Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unbound make requests to 53 port

    Scheduled Pinned Locked Moved DHCP and DNS
    8 Posts 3 Posters 807 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      lcbbcl
      last edited by

      I have my resolver set to forwarding mode to 1.1.1.1 and of course i did select Use SSL/TLS for outgoing DNS Queries to Forwarding Servers.
      Today testing some dns servers i saw that i have queries using 53 udp.Most of my queries are for 853 tcp but i have also 53 udp.
      Is this normal? Right now i made fast a floating rule to stop outbound traffic for port 53 and my dns is working.
      screen

      1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan
        last edited by

        Hi,

        Some device in your LAN that likes to question directly 1.1.1.1:53 ?

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 0
        • L
          lcbbcl
          last edited by lcbbcl

          Hello,
          No i don't have(as far i know), but this request is made also to root servers if unbound will restart.
          Now i set another forward dns server, is the same behavior.
          dns2.PNG
          Here is my config
          dns3.PNG
          dns4.PNG

          1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan
            last edited by Gertjan

            What are the IP's what you masked out ?
            Your LAN IP's ?
            WAN IP ?

            @jimp, recently, created a bug tracker on pfSense redmine, where he mentions the resolver bypassing the forward servers.

            edit : https://redmine.pfsense.org/issues/10931 ?

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 1
            • L
              lcbbcl
              last edited by

              Is my wan , it is a pppoe connection.
              I see no point to mask a rfc1918.
              Thanks for the link, at least now i know that is not my fault.

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by johnpoz

                When you list anything in general settings pfsense can and would use those for its own lookups directly, so would not use tls to talk to those.

                See the redmine linked to.

                Also - having dnssec enable when you are forwarding is pointless. 1.1.1.1 already does dnssec, asking it for dnssec is pointless and just added queries for no reason.

                If you were forwarding to something that didn't do dnssec, asking for it - again would be pointless.

                When you forward, there is no point to leaving dnssec enabled. Where you forward will either be doing it or not. If it does it, great if it doesn't asking for it does nothing and is just wasted queries.

                Also your doing dot to here ? doh-dot.applied-privacy.net

                Forwarding to servers that could resolve stuff differently is bad idea.. If 1 filters traffic for say bad sites, and the other doesn't Or 1 does dnssec and the other doesn't you run into an issue where something should of been filtered is not, or something that fails dnssec is returned, etc.

                If you want to point to multiple dns, you need to make sure they will resolve everything the same. if 1 filters bad stuff, and the other does not - or filters different sites.. You run into an issue where your not sure exactly what your going to get. And once its cached locally all your other clients will get that same info.

                You need to be sure the NS you point to do things the same way.. If you trust 1.1.1.1, then use that - use their alternate IPs if you want to.. But its anycast anyway.. Do you honestly think they would go down. If so most of the planet would be down ;) You could always just point to something else if they had an extended outage.

                It makes no sense to use different NS that are not resolving and returning the exact same info.. Based on filtering criteria and doing dnssec or not..

                This isn't the days of pointing to a couple of boxes your ISP ran, and 1 might get overloaded or go down, and the other worked. These services like quad9, 1.1.1.1, googledns, etc. Are global anycast cdn deployments designed to be up! And work.. It makes no sense to point to more than 1 of them.. Since they all have their own take on what is filter, or what is not. And who you choose may or may not be doing dnssec.. Pick 1 and use only them.. Or you could have issues with what is returned or not returned depending on which NS unbound happens to use.. Which you never can be sure which one that will be.

                edit: It seems a misread this a bit.. You were only using 1.1.1.1 and seeing queries to root, and then changed to this different dot-doh NS and still seeing queries to root.. What is the source of these queries? Why are you hiding them if they are rfc1918? Firewall would not log pfsense own queries, so those are devices from your network, external network?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                L 1 Reply Last reply Reply Quote 1
                • L
                  lcbbcl @johnpoz
                  last edited by

                  @johnpoz said in Unbound make requests to 53 port:

                  When you list anything in general settings pfsense can and would use those for its own lookups directly, so would not use tls to talk to those.

                  See the redmine linked to.

                  Also - having dnssec enable when you are forwarding is pointless. 1.1.1.1 already does dnssec, asking it for dnssec is pointless and just added queries for no reason.

                  If you were forwarding to something that didn't do dnssec, asking for it - again would be pointless.

                  When you forward, there is no point to leaving dnssec enabled. Where you forward will either be doing it or not. If it does it, great if it doesn't asking for it does nothing and is just wasted queries.

                  Also your doing dot to here ? doh-dot.applied-privacy.net

                  Forwarding to servers that could resolve stuff differently is bad idea.. If 1 filters traffic for say bad sites, and the other doesn't Or 1 does dnssec and the other doesn't you run into an issue where something should of been filtered is not, or something that fails dnssec is returned, etc.

                  If you want to point to multiple dns, you need to make sure they will resolve everything the same. if 1 filters bad stuff, and the other does not - or filters different sites.. You run into an issue where your not sure exactly what your going to get. And once its cached locally all your other clients will get that same info.

                  You need to be sure the NS you point to do things the same way.. If you trust 1.1.1.1, then use that - use their alternate IPs if you want to.. But its anycast anyway.. Do you honestly think they would go down. If so most of the planet would be down ;) You could always just point to something else if they had an extended outage.

                  It makes no sense to use different NS that are not resolving and returning the exact same info.. Based on filtering criteria and doing dnssec or not..

                  This isn't the days of pointing to a couple of boxes your ISP ran, and 1 might get overloaded or go down, and the other worked. These services like quad9, 1.1.1.1, googledns, etc. Are global anycast cdn deployments designed to be up! And work.. It makes no sense to point to more than 1 of them.. Since they all have their own take on what is filter, or what is not. And who you choose may or may not be doing dnssec.. Pick 1 and use only them.. Or you could have issues with what is returned or not returned depending on which NS unbound happens to use.. Which you never can be sure which one that will be.

                  edit: It seems a misread this a bit.. You were only using 1.1.1.1 and seeing queries to root, and then changed to this different dot-doh NS and still seeing queries to root.. What is the source of these queries? Why are you hiding them if they are rfc1918? Firewall would not log pfsense own queries, so those are devices from your network, external network?

                  Thank you for your amazing explanation.
                  Dnssec was enabled because i was testing unbound alone and also different dns servers.I already saw your suggestion on different threads.
                  I won't use 1.1.1.1 , it was just use as example.
                  I was curious to understand how/who send the requests to port 53, because i have a nat rule catching all the dns requests and also unbound was set to tls mode.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    @lcbbcl said in Unbound make requests to 53 port:

                    I was curious to understand how/who send the requests to port 53

                    If you have servers listed in general other than loopback, pfsense can and will depending use those for its own lookups.. Which would not use dot, they would just be normal queries to 53.

                    There is currently a redmine to change this behavior if so desired.
                    https://redmine.pfsense.org/issues/10931

                    If you only want pfsense, even for its own look ups - when it checks for updates, when you grab package list, if you click resolve some IP in the firewall log, etc. Anything that pfsense might try and resolve on its own. Aliases for example..

                    Then you would set the option to only put loopback (127.0.0.1) in resolv.conf

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.