Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS leak

    Scheduled Pinned Locked Moved General pfSense Questions
    23 Posts 10 Posters 4.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GertjanG
      Gertjan
      last edited by

      2.4.5-p1 of course.
      Early versions shouldn't be used, mainly for security reasons.

      Unbound, as a resolver, use whatever interface (outgoing) it can get it hands on, to obtain DNS answers.
      This is normally the WAN interface. If you add another WAN type interface, like a connection to remote VPN server, then that will be another WAN interface.
      Unbound should be restarted if such a VPN interface comes up. This happens typically later on during the boot process.
      Firewall rues should enforce the behaviour that looks like this :
      Use the classic WAN if it's the only one available.
      Use a VPN WAN if that one is available.

      Btw : take note : I only did some minor VPN experiences using pfSense as a VPN-client, using a (paid) remote VPN server. As such, never tried to understand what 'DNS leaks' means.

      See (all !) the official VPN videos from Netgate on their Youtube channel.

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      P 1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by stephenw10

        There isn't a known issue in 2.4.5 that would present like that.
        How exactly do you have the clients configured?

        Unfortunately there are a great number of people out there who have no idea what DNS leak tests actually do. That means the signal to noise ratio for reports like this is low inducing skepticism! 😉

        Steve

        L 1 Reply Last reply Reply Quote 1
        • L
          linuxlad @stephenw10
          last edited by

          @stephenw10 said in DNS leak:

          Unfortunately there are a great number if people out there who have no idea what DNS leak tests actually do. That means the signal to noise ratio for reports like this low inducing skepticism!

          I found the config issue on my side. Sorry for the Spam.

          1 Reply Last reply Reply Quote 1
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            You'll have to try a lot harder to get classified as spam. 😉

            There's a lot of misinformation out there.

            1 Reply Last reply Reply Quote 0
            • P
              PowerSing Banned @Gertjan
              last edited by

              This post is deleted!
              G 1 Reply Last reply Reply Quote 0
              • G
                gabacho4 Rebel Alliance @PowerSing
                last edited by gabacho4

                @PowerSing funny how both of the two posts you have ever made are about the FUD a "friend" has told you about pfsense.

                @stephenw10 can we get this account banned for being a troll?

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  We can certainly keep a close eye out!

                  I agree that is just FUD.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    He is putting up names from linked in with another key word to boost their SEO rating.. Banned and posts deleted.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 1
                    • AKEGECA
                      AKEGEC
                      last edited by

                      @emammadov DNS leaks can happen because of your configuration, ISP and bugs.

                      • Disconnected cable of your ISP on your Pfsense device.
                      • Go to System > General Setup >  DNS server setting > DNS server > Enter 2 IP addresses from Quad9 DNS: 9.9.9.9 and 149.112.112.112 > Unchecked DNS Server Override > Save.
                      • Go to Services > DNS Resolver : 
                        √ Checked Enable DNS resolver box 
                        Network Interfaces - ALL
                        Outgoing Network Interfaces - ALL
                        √Checked Enable Forwarding Mode box
                        √Checked Use SSL/TSL for outgoing
                        √Checked DHCP Registration
                        √ Checked Static DHCP
                        Save.
                      • Reboot Pfsense, Diagnostics > Reboot and reconnect your ISP cable.
                        
Hope this helps.
                      1 Reply Last reply Reply Quote 1
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        So 'leaking' all of your queries to quad9 as opposed to resolving it yourself?

                        It really depends what you're trying to achieve. If that's hiding DNS queries from your ISP that would do it. If the test is checking if clients are sending DNS over a VPN that would show as all leaked. 😉

                        Steve

                        AKEGECA 1 Reply Last reply Reply Quote 0
                        • L
                          linuxlad
                          last edited by

                          I feel really guilty for reviving this 3 months old thread. 😇

                          1 Reply Last reply Reply Quote 0
                          • AKEGECA
                            AKEGEC @stephenw10
                            last edited by

                            @stephenw10 said in DNS leak:

                            So 'leaking' all of your queries to quad9 as opposed to resolving it yourself?

                            It really depends what you're trying to achieve. If that's hiding DNS queries from your ISP that would do it. If the test is checking if clients are sending DNS over a VPN that would show as all leaked. 😉

                            Steve

                            But Steve, it is still not quite right. A DNS leak is still a leak, that means ISP can still see visited hosts.
                            Pfsense configurations need some tweaking. For those who use VPN provider with DNS leaks please follow these steps:

                            • Go to Firewall > Wan > add new rule:
                              Action: Block
                              Interface: Wan
                              Address Family: IPv4+IPv6
                              Protocol: TCP/UDP
                              Source: Any
                              Destination: Any Port Range Custom: 53
                              Save

                            • Go to Firewall > Lan and/or Opt1 tab
                              Action: Pass
                              Interface: Lan and/or Opt1
                              Address Family: IPv4
                              Protocol: UDP
                              Source: Lan net or Opt1 net
                              Destination: any Port Range Custom: 53
                              #Click button# Display Advance
                              Gateway: Choose your VPN Interface
                              Save

                            • Go to Services > DHCP server > Lan and/or Opt1>Servers>DNS server (Quad9 DNS):
                              9.9. 9.9
                              149.112. 112.112
                              2620:fe::fe
                              2620:fe::fe:9
                              Save

                            Reboot your Pfsense and test it again for DNS leak https://ipleak.net
                            
Hope this helps.

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              That site does not respond for me. Which I'm finding quite ironic!

                              Any DNS leak test simply shows you where your clients queries are being resolved. You have to device for yourself if those are correct.

                              There is no reason to have a block rule for DNS on WAN. All inbound traffic is blocked on WAN by default anyway.

                              Steve

                              AKEGECA 1 Reply Last reply Reply Quote 0
                              • AKEGECA
                                AKEGEC @stephenw10
                                last edited by

                                @stephenw10 said in DNS leak:

                                That site does not respond for me. Which I'm finding quite ironic!

                                Any DNS leak test simply shows you where your clients queries are being resolved. You have to device for yourself if those are correct.

                                There is no reason to have a block rule for DNS on WAN. All inbound traffic is blocked on WAN by default anyway.

                                Steve

                                Good morning Steve, theoretically the default configs is blocked on Wan, but for some odd reason Pfsense responds differently with different hardware ;)
                                Also the second rule (pass 53), you need to assign to all interfaces (opt1,opt2,..) and place it above all others rules.

                                Then test again for DNS leak https://ipleak.net

                                alt text

                                1 Reply Last reply Reply Quote 0
                                • GertjanG
                                  Gertjan
                                  last edited by

                                  @AKEGEC : your second rule : include TCP.

                                  Your first rule : WAN is blocking everything, even for these devices :

                                  @AKEGEC said in DNS leak:

                                  but for some odd reason Pfsense responds differently with different hardware

                                  so the default block all rule will do it's job. If for some "odd reasons" devices could penetrate the firewall I recommend changing the firewall and/or the person that admin's it.

                                  No "help me" PM's please. Use the forum, the community will thank you.
                                  Edit : and where are the logs ??

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.