• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Setting low TTL to fix Squid issue

General pfSense Questions
4
23
2.0k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    michmoor LAYER 8 Rebel Alliance @JonathanLee
    last edited by michmoor Sep 19, 2023, 2:25 PM Sep 19, 2023, 2:23 PM

    @JonathanLee I block as much DoH as i can based on the pfblocker filter ive applied.
    My upstream DNS is CloudFlare. I am not using my ISP dns servers.
    I am already blocking external DNS and DoT.

    I created a floating rule
    login-to-view

    I created an alias deny
    login-to-view

    Custom Unbound settings
    login-to-view

    Firewall: NetGate,Palo Alto-VM,Juniper SRX
    Routing: Juniper, Arista, Cisco
    Switching: Juniper, Arista, Cisco
    Wireless: Unifi, Aruba IAP
    JNCIP,CCNP Enterprise

    M 1 Reply Last reply Sep 19, 2023, 2:51 PM Reply Quote 0
    • M
      michmoor LAYER 8 Rebel Alliance @michmoor
      last edited by michmoor Sep 19, 2023, 3:20 PM Sep 19, 2023, 2:51 PM

      @michmoor said in Setting low TTL to fix Squid issue:
      @JonathanLee

      So a common problem which i really dont know why it happens is why there is a problem specifically with Chrome.
      Chrome will clearly be in conflict with whats in the dns cache and here are the errors
      For example, if i visit Twitter (X) i am unable to load any pictures or video.
      Wireshark reveals the reason why.
      Its always DNS. :)

      Problem outlined: https://www.squid-cache.org/Doc/config/host_verify_strict/
      Dont really know how to implement this host verify strict command..

      login-to-view

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      J 1 Reply Last reply Sep 19, 2023, 11:10 PM Reply Quote 1
      • J
        JonathanLee @michmoor
        last edited by JonathanLee Sep 19, 2023, 11:19 PM Sep 19, 2023, 11:10 PM

        @michmoor

        http://www.squid-cache.org/Doc/config/host_verify_strict/

        Have you attempted to set this in advanced options to on or off? It's default is off. I am having this same issue with Apple music and mzstatic making it's own get requests.

        https://forum.netgate.com/topic/182866/universal-procedure-pointers-upp-mzstatic-com-s-mode-of-access-redirector-question/

        I am having the opposite it's apparently approving connection as splice with the same IP sometimes.

        I think under advanced options is where it needs to be.

        host_verify_strict on
        host_verify_strict off

        Make sure to upvote

        M 1 Reply Last reply Sep 20, 2023, 12:36 AM Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @JonathanLee
          last edited by michmoor Sep 20, 2023, 12:38 AM Sep 20, 2023, 12:36 AM

          @JonathanLee I did apply it under advanced options but doesnt seem to have any impact. I still get the /409 errors.
          Do you know where the squid conf file is? I wonder if its really set..

          i got so desperate i set it in each box lol

          login-to-view

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          M J 2 Replies Last reply Sep 20, 2023, 12:50 AM Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @michmoor
            last edited by Sep 20, 2023, 12:50 AM

            But to my point about devices with hard coded dns servers

            Look at this. My IoT television gets its DHCP from my pfsenese. Pfsense hands its IP out as the DNS server yet as you can see from pfblocker its still requesting a google dns.
            Its hard coded in a lot of these devices which is an issue but dont think thats why squid breaks.

            login-to-view

            login-to-view

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            J 2 Replies Last reply Sep 20, 2023, 5:32 AM Reply Quote 0
            • J
              JonathanLee @michmoor
              last edited by Sep 20, 2023, 3:10 AM

              @michmoor

              Try

              /usr/local/etc/squid/squid.conf
              login-to-view

              Make sure to upvote

              1 Reply Last reply Reply Quote 1
              • J
                JonathanLee @michmoor
                last edited by Sep 20, 2023, 5:32 AM

                @michmoor

                I wanted to check with you on Netflix, I forgot to mention I have Hulu and other streaming services set to no cache. Are you attempting to cache Netflix?

