Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Is something changes on resolving domain name

    2.0-RC Snapshot Feedback and Problems - RETIRED
    5
    14
    5.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rlai000
      last edited by

      I previously has snapshot of 6th Aug.  But after updated to the current one (and tried a few in between), my VPN's cannot resolve the url

      My VPNs are using url that have the same domain name as my internal domain and in turn this domain name is resolved "internally" by a dns server on one of the VPN links.

      It works on the snapshot on or before 6th Aug. like that.  i.e. pfSense will "directly" using the ISP or the assigned dns servers for any domain name resolving.  I could using the Diagnostic:Ping to ping the url.

      With the latest snapshot, I couldn't ping the url on Diagnostic:Ping.  It seems the ping (and the VPN, filterdns) is trying to resolve the url from the dns server that actually on a VPN link (which cannot establish as the VPN url itself not resolving)

      I also see there is one more entry on the DNS server on Dashboard which is 127.0.0.1  It seems pfSense is now resolving domain names using internal dns forwarder.  Hence all my VPNs (except one is using no-ip.info) are broken.

      Could the developer confirm whether this is intentional or just a bug?

      Thanks.

      -Raylund

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        That was an intentional change. If you are getting back private IPs from your upstream DNS servers, just uncheck the box for DNS rebind protection under System > Advanced.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • R
          rlai000
          last edited by

          I did as suggested but still have problem.

          I think I should make it more clear by example.

          I've an Active Directory setup in different offices/locations and connected via VPN (site-to-site IPSec).  Not all offices have their own Domain Controller and DNS server.  My office use DNS Forwarder to set "authoritative DNS server" for my AD domain to a remote office which has a DC and DNS server (via VPN).

          Here is the problem.  Let say my AD domain is called addomain.ca.  This domain name, addomain.ca, is also a valid public domain on internet.  I've setup DDNS (via easyDNS) that reference to other offices, e.g. gw0-surrey.addomain.ca, gw50-brampton.addomin.ca.  My pfsense and other locations' SonicWall will using this url for VPN connection.  And my DNS Forwarder for addomain.ca is referenced to, let say, the LAN (192.168.0.0/24) of gw0-surrey.addomain.ca.

          As you could see now, my LAN will resolve addomina.ca to the DNS server on 192.168.0.0/24 via VPN.  But now, pfsense try to resolve gw0-surrey.addomain.ca from the server in 192.168.0.0/24 which is not yet connected itself.

          It's a catch 22 case now.  Before the current snapshot, pfsense just resolve gw0-surrey.addomain.ca "externally" without problem.  But now it try to resolve "internally".

          I don't know whether this make my case a bit clear.

          -Raylund

          1 Reply Last reply Reply Quote 0
          • R
            rlai000
            last edited by

            My System log filled with the following:
            filterdns: host_dns: failed looking up "gw51-xxx.ca": hostname nor servname provided, or not known

            @rlai000:

            I did as suggested but still have problem.

            I think I should make it more clear by example.

            I've an Active Directory setup in different offices/locations and connected via VPN (site-to-site IPSec).  Not all offices have their own Domain Controller and DNS server.  My office use DNS Forwarder to set "authoritative DNS server" for my AD domain to a remote office which has a DC and DNS server (via VPN).

            Here is the problem.  Let say my AD domain is called addomain.ca.  This domain name, addomain.ca, is also a valid public domain on internet.  I've setup DDNS (via easyDNS) that reference to other offices, e.g. gw0-surrey.addomain.ca, gw50-brampton.addomin.ca.  My pfsense and other locations' SonicWall will using this url for VPN connection.  And my DNS Forwarder for addomain.ca is referenced to, let say, the LAN (192.168.0.0/24) of gw0-surrey.addomain.ca.

            As you could see now, my LAN will resolve addomina.ca to the DNS server on 192.168.0.0/24 via VPN.  But now, pfsense try to resolve gw0-surrey.addomain.ca from the server in 192.168.0.0/24 which is not yet connected itself.

            It's a catch 22 case now.  Before the current snapshot, pfsense just resolve gw0-surrey.addomain.ca "externally" without problem.  But now it try to resolve "internally".

            I don't know whether this make my case a bit clear.

            -Raylund

            1 Reply Last reply Reply Quote 0
            • R
              rlai000
              last edited by

              More information.

              It seemed the url of VPN resolved at the very first beginning for several links.

