Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS error

    Scheduled Pinned Locked Moved DHCP and DNS
    10 Posts 2 Posters 541 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      Antibiotic
      last edited by Antibiotic

      Hi, dns log show this error

      unbound 83870 [83870:2] error: SSL_write syscall: Permission denied

      What it mean,before never see this error type on my pfsense. Unbound resolver working in forward mode to upstream dns in general settings

      Screenshot_13-5-2024_191756_192.168.20.1.jpeg

      c1b1a050-4bd5-497f-83c2-3c8c573acf74-image.png

      pfSense plus 24.11 on Topton mini PC
      CPU: Intel N100
      NIC: Intel i-226v 4 pcs
      RAM : 16 GB DDR5
      Disk: 128 GB NVMe
      Brgds, Archi

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @Antibiotic
        last edited by

        @Antibiotic said in DNS error:

        unbound 83870 [83870:2] error: SSL_write syscall: Permission denied

        It could be as simple as : "the TCP connection, SSL secured" broke, as Internet is a rough place and SSL (TLS) is highly sensible, and unbound complains.
        Knowing that two of the possible outgoing connections go over a VPN, changes are bigger (as the path is way more complicated).

        Keep in mind : complex setup tend to break faster. Stay on KIS road, and you've more time left to do other things^^

        Couldn't find much info.

        Btw : both the reverse of 1.1.1.1 and 1.0.0.1 is not cloudflare-dns,com but "one.one.one.one".

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        A 3 Replies Last reply Reply Quote 0
        • A
          Antibiotic @Gertjan
          last edited by

          @Gertjan Ok , did KIS

          9a5a1fdb-981e-4751-8256-fb89e4b7c7ec-image.png

          pfSense plus 24.11 on Topton mini PC
          CPU: Intel N100
          NIC: Intel i-226v 4 pcs
          RAM : 16 GB DDR5
          Disk: 128 GB NVMe
          Brgds, Archi

          1 Reply Last reply Reply Quote 0
          • A
            Antibiotic @Gertjan
            last edited by

            @Gertjan said in DNS error:

            Btw : both the reverse of 1.1.1.1 and 1.0.0.1 is not cloudflare-dns,com but "one.one.one.one".

            Lol, always set cloudflare-dns.com fot tls over dns

            pfSense plus 24.11 on Topton mini PC
            CPU: Intel N100
            NIC: Intel i-226v 4 pcs
            RAM : 16 GB DDR5
            Disk: 128 GB NVMe
            Brgds, Archi

            GertjanG 1 Reply Last reply Reply Quote 0
            • A
              Antibiotic @Gertjan
              last edited by Antibiotic

              @Gertjan BTW is any benefits to increase in dns resolver settings "Number of Queries per Thread" default is 512. Lets say up to 1024? Home user not a server production

              pfSense plus 24.11 on Topton mini PC
              CPU: Intel N100
              NIC: Intel i-226v 4 pcs
              RAM : 16 GB DDR5
              Disk: 128 GB NVMe
              Brgds, Archi

              1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan @Antibiotic
                last edited by

                @Antibiotic said in DNS error:

                Lol, always set cloudflare-dns.com fot tls over dns

                It's just my brain that tells me : when you (unbound) uses TLS, it will get a cert from the other side.
                The cert contains a 'host name' (one.one.one.one) and this one.one.one.one resolves to .... aha : 1.1.1.1 : so the connection is ok, unbound speaks to the one he wants to talk to (and the resverse of 1.1.1.1 is ... one.one.one.one. Great.

                Like https.

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                A 1 Reply Last reply Reply Quote 0
                • A
                  Antibiotic @Gertjan
                  last edited by Antibiotic

                  @Gertjan How to check with my new settings, that resolve correctly DOT now via DNS server hostname?

                  pfSense plus 24.11 on Topton mini PC
                  CPU: Intel N100
                  NIC: Intel i-226v 4 pcs
                  RAM : 16 GB DDR5
                  Disk: 128 GB NVMe
                  Brgds, Archi

                  GertjanG 1 Reply Last reply Reply Quote 0
                  • GertjanG
                    Gertjan @Antibiotic
                    last edited by

                    @Antibiotic

                    With this :

                    be268eaf-1eef-42d7-bcfe-7e4502c6b94e-image.png

                    you set it up like this :

                    9aa3becc-8466-4817-b40d-d03583dc60c3-image.png

                    ?
                    So, in short, forwarding to 194.242.2.4, using TLS.

