Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [SOLVED] DNS Requests From Clients Failing

    Scheduled Pinned Locked Moved DHCP and DNS
    19 Posts 5 Posters 5.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOMK
      KOM
      last edited by

      You're getting nothing back when you do a manual lookup?  It should come back with either a resolution or an error.  Here is how it should work (from my location):

      PS C:\Users\kom> nslookup
      Default Server:  ad.kom.local
      Address:  10.10.0.1

      server pfsense.kom.local
      Default Server:  pfsense.kom.local
      Address:  10.10.4.1

      www.google.com
      Server:  pfsense.kom.local
      Address:  10.10.4.1

      Non-authoritative answer:
      Name:    www.google.com
      Addresses:  2607:f8b0:400b:808::2004
                172.217.0.228

      1 Reply Last reply Reply Quote 0
      • lawrencedolL
        lawrencedol
        last edited by

        Yes, successful lookup is what my output, above, shows… but only afer I change the server to an invalid IP address, like 10.1.2.3. As long as the server is the name or IP address of the pfSense box (10.70.80.1) the lookup fails (which the above output also shows, first).

        Lawrence Dol
        Perfection is the enemy of excellence.
        pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

        1 Reply Last reply Reply Quote 0
        • KOMK
          KOM
          last edited by

          Sorry, I'm a dummy.  I didn't notice the scroll bars in your output and thought that was all.

          It certainly shouldn't be resolving when you supply a bogus DNS.  I'm starting to get suspicious about your extra router in the mix.

          What do you have under System - General - DNS Server Settings?

          1 Reply Last reply Reply Quote 0
          • lawrencedolL
            lawrencedol
            last edited by

            General DNS settings attached.

            ![2018-01-12 13_52_42-Web - pfsense.lan - System_ General Setup - pfsense.lan - System_ General Setup.png](/public/imported_attachments/1/2018-01-12 13_52_42-Web - pfsense.lan - System_ General Setup - pfsense.lan - System_ General Setup.png)
            ![2018-01-12 13_52_42-Web - pfsense.lan - System_ General Setup - pfsense.lan - System_ General Setup.png_thumb](/public/imported_attachments/1/2018-01-12 13_52_42-Web - pfsense.lan - System_ General Setup - pfsense.lan - System_ General Setup.png_thumb)

            Lawrence Dol
            Perfection is the enemy of excellence.
            pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              First off, OpenDNS does not properly support DNSSEC (last I heard) so uncheck that in the resolver.

              Second, you should be getting some kind of response. Are you POSITIVE you didn't dork with the firewall rules on that inside interface such that DNS is now blocked?

              Or the listen interfaces?

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • lawrencedolL
                lawrencedol
                last edited by

                Derelict,

                It was IPSEC doing it! If I turn that off and apply, then I can ping; if I turn it back on, apply and flush DNS on the client then it fails; turning it back off allows the client to work again.

                Thank you!

                PS: The only firewall rules I have are those created automatically on the LAN interfaces.

                Lawrence Dol
                Perfection is the enemy of excellence.
                pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  DNSSEC or IPsec?

                  And don't confuse "ping" with "resolve names".

                  You could probably always ping the correct IP address. You just couldn't resolve the correct IP address from the name.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • GertjanG
                    Gertjan
                    last edited by

                    @Lawrence:

                    It was IPSEC doing it! If I turn that off and apply, then I can ping; if I turn it back on, apply and flush DNS on the client then it fails; turning it back off allows the client to work again.

                    IPSEC ? Or DNSSEC ?

                    The pfSense Resolvers uses DNSSEC by default - some sort of future secured DNS - and, you should know that OpenDNS doesn't work with DNSSEC.
                    When you flush the DNS on your client, you didn't flush the DNS cache on pfSense, so it still seems to work. But as soon as the cache times out, things will be 'broken' again.
                    Rule of thumb : when using OpenDNS, disable your local (pfSense) resolver the DNSSEC capabilities - or use the forwarder, this is one of the reasons it still exists in pfSense : for those who want to send all their DNS traffic to some off-site DNS service like OpenDNS.

                    No "help me" PM's please. Use the forum, the community will thank you.
                    Edit : and where are the logs ??

                    1 Reply Last reply Reply Quote 0
                    • lawrencedolL
                      lawrencedol
                      last edited by

                      All,

                      Sorry, I did mean DNSSEC.

                      I do know that I was flushing the client cache, but since it was only the client which was failing to resolve DNS names (resolving from the pfSense box has been working since inception) and since pinging with a host name requires a DNS resolution first, that seems a valid test to me. Specifically what I did was ping google.com => fail. Disable DNSSEC, then ping google.com => success. Enable DNSSEC again, then ping google.com => success (address still cached on client). Then ipconfig /flushdns and ping google.com => fail (expected). Finally, disable DNSSEC then ping google.com => success again. Which demonstrates conclusively that DNSSEC is causing an issue with the client (given that there was no problem resolving names from the pfSense diagnostic tool). Of course, my initial and subsequent posts did make clear that I could ping and access hosts by their IP address the whole time.

                      [This train of logic actually suggests that it is the client (Windows 10) not OpenDNS which can't do DNSSEC, since with DNSSEC enabled resolving names from the pfSense box works. But that is an aside for me right now since the problem is resolved.]

                      Again, thanks for your help.

                      PS: Is there a way to mark this thread as resolved?

                      Lawrence Dol
                      Perfection is the enemy of excellence.
                      pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        "This train of logic actually suggests that it is the client (Windows 10) not OpenDNS which can't do DNSSEC"

                        Sorry but that is not what that train of non logic suggests at all…  Suggest you research how dnssec works, and why asking opendns for dnssec is not going to work..  But why it does work when you acktually resolve, etc.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.