Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    After About 5 Days I get this: openvpn[5531]: RESOLVE: Cannot resolve host addre

    Scheduled Pinned Locked Moved OpenVPN
    53 Posts 3 Posters 27.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      archedraft
      last edited by

      How to use Policy Based Routing and Multi VPN

      • I Followed this guide http://www.komodosteve.com/archives/232

      • NOTES: I used the same server port for both VPN's

      • NOTES: I added the following commands into Advanced Config (When pfSense first boots it loads VPN_IP_#1 but if the client gets restarted it will randomly pick of the the 3 VPN_IP's

      • SCREENSHOT: OpenVPN Client 1

      • SCREENSHOT: OpenVPN Client 2

      remote_VPN IP_#1 Port#;
      remote VPN_IP_#2 Port#;
      remote VPN_IP_#3 Port#;
      remote-random;

      • SCREENSHOT: System Gateways

      • This is where you will setup two aliases for the USA VPN's and EU VPN's

      • Make sure you have static IP address for the machines

      • I made 3 rules (1 that redircts the EU vpn through the EU gateway, 1 that redirects the US vpn through the US gateway, and 1 that selects every other IP address not specified in aliases and sends it to the defualt WAN gateway)

      • Proto: ANY, Source: Alias, Gateway: VPN

      • SCREENSHOT: Firewall Rules 1

      • SCREENSHOT: Firewall Rules 2

      • First delete all rules

      • Select "Automatic outbound NAT rule generation" and click save

      • Select "Manual Outbound NAT rule generation" and click save

      • This should auto created any rules needed for the VPN's

      • Now create a rule that will stop traffic if the VPN is down

      • Click "Do not NAT", Interface "WAN", Protocol "any", Source "Alias"

      • MAKE SURE you move the rule to the top of the list as pfsense carries out rules from top down

      • SCREENSHOT: Firewall NAT Outbound 1

      • SCREENSHOT: Firewall NAT Outbound 2

      • Action "Block", Interface "WAN", Direction "any", Protocol "any", Source "alias"

      • SCREENSHOT: Firewall Rules Floating 1

      • SCREENSHOT: Firewall Rules Floating 2

      • This along with with #5  will block your machine from going to internet

      ![OpenVPN Client 1.JPG_thumb](/public/imported_attachments/1/OpenVPN Client 1.JPG_thumb)
      ![OpenVPN Client 1.JPG](/public/imported_attachments/1/OpenVPN Client 1.JPG)

      1 Reply Last reply Reply Quote 0
      • A
        archedraft
        last edited by

        Screenshots

        ![OpenVPN Client 2.JPG](/public/imported_attachments/1/OpenVPN Client 2.JPG)
        ![OpenVPN Client 2.JPG_thumb](/public/imported_attachments/1/OpenVPN Client 2.JPG_thumb)
        ![System Gateways.JPG](/public/imported_attachments/1/System Gateways.JPG)
        ![System Gateways.JPG_thumb](/public/imported_attachments/1/System Gateways.JPG_thumb)
        ![Firewall Rules 1.JPG](/public/imported_attachments/1/Firewall Rules 1.JPG)
        ![Firewall Rules 1.JPG_thumb](/public/imported_attachments/1/Firewall Rules 1.JPG_thumb)

        1 Reply Last reply Reply Quote 0
        • M
          m3ki
          last edited by

          Sounds about right ;) Glad I could help :)

          1 Reply Last reply Reply Quote 0
          • A
            archedraft
            last edited by

            Screenshots

            ![Firewall Rules 2.JPG](/public/imported_attachments/1/Firewall Rules 2.JPG)
            ![Firewall Rules 2.JPG_thumb](/public/imported_attachments/1/Firewall Rules 2.JPG_thumb)
            ![Firewall NAT Outbound 1.JPG](/public/imported_attachments/1/Firewall NAT Outbound 1.JPG)
            ![Firewall NAT Outbound 1.JPG_thumb](/public/imported_attachments/1/Firewall NAT Outbound 1.JPG_thumb)

