Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS Resolver - Content Filtering - NSLOOKUP - Server Unknown

    Scheduled Pinned Locked Moved pfBlockerNG
    5 Posts 2 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      Detfree23
      last edited by

      Good morning Netgate family...!

      I recently (yesterday) upgraded from 21.02 to 21.05 (SG-3100). Prior to that, an NSLOOKUP from Windows 10 - would point to 10.10.10.1. This gave me an indication that DNS was being referenced internally and using the pfBlocker splash page if someone tried to go to a page protected by the items I click off on for protection such as TOP level items like Shallalist and UT1 (gambling, porn, etc..). After the upgrade to 21.05 the NSLookup is not resolving. I'll show snipits below. I've removed / uninstalled (keeping the pfBlocker settings) and re-installed it after upgrade to 21.05. I've clicked off of DNS Resolver enabled to test and perhaps I didn't wait long enough, but NSLookup still crokes. Anybody have some ideas to help me? I also have an HP multi-function printer that connects to the HP Web Services and it's not connecting out. I don't know if DNS Resolver is messing with that either? After deploying DNS Resolver and Content filtering I never checked the HP Web Services on the printer so I don't know if that is related or not. The idea here is to content filter on the network (home environment). I'd consider the predominant configure rather basic here.

      88dfeab9-eb30-4a5f-afce-66097c3cb83e-image.png

      479cfffa-1e22-427b-9197-4bbf4d15a61a-image.png

      ed9a4493-22f5-42e6-a7eb-15837488abae-image.png

      1ef9a1b9-c566-4741-8d73-b4f326423b63-image.png

      e012b891-aae2-4f0e-bc13-40fbb3d461e3-image.png

      948c1d78-2a0c-43bd-88ca-4c7011e5461a-image.png

      12c69391-060b-4083-827b-fa14b41761b0-image.png

      bdbe3f0d-3a32-4da6-8f3c-6724ae5642ce-image.png

      e74f88b0-0632-422e-8bdd-98b34f030336-image.png

      4588f819-792e-408b-824f-28756db722bc-image.png

      Regards, Franklin

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @Detfree23
        last edited by Gertjan

        @detfree23

        This :

        eacb8e9b-41f5-47c1-b557-31af7111623d-image.png

        Is unneeded, and even scary.
        "8.8.4.4" isn't the hostname of 8.8.8.8 ......
        Just delete that "8.8.8.8" - use the default settings and it will be just perfect.

        I guess you don't quiet understand what the "10.10.10.1" can do for you (very little) but it is not a service that listens for DNS requests. So 'nslookup' doesn't deal with "10.10.10.1".
        Except if that "10.10.10.1" is your actual LAN ..... and in that case you actually are in trouble.

        Can you show the

        ipconfig /all
        

        from your PC ?

        DHCP and LAN setting from pfSense - if you decided not the use the default settings.

        Btw :

        Just forget about this 'thing' :

        f2cd7af7-568c-473f-992e-abd5f1cc2608-image.png

        because you can't break TLS/SSL.
        And you will not want to break it neither ;)

        Because my "Win10" PC has default network settings
        and
        My pfSense has default network settings,
        I see a

        C:\Users\gwkro>nslookup
        Serveur default :  pfsense.my-local-network.net
        Address:  2001:470:dead:beef:2::1
        

        (
        It decided to use my IPv6 (pfSense LAN IP) which is actually assigned to me by my IPv6 ISP
        It would have been a better demo if it was showing :
        Address: 192.168.1.1
        which is my pfSense LAN IPv4
        )

        )

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 0
        • D
          Detfree23
          last edited by

          @gertjan - Thanks for the response and help here.

          I didn't see the "hostname" where I put 8.8.4.4....I took it out and the 8.8.8.8 as well (Google's DNS servers). I was using them versus my current ISP.

          I'm on the 192.168.111.x subnet. At one point, when I set up the content filtering and DNS Resolver, I watched this video and the guy pointed out things to do. When I made those changed and did an nslookup, it pointed-resolved to 10.10.10.1 which gave me the impression it pointed to my pfSense and if someone ended up going to a site that should be blocked, the internal pfBlocker webpage was shown.

          I did do some recent updates for my Windows. I just can't get around why windows is not resolving properly. Why the "DNS Server unknown"? Things are resolving because I can still get out to webpages, but content filtering does not appear to be working.

          https://www.youtube.com/watch?v=luXhXisoWhA

          b5a8197b-99ea-4045-b98e-e84366b757de-image.png

          My current IP of the network...

          71b72970-c4eb-4881-ac1e-43dd73ce6630-image.png

          8e165adf-e1be-4595-a472-20aebc4b960e-image.png 012df2d4-a29b-40b5-999c-cdf738189a7e-image.png

          GertjanG 1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @Detfree23
            last edited by

            @detfree23 said in DNS Resolver - Content Filtering - NSLOOKUP - Server Unknown:

            I didn't see the "hostname" where I put 8.8.4.4....I took it out and the 8.8.8.8 as well (Google's DNS servers). I was using them versus my current ISP.

            See your :

            3a7c699f-8b65-4092-90a5-d6279d24324f-image.png

            so you are resolving, not forwarding. 8.8.8.8 etc aren't used at all.
            The resolver is resolving ;)
            There is no need to add any DNS IP, that's something of the past.

            Your nslookup examples :
            nslookup (or windows actually) prefers IPv6 over IPv4.
            Is 2600:1700:7d0:8c39:208;a2ff:fe0f:720a an IPv6 used by pfSense, and is it answering to DNS request over port 53 on this IPv6 ?

            Type

            server 192.168.111.1
            

            to force it to use the IPv4 of your LAN.
            Now nslookup works ?

            I guess, when you de activate IPv6 on the interface that your PC uses, the issue is gone..

            On the resolver (pfSense) side :

            The Services > DNS Resolver > Advanced Settings page :

            320ff71a-d56b-4ea6-8c6b-4fe97c1b192c-image.png

            if this option is uncked, the ACL list isn't taken in account, and unbound just accepts all nternal networks.
            If it is checked, check the ACL list, and make sure "2600:1700:7d0:8c39:208;a2ff:fe0f:720a" is part of a listed network.

            Also : can you

            ping -6 2600:1700:7d0:8c39:208;a2ff:fe0f:720a
            

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 0
            • D
              Detfree23
              last edited by

              @Gertjan - once again, I appreciate your time.

              I decided to take the path of least resistance for the moment and I default reset pfBlocker, then reloaded the below, added in my shallalist and UT1. Looks like the redirect IP for sites you can't go to on the lists (10.10.10.1) are working. I'll see how this holds up for the next few days. Unbound python mode because it uses less resources. I think I might enjoy a more robust PC or netgate so I can load up other things like Snort. Are you using a Netgate appliance or a PC of sorts (community pfsense)? Got a recommendation? Franklin

              d1c1dff7-7c1c-4406-9dd5-c610d8f4d53b-image.png

              5a9966f5-53bb-4ee4-84a1-415144e800ce-image.png

              a8ea957b-37ba-40b9-84ec-914458dbf63e-image.png

              b413ba95-7388-4dcd-a8e2-df4cca86dd1a-image.png

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.