• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Blocking Port 53 & Issues Resolving Host Names

Scheduled Pinned Locked Moved DHCP and DNS
10 Posts 4 Posters 1.4k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • ?
    A Former User
    last edited by A Former User Jan 30, 2020, 3:40 PM Jan 30, 2020, 4:14 AM

    Dear Negate Community,

    I recently setup DNS over TLS with cloudflare and it's working for the most part except some websites take a long time to load (or even fail occasionally). But once the web page loads, navigating the web page is normal and speedy and will work for a little bit but then revert back to taking a long time to load.

    Also, for example, it stopped pfsenes from finding the new pfsense update, my vpn fails to restart properly and stops pfblockerng from updating until I disable the rule.

    I have isolated the issue to this firewall rule that is blocking port 53:

    52b1a4a1-7442-4002-9a32-0b2dd8f54afb-image.png

    If I disable this firewall rule, all websites load fine. But then, DNS starts going over port 53 and not 853.

    Here are other rules I have for port 53, but I don't think they are affecting my issue:

    1389515e-0cbb-4816-b257-22fb19495435-image.png

    b3790c8a-3971-4b9c-8c5b-d7f3991d7ba4-image.png

    Here is a sample of my state table for 1.0.0.1:
    https://hastebin.com/oqusazuxep.nginx

    Is anyone else experiencing this? Any tips / recommendation would be greatly appreciated!

    Thank you very much!

    1 Reply Last reply Reply Quote 0
    • K
      kiokoman LAYER 8
      last edited by Jan 30, 2020, 10:48 AM

      i would check this under dns resolver

      DNS Query Forwarding
      Enable Forwarding Mode If this option is set, DNS queries will be forwarded to the upstream DNS servers defined under System > General Setup or those obtained via DHCP/PPP on WAN (if DNS Server Override is enabled there).

      Use SSL/TLS for outgoing DNS Queries to Forwarding Servers When set in conjunction with DNS Query Forwarding, queries to all upstream forwarding DNS servers will be sent using SSL/TLS on the default port of 853. Note that ALL configured forwarding servers MUST support SSL/TLS queries on port 853. <- and check this

      ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
      Please do not use chat/PM to ask for help
      we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
      Don't forget to Upvote with the 👍 button for any post you find to be helpful.

      1 Reply Last reply Reply Quote 0
      • ?
        A Former User
        last edited by Jan 30, 2020, 2:48 PM

        Hi kiokoman,

        Thanks you, I just double checked and all those settings are checked off already and I am using cloudflare which supports DNS over TLS.

        1 Reply Last reply Reply Quote 0
        • K
          kiokoman LAYER 8
          last edited by Jan 30, 2020, 4:02 PM

          and that is 1.1.1.1 and 1.0.0.1 ?

          ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
          Please do not use chat/PM to ask for help
          we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
          Don't forget to Upvote with the 👍 button for any post you find to be helpful.

          ? 1 Reply Last reply Jan 30, 2020, 4:36 PM Reply Quote 0
          • ?
            A Former User @kiokoman
            last edited by A Former User Jan 30, 2020, 4:38 PM Jan 30, 2020, 4:36 PM

            @kiokoman yes sir! and for hostname, I have: 1dot1dot1dot1.cloudflare-dns.com for both of them.

            I broke my internet somehow, fixing that right now 😂

            Update: oh it's back now!

            ? L 2 Replies Last reply Jan 30, 2020, 11:46 PM Reply Quote 0
            • ?
              A Former User @A Former User
              last edited by Jan 30, 2020, 11:46 PM

              This post is deleted!
              1 Reply Last reply Reply Quote 0
              • ?
                A Former User
                last edited by A Former User Feb 2, 2020, 4:33 PM Feb 2, 2020, 4:28 PM

                Hello,

                Just an update:

                It looks like some websites failing/taking a long time to load was related to snort (although I disabled all packages before as a test and it was still having issues but looks like that's not the case now)

                In terms of external host names not resolving, such as:

                1. pfsense not finding an update for itself,
                2. pfblockerng failing updates, for example with: Could not resolve host: ransomwaretracker.abuse.ch Retry in 5 seconds...
                3. VPN not working unless I put an IP in the config (instead of hostname)
                4. No packages appearing under the "available packages"

                I found that if I did the following it fixed this (But please let me know if this is wrong!):

                1. Go to System -> General Setup
                2. Uncheck "Disable DNS Forwarder"
                  Do not use the DNS Forwarder/DNS Resolver as a DNS server for the firewall
                  By default localhost (127.0.0.1) will be used as the first DNS server where the DNS Forwarder or DNS Resolver is enabled and set to listen on localhost, so system can use the local DNS service to perform lookups. Checking this box omits localhost from the list of DNS servers in resolv.conf.
                3. Go to: Services -> DNS Resolver
                4. Select "All" for the Network Interfaces and Outgoing Network Interfaces.

                So in summary,

                1. I have All domain devices' DNS pointing to my internal AD DNS servers via DHCP scope
                2. I added the pfsense ip to the forwarder list of my AD DNS servers
                3. Added my AD DNS servers to the DNS resolver domain override setting
                4. I enabled all interfaces for "network interfaces" and "outgoing network interfaces" in the DNS resolver setting
                5. I unchecked "Disable DNS forwarder" under System -> General Setup
                6. Blocking port 53 outbound
                7. Using cloudflare for DNS over TLS in System -> General Setup

                If this is borked please let me know! (but it everything seems to be working now... even while blocking port 53 outbound)

                ? 1 Reply Last reply Feb 2, 2020, 4:48 PM Reply Quote 0
                • ?
                  A Former User @A Former User
                  last edited by A Former User Feb 2, 2020, 6:41 PM Feb 2, 2020, 4:48 PM

                  @techgeek055 Just another update:

                  all issues seem to be resolved except when visiting websites, I will randomly get 2 different white pages with 2 different errors: DNS_PROBE_STARTED then DNS_PROBE_FINISHED_NXDOMAIN ,then it will load the webpage normally after half a second.

                  Edit: Actually i think it's working without this issue

                  1 Reply Last reply Reply Quote 0
                  • L
                    Law_at_Nexus @A Former User
                    last edited by May 22, 2020, 2:59 PM

                    @techgeek055 hostname one.one.one.one not 1dot1dot1dot1.cloudflare-dns.com

                    1 Reply Last reply Reply Quote 0
                    • G
                      Gertjan
                      last edited by May 22, 2020, 3:56 PM

                      Yep, confirmed :

                      [2.4.5-RELEASE][root@priv.brit-hotel-fumel.net]/root: host 1.1.1.1
                      1.1.1.1.in-addr.arpa domain name pointer one.one.one.one.
                      

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                        This community forum collects and processes your personal information.
                        consent.not_received