            1 Reply Last reply Reply Quote 0
            • A
              archedraft
              last edited by

              screenshots

              ![Firewall NAT Outbound 2.JPG](/public/imported_attachments/1/Firewall NAT Outbound 2.JPG)
              ![Firewall NAT Outbound 2.JPG_thumb](/public/imported_attachments/1/Firewall NAT Outbound 2.JPG_thumb)
              ![Firewall Rules Floating 1.JPG](/public/imported_attachments/1/Firewall Rules Floating 1.JPG)
              ![Firewall Rules Floating 1.JPG_thumb](/public/imported_attachments/1/Firewall Rules Floating 1.JPG_thumb)

              1 Reply Last reply Reply Quote 0
              • A
                archedraft
                last edited by

                Screenshots

                ![Firewall Rules Floating 2.JPG](/public/imported_attachments/1/Firewall Rules Floating 2.JPG)
                ![Firewall Rules Floating 2.JPG_thumb](/public/imported_attachments/1/Firewall Rules Floating 2.JPG_thumb)

                1 Reply Last reply Reply Quote 0
                • M
                  m3ki
                  last edited by

                  Hah now the topic went from cannot resolve address to…..... how to make policy based routing with multiple vpn clients.......

                  1 Reply Last reply Reply Quote 0
                  • A
                    archedraft
                    last edited by

                    Yeah, I was going to rename the first post but I guess it doesn't let you modify the first post… Ill start a new thread as well lol. Thanks again m3ki!

                    1 Reply Last reply Reply Quote 0
                    • M
                      m3ki
                      last edited by

                      Any time :)

                      Next steps to think about…... you can also forward certain ports, protocols, domains...... to go to vpn........ etc.... moar fun!

                      1 Reply Last reply Reply Quote 0
                      • A
                        archedraft
                        last edited by

                        is it be possible to setup a rule that let certain websites go through the USA vpn even if I am using the machine on the EU vpns?????  :D

                        1 Reply Last reply Reply Quote 0
                        • M
                          m3ki
                          last edited by

                          Lol yes I think so, remember rules go top down.
                          So if rule us caught before bottom one that one is executed.

                          ie.
                          1. If source…. EU, DESTINATION = google.com then US
                          2. if source EU, DESTINATION * then EU

                          so #1 will be executed. you can also use ! in front of ip etc..... which will mean if not this then that..

                          The only issue is i think domain names wont work... and you may have to use ip address instead.

                          1 Reply Last reply Reply Quote 0
                          • A
                            archedraft
                            last edited by

                            oh this is exciting!

                            1 Reply Last reply Reply Quote 0
                            • M
                              m3ki
                              last edited by

                              Haaahhahahaha I have created a monster!

                              1 Reply Last reply Reply Quote 0
                              • A
                                archedraft
                                last edited by

                                The problem is still there even after making all the changes. The annoying thing is that when the US VPN is in this reconnecting process, it kills all other internet connection even the EU VPN and normal WAN, however; if all the VPN's are up and running normally and then I disable the USA VPN, the EU VPN and normal WAN work just fine… My entire VPN client setup (with pictures) is shown on page 3. Does anyone have any ideas?

                                Nov 2 06:39:26	openvpn[97331]: SIGUSR1[soft,init_instance] received, process restarting
                                Nov 2 06:39:26	openvpn[97331]: RESOLVE: Cannot resolve host address: us-east.privateinternetaccess.com: hostname nor servname provided, or not known
                                Nov 2 06:39:26	openvpn[97331]: RESOLVE: Cannot resolve host address: us-east.privateinternetaccess.com: hostname nor servname provided, or not known
                                Nov 2 06:39:26	openvpn[97331]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
                                Nov 2 06:39:26	openvpn[97331]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
                                Nov 2 06:39:24	openvpn[97331]: SIGUSR1[soft,init_instance] received, process restarting
                                Nov 2 06:39:24	openvpn[97331]: RESOLVE: Cannot resolve host address: us-midwest.privateinternetaccess.com: hostname nor servname provided, or not known
                                Nov 2 06:39:24	openvpn[97331]: RESOLVE: Cannot resolve host address: us-midwest.privateinternetaccess.com: hostname nor servname provided, or not known
                                Nov 2 06:39:24	openvpn[97331]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
                                Nov 2 06:39:24	openvpn[97331]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
                                Nov 2 06:39:22	openvpn[97331]: SIGUSR1[soft,init_instance] received, process restarting
                                Nov 2 06:39:22	openvpn[97331]: RESOLVE: Cannot resolve host address: us-west.privateinternetaccess.com: hostname nor servname provided, or not known
                                