              System log seeing several of my VPNs "reloading IPSec tunnel":
              php: : Reloading IPsec tunnel '0.x_Surrey'. Previous IP 'xxx', current IP 'xxx'. Reloading policy

              This is confirmed too in the "pfSense: status: cat /tmp/rules.debug" like:
              pass out on $WAN  route-to ( fxp1 xxx )  proto udp from any to xxx port = 500 keep state label "IPsec: 0.x_Surrey - outbound isakmp"
              pass in on $WAN  reply-to ( fxp1 xxx )  proto udp from xxx to any port = 500 keep state label "IPsec: 0.x_Surrey - inbound isakmp"
              pass out on $WAN  route-to ( fxp1 xxx )  proto udp from any to xxx port = 4500 keep state label "IPsec: 0.x_Surrey - outbound nat-t"
              pass in on $WAN  reply-to ( fxp1 xxx )  proto udp from xxx to any port = 4500 keep state label "IPsec: 0.x_Surrey - inbound nat-t"
              pass out on $WAN  route-to ( fxp1 xxx )  proto esp from any to xxx keep state label "IPsec: 0.x_Surrey - outbound esp proto"
              pass in on $WAN  reply-to ( fxp1 xxx )  proto esp from xxx to any keep state label "IPsec: 0.x_Surrey - inbound esp proto"

              But some other VPN links are:

              ERROR! Unable to determine remote IPsec peer address for gw22-xxx.ca

              And after some time, say few minutes, all my System log filled with something like:
              filterdns: host_dns: failed looking up "gw0-xxx.ca": hostname nor servname provided, or not known

              i.e. even the resolved domain beforehand didn't resolve later; thus all my VPN links broken.

              -Raylund

              1 Reply Last reply Reply Quote 0
              • E
                eri--
                last edited by

                Can you show me the output of
                dig @yourdnsserver $yourdomainname
                dig $yourdomainname

                Just to see what is going on here.

                1 Reply Last reply Reply Quote 0
                • E
                  eri--
                  last edited by

                  I put an option under System->Advanced-> Miscellaneous to allow restoring older behavior.
                  Test it with next snapshots.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    Just noticed the 127.0.0.1 for dns as well, seems to be a bit of a problem if not using the internal forwarder.  Using unbound and even though I highlighted both lan and loopback, unbound did not want to listen on 127.0.0.1

                    I had to manually edit the unbound.conf for it to listen on loopback, now for example looking to see if there is an update available on the dashboard again works.

                    Should prob bring this up in the package sections for unbound.  If I highlight like below image and restart unbound shouldn't it listen on 127.0.0.1 as well as the lan interface

                    unboundloopback.jpg
                    unboundloopback.jpg_thumb

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    1 Reply Last reply Reply Quote 0
                    • R
                      rlai000
                      last edited by

                      @ermal:

                      Can you show me the output of
                      dig @yourdnsserver $yourdomainname
                      dig $yourdomainname

                      Just to see what is going on here.

                      From 2.0-RC3 (i386) built on Sat Aug 6 19:02:34 EDT 2011

                      dig1.JPG
                      dig1.JPG_thumb
                      dig2.JPG
                      dig2.JPG_thumb

                      1 Reply Last reply Reply Quote 0
                      • R
                        rlai000
                        last edited by

                        From 2.0-RC3 (i386) built on Fri Aug 12 00:28:10 EDT 2011

                        dig3.JPG
                        dig3.JPG_thumb
                        dig4.JPG
                        dig4.JPG_thumb

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          you forgot the @ in your dig command – your just doing queries for the 2 different items.

                          Can you show me the output of
                          dig **@**yourdnsserver $yourdomainname
                          dig $yourdomainname

                          dig @192.168.20.17 hrl.ca

                          your first queries went to 156.154.70.22

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          1 Reply Last reply Reply Quote 0
                          • R
                            rlai000
                            last edited by

                            Thanks John.

                            Here are the outputs.  One from old snapshot of 6th Aug and one is the most current one.

                            Both produced the same results.

                            -Raylund

                            dig1.JPG
                            dig1.JPG_thumb
                            dig3.JPG
                            dig3.JPG_thumb

                            1 Reply Last reply Reply Quote 0
                            • R
                              rlai000
                              last edited by

                              ermal,

                              I'm now running the latest snapshot 2.0-RC3 (i386) built on Fri Aug 12 09:36:08 EDT 2011

                              I got some funny results.

                              1st scenario, all my VPN connections are up and running.

                              But, Status:IPSec shows all "yellow crossed" box (except one is green box which url is referenced to no-ip.info).

                              The Status:System logs:IPsec VPN has all the proper connections transactions BUT they're not referencing to the usual "named"; they're all now IP addresses and numbers.

                              The Status:System logs:System still filled with "filterdns: host_dns: failed looking up "xxx": hostname nor servname provided, or not known".

                              2nd scenario is I did check the option in System:Advanced:Miscellaneous:DNS Forwarder:Localhost.

                              All is going back to normal as before.

                              Anyway, both scenario my VPN connections are working now.  Except the 1st scenario that pfsense is very slow in respond when click on "Status:IPSec" and "Status:System logs:IPsec VPN".

                              Thanks

                              -Raylund

                              1 Reply Last reply Reply Quote 0
                              • W
                                wagonza
                                last edited by

                                Just fyi - the unbound package is updated. Which now correctly listens on the loopback address when it has been selected.

                                Follow me on twitter http://twitter.com/wagonza
                                http://www.thepackethub.co.za

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.