Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    2.4.1: local DNS not working

    Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
    50 Posts 11 Posters 8.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kejianshi
      last edited by

      Still broken for me also on 1 VM.  Not a big deal for me since its just a crash test dummy VM.

      I think there is something in the network environment there screwing it up.  Dig fails outright.

      1 Reply Last reply Reply Quote 0
      • R
        repomanz
        last edited by

        @johnpoz:

        Nonsense… Resolver works just fine in 2.4.. If it broke then the boards would be under ddos attack with people complaining..

        Putting it into forwarder mode is NOT the correct solution.. So now your clients are asking pfsense, just to ask your local dns to go and do what exactly, then resolve?  Have you clients ask your local dns directly - then have it forward to pfsense to resolve.

        John - need some clarification:

        If under general settings, I have 1 DNS entry (my dns server).  If i don't check the forwarder option under resolver then my internal clients do not hit my DNS (only pfsense out to google i suppose).  It's only when I enable to forward option in the resolver that it works correctly.

        So - this sounds similar to the other person talking above about pfsense using google and ignoring dns settings.

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          1. under general settings, i have the local DNS server set (10.180.x.x)
          2. in dnsresolver, i have static mappings for a couple linux servers.  I also have dhcp and static ips being registered in dnsresolver.  dnssec is checked
            3) in dhcp server, the dns value is blank (should default to #1 right)
          3. in dhcp server i have a few static leases defined

          No. It defaults to the interface address the DHCP Server is running on.

          Leave blank to use the system default DNS servers: this interface's IP if DNS Forwarder or Resolver is enabled, otherwise the servers configured on the System / General Setup page.

          Look at the client that was configured using DHCP. What are its configured name servers? What happens when it tries to use them to resolve names? Then look at why that might be. Using tools like dig/drill to solve this instead of the silly windows tools helps a lot.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • JKnottJ
            JKnott
            last edited by

            So - this sounds similar to the other person talking above about pfsense using google and ignoring dns settings.

            No, it's not pfSense using Google DNS.  It's my computer, which has pfSense configured as the first DNS to try and Google as the 2nd, should the first fail.  PfSense resolver fails, so the computer falls through to use Google.  This accounts for the delay when I first go to a web site.  Dig proves it.  When resolver is configured, it uses Google, when forwarder, pfSense.

            Here's what happens on my computer.  The first time is with resolver enabled and the 2nd, with resolver.  The firewall address has been changed to protect the guilty.  ;)

            $ dig google.com

            ; <<>> DiG 9.9.9-P1 <<>> google.com
            ;; global options: +cmd
            ;; Got answer:
            ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46476
            ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

            ;; OPT PSEUDOSECTION:
            ; EDNS: version: 0, flags:; udp: 512
            ;; QUESTION SECTION:
            ;google.com.                    IN      A

            ;; ANSWER SECTION:
            google.com.            299    IN      A      172.217.0.238

            ;; Query time: 48 msec
            ;; SERVER: 2001:4860:4860::8888#53(2001:4860:4860::8888)
            ;; WHEN: Sun Nov 05 15:19:58 EST 2017
            ;; MSG SIZE  rcvd: 55

            $ dig google.com

            ; <<>> DiG 9.9.9-P1 <<>> google.com
            ;; global options: +cmd
            ;; Got answer:
            ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9659
            ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

            ;; OPT PSEUDOSECTION:
            ; EDNS: version: 0, flags:; udp: 512
            ;; QUESTION SECTION:
            ;google.com.                    IN      A

            ;; ANSWER SECTION:
            google.com.            199    IN      A      172.217.2.174

            ;; Query time: 13 msec
            ;; SERVER: 2607:fea8:4cdf🔡216:17ff:fea7:xyz#53(2607:fea8:4cdf🔡216:17ff:fea7:xyz)
            ;; WHEN: Sun Nov 05 15:21:33 EST 2017
            ;; MSG SIZE  rcvd: 55

            PfSense running on Qotom mini PC
            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
            UniFi AC-Lite access point

            I haven't lost my mind. It's around here...somewhere...

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              No, it's not pfSense using Google DNS.  It's my computer, which has pfSense configured as the first DNS to try and Google as the 2nd, should the first fail.

              Common mistake.

              ALL configured client name servers MUST return the same answers to the same questions. This is ESPECIALLY true if you want to use local overrides.

              There is NO guarantee which configured name server will be used first by the client.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • JKnottJ
                JKnott
                last edited by

                @Derelict:

                No, it's not pfSense using Google DNS.  It's my computer, which has pfSense configured as the first DNS to try and Google as the 2nd, should the first fail.

