Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unresolvable DNS Entries

    Scheduled Pinned Locked Moved DHCP and DNS
    24 Posts 6 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ Offline
      johnpoz LAYER 8 Global Moderator
      last edited by

      ^ Agreed if you want to help the 2 users on the planet that type ww.yorudomain.com and can not figure out what they did wrong when they don't get an answer, etc.  Then sure ok use a wildcard on the public side - what does that have to do with your internet view of your domain.  Which why it would match up and want to resolve public IPs another question.  Do the machines these fqdns resolve to only have public IPs - they are not on a rfc1918 IP at all?  If they are on rfc1918 space why would you not have your internal clients resolve those IPs for the sites they want to access?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 25.07 | Lab VMs 2.8, 25.07

      1 Reply Last reply Reply Quote 0
      • D Offline
        doktornotor Banned
        last edited by

        What's particularly bizarre - you yourself do not like what you are doing to others.

        I just don't like that when a user puts in an address that doesn't exist that they get forwarded to our website… I'd much rather they go to an error page.

        vs.

        We want people on the net to get redirected to our main site, should the type an incorrect URL with our domain name.

        ::)

        P.S. Recall the Verisign TLD wildcard fiasco?

        1 Reply Last reply Reply Quote 0
        • B Offline
          bryan.paradis
          last edited by

          The problem is that dnsmasq forwards the appended name out to your external DNS which will wildcard to your website. Go into your pfsense dns forwarder settings and add a domain override at the very bottom. Use "!" so it doesn't forward anywhere.

          You really should take a look at the resolver log. You will see exactly what happens. Add log-queries to the advanced dnsmasq options to get more verbose output in the resolver log.

          Forwarding no override

          
          Feb 22 17:25:00	dnsmasq[93889]: reply www.efrgthyhyjuyjk.com is NXDOMAIN-IPv6
          Feb 22 17:25:00	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com to 8.8.4.4
          Feb 22 17:25:00	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com to 8.8.8.8
          Feb 22 17:25:00	dnsmasq[93889]: query[AAAA] www.efrgthyhyjuyjk.com from 192.168.55.101
          Feb 22 17:25:00	dnsmasq[93889]: reply www.efrgthyhyjuyjk.com is NXDOMAIN-IPv4
          Feb 22 17:25:00	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com to 8.8.4.4
          Feb 22 17:25:00	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com to 8.8.8.8
          Feb 22 17:25:00	dnsmasq[93889]: query[A] www.efrgthyhyjuyjk.com from 192.168.55.101
          Feb 22 17:25:00	dnsmasq[93889]: reply www.efrgthyhyjuyjk.com.localdomain is NXDOMAIN-IPv6
          Feb 22 17:24:59	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com.localdomain to 8.8.4.4
          Feb 22 17:24:59	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com.localdomain to 8.8.8.8
          Feb 22 17:24:59	dnsmasq[93889]: query[AAAA] www.efrgthyhyjuyjk.com.localdomain from 192.168.55.101
          Feb 22 17:24:59	dnsmasq[93889]: reply www.efrgthyhyjuyjk.com.localdomain is NXDOMAIN-IPv4
          Feb 22 17:24:59	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com.localdomain to 8.8.4.4
          Feb 22 17:24:59	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com.localdomain to 8.8.8.8
          Feb 22 17:24:59	dnsmasq[93889]: query[A] www.efrgthyhyjuyjk.com.localdomain from 192.168.55.101
          
          

          Not fowarding with override enabled

          
          Feb 22 17:19:05	dnsmasq[6833]: reply www.efrgthyhyjuyjk.com is NXDOMAIN-IPv6
          Feb 22 17:19:05	dnsmasq[6833]: forwarded www.efrgthyhyjuyjk.com to 8.8.4.4
          Feb 22 17:19:05	dnsmasq[6833]: forwarded www.efrgthyhyjuyjk.com to 8.8.8.8
          Feb 22 17:19:05	dnsmasq[6833]: query[AAAA] www.efrgthyhyjuyjk.com from 192.168.55.101
          Feb 22 17:19:05	dnsmasq[6833]: reply www.efrgthyhyjuyjk.com is NXDOMAIN-IPv4
          Feb 22 17:19:05	dnsmasq[6833]: forwarded www.efrgthyhyjuyjk.com to 8.8.4.4
          Feb 22 17:19:05	dnsmasq[6833]: forwarded www.efrgthyhyjuyjk.com to 8.8.8.8
          Feb 22 17:19:05	dnsmasq[6833]: query[A] www.efrgthyhyjuyjk.com from 192.168.55.101
          
          

          Dnsmasq is quite simple it basically looks at manual entries and dhcp information. Everything else is forwarded externally for a lookup. If you want a real DNS server you could try the BIND package or spinning up a separate VM and running bind.

