• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Enabling DNS SSL/TLS Local Client

Scheduled Pinned Locked Moved DHCP and DNS
13 Posts 3 Posters 1.2k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • N
    NollipfSense
    last edited by Feb 19, 2022, 5:34 PM

    To enable DNS resolving via SSL/TLS for local client, all I need to do is check the box, pick the certificate for the local client...no need for firewall rule...correct?

    Screen Shot 2022-02-19 at 11.31.10 AM.png

    pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
    pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

    1 Reply Last reply Reply Quote 0
    • N
      NollipfSense
      last edited by Feb 20, 2022, 6:32 PM

      Well, it needs a bit more configuring per here: https://docs.netgate.com/pfsense/en/latest/services/dns/resolver-config.html

      However, even after doing all has required, I still get connection timeout; so, the problem could be FreePBX firewall...not sure what's going on. I find FreePBX to be finicky, indeed.

      pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
      pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

      1 Reply Last reply Reply Quote 0
      • N
        NollipfSense
        last edited by NollipfSense Feb 20, 2022, 10:17 PM Feb 20, 2022, 10:15 PM

        So, I enabled DHCP static mapping, cleared the browser cache yet the freepbx domain name will not resolve locally. Then, I did a packer capture on port 853 while directing the browser to go to the address, nothing appeared when view capture, just empty, don't know what else to do...pfSense isn't doing anything either...any suggestions?

        Screen Shot 2022-02-20 at 3.52.30 PM.png
        Screen Shot 2022-02-20 at 3.58.41 PM.png
        Screen Shot 2022-02-20 at 12.08.12 PM.png

        pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
        pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

        1 Reply Last reply Reply Quote 0
        • N
          NollipfSense
          last edited by Feb 21, 2022, 8:21 PM

          So, no matter what DNS resolution behavior I set, whether use local (127.0.0.1), fall back to remote DNS or use local DNS, ignore remote DNS servers, local DNS always takes the longest and lands on the A record address instead on local IP address. I see why the browser would timeout with an error. Anyone knows why? Is it because of how domain zone was set up to point to the A record? Should I have a firewall rule to reject all other DNS request?

          Screen Shot 2022-02-21 at 9.39.38 AM.png
          Screen Shot 2022-02-21 at 9.31.38 AM.png
          Screen Shot 2022-02-21 at 9.37.38 AM.png
          Screen Shot 2022-02-21 at 10.18.22 AM.png

          pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
          pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

          J 1 Reply Last reply Feb 21, 2022, 8:28 PM Reply Quote 0
          • J
            johnpoz LAYER 8 Global Moderator @NollipfSense
            last edited by johnpoz Feb 21, 2022, 8:58 PM Feb 21, 2022, 8:28 PM

            @nollipfsense your client asking on 53 udp going to be DoT? (dns over tls)?

            That port would be 853.. Did you tell your client to use DoT and point it to pfsense? Does you client even support DoT?

            Why would you think you would want or need to use DoT over your local network?

            Not sure why anyone would want/need to do this.. But here using kdig which allows for easy testing of dot or doh sort of connections. I enabled unbound to listen on tcp 853, just using the same cert as my web gui, a cert I signed with my own ca..

            unboundsettings.jpg

            Now I on my client I do a dot connection to pfsense on interface I am listening on, in this case 192.168.2.253 (yes this is allowed on the firewall rules on that interface).. You can see it validates the cert, and trusts it because I told it to use my CA cert.. And looks up www.google.com just fine.

            dottest.jpg

            But for the life of me can not figure out why you think your pbx needs to do dot locally?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            N 1 Reply Last reply Feb 21, 2022, 9:17 PM Reply Quote 0
            • N
              NollipfSense @johnpoz
              last edited by Feb 21, 2022, 9:17 PM

              @johnpoz It seems that there are problems with the certificate...I get what appears half-right, half timeout so unable to verify. Not sure what all that means and why. I did a verification test from FreePBX CLI and it seems that I need to sort the problem out first:

              openssl s_client -connect nollivoipserver.nollicomm.net:443...got:
              depth=0 CN = nollivoipserver.nollicomm.net
              verify error:num=20:unable to get local issuer certificate
              verify return:1
              depth=0 CN = nollivoipserver.nollicomm.net
              verify error:num=21:unable to verify the first certificate
              verify return:1

              Certificate chain
              0 s:/CN=nollivoipserver.nollicomm.net
              i:/C=US/O=Let's Encrypt/CN=R3

              Screen Shot 2022-02-21 at 2.39.11 PM.png

              pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
              pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

              J 1 Reply Last reply Feb 21, 2022, 9:43 PM Reply Quote 0
              • J
                johnpoz LAYER 8 Global Moderator @NollipfSense
                last edited by johnpoz Feb 21, 2022, 9:45 PM Feb 21, 2022, 9:43 PM

                @nollipfsense I would think that is on your client then..