                Common mistake.

                ALL configured client name servers MUST return the same answers to the same questions. This is ESPECIALLY true if you want to use local overrides.

                There is NO guarantee which configured name server will be used first by the client.

                Not according to the Linux man pages:

                nameserver Name server IP address
                              Internet address of a name server that the resolver should
                              query, either an IPv4 address (in dot notation), or an IPv6
                              address in colon (and possibly dot) notation as per RFC 2373.
                              Up to MAXNS (currently 3, see <resolv.h>) name servers may be
                              listed, one per keyword.  If there are multiple servers, the
                              resolver library queries them in the order listed.
                  If no
                              nameserver entries are present, the default is to use the name
                              server on the local machine.  (The algorithm used is to try a
                              name server, and if the query times out, try the next, until
                              out of name servers, then repeat trying all the name servers
                              until a maximum number of retries are made.)

                http://man7.org/linux/man-pages/man5/resolv.conf.5.html

                So, since pfSense is listed first in /etc/resolv.conf, followed by Google, then pfSense will be tried first and if it fails, then Google.</resolv.h>

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  OK don't listen to years of experience.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • K
                    kejianshi
                    last edited by

                    Try to dig from command line in pfsense.  If it works, its not the same Issue I'm having.

                    1 Reply Last reply Reply Quote 0
                    • JKnottJ
                      JKnott
                      last edited by

                      @kejianshi:

                      Try to dig from command line in pfsense.  If it works, its not the same Issue I'm having.

                      Dig shows 127.0.0.1 with either forwarder or resolver.

                      PfSense running on Qotom mini PC
                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                      UniFi AC-Lite access point

                      I haven't lost my mind. It's around here...somewhere...

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        Show the output please. I have NO IDEA what "dig shows 127.0.0.1" means. Shows where? There is no context.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • JKnottJ
                          JKnott
                          last edited by

                          @Derelict:

                          Show the output please. I have NO IDEA what "dig shows 127.0.0.1" means. Shows where? There is no context.

                          /root: dig google.com

                          ; <<>> DiG 9.11.2 <<>> google.com
                          ;; global options: +cmd
                          ;; Got answer:
                          ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63302
                          ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

                          ;; OPT PSEUDOSECTION:
                          ; EDNS: version: 0, flags:; udp: 4096
                          ;; QUESTION SECTION:
                          ;google.com.                    IN      A

                          ;; ANSWER SECTION:
                          google.com.            300    IN      A      172.217.0.238

                          ;; Query time: 310 msec
                          ;; SERVER: 127.0.0.1#53(127.0.0.1)
                          ;; WHEN: Sun Nov 05 18:31:26 EST 2017
                          ;; MSG SIZE  rcvd: 55

                          PfSense running on Qotom mini PC
                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                          UniFi AC-Lite access point

                          I haven't lost my mind. It's around here...somewhere...

                          1 Reply Last reply Reply Quote 0
                          • H
                            hda
                            last edited by

                            ;; SERVER: 2001:4860:4860::8888#53(2001:4860:4860::8888)
                            ;; WHEN: Sun Nov 05 15:19:58 EST 2017
                            ;; MSG SIZE  rcvd: 55

                            snipped

                            ;; SERVER: 2607:fea8:4cdf🔡216:17ff:fea7:xyz#53(2607:fea8:4cdf🔡216:17ff:fea7:xyz)
                            ;; WHEN: Sun Nov 05 15:21:33 EST 2017
                            ;; MSG SIZE  rcvd: 55

                            How are your addresses IPv6 and Global ?

                            1 Reply Last reply Reply Quote 0
                            • JKnottJ
                              JKnott
                              last edited by

                              How are your addresses IPv6 and Global ?

                              ???

                              I have valid global unicast addresses on IPv6.  That's never been the issue.  The problem is when pfSense is configured to use resolver for DNS, it fails, but works with forwarder.  Nothing else changed when I updated from 2.4.0.

                              PfSense running on Qotom mini PC
                              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                              UniFi AC-Lite access point

                              I haven't lost my mind. It's around here...somewhere...

                              1 Reply Last reply Reply Quote 0
                              • DerelictD
                                Derelict LAYER 8 Netgate
                                last edited by

                                /root: dig google.com

                                ; <<>> DiG 9.11.2 <<>> google.com
                                ;; global options: +cmd
                                ;; Got answer:
                                ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63302
                                ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

                                ;; OPT PSEUDOSECTION:
                                ; EDNS: version: 0, flags:; udp: 4096
                                ;; QUESTION SECTION:
                                ;google.com.                    IN      A

                                ;; ANSWER SECTION:
                                google.com.            300    IN      A      172.217.0.238

                                ;; Query time: 310 msec
                                ;; SERVER: 127.0.0.1#53(127.0.0.1)
                                ;; WHEN: Sun Nov 05 18:31:26 EST 2017
                                ;; MSG SIZE  rcvd: 55

                                If that was taken on pfSense then the local resolver is working fine. You asked localhost for an answer and got one.

