Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS leak

    Scheduled Pinned Locked Moved General pfSense Questions
    23 Posts 10 Posters 4.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      That site does not respond for me. Which I'm finding quite ironic!

      Any DNS leak test simply shows you where your clients queries are being resolved. You have to device for yourself if those are correct.

      There is no reason to have a block rule for DNS on WAN. All inbound traffic is blocked on WAN by default anyway.

      Steve

      AKEGECA 1 Reply Last reply Reply Quote 0
      • AKEGECA
        AKEGEC @stephenw10
        last edited by

        @stephenw10 said in DNS leak:

        That site does not respond for me. Which I'm finding quite ironic!

        Any DNS leak test simply shows you where your clients queries are being resolved. You have to device for yourself if those are correct.

        There is no reason to have a block rule for DNS on WAN. All inbound traffic is blocked on WAN by default anyway.

        Steve

        Good morning Steve, theoretically the default configs is blocked on Wan, but for some odd reason Pfsense responds differently with different hardware ;)
        Also the second rule (pass 53), you need to assign to all interfaces (opt1,opt2,..) and place it above all others rules.

        Then test again for DNS leak https://ipleak.net

        alt text

        1 Reply Last reply Reply Quote 0
        • GertjanG
          Gertjan
          last edited by

          @AKEGEC : your second rule : include TCP.

          Your first rule : WAN is blocking everything, even for these devices :

          @AKEGEC said in DNS leak:

          but for some odd reason Pfsense responds differently with different hardware

          so the default block all rule will do it's job. If for some "odd reasons" devices could penetrate the firewall I recommend changing the firewall and/or the person that admin's it.

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.