• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

[SOLVED] DNS Requests From Clients Failing

Scheduled Pinned Locked Moved DHCP and DNS
19 Posts 5 Posters 5.5k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L
    lawrencedol
    last edited by Jan 13, 2018, 8:57 PM Jan 12, 2018, 5:58 AM

    I am a new user of pfSense and new to this forum. I have a working knowledge of networking in general, but it's not my area of expertise since "we have a guy for that" at work. I have just recently built a pfSense box to replace my consumer router at home.

    My setup (while configuring) is:

    client <==> pfSense <=(nat 10.x.x.x)=> router <=(nat 192.168.x.x)=> cable-modem

    (When I am happy with everything, I'll remove the router, which is currently serving the rest of the house, but for right now I want only my computer behind the pfSense box.)

    The problem I have is that DNS requests from the client do not seem to be received (or responded to). I can resolve names for public servers from the pfSense box, but not from the client. However, the client is able to communicate to the internet using IP addresses, and the pfSense DHCP works and I can ping the client computer. I can also reach computers on the downstream home network by IP. So I conclude that wiring and IP addressing is correct and that DNS resolution is the problem.

    Settings for the DNS service have been left at installed defaults, but I've also tried enabling some of the more obvious options with no success.

    DHCP assigns the DNS Servers as the LAN IP of the pfSense LAN interface (singular):

    Default Gateway . . . . . . . . . : 10.x.x.1
        DNS Servers . . . . . . . . . . . : 10.x.x.1

    Since I am brand new to this, I don't know how to go about diagnosing the issue, though I have poked around in the diagnostics menu.

    ETA: Marking as solved as requested.

    Lawrence Dol
    Perfection is the enemy of excellence.
    pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

    1 Reply Last reply Reply Quote 0
    • K
      KOM
      last edited by Jan 12, 2018, 3:00 PM

      Can you confirm via ipconfig /all that the client has the correct DNS?  Can you confirm that pfSense itself can resolve via Diagnostics - DNS Lookup?

      1 Reply Last reply Reply Quote 0
      • L
        lawrencedol
        last edited by Jan 12, 2018, 5:31 PM

        @KOM,

        Yes, the information in my post was obtained by doing both of these. The DNS server IP is the same as the gateway, both being the PFSense address on the LAN interface. And I used PFSense diagnostics to resolve and ping multiple internet hosts by name. I can also ping the client and the downstream LAN devices using names from the PFSense box. So it's only the client where DNS seems to fall into a black hole.

        Lawrence Dol
        Perfection is the enemy of excellence.
        pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

        1 Reply Last reply Reply Quote 0
        • K
          KOM
          last edited by Jan 12, 2018, 5:56 PM

          Did you edit the LAN rules perhaps and somehow block DNS?  What do you get if you manually try to resolve via nslookup?

          nslookup
          server (pfSense hostname or LAN IP)
          www.google.com
          
          1 Reply Last reply Reply Quote 0
          • L
            lawrencedol
            last edited by Jan 12, 2018, 6:31 PM

            I get:

            
            nslookup
            Default Server:  pfsense.lan
            Address:  10.70.80.1
            
            

            But I'd expect OpenDNS to show as the final server, since that's what I've configured.

            I did not edit the LAN rules.

            Lawrence Dol
            Perfection is the enemy of excellence.
            pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

            1 Reply Last reply Reply Quote 0
            • D
              Derelict LAYER 8 Netgate
              last edited by Jan 12, 2018, 7:33 PM Jan 12, 2018, 7:29 PM

              The default configuration is a DNS Resolver.

              The DNS resolver does not use configured name servers to resolve client requests. It starts at the root name servers and works down hierarchically until it obtains the answers from the authoritative name servers for that zone/domain.

              If you want to leverage OpenDNS, Quad9, etc, you must use either the DNS Forwarder or the DNS Resolver in forwarding mode so all answers are obtained from those specific servers.

              There are three different things to keep in mind:

              • What servers the clients are configured to use as DNS servers (The configuration of the client itself - often via DHCP)

              • What servers the firewall itself uses as DNS servers (The settings in System > General)

              • Where/how the DNS server software on pfSense is configured to obtain answers to client queries. (The choice between the DNS Forwarder or DNS Resolver and the configuration of the same)

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • K
                KOM
                last edited by Jan 12, 2018, 8:09 PM

                Actually, I wanted you to manually use pfSense as your DNS server for this test by issuing the command:

                server (pfSense hostname or IP)
                

                Then you would try to resolve google.com or whatever and see what you get on your client.

                1 Reply Last reply Reply Quote 0
                • L
                  lawrencedol
                  last edited by Jan 12, 2018, 8:33 PM

                  KOM,

                  Sorry about that. I'd not used nslookup before.

