Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Excessive "Call Home" DNS queries after update pfSense CE 2.8.0

    Scheduled Pinned Locked Moved DHCP and DNS
    17 Posts 4 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      binfree @tinfoilmatt
      last edited by binfree

      @tinfoilmatt said in Excessive "Call Home" DNS queries after update pfSense CE 2.8.0:

      Perhaps you could say a little more about your local DNS configuration, including pfSense host and where/how else services are being hosted/served on your LAN?

      That's the strange thing. Same as before with 2.7.2

      Upstream public DNS defined in pfSense General settings:

      Screenshot 2025-06-04 at 4.22.34 PM.png

      DHCP (Kea) hands out my AdGuard Home IP for DNS:

      Screenshot 2025-06-04 at 4.23.55 PM.png

      AdGuard Home is queried by any device on the network needing DNS and does caching. Upstreams to Unbound (running on pfSense) for all non-cached queries. No changes to TTL are made by AGH.

      You can see the results being served from the cache:

      Screenshot 2025-06-04 at 4.27.09 PM.png

      Lastly, Unbound forwards to the first-mentioned public DNS when the lookups aren't private addresses.

      Screenshot 2025-06-04 at 4.28.01 PM.png

      Unbound custom options:

      server:
      private-domain: "myunraid.net"
      private-domain: "plex.direct"
      local-zone: "use-application-dns.net" always_nxdomain

      @johnpoz said in Excessive "Call Home" DNS queries after update pfSense CE 2.8.0:

      @binfree do you leave the webgui open? I don't see a reason why pfsense would look for those unless the gui is open to be honest.

      No, the WebUI is generally not open unless I'm looking at something in particular, then I close the tab/window.

      Is it possible that with 2.7.2 pfSense's own queries were using 127.0.0.1 directly and not going via Unbound?

      5a8f82d1-60ef-4ae6-b6ba-33524542c6da-image.png

      Unbound listens on ports 53 and 853, so if pf previously used localhost and not Unbound for its own queries, I wouldn't see the queries recorded in AGH. Just speculation for a possible difference.

      tinfoilmattT 1 Reply Last reply Reply Quote 0
      • B
        binfree
        last edited by binfree

        While writing the reply above, the queries continued to be made and logged. I made a single configuration change:

        Screenshot 2025-06-04 at 4.48.21 PM.png

        Specifically turning off the first option here:

        Screenshot 2025-06-04 at 4.48.47 PM.png

        And now it's been over 10 minutes with no DNS queries from pfSense. This is doing my head in. :)

        It's 16:54 as I paste this:

        Screenshot 2025-06-04 at 4.54.10 PM.png

        S 1 Reply Last reply Reply Quote 0
        • tinfoilmattT
          tinfoilmatt @binfree
          last edited by

          @binfree said in Excessive "Call Home" DNS queries after update pfSense CE 2.8.0:

          Upstream public DNS defined in pfSense General settings:

          Screenshot 2025-06-04 at 4.22.34 PM.png

          If you're relying on the DNS Resolver (Unbound) to utilize DoT, dns.quad9.net should be used as the hostname for both of Quad9's nameservers and cloudflare-dns.com for both of Cloudflare's.

          B 1 Reply Last reply Reply Quote 0
          • S
            SteveITS Galactic Empire @binfree
            last edited by

            @binfree the cert expiration notice is an email from pfSense.

            So, what on pfSense is pointing to Adguard for DNS? Or am I misunderstanding?

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote 👍 helpful posts!

            B 1 Reply Last reply Reply Quote 0
            • B
              binfree @SteveITS
              last edited by binfree

              @SteveITS said in Excessive "Call Home" DNS queries after update pfSense CE 2.8.0:

              @binfree the cert expiration notice is an email from pfSense.

              Yes. And it should have no bearing on this issue. It's just something I wanted to turn off. And writing settings to pfSense (at this time) suddenly and unexpectedly coincided with all DNS queries coming from pfSense stopping. Problem solved - but who knows why.