                    Here's one, execute it on pfSense :

                    dig @127.0.0.1 www.google.com +trace
                    

                    Also : check every device connected to pfSense, and check every application (system, browser, everything) that it using the pfSense IP as a DNS.
                    Be aware that browser, when you install them these days, can do (will do) DOT/DOH themselves, completely bypassing pfSense, bypassing unbound (and where unbound forwards to = your 194.242.2.4)
                    A way to check this : look it up :

                    74ef35eb-0238-4e70-9c9b-5bbc65524652-image.png

                    Packet capture traffic on LAN that has a destination, using port 853 (DOT), and let it run for a while.
                    If lines get logged; devices are doing DOT.
                    DOH is more difficult, as these could be classic https requests.
                    And you can't have access to the payload, as it is TLS ;)
                    I block on my LAns most DOT/DOH using pfBlockerng, forcing my LAN devices to uses classic "port 53", so unbound can do its thing.

                    Btw : KIS isn't even forwarding. Its resolving (that's why unbound was used : its a resolver 😊 ).

                    No "help me" PM's please. Use the forum, the community will thank you.
                    Edit : and where are the logs ??

                    A 2 Replies Last reply Reply Quote 0
                    • A
                      Antibiotic @Gertjan
                      last edited by

                      @Gertjan said in DNS error:

                      dig @127.0.0.1 www.google.com +trace

                      What have now:

                      ; <<>> DiG 9.18.20 <<>> @127.0.0.1 www.google.com +trace
                      ; (1 server found)
                      ;; global options: +cmd
                      . 1213 IN NS e.root-servers.net.
                      . 1213 IN NS m.root-servers.net.
                      . 1213 IN NS i.root-servers.net.
                      . 1213 IN NS a.root-servers.net.
                      . 1213 IN NS c.root-servers.net.
                      . 1213 IN NS f.root-servers.net.
                      . 1213 IN NS k.root-servers.net.
                      . 1213 IN NS d.root-servers.net.
                      . 1213 IN NS g.root-servers.net.
                      . 1213 IN NS b.root-servers.net.
                      . 1213 IN NS j.root-servers.net.
                      . 1213 IN NS l.root-servers.net.
                      . 1213 IN NS h.root-servers.net.
                      . 1213 IN RRSIG NS 8 0 518400 20240526170000 202 40513160000 5613 . IiMf9tIbZ472c1VluFXMSiqPKqBsYj036EOMEhVb1GzkE+KOF3CE3XOd 6Uq3 jirWQYXzKumY2Zv9nICGSNpz7dBmoZfPcO0gEKhNaO4kvI5Sd9Xo L8vHmJLT/DXKNbj0N/Jb8Ugimn6 hzn+EgUgcWkzi3/UbfG3S3PatTsN5 Ao+bAUYlTnEYmVmSvLbXICRebu5pw5fKezh45+MtSSb7IVQrTg BEcdwP sXURDTv0V+6gKSj2eN0lyOwRzj1HTSMBEOah2ZiPsuVhncZqkU34ctQV 1fEuNqreLTTf2AHP iV3WEv1ZYENFM3DW6zkAXBWxNZwGFX81GoC91ZbL E27KjQ==
                      ;; Received 1097 bytes from 127.0.0.1#53(127.0.0.1) in 60 ms

                      ;; communications error to 192.112.36.4#53: connection refused
                      ;; communications error to 192.112.36.4#53: connection refused
                      ;; communications error to 192.112.36.4#53: connection refused
                      ;; communications error to 199.7.83.42#53: connection refused
                      ;; communications error to 199.7.91.13#53: connection refused
                      Is it OK?

                      pfSense plus 24.11 on Topton mini PC
                      CPU: Intel N100
                      NIC: Intel i-226v 4 pcs
                      RAM : 16 GB DDR5
                      Disk: 128 GB NVMe
                      Brgds, Archi

                      1 Reply Last reply Reply Quote 0
                      • A
                        Antibiotic @Gertjan
                        last edited by Antibiotic

                        @Gertjan said in DNS error:

                        Also : check every device connected to pfSense, and check every application (system, browser, everything) that it using the pfSense IP as a DNS.
                        Be aware that browser, when you install them these days, can do (will do) DOT/DOH themselves, completely bypassing pfSense, bypassing unbound (and where unbound forwards to = your 194.242.2.4)

                        With my rules, I think impossible to bypass))

                        cc42b186-3fb3-4a7e-9b9b-55d32d494497-image.png

                        639afd55-7c87-4f17-bca9-236d70a91f45-image.png

                        10795f50-6b06-414c-b6df-af852d980f6b-image.png

                        d5047651-cb0d-45b9-83c0-b2cc98489805-image.png

                        pfSense plus 24.11 on Topton mini PC
                        CPU: Intel N100
                        NIC: Intel i-226v 4 pcs
                        RAM : 16 GB DDR5
                        Disk: 128 GB NVMe
                        Brgds, Archi

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.