                  Despite the fact the ipconfig /all reports the correct local IP address of the pfSense box for the DNS server, I had to set the server to the IP address, from the default DNS name. That resulted in the following (successful) queries:

                  nslookup
                  Default Server:  pfsense.lan
                  Address:  10.70.80.1
                  
                  > google.com
                  Server:  pfsense.lan
                  Address:  10.70.80.1
                  
                  > server 10.80.80.1
                  Default Server:  [10.80.80.1]
                  Address:  10.80.80.1
                  
                  > google.com
                  Server:  [10.80.80.1]
                  Address:  10.80.80.1
                  
                  Non-authoritative answer:
                  Name:    google.com
                  Addresses:  2607:f8b0:400a:806::200e
                            216.58.216.142
                  
                  > exit
                  

                  Derelict,

                  I have the resolver configured for forwarding mode (Enable Forwarding Mode), now, but still with no success. (Screenshot attached.)

                  ![2018-01-12 12_31_26-Web - pfsense.lan - Services_ DNS Resolver_ General Settings - pfsense.lan - Ser.png](/public/imported_attachments/1/2018-01-12 12_31_26-Web - pfsense.lan - Services_ DNS Resolver_ General Settings - pfsense.lan - Ser.png)
                  ![2018-01-12 12_31_26-Web - pfsense.lan - Services_ DNS Resolver_ General Settings - pfsense.lan - Ser.png_thumb](/public/imported_attachments/1/2018-01-12 12_31_26-Web - pfsense.lan - Services_ DNS Resolver_ General Settings - pfsense.lan - Ser.png_thumb)

                  Lawrence Dol
                  Perfection is the enemy of excellence.
                  pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

                  1 Reply Last reply Reply Quote 0
                  • L
                    lawrencedol
                    last edited by Jan 12, 2018, 8:58 PM Jan 12, 2018, 8:54 PM

                    I just noticed the typo in my IP address… 10.80 instead of 10.70... I wonder why that worked, since I don't have a 10.80 network?

                    It seems that the problem is having the DNS IP set to 10.70.80.1 (the LAN address of the pfSense box). If I set it to something unknown lookups work??

                    nslookup
                    Default Server:  pfsense.lan
                    Address:  10.70.80.1
                    
                    > google.com
                    Server:  pfsense.lan
                    Address:  10.70.80.1
                    
                    *** pfsense.lan can't find google.com: Server failed
                    > server 10.70.80.1
                    Default Server:  pfsense.lan
                    Address:  10.70.80.1
                    
                    > google.com
                    Server:  pfsense.lan
                    Address:  10.70.80.1
                    
                    *** pfsense.lan can't find google.com: Server failed
                    > server 10.1.2.3
                    Default Server:  [10.1.2.3]
                    Address:  10.1.2.3
                    
                    > google.com
                    Server:  [10.1.2.3]
                    Address:  10.1.2.3
                    
                    Non-authoritative answer:
                    Name:    google.com
                    Addresses:  2607:f8b0:400a:806::200e
                              216.58.216.142
                    
                    > exit
                    
                    

                    Wuhuh?

                    Lawrence Dol
                    Perfection is the enemy of excellence.
                    pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

                    1 Reply Last reply Reply Quote 0
                    • K
                      KOM
                      last edited by Jan 12, 2018, 9:01 PM

                      You're getting nothing back when you do a manual lookup?  It should come back with either a resolution or an error.  Here is how it should work (from my location):

                      PS C:\Users\kom> nslookup
                      Default Server:  ad.kom.local
                      Address:  10.10.0.1

                      server pfsense.kom.local
                      Default Server:  pfsense.kom.local
                      Address:  10.10.4.1

                      www.google.com
                      Server:  pfsense.kom.local
                      Address:  10.10.4.1

                      Non-authoritative answer:
                      Name:    www.google.com
                      Addresses:  2607:f8b0:400b:808::2004
                                172.217.0.228

                      1 Reply Last reply Reply Quote 0
                      • L
                        lawrencedol
                        last edited by Jan 12, 2018, 9:23 PM

                        Yes, successful lookup is what my output, above, shows… but only afer I change the server to an invalid IP address, like 10.1.2.3. As long as the server is the name or IP address of the pfSense box (10.70.80.1) the lookup fails (which the above output also shows, first).

                        Lawrence Dol
                        Perfection is the enemy of excellence.
                        pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

                        1 Reply Last reply Reply Quote 0
                        • K
                          KOM
                          last edited by Jan 12, 2018, 9:34 PM

                          Sorry, I'm a dummy.  I didn't notice the scroll bars in your output and thought that was all.

                          It certainly shouldn't be resolving when you supply a bogus DNS.  I'm starting to get suspicious about your extra router in the mix.

                          What do you have under System - General - DNS Server Settings?

                          1 Reply Last reply Reply Quote 0
                          • L
                            lawrencedol
                            last edited by Jan 12, 2018, 9:53 PM

                            General DNS settings attached.