          ![2014-02-22 17_34_56-pfsense.localdomain - Services_ DNS forwarder_ Edit Domain Override.png](/public/imported_attachments/1/2014-02-22 17_34_56-pfsense.localdomain - Services_ DNS forwarder_ Edit Domain Override.png)
          ![2014-02-22 17_34_56-pfsense.localdomain - Services_ DNS forwarder_ Edit Domain Override.png_thumb](/public/imported_attachments/1/2014-02-22 17_34_56-pfsense.localdomain - Services_ DNS forwarder_ Edit Domain Override.png_thumb)
          ![2014-02-22 17_36_57-pfsense.localdomain - Services_ DNS forwarder.png](/public/imported_attachments/1/2014-02-22 17_36_57-pfsense.localdomain - Services_ DNS forwarder.png)
          ![2014-02-22 17_36_57-pfsense.localdomain - Services_ DNS forwarder.png_thumb](/public/imported_attachments/1/2014-02-22 17_36_57-pfsense.localdomain - Services_ DNS forwarder.png_thumb)

          1 Reply Last reply Reply Quote 0
          • N Offline
            Nathan.S
            last edited by

            Thank you for the info bryan. You certainly got me pointed in the right direction.

            I've gotten my config operating the way I wanted, and without having to change anything on our domain, which would also effect our public side, which I have no personal responsibilities for at my work.

            Adding a domain override did NOT work unfortunately, as it seems pfsense still sends out your local domain as a search domain to clients. I found that if I entered a domain without a wildcard configuration under the optional "search domains" under the DHCP server page then invalid domain entries returned a not found reply.

            It's quite obvious that pfsense is still polling locally because I can not only access my manual host entries, but even ones that I haven't directly forwarded. For example:

            appliance1.ourdomain.com is registered to 192.x.x.x and you can access it perfectly via hostname instead of IP
            appliance2.ourdomain.com is only configured on the device, not in pfsense, and is able to be accessed perfectly via hostname instead of IP

            Unfortunately this means the internal clients HAVE to enter .ourdomain.com for hostname access to work, but that's better than where I was before, since very few of us will be accessing devices via hostname anyways, while many more in the company will be typing invalid URL's.

            1 Reply Last reply Reply Quote 0
            • B Offline
              bryan.paradis
              last edited by

              @Nathan.S:

              Thank you for the info bryan. You certainly got me pointed in the right direction.

              I've gotten my config operating the way I wanted, and without having to change anything on our domain, which would also effect our public side, which I have no personal responsibilities for at my work.

              Adding a domain override did NOT work unfortunately, as it seems pfsense still sends out your local domain as a search domain to clients. I found that if I entered a domain without a wildcard configuration under the optional "search domains" under the DHCP server page then invalid domain entries returned a not found reply.

              It's quite obvious that pfsense is still polling locally because I can not only access my manual host entries, but even ones that I haven't directly forwarded. For example:

              appliance1.ourdomain.com is registered to 192.x.x.x and you can access it perfectly via hostname instead of IP
              appliance2.ourdomain.com is only configured on the device, not in pfsense, and is able to be accessed perfectly via hostname instead of IP

              Unfortunately this means the internal clients HAVE to enter .ourdomain.com for hostname access to work, but that's better than where I was before, since very few of us will be accessing devices via hostname anyways, while many more in the company will be typing invalid URL's.

              I think there is a lack of a clarity surrounding exactly what you want to be happening.

              Who do you want to get wildcarded: People inside your network or people on the internet?

              1 Reply Last reply Reply Quote 0
              • N Offline
                Nathan.S
                last edited by

                Q: What do I want to get wildcarded?
                A: Just people on the internet, accessing our website.

                I didn't setup the wildcard, I only setup and manage internal hardware and software. We have a web department that manages our domain (company website).

                It would seem silly to NOT use our domain (company website) as the domain for our internal network though. Hence the conflict of interest regarding the wildcard.

                1 Reply Last reply Reply Quote 0
                • N Offline
                  Nathan.S
                  last edited by

                  @bryan.paradis:

                  Do you have a wildcard subdomain setup on pfsense?