              So, what on pfSense is pointing to Adguard for DNS? Or am I misunderstanding?

              Just the DNS address setting in DHCP. The place it needs to be set to have DHCP provide it to all clients on the network.

              S 1 Reply Last reply Reply Quote 0
              • B
                binfree @tinfoilmatt
                last edited by binfree

                @tinfoilmatt said in Excessive "Call Home" DNS queries after update pfSense CE 2.8.0:

                If you're relying on the DNS Resolver (Unbound) to utilize DoT, dns.quad9.net should be used as the hostname for both of Quad9's nameservers and cloudflare-dns.com for both of Cloudflare's.

                Can't remember why I forgot to change the IPs for quad9. The dns11 is correct, I just forgot to change the other entries - for DNSSEC/ECS.

                45a16309-9466-4571-aed8-92869cead1ec-image.png

                Followed this for Cloudflare: DNS over TLS

                1 Reply Last reply Reply Quote 0
                • S
                  SteveITS Galactic Empire @binfree
                  last edited by

                  @binfree said in Excessive "Call Home" DNS queries after update pfSense CE 2.8.0:

                  So, what on pfSense is pointing to Adguard for DNS? Or am I misunderstanding?

                  Just the DNS address setting in DHCP. The place it needs to be set to have DHCP provide it to all clients on the network.

                  But you’re saying pfSense itself is querying AdGuard? Even though it’s not configured to use it?

                  Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                  When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                  Upvote 👍 helpful posts!

                  B 1 Reply Last reply Reply Quote 0
                  • B
                    binfree @SteveITS
                    last edited by binfree

                    @SteveITS said in Excessive "Call Home" DNS queries after update pfSense CE 2.8.0:

                    But you’re saying pfSense itself is querying AdGuard? Even though it’s not configured to use it?

                    I should probably read the documentation on this as the use of the word "or" makes the result undefined when you have multiple options configured. Not that the setting should have anything to do with the DNS spam I mentioned.

                    94304b4d-9f67-4c6b-a813-615553eabc0c-image.png

                    After reading the docs, pfSense should not be using the DNS server defined in DHCP - this is the only place AGH IP is defined as I recall. It should use only the resolver which uses the DNS servers listed above as it's in forwarding mode.

                    And if I check the resolver status, it only knows about the upstream DNS entries:

                    d3aafc23-3a72-42f1-a9ce-e9032179fd66-image.png

                    So no idea how/why pfSense was sending requests to AGH. Must be a bug somewhere.

                    S 1 Reply Last reply Reply Quote 0
                    • S
                      SteveITS Galactic Empire @binfree
                      last edited by

                      @binfree said in Excessive "Call Home" DNS queries after update pfSense CE 2.8.0:

                      pfSense should not be using the DNS server defined in DHCP

                      Right, that was the gist of my point/question.

                      Are there any NAT forwards to AdGuard?

                      @binfree said in Excessive "Call Home" DNS queries after update pfSense CE 2.8.0:

                      the use of the word "or"

                      "Resolver or Forwarder" are the two options for providing DNS in pfSense. Resolver = unbound, Forwarder = dnsmasq. The dropdown allows, for instance, not using "itself" (127.0.0.1 is one of the two) and only using DNS from Settings > General.

                      You can also check Diagnostics > DNS Lookup.

                      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                      Upvote 👍 helpful posts!

                      B 1 Reply Last reply Reply Quote 0
                      • B
                        binfree @SteveITS
                        last edited by

                        @SteveITS said in Excessive "Call Home" DNS queries after update pfSense CE 2.8.0:

                        @binfree said in Excessive "Call Home" DNS queries after update pfSense CE 2.8.0:

                        pfSense should not be using the DNS server defined in DHCP

                        Are there any NAT forwards to AdGuard?

                        No, nothing.