                            ![2018-01-12 13_52_42-Web - pfsense.lan - System_ General Setup - pfsense.lan - System_ General Setup.png](/public/imported_attachments/1/2018-01-12 13_52_42-Web - pfsense.lan - System_ General Setup - pfsense.lan - System_ General Setup.png)
                            ![2018-01-12 13_52_42-Web - pfsense.lan - System_ General Setup - pfsense.lan - System_ General Setup.png_thumb](/public/imported_attachments/1/2018-01-12 13_52_42-Web - pfsense.lan - System_ General Setup - pfsense.lan - System_ General Setup.png_thumb)

                            Lawrence Dol
                            Perfection is the enemy of excellence.
                            pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

                            1 Reply Last reply Reply Quote 0
                            • D
                              Derelict LAYER 8 Netgate
                              last edited by Jan 12, 2018, 11:48 PM

                              First off, OpenDNS does not properly support DNSSEC (last I heard) so uncheck that in the resolver.

                              Second, you should be getting some kind of response. Are you POSITIVE you didn't dork with the firewall rules on that inside interface such that DNS is now blocked?

                              Or the listen interfaces?

                              Chattanooga, Tennessee, USA
                              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                              Do Not Chat For Help! NO_WAN_EGRESS(TM)

                              1 Reply Last reply Reply Quote 0
                              • L
                                lawrencedol
                                last edited by Jan 13, 2018, 12:08 AM

                                Derelict,

                                It was IPSEC doing it! If I turn that off and apply, then I can ping; if I turn it back on, apply and flush DNS on the client then it fails; turning it back off allows the client to work again.

                                Thank you!

                                PS: The only firewall rules I have are those created automatically on the LAN interfaces.

                                Lawrence Dol
                                Perfection is the enemy of excellence.
                                pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

                                1 Reply Last reply Reply Quote 0
                                • D
                                  Derelict LAYER 8 Netgate
                                  last edited by Jan 13, 2018, 1:07 AM

                                  DNSSEC or IPsec?

                                  And don't confuse "ping" with "resolve names".

                                  You could probably always ping the correct IP address. You just couldn't resolve the correct IP address from the name.

                                  Chattanooga, Tennessee, USA
                                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                  1 Reply Last reply Reply Quote 0
                                  • G
                                    Gertjan
                                    last edited by Jan 13, 2018, 1:12 AM

                                    @Lawrence:

                                    It was IPSEC doing it! If I turn that off and apply, then I can ping; if I turn it back on, apply and flush DNS on the client then it fails; turning it back off allows the client to work again.

                                    IPSEC ? Or DNSSEC ?

                                    The pfSense Resolvers uses DNSSEC by default - some sort of future secured DNS - and, you should know that OpenDNS doesn't work with DNSSEC.
                                    When you flush the DNS on your client, you didn't flush the DNS cache on pfSense, so it still seems to work. But as soon as the cache times out, things will be 'broken' again.
                                    Rule of thumb : when using OpenDNS, disable your local (pfSense) resolver the DNSSEC capabilities - or use the forwarder, this is one of the reasons it still exists in pfSense : for those who want to send all their DNS traffic to some off-site DNS service like OpenDNS.

                                    No "help me" PM's please. Use the forum, the community will thank you.
                                    Edit : and where are the logs ??

                                    1 Reply Last reply Reply Quote 0
                                    • L
                                      lawrencedol
                                      last edited by Jan 13, 2018, 1:34 AM

                                      All,

                                      Sorry, I did mean DNSSEC.

                                      I do know that I was flushing the client cache, but since it was only the client which was failing to resolve DNS names (resolving from the pfSense box has been working since inception) and since pinging with a host name requires a DNS resolution first, that seems a valid test to me. Specifically what I did was ping google.com => fail. Disable DNSSEC, then ping google.com => success. Enable DNSSEC again, then ping google.com => success (address still cached on client). Then ipconfig /flushdns and ping google.com => fail (expected). Finally, disable DNSSEC then ping google.com => success again. Which demonstrates conclusively that DNSSEC is causing an issue with the client (given that there was no problem resolving names from the pfSense diagnostic tool). Of course, my initial and subsequent posts did make clear that I could ping and access hosts by their IP address the whole time.

                                      [This train of logic actually suggests that it is the client (Windows 10) not OpenDNS which can't do DNSSEC, since with DNSSEC enabled resolving names from the pfSense box works. But that is an aside for me right now since the problem is resolved.]

                                      Again, thanks for your help.

                                      PS: Is there a way to mark this thread as resolved?

                                      Lawrence Dol
                                      Perfection is the enemy of excellence.
                                      pfSense on a recycled AMD AthlonII X3 435; 3GHz; 8 GiB

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        johnpoz LAYER 8 Global Moderator
                                        last edited by Jan 13, 2018, 1:55 AM

                                        "This train of logic actually suggests that it is the client (Windows 10) not OpenDNS which can't do DNSSEC"

                                        Sorry but that is not what that train of non logic suggests at all…  Suggest you research how dnssec works, and why asking opendns for dnssec is not going to work..  But why it does work when you acktually resolve, etc.

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                                        1 Reply Last reply Reply Quote 0
                                        19 out of 19
                                        • First post
                                          19/19
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                          This community forum collects and processes your personal information.
                                          consent.not_received