                                

                                Capture.JPG
                                Capture.JPG_thumb

                                1 Reply Last reply Reply Quote 0
                                • M
                                  m3ki
                                  last edited by

                                  What if EU goes down does it bring down us one?

                                  1 Reply Last reply Reply Quote 0
                                  • A
                                    archedraft
                                    last edited by

                                    If I disable the EU VPN the US VPN works.

                                    1 Reply Last reply Reply Quote 0
                                    • A
                                      archedraft
                                      last edited by

                                      Is the only difference between our VPN client config, you use strongvpn and you use number IP addresses instead of the letter ip address?

                                      1 Reply Last reply Reply Quote 0
                                      • A
                                        archedraft
                                        last edited by

                                        I figured out the Cannot resolve host address problem:

                                        PIA only supplies domain names and not ip address. The domain names will work initially but after about a week it seems PIA requires you to renew your lease? At that point pfSense is unable to reconnect to the VPN. If you change all the domain names to ip address then everything works just fine. I am sure if you are part of this forum you can figure out how to find the PIA ip addresses but if you cannot figure it out contact PIA and they will tell you how.

                                        1 Reply Last reply Reply Quote 0
                                        • F
                                          Finger79
                                          last edited by

                                          Necrobumping this thread because I've been getting this error since becoming a PIA customer.  My workaround was to use a server's IP address in the OpenVPN Client config, but since IPs change, I'd much prefer to use the FQDN and have DNS figure it out.

                                          Thing is, since all DNS queries are sent out through the OpenVPN tunnel to PIA's resolvers, if the tunnel goes down, I'll get this error in the logs:

                                          @OpenVPN:

                                          RESOLVE: Cannot resolve host address: [location].privateinternetaccess.com: hostname nor servname provided, or not known

                                          …and then I will have to manually log into the WebUI and restart the OpenVPN service.

                                          Is there a cleaner solution to this instead of the workaround of hard-coding a PIA IP Address?

                                          (Note:  Each PIA gateway, say us-west.privateinternetaccess.com, resolves to maybe a dozen IP addresses, and they come and go, so sometimes the A record for an IP address will disappear after a week and become invalid.)

                                          Edited to Add:  I'm using the legacy DNS Forwarder (dnsmasq).  Would this problem go away if I switched to using the DNS Resolver (unbound)?  I thought both of them cached DNS, so it's strange that I'm getting the "Cannot resolve host address" error in the first place.  pfSense shouldn't need to resolve anything but look in the localhost cache.

                                          Edit 2:  I have two manual outbound NAT Rules created for PIA:
                                          1.  localhost to PIA:  127.0.0.0/8 to PIA address
                                          2.  LAN to PIA:  [LAN subnet /24 ] to PIA address

                                          1 Reply Last reply Reply Quote 0
                                          • F
                                            Finger79
                                            last edited by

                                            There's a lot of commercial VPN users in this forum.  Surely not everyone is hard-coding an IP address.  What is everyone here doing to get around this issue?

                                            I spent a ton of hours experimenting today.  I migrated from dnsmasq to unbound, but same results.  I disabled the first NAT rule "localhost to PIA" but same results.

                                            The next thing I'd like to try is to remove the persist-tun directive, but it's hard-coded.  No matter what I do, it's there.

                                            From the manual:

                                            @OpenVPN:

                                            –persist-tun
                                                Don't close and reopen TUN/TAP device or run up/down scripts across SIGUSR1 or --ping-restart restarts.

                                            SIGUSR1 is a restart signal similar to SIGHUP, but which offers finer-grained control over reset options.

                                            I'm thinking whenever I get a SIGUSR1 reset, I do want to close and reopen the TUN device, which would trigger a new name resolution query.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.