                  Nope. The only place anything related to our company's website is entered is as the domain name under System->General Setup. The wildcard "issue" only comes into play when pfsense starts searching our domain name for name resolution, and our website hands back a response to forward the client to the company website.

                  If I changed the domain in pfsense to ourcompany minus ".com" or to something else entirely, then the "issue" i'm having would be resolved. But as I stated, the issue is resolved for the most part just by specifying a search domain for the DHCP server.

                  1 Reply Last reply Reply Quote 0
                  • B Offline
                    bryan.paradis
                    last edited by

                    @Nathan.S:

                    @bryan.paradis:

                    Do you have a wildcard subdomain setup on pfsense?

                    Nope. The only place anything related to our company's website is entered is as the domain name under System->General Setup. The wildcard "issue" only comes into play when pfsense starts searching our domain name for name resolution, and our website hands back a response to forward the client to the company website.

                    If I changed the domain in pfsense to ourcompany minus ".com" or to something else entirely, then the "issue" i'm having would be resolved. But as I stated, the issue is resolved for the most part just by specifying a search domain for the DHCP server.

                    Deleted my previous post.

                    1. Remove your domain from the search list in the DHCP. It is already set as the domain for the dhcp. You can verify by doing ps aux | grep dhcp and expanding the window you will see "-d yourdomainhere"

                    2. Please go check your resolver log and do a nslookup for some garbage hostname. Please grab this information and replace your real domain and IP with something else. Please get the queries and the replies. Post it here like the example below in codeblock.

                    3. How did you setup your domain override? Are you sure you set it up right. As you can see in my other post the domain override clearly stops lookup for that domain on the external dns servers I have set in General Settings. Which is exactly what you need to stop everything not resolvable internally getting appending and resolving to your website

                    4. If you setup the domain override again with the correct "!" so traffic for that domain is not forwarded anywhere. Please look at the resolver log again and post output as well. You should not see anything.yourdomain in any queries going to googles dns servers. I have attached the picture from my previous post. Please note that you may need to add a host override for your website internally as you will be blocking that from resolving from the public DNS.

                    
                    Feb 22 17:25:00	dnsmasq[93889]: reply www.efrgthyhyjuyjk.com is NXDOMAIN-IPv6
                    Feb 22 17:25:00	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com to 8.8.4.4
                    Feb 22 17:25:00	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com to 8.8.8.8
                    Feb 22 17:25:00	dnsmasq[93889]: query[AAAA] www.efrgthyhyjuyjk.com from 192.168.55.101
                    Feb 22 17:25:00	dnsmasq[93889]: reply www.efrgthyhyjuyjk.com is NXDOMAIN-IPv4
                    Feb 22 17:25:00	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com to 8.8.4.4
                    Feb 22 17:25:00	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com to 8.8.8.8
                    Feb 22 17:25:00	dnsmasq[93889]: query[A] www.efrgthyhyjuyjk.com from 192.168.55.101
                    Feb 22 17:25:00	dnsmasq[93889]: reply www.efrgthyhyjuyjk.com.localdomain is NXDOMAIN-IPv6
                    Feb 22 17:24:59	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com.localdomain to 8.8.4.4
                    Feb 22 17:24:59	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com.localdomain to 8.8.8.8
                    Feb 22 17:24:59	dnsmasq[93889]: query[AAAA] www.efrgthyhyjuyjk.com.localdomain from 192.168.55.101
                    Feb 22 17:24:59	dnsmasq[93889]: reply www.efrgthyhyjuyjk.com.localdomain is NXDOMAIN-IPv4
                    Feb 22 17:24:59	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com.localdomain to 8.8.4.4
                    Feb 22 17:24:59	dnsmasq[93889]: forwarded www.efrgthyhyjuyjk.com.localdomain to 8.8.8.8
                    Feb 22 17:24:59	dnsmasq[93889]: query[A] www.efrgthyhyjuyjk.com.localdomain from 192.168.55.101
                    
                    

                    ![2014-02-22 17_34_56-pfsense.localdomain - Services_ DNS forwarder_ Edit Domain Override.png](/public/imported_attachments/1/2014-02-22 17_34_56-pfsense.localdomain - Services_ DNS forwarder_ Edit Domain Override.png)
                    ![2014-02-22 17_34_56-pfsense.localdomain - Services_ DNS forwarder_ Edit Domain Override.png_thumb](/public/imported_attachments/1/2014-02-22 17_34_56-pfsense.localdomain - Services_ DNS forwarder_ Edit Domain Override.png_thumb)

                    1 Reply Last reply Reply Quote 0
                    • N Offline
                      Nathan.S
                      last edited by

                      The good news is that it seems like the domain override worked this time. I did it exactly as I did last time, but now I'm wondering if I didn't give it enough time after restarting the forwarder service and renewing my DHCP lease or something. All I know is that I changed the settings, verified I didn't break the network, and then had to head into a meeting. Came out of the meeting, and now it's working properly.

