Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PFSense/Unbound Rejecting Queries

    Scheduled Pinned Locked Moved DHCP and DNS
    10 Posts 8 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      grantcurell
      last edited by

      I'm trying to understand why PFSense is rejecting these DNS queries.

      pcap_rejection.PNG

      Here are the DNS resolver settings. For starters, the ALL interface is selected, but so is the OpenShift interface which is receiving these queries.

      dns_settings.PNG

      1 Reply Last reply Reply Quote 0
      • KOMK
        KOM
        last edited by KOM

        REFUSED is usually due to policy reasons. What happens if you select only All for Network Interfaces? Maybe something weird is happening of you select All and other specific interfaces.

        1 Reply Last reply Reply Quote 0
        • JeGrJ
          JeGr LAYER 8 Moderator
          last edited by

          a) rejecting sth. like "google.com.yourdomain.tld" isn't unexpected.
          b) why are your selecting "ANY" but adding WAN, LAN, Openshift as network interface IPs?
          c) Do you have anything set in the other tabs (access lists etc.)?
          d) Is there anything wrong with resolving? Why do you forward DNS?

          Don't forget to upvote ๐Ÿ‘ those who kindly offered their time and brainpower to help you!

          If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

          1 Reply Last reply Reply Quote 0
          • T
            TheFortium
            last edited by

            I'm not sure if the issue has been solved, but I had the same issue and the issue drove me crazy. But I found out, that I just need to create an Access List, that accepts Requests from my Clients. Easiest is to creat an allow all list since I've already done the Filtering in Firewall-Rules and in the Listening interfaces Tab.

            To make the ACL simply go to Access Lists:

            6cdbce97-daa6-4321-8836-4de395ba2bb2-image.png

            And then create a new one, that allows the Clients:

            210de9f5-7a2a-4aa2-a9ec-67d92c65dcd0-image.png

            Hope I could help you and maybe other people experiencing this issue.

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              FYI- Do not make an ACL like the one shown in that screenshot. It's incredibly dangerous.

              You never want to allow from all (0.0.0.0/0) since one mistake with your WAN rules could lead to you acting as a DDoS reflector, among other things.

              Only add ACLs for specific local networks to which you need to provide access. Directly connected networks are typically added to the ACL list automatically, though they don't show in the GUI.

              In this case, since the query was refused from the client address 10.0.1.106, then you'd probably want to add an ACL for that particular subnet (most likely 10.0.1.0/24)

              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • T
                ThumbSec
                last edited by

                I'm really curious on the why behind this. It worked for me but I did a lot of searching and watching set up videos before I installed pfsense and not a single one of them mentioned this.

                I'm just worried that my set up puts me in a weird minority that requires me to use access lists.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Out of the box pfsense will create auto acl that allows all locally attached networks to query unbound.

                  Unless you checked this box in advanced unbound

                  acl.png

                  Any locally attached network will be able to query unbound. But downstream networks, or tunnel networks (vpn) would not.

                  If you want such networks to be able to query unbound, then you would need to create an acl to allow them.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 1
                  • T
                    ThumbSec
                    last edited by

                    Thanks. That option was not checked but adding the ACL resolved my problem nonetheless.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by johnpoz

                      I didn't expect it to be checked, if your default and your other networks worked without you creating acls ;) Mine is checked because I like seeing all my ACLs vs having auto.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • P
                        pete35
                        last edited by pete35

                        Same problem here. I need to toggle the option in the GUI twice,
                        after that in works properly. Removing the ACL afterwards doesnt change anything.

                        91865051-b24b-4f72-9502-d412e4ffca91-image.png

                        It looks like, there is a glitch in the GUI.

                        It works for some time, but afterwards it needs the ACL again. So no great news here.

                        <a href="https://carsonlam.ca">bintang88</a>
                        <a href="https://carsonlam.ca">slot88</a>

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.