                                Chattanooga, Tennessee, USA
                                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                1 Reply Last reply Reply Quote 0
                                • H
                                  hda
                                  last edited by

                                  @JKnott:

                                  I have valid global unicast addresses on IPv6.

                                  Me too… and to say, dual stack IPv6 & (IPv4 NAT) on LAN's.

                                  A host on LAN reports as the DNS server the IPv4 pfSense-LAN address.

                                  You have a special home config I now believe ;) Single stack, IPv6 ?

                                  1 Reply Last reply Reply Quote 0
                                  • B
                                    bbrendon
                                    last edited by

                                    @johnpoz:

                                    Nonsense… Resolver works just fine in 2.4.. If it broke then the boards would be under ddos attack with people complaining..

                                    Well, without logs there isn't much point in arguing. But I will say based on the very general sense its not nonsense. I have seen resolver break two other times (once in 2.3.x and once in 2.4.0). Both were shown to me after a level 1 tech tried upgrading or something. Both times I saw security errors in the logs and disabled DNSSEC support and the problem was fixed.

                                    I've never reported the issue because it was a quick hack fix, but the point is without diagnosing, anything is possible.

                                    1 Reply Last reply Reply Quote 0
                                    • DerelictD
                                      Derelict LAYER 8 Netgate
                                      last edited by

                                      DNSSEC being broken is not necessarily the fault of the resolver. Particularly if the resolver is in forwarding mode.

                                      Anyone who claims "it's broken" needs to be able to show what isn't working in some way that people on a forum can see.

                                      "It's broken" when it is working for tens of thousands of sites is nonsense. Or at least points to a local configuration error at that site which, again, would require some evidence presented for evaluation.

                                      Chattanooga, Tennessee, USA
                                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                      1 Reply Last reply Reply Quote 0
                                      • JKnottJ
                                        JKnott
                                        last edited by

                                        If that was taken on pfSense then the local resolver is working fine. You asked localhost for an answer and got one.

                                        I noticed that too.  But it does not work for a computer behind pfSense.  I included dig examples in an earlier message, that showed pfSense works with forwarder, but not resolver, for that computer.

                                        PfSense running on Qotom mini PC
                                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                        UniFi AC-Lite access point

                                        I haven't lost my mind. It's around here...somewhere...

                                        1 Reply Last reply Reply Quote 0
                                        • JKnottJ
                                          JKnott
                                          last edited by

                                          @hda:

                                          @JKnott:

                                          I have valid global unicast addresses on IPv6.

                                          Me too… and to say, dual stack IPv6 & (IPv4 NAT) on LAN's.

                                          A host on LAN reports as the DNS server the IPv4 pfSense-LAN address.

                                          You have a special home config I now believe ;) Single stack, IPv6 ?

                                          I always get an IPv6 address as shown in dig.  My network is dual stack, with everything capable of IPv6 getting both IPv4 & IPv6 addresses.  My main computer uses static configuration for DNS, with IPv6 addresses for pfSense and Google DNS servers.  Devices that connect via DHCP get the IPv4 address for pfSense DNS for the 1st DNS server and 8.8.8.8 & 4.4.4.4 for 2nd & 3rd.

                                          PfSense running on Qotom mini PC
                                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                          UniFi AC-Lite access point

                                          I haven't lost my mind. It's around here...somewhere...

                                          1 Reply Last reply Reply Quote 0
                                          • DerelictD
                                            Derelict LAYER 8 Netgate
                                            last edited by

                                            Dude.

                                            Enable the resolver.

                                            Go to the client that doesn't work.

                                            What are the configured name servers on that client? Probably in /etc/resolv.conf. There is a lot of disparity in how this is done now. In ubuntu it's all generated by resolvconf, YDMV.

                                            Query each of them individually as in:

                                            dig @192.168.1.1 www.google.com A
                                            dig @192.168.1.1 www.google.com AAAA
                                            dig @8.8.8.8 www.google.com A
                                            dig @8.8.8.8 www.google.com AAAA
                                            dig @8.8.4.4 www.google.com A
                                            dig @8.8.4.4 www.google.com AAAA

                                            See if you can see where the problem is.

                                            Chattanooga, Tennessee, USA
                                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.