forwarding the request ?

                    It will never send the hostname. I was not able to figure out how to send the requesting IP. I do not think it is possible because pfSense is "proxying" the request. Even hosts requesting from wrong DNS servers on different subnets show up as pfSense.
                    DoH is mostly blocked with pfBlocker and DoT is blocked by blocking 853. Not perfect.

                    o||||o
                    7100-1u

                    A 1 Reply Last reply Oct 25, 2024, 6:44 PM Reply Quote 0
                    • A
                      abesh @AndyRH
                      last edited by Oct 25, 2024, 6:44 PM

                      @AndyRH Apparently possible in OPNSense so should also be possible in pfSense. I need to go through this post in detail when I have a bit of time : https://forum.opnsense.org/index.php?topic=34907.0

                      J 1 Reply Last reply Oct 27, 2024, 1:46 PM Reply Quote 0
                      • J
                        johnpoz LAYER 8 Global Moderator @abesh
                        last edited by Oct 27, 2024, 1:46 PM

                        @abesh not exactly sure what your seeing and what you expect..

                        If I redirect dns queries to my pihole I see who did the query.

                        dns.jpg

                        My pc i9-win.home.arpa is 192.168.9.100

                        client.jpg

                        This works when your pihole is on a different network than your client.. If the client is on the same network as your pihole your most likely going to run into issues with answer coming from different IP than where the client sent the traffic. Unless you forward to loopback and have unbound query the pihole, this will look like it came from pfsense IP vs the client.

                        You might be able to use

                        send-client-subnet:

                        In your unbound config.. But not sure if that has been enabled in the unbound on pfsense.. I would have to do some testing.

                        Your best option if you want to forward direct to pihole, and see what source IP asked for something, is put your pihole on a different vlan than your clients.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • P
                          provels
                          last edited by Oct 27, 2024, 1:53 PM

                          Likely not relevant, but I use Pihole as the LAN DNS and forward to pfSense where it also hits pfBlocker and Unbound (Resolver).

                          Peder

                          MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                          BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                          J 1 Reply Last reply Oct 27, 2024, 1:59 PM Reply Quote 2
                          • J
                            johnpoz LAYER 8 Global Moderator @provels
                            last edited by Oct 27, 2024, 1:59 PM

                            @provels that is the better way to do it if you ask me.. That is what I do as well.. Clients ask pihole, pihole asks unbound on pfsense, unbound resolves.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            P 1 Reply Last reply Oct 27, 2024, 2:18 PM Reply Quote 2
                            • P
                              provels @johnpoz
                              last edited by provels Oct 27, 2024, 2:20 PM Oct 27, 2024, 2:18 PM

                              @johnpoz Not to trash pfB, but I love the simplicity, efficiency, and ease of management of Pihole, especially when I see numbers like this from a minuscule VM.
                              8c6173db-469a-4c01-9871-bab7bb952666-image.png

                              Peder

                              MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                              BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                              J 1 Reply Last reply Oct 27, 2024, 2:29 PM Reply Quote 1
                              • J
                                johnpoz LAYER 8 Global Moderator @provels
                                last edited by Oct 27, 2024, 2:29 PM

                                @provels yeah not meaning to trash pfb either, I use it for my aliases and its great, but been using pihole long time, and yeah the eye candy is nice, etc. etc..

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 2
                                • R
                                  Raffi_
                                  last edited by Raffi_ Nov 11, 2024, 3:36 PM Nov 1, 2024, 4:48 PM

                                  I agree with you guys, pi-hole pointing to pfsense unbound is my preferred setup too and what I suggested.

                                  I'm so glad my friend got me to try out a pi-hole setup. Once you do, there is really no going back to pfblocker. They both are great tools, but the limitation of having to enter individual IP address for bypassing is a pretty big deal breaker on pfblocker. I used to be able to define a range or subnets which can bypass it via the custom resolver options, but that doesn't seems to work anymore. I'm sure I'm missing something but the fact that I had a hard time trying to find what I'm missing is enough to say pi-hole is the clear winner in that respect. I also love that I can turn it off for x amount of time for testing purposes. The visuals are for sure nice too.

                                  T 1 Reply Last reply Nov 1, 2024, 5:09 PM Reply Quote 0
                                  • T
                                    tinfoilmatt @Raffi_
                                    last edited by Nov 1, 2024, 5:09 PM

                                    @Raffi_ said in Redirected all DNS to pihole using pfSense. Pihole still showing some hosts as not using the DNS ?:

                                    They both are great tools, but the limitation of having to enter individual IP address for bypassing is a pretty big deal breaker on pfblocker. I used to be able to define a range or subnets which can bypass it[ . . . ]

                                    If LAN hosts are bypassing local network policy entirely, one might not be thinking about and/or doing it right. I can't think of a single use case where granular domain/address (including subnet) control isn't preferable to simply bypassing DNSBL/IP filtering altogether—which is definitely well-within pfB's capabilites. That one hasn't personally figured out how to configure one or the other the way they desire says nothing about the objective limitations of either software, except maybe user-friendliness.

                                    Pi-hole is the clear winner in whatever aspect/s you've determined to be the case for you personally.

                                    R 1 Reply Last reply Nov 11, 2024, 3:40 PM Reply Quote 0
                                    • J
                                      JonathanLee
                                      last edited by Nov 1, 2024, 5:12 PM

                                      What about DoT or DoH ?

                                      Make sure to upvote

                                      T 1 Reply Last reply Nov 1, 2024, 5:16 PM Reply Quote 0
                                      • T
                                        tinfoilmatt @JonathanLee
                                        last edited by Nov 1, 2024, 5:16 PM

                                        @JonathanLee If you're responding to me, both can be mitigated to the extent possible wih port filtering (DoT), NAT (DoH and DoT), and block lists (DoH and DoT).

                                        And that has nothing to do with Pi-hole versus pfB. No DNS forwarder or resolver on its own can do anything about either.

                                        J 1 Reply Last reply Nov 1, 2024, 5:25 PM Reply Quote 0
                                        • J
                                          JonathanLee @tinfoilmatt
                                          last edited by Nov 1, 2024, 5:25 PM

                                          @cyberconsultants I have a huge list I use to block them

                                          Make sure to upvote

                                          T 1 Reply Last reply Nov 1, 2024, 6:43 PM Reply Quote 0
                                          51 out of 54
                                          • First post
                                            51/54
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received