                      And to reiterated/clarify:

                      Under general settings I have "ourwebsite.com" and under DHCP there's no search domain specified, but under DNS Forwarder there's a Domain override with "localdomain" for the domain field, and "!" for the IP field.

                      And of course, I can still access my appliances via hostname. Lovely.

                      Here's my log, and man this can be tough to hunt down when you've got so much traffic going on. Thanks for the help though. I'm not 100% positive I found all the relative lines to this one request, as it was spread accross about 50 lines, but I think that's all of it.

                      Feb 24 15:03:50	dnsmasq[87210]: reply www.qwwersdfretdfg.com is NXDOMAIN-IPv4
                      Feb 24 15:03:50	dnsmasq[87210]: forwarded www.qwwersdfretdfg.com to 8.8.8.8
                      Feb 24 15:03:50	dnsmasq[87210]: query[A] www.qwwersdfretdfg.com from 192.168.16.19
                      Feb 24 15:03:50	dnsmasq[87210]: reply qwwersdfretdfg.com is NXDOMAIN-IPv4
                      Feb 24 15:03:50	dnsmasq[87210]: forwarded qwwersdfretdfg.com to 8.8.8.8
                      Feb 24 15:03:50	dnsmasq[87210]: query[A] qwwersdfretdfg.com from 192.168.16.19
                      
                      1 Reply Last reply Reply Quote 0
                      • B Offline
                        bryan.paradis
                        last edited by

                        @Nathan.S:

                        The good news is that it seems like the domain override worked this time. I did it exactly as I did last time, but now I'm wondering if I didn't give it enough time after restarting the forwarder service and renewing my DHCP lease or something. All I know is that I changed the settings, verified I didn't break the network, and then had to head into a meeting. Came out of the meeting, and now it's working properly.

                        And to reiterated/clarify:

                        Under general settings I have "ourwebsite.com" and under DHCP there's no search domain specified, but under DNS Forwarder there's a Domain override with "localdomain" for the domain field, and "!" for the IP field.

                        And of course, I can still access my appliances via hostname. Lovely.

                        Here's my log, and man this can be tough to hunt down when you've got so much traffic going on. Thanks for the help though. I'm not 100% positive I found all the relative lines to this one request, as it was spread accross about 50 lines, but I think that's all of it.

                        Feb 24 15:03:50	dnsmasq[87210]: reply www.qwwersdfretdfg.com is NXDOMAIN-IPv4
                        Feb 24 15:03:50	dnsmasq[87210]: forwarded www.qwwersdfretdfg.com to 8.8.8.8
                        Feb 24 15:03:50	dnsmasq[87210]: query[A] www.qwwersdfretdfg.com from 192.168.16.19
                        Feb 24 15:03:50	dnsmasq[87210]: reply qwwersdfretdfg.com is NXDOMAIN-IPv4
                        Feb 24 15:03:50	dnsmasq[87210]: forwarded qwwersdfretdfg.com to 8.8.8.8
                        Feb 24 15:03:50	dnsmasq[87210]: query[A] qwwersdfretdfg.com from 192.168.16.19
                        

                        Yeah that looks about right. Glad you got it working. It could have been cached dns on your client. On windows you can ipconfig -flushdns. You can access your website still properly?

                        1 Reply Last reply Reply Quote 0
                        • N Offline
                          Nathan.S
                          last edited by

                          Yea, I'm on OSX and hadn't done a true flush, just a DHCP renew. Probably was the problem the first go around, since I don't specifically remember changing the URL.

                          And yes, we can still access our site internally, even the legitimate wildcards. An invalid wildcard turns up our website too, exactly as it would for people on the outside of our network.

                          Thanks so much for the help! Time to backup the config again…

                          1 Reply Last reply Reply Quote 0
                          • P Offline
                            peersu
                            last edited by

                            Adding a domain over-ride with IP of "!" solved this problem for me… I wonder how common it is for new users.  Seems like a good tip for FAQ if it doesn't already exist.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.