Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Forced to use TCP 853 over VPN connections after enabling DoT(DNS over TLS)

    Scheduled Pinned Locked Moved IPsec
    3 Posts 2 Posters 980 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Alejo 0A
      Alejo 0
      last edited by

      Greetings everyone,

      I am using a remote access IPsec VPN and it works really well, the only problem is that when I enable the option Respond to incoming SSL/TLS queries from local clients on the DNS Resolver section, port 53 UDP closes and 853 TCP opens up forcing remote access connections to use DoT for name resolution.

      The LAN is unaffected, port 53 UDP remains available on top of the newly available 853 TCP after enabling said option.

      Is this normal DNS Resolver behaviour after enabling this option for IPsec or am I doing something wrong with my current configuration ?

      For information I am using the current config:

      DNS Resolver[√] : Network Interfaces -> ALL; Outgoing Network Interfaces -> ALL;
      DNS Forwarder: Disabled

      Under System > General setup:
      DNS Override: [√] Allow DNS server list to be overridden by DHCP/PPP on WAN or remote OpenVPN server
      DNS Resolution Behavior: [Use loca DNS(127.0.0.1), fall back to remote DNS Servers(default)]

      Under IPsec > Mobile:
      SplitDNS [Unchecked]
      DNS Servers [√] > Server#1 : Firewall's Local IP

      I am also running pfBlockerNG-devel

      Thanks in advance !

      The darker the night, the brighter the stars.

      1 Reply Last reply Reply Quote 1
      • Alejo 0A
        Alejo 0
        last edited by

        We figured it out thus I will be posting our solution here in case anyone finds the same issue in the future.

        Basically once the DoT option is enabled unbound changes behavoir because of the way is implemented in pfSense software. See: https://redmine.pfsense.org/issues/13393

        To make sure enabling DoT works, you should choose specific network interface(s) to which the DNS Resolver will bind when listening for queries from clients and not listening on ALL interfaces, i.e DNS Resolver > Network Interfaces > ALL , which is the default option for pfSense.

        In short changing our DNS Resolver's listening interfaces from ALL to just the LAN, DMZ and localhost solved the issue.

        Hope this helps,

        Alejandro

        The darker the night, the brighter the stars.

        1 Reply Last reply Reply Quote 2
        • S
          seanmcb
          last edited by

          This post is deleted!
          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.