                I set them to never cache on Squid

                login-to-view

                Did you set a NAT for the DNS rules to force all devices to use the firewall?

                That should help if you NAT it.

                Make sure to upvote

                1 Reply Last reply Reply Quote 0
                • J
                  JonathanLee @michmoor
                  last edited by JonathanLee Sep 20, 2023, 6:54 AM Sep 20, 2023, 5:43 AM

                  @michmoor Are you blocking port 53 for 8.8.8.8? it shows a red lock, it should only block port 443 for 8.8.8.8, 53 is the standard or if you use dns over tls ssl 853 that might be the issue, TheGreatWall_DoH is blocking standard port 53 over just the 443 DoH access.

                  Create a NAT rule for all DNS requests that are not being sent to the firewall or it's loopback. And force it to go to the firewall.

                  Make sure to upvote

                  M 1 Reply Last reply Sep 20, 2023, 2:36 PM Reply Quote 0
                  • N
                    NollipfSense
                    last edited by Sep 20, 2023, 1:51 PM

                    Interesting conversation here, indeed...thanks for sharing!

                    pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                    pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                    1 Reply Last reply Reply Quote 2
                    • M
                      michmoor LAYER 8 Rebel Alliance @JonathanLee
                      last edited by Sep 20, 2023, 2:36 PM

                      @JonathanLee
                      Im blocking 53 and 443
                      The red lock in pfblocker should indicate that traffic is being blocked - sinkholed so dont think theres any worry about that.

                      login-to-view

                      Floating Rule

                      login-to-view

                      So in my case theres no reason i can think of to use Port Forards.

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      J 1 Reply Last reply Sep 20, 2023, 2:42 PM Reply Quote 0
                      • J
                        JonathanLee @michmoor
                        last edited by Sep 20, 2023, 2:42 PM

                        @michmoor with pfBlocker don't you still need to redirect the clients that are ignoring the DNS settings still? That is interesting, I always have clients that will attempt to use a different DNS all the time with NAT it doesn't matter they go where I configured them too unless they use some new experimental protocol.

                        Make sure to upvote

                        M 1 Reply Last reply Sep 20, 2023, 2:45 PM Reply Quote 0
                        • M
                          michmoor LAYER 8 Rebel Alliance @JonathanLee
                          last edited by Sep 20, 2023, 2:45 PM

                          @JonathanLee I will try adding a nat redirect just to test to see if it makes things better.

                          To your other question, i am not using Squid Proxy to cache anything.

                          login-to-view

                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                          Routing: Juniper, Arista, Cisco
                          Switching: Juniper, Arista, Cisco
                          Wireless: Unifi, Aruba IAP
                          JNCIP,CCNP Enterprise

                          J 1 Reply Last reply Sep 20, 2023, 2:47 PM Reply Quote 0
                          • J
                            JonathanLee @michmoor
                            last edited by Sep 20, 2023, 2:47 PM

                            @michmoor I love the cache I have DSL/ copper it acts as an accelerator

                            Make sure to upvote

                            M 1 Reply Last reply Sep 20, 2023, 3:07 PM Reply Quote 0
                            • M
                              michmoor LAYER 8 Rebel Alliance @JonathanLee
                              last edited by Sep 20, 2023, 3:07 PM

                              @JonathanLee ahhh
                              Im on 500/500 Fiber.

                              Firewall: NetGate,Palo Alto-VM,Juniper SRX
                              Routing: Juniper, Arista, Cisco
                              Switching: Juniper, Arista, Cisco
                              Wireless: Unifi, Aruba IAP
                              JNCIP,CCNP Enterprise

                              1 Reply Last reply Reply Quote 0
                              19 out of 23
                              • First post
                                19/23
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.