                        @binfree said in Excessive "Call Home" DNS queries after update pfSense CE 2.8.0:

                        "Resolver or Forwarder" are the two options for providing DNS in pfSense.

                        In addition of course to "none" which uses only the upstream in General directly without Unbound or DNSMasq.

                        This is working now as per the documentation. I'm using Unbound in forward mode and no pfSense queries ever show up in AdGuard anymore - which is how it should always be.

                        You can also check Diagnostics > DNS Lookup.

                        Thanks. Same as the testing I did from the terminal on pfSense, which confirms 127* and the defined upstreams. Nothing indicating anywhere that it should ever go to AGH's address.

                        1 Reply Last reply Reply Quote 0
                        • B
                          binfree
                          last edited by binfree

                          So here's another unexplained appearance of the pfSense IP in AdGuard:

                          e67c993c-a987-4060-a314-dd382cfa7b5b-image.png

                          Some 2000 queries, starting last night apparently. None are actually sourced from pfSense, they're all from my iPhone - the ones in the screenshot are most definitely from the FlipBoard news aggregation app.

                          In pfSense logs I see these entries with my iPhone's MAC:

                          5a19af39-0358-4f7f-99bf-b9fc9807f3e8-image.png

                          9429fc95-c5b8-47de-a5b0-5f933c472338-image.png

                          35e6b4cd-9234-4e65-8db7-16adaae9b71c-image.png

                          7005e245-7c8b-4192-9720-8443801af759-image.png

                          I don't have a clue where 192.168.1.102 comes from. AFAIK there's nothing on my network using that range. Nothing I've ever set up anyway. The info on Apple Bonjour sleep proxy doesn't seem to cover this scenario. And I already have the system tunable net.link.ether.inet.log_arp_movements set to disabled anyway.

                          Then there's this other set of flip-flops which are all over the log, coming from a x86 machine running Unraid that only has a single NIC connected to the network with the MAC 60:be:b4:17:30:bc (S-Bluetech, limited). I don't know of anything on the network with the other MAC. The only MACs even starting with 54 are virtual from QEMU.

                          ec316834-1a1b-4566-ac88-68821a345a90-image.png

                          B 1 Reply Last reply Reply Quote 0
                          • B
                            binfree @binfree
                            last edited by

                            Uuuuuugh. On a long drive earlier today had a thought pop into my head...

                            Tailscale

                            There's a (much more) than zero chance that the iPhone traffic I saw coming from pfSense is tunneled traffic from the Tailnet - which advertises my AGH IP (10.8.8.10) as DNS. That's also likely how pfSense got the address to do its own queries - I just don't know why those would try hitting the Tailnet for that period of time when normally it just goes local/127.0.0.1

                            S 1 Reply Last reply Reply Quote 0
                            • S
                              SteveITS Galactic Empire @binfree
                              last edited by

                              @binfree Would it be (in essence) NATting through pfSense?

                              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                              Upvote 👍 helpful posts!

                              B 1 Reply Last reply Reply Quote 0
                              • B
                                binfree @SteveITS
                                last edited by binfree

                                More or less, SNAT I believe.

                                Tailscale offers a mesh-based Wireguard tunnel to access (for example) devices on your LAN without the bother of doing any router-side config.

                                The device you're using outside the LAN (my iPhone) connects directly to public sites without going through the tunnel, but since I'm advertising my own LAN-based DNS to the whole Tailnet (the mesh), and that DNS is not itself running Tailscale, connections to that DNS system are routed from another system that IS running Tailscale on the LAN. The system being used in this case is pfSense, as what Tailscale calls a subnet router, so its IP shows up as the source of the DNS query on the DNS (AGH) system.

                                Turns out there's a way for Tailscale to preserve the original IP, so I'm going to try that out.

                                And so... Guess what happens when you set AGH to drop connections from pfSense? :) Yeah, no DNS on your mobile - which I ran into today as I tried, and failed, to stream music after just starting my drive.

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.