                I don't have any problems validating connecting to my acme certs on pfsense (use them in haproxy)

                user@NewUC:~$ openssl s_client -connect overseerr.snipped:443
                CONNECTED(00000003)
                depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
                verify return:1
                depth=1 C = US, O = Let's Encrypt, CN = R3
                verify return:1
                depth=0 CN = overseerr.snipped
                verify return:1
                ---
                Certificate chain
                 0 s:CN = overseerr.snipped
                   i:C = US, O = Let's Encrypt, CN = R3
                 1 s:C = US, O = Let's Encrypt, CN = R3
                   i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
                 2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
                   i:O = Digital Signature Trust Co., CN = DST Root CA X3
                ---
                

                None which has anything to do with your client doing a query on UDP 53 when your trying to do DoT which would be TCP over 853..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                N 1 Reply Last reply Feb 22, 2022, 3:18 PM Reply Quote 0
                • N
                  NollipfSense @johnpoz
                  last edited by Feb 22, 2022, 3:18 PM

                  @johnpoz said in Enabling DNS SSL/TLS Local Client:

                  I would think that is on your client then..

                  Yes John, it was the client, but also my fault. I forgot to paste the CA into FreePBX so that made it untrustworthy to pfSense which turned to the outside for resolving. It will take a few days to fix since it took me on a wild goose chase diagnosing while other work projects got neglected.

                  pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                  pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                  1 Reply Last reply Reply Quote 0
                  • N
                    NollipfSense
                    last edited by NollipfSense Feb 23, 2022, 11:40 PM Feb 23, 2022, 11:13 PM

                    Got it working finally, wipe off sweat...what was missing is that I also needed to add a host override and that cost me lots of time. I am amazed that it still used DNS:53...wow! Hey @johnpoz why it's use DNS:53 despite checking SSL/TLS and port 853?

                    Screen Shot 2022-02-23 at 5.10.47 PM.png

                    Screen Shot 2022-02-23 at 5.25.48 PM.png

                    Screen Shot 2022-02-23 at 5.29.04 PM.png

                    pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                    pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                    J 1 Reply Last reply Feb 24, 2022, 7:39 AM Reply Quote 0
                    • J
                      johnpoz LAYER 8 Global Moderator @NollipfSense
                      last edited by Feb 24, 2022, 7:39 AM

                      @nollipfsense said in Enabling DNS SSL/TLS Local Client:

                      why it's use DNS:53 despite checking SSL/TLS and port 853?

                      You listening for dot on 853 has NOTHING to do with the client asking.. I find it hard to believe some pbx would even support dot.. And if it did - it would have to be setup to do that for sure..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      GertjanG N 2 Replies Last reply Feb 24, 2022, 9:25 AM Reply Quote 0
                      • GertjanG
                        Gertjan @johnpoz
                        last edited by Feb 24, 2022, 9:25 AM

                        @johnpoz said in Enabling DNS SSL/TLS Local Client:

                        why it's use DNS:53 despite checking SSL/TLS and port 853?

                        Who is "it" ?

                        When you set up a TLS web server on port 443, why is (was) everybody still using port 80 ?
                        Because clients do whatever they want !

                        With DNS, we can't redirect requests as we can do with web requests.

                        [2.6.0-RELEASE][admin@pfsense.local.net]/root: sockstat -4 | grep '853'
                        unbound  unbound    4826  5  udp4   *:853                 *:*
                        unbound  unbound    4826  6  tcp4   *:853                 *:*
                        

                        so now Unbound is listening on port 53 and 853 (TLS). Like a webserver on port 80 and 443 (TLS).

                        This doesn't mean that my LAN devices start to use it. I have to inform - set up - them one by one so they are aware that they can use DNS over TLS over port 853.

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        N 1 Reply Last reply Feb 24, 2022, 12:49 PM Reply Quote 0
                        • N
                          NollipfSense @johnpoz
                          last edited by Feb 24, 2022, 12:46 PM

                          @johnpoz said in Enabling DNS SSL/TLS Local Client:

                          You listening for dot on 853 has NOTHING to do with the client asking..

                          I discovered why I was seeing that early this morning...my laptop is behind Mikrotik...Thanks John.

                          pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                          pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                          1 Reply Last reply Reply Quote 0
                          • N
                            NollipfSense @Gertjan
                            last edited by Feb 24, 2022, 12:49 PM

                            @gertjan said in Enabling DNS SSL/TLS Local Client:

                            When you set up a TLS web server on port 443, why is (was) everybody still using port 80 ?
                            Because clients do whatever they want !

                            Thank you Gertjan, I discovered that early this morning.

                            pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                            pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                            1 Reply Last reply Reply Quote 0
                            1 out of 13
                            • First post
                              1/13
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                              This community forum collects and processes your personal information.
                              consent.not_received