• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

DNS server in "general settings" when using unbound as resolver

Scheduled Pinned Locked Moved DHCP and DNS
unboundpihole
11 Posts 4 Posters 2.7k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G
    gniting
    last edited by Jun 20, 2020, 9:36 AM

    Background/context:
    I am using a local DNS server (pihole) for DNS resolution for all devices on my network. This DNS is assigned by pfsense through DHCP. Pihole is configured to use pfsense as its only upstream resolver. I am not running pfsense unbound in forwarding mode, it is querying root servers directly.

    Now my questions for you are:

    1. What DNS server I should put in pfsense->general settings? I've tried my local pihole's IP, an external DNS like 8.8.8.8, and even left it blank, regardless of what I use, things work normally. Which, I guess, is what should happen when unbound is querying root servers directly. But I'd still like to understand what's the ideal setting here.
    2. I have a NAT rule set up to block DNS queries for hardcoded DNS servers and route them all to my pihole. This works well for queries for any machine on my network EXCEPT the pfsense box. Can I have DNS queries made by the pfsense box also route through pihole? I assumed that the NAT rule + firewall rule would take care of this but apparently not.

    Needless to say, I've managed to thoroughly confuse myself. Any helpful hints are appreciated so that I can sleep in peace :)

    1 Reply Last reply Reply Quote 0
    • K
      kiokoman LAYER 8
      last edited by kiokoman Jun 20, 2020, 9:49 AM Jun 20, 2020, 9:48 AM

      1 What DNS server I should put in pfsense->general settings? > my local pihole's IP

      2 NAT rule + firewall rules, there is no need for the box, only for device on the lan

      ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
      Please do not use chat/PM to ask for help
      we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
      Don't forget to Upvote with the 👍 button for any post you find to be helpful.

      1 Reply Last reply Reply Quote 0
      • G
        gniting
        last edited by Jun 20, 2020, 10:55 AM

        @kiokoman Thanks for the insights in regards to #2. Good to know!

        When I use my pihole's IP in pfsense->general settings, executing dig pfsense.org on the pfsense box does not cause for that lookup to go to pihole. Instead, pfsense will resolve it locally (and properly) despite the fact that I have the setting Do not use the DNS Forwarder/DNS Resolver as a DNS server for the firewall checked. Another pfsense local box nuance?

        1 Reply Last reply Reply Quote 0
        • J
          johnpoz LAYER 8 Global Moderator
          last edited by johnpoz Jun 20, 2020, 11:31 AM Jun 20, 2020, 11:26 AM

          The only thing pfsense should point to is itself, loopback.. Why would you think it needs to know about or point to pihole in any way?

          dns.jpg

          The only reason pfsense would need to go ask pihole something, is if pihole knew something it needed... What would that be in your scenario? I can't think of anything.

          And if it did, that would be a domain override..

          I use pihole in my network, clients point to pihole for dns.. It forwards to pfsense, pfsense resolves..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          G 1 Reply Last reply Jun 20, 2020, 11:48 AM Reply Quote 0
          • G
            gniting @johnpoz
            last edited by Jun 20, 2020, 11:48 AM

            @johnpoz yep, makes total sense. I guess I just needed to have this hammered into my head. Thanks!

            1 Reply Last reply Reply Quote 0
            • J
              johnpoz LAYER 8 Global Moderator
              last edited by Jun 21, 2020, 11:23 AM

              Users seem to have a hard time grasping what a resolver is and how it works.. They think that there has to be a dns server you point to..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              4 1 Reply Last reply Sep 18, 2020, 8:44 PM Reply Quote 0
              • 4
                4o4rh @johnpoz
                last edited by Sep 18, 2020, 8:44 PM

                @johnpoz what i don't understand is, if we do the way you recommend (which i had for a long time) the dnsleak test shows my ISP.

                so now i had to go back to using the DNS Resolver to forward to 1.1.1.1 so i don't fail the leak test

                1 Reply Last reply Reply Quote 0
                • J
                  johnpoz LAYER 8 Global Moderator
                  last edited by johnpoz Sep 19, 2020, 4:10 AM Sep 19, 2020, 4:07 AM

                  @gwaitsi said in DNS server in "general settings" when using unbound as resolver:

                  so i don't fail the leak test

                  Yeah because its so much better to hand everywhere you go to 1.1.1.1.. I mean who would be tracking that.. vs talking directly to the authoritative ns across the globe directly..

                  What do you think is easier to track?

                  If your tinfoil hat is that tight, then just route your dns queries through a vpn.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  4 1 Reply Last reply Sep 19, 2020, 8:26 PM Reply Quote 0
                  • 4
                    4o4rh @johnpoz
                    last edited by 4o4rh Sep 19, 2020, 8:33 PM Sep 19, 2020, 8:26 PM

                    @johnpoz my dnsleak test IS being conducted over a VPN.

                    I route everything over expressvpn (except for a few IPs like this forum which don't VPNs).

                    So what use is the VPN if the dnsleak test then gives my local IP address when using the root servers? that seems to defeat the who point of having the VPN.

                    the problem is, unbound does not respect the outgoing interfaces. i tell the firewall to use 1.1.1.1 and not use the unbound/forwarder - resolution from the firewall correctly goes to 1.1.1.1.
                    if i select unbound to use only the vpn interfaces, it does not. it goes via WAN

                    1 Reply Last reply Reply Quote 0
                    • J
                      johnpoz LAYER 8 Global Moderator
                      last edited by Sep 19, 2020, 8:33 PM

                      Well clearly you not routing your dns queries over a vpn, if the dns test is showing your actual IP vs your vpn ip..

                      Bringing up unbound on a vpn interface to be used as outbound can be problematic depending on when the vpn comes up, if goes down, how you actually have your routing setup, etc.

                      Unbound should be set to only use the localhost for outbound traffic if you want to ensure vpn traffic is used if your doing a default route then via your vpn service.

                      Or if you going to be doing policy routing of your vpn connection, its best to move your dns off of pfsense and have something on your network doing the dns queries so you can be sure you policy route that traffic, and use any sort of kill switches for when the vpn might go down that your tinfoil hat calls for.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      4 1 Reply Last reply Sep 19, 2020, 8:52 PM Reply Quote 0
                      • 4
                        4o4rh @johnpoz
                        last edited by 4o4rh Sep 19, 2020, 9:00 PM Sep 19, 2020, 8:52 PM

                        @johnpoz dnsleaktest.com shows the IP address of my vpn provider.
                        whether you select standard or extended, it then shows results in the IP of my ISP connection.

                        my config is as follows
                        System DNS Servers
                        DNS Servers 1.1.1.1 firewall WAN
                        DNS Server Override unchecked
                        Disable DNS Forwarder checked

                        DNS Resolver
                        enable checked
                        Network Interfaces LAN / VLAN
                        Outgoing Interfaces Localhost
                        system transparent
                        DNSSEC checked
                        Use SSL/TLS outgoing checked
                        DHCP Register checked
                        Static DHCP checked

                        Advanced Privacy
                        Hide ID checked
                        Hide Version checked
                        Query Name checked
                        Prefetch Support checked
                        prefetch DNS key checked
                        harden DNSSEC checked
                        Experimental Bit 0x20 checked

                        Routing
                        WAN Default Route

                        Rules
                        TCP/UDP * * LAN Address DNS allow
                        TCP/UDP * * !Firewall DNS block

                        TCP/UDP * * VPNBYPASS * WAN none
                        TCP/UDP * * !LAN * ExpressVPN none

                        NAT
                        LAN TCP/UDP * * !LAN Address DNS LAN Addr (i found using 127.0.0.1 didn't work, but it did with LAN addr)

                        ** PS it is not a tin foil hat, when you live in a country where big law firms criminally intimidate and extort (for 3yrs relentlessly) exorbitant amounts of money because you play 50sec of a movie - consider yourself lucky your lawyers haven't woken up to that scam **

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received