Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Slow local DNS lookup

    Scheduled Pinned Locked Moved DHCP and DNS
    21 Posts 3 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @Antibiotic
      last edited by johnpoz

      @Antibiotic just to be complete, I added my homeCA to trusted, and now it validated the cert and trusts it

      user@UC:/$ kdig -d @192.168.2.253 +tls-ca +tls-host=doh.home.arpa nas.home.arpa
      ;; DEBUG: Querying for owner(nas.home.arpa.), class(1), type(1), server(192.168.2.253), port(853), protocol(TCP)
      ;; DEBUG: TLS, imported 147 system certificates
      ;; DEBUG: TLS, received certificate hierarchy:
      ;; DEBUG:  #1, CN=doh.home.arpa,C=US,ST=IL,L=Schaumburg,O=Home,OU=Home CA
      ;; DEBUG:      SHA-256 PIN: 1ooj7dE/is2fHGbRskOqdnb2Cg4OFm/93Pzy0MNObLk=
      ;; DEBUG: TLS, skipping certificate PIN check
      ;; DEBUG: TLS, The certificate is trusted. 
      ;; TLS session (TLS1.3)-(ECDHE-SECP256R1)-(ECDSA-SECP256R1-SHA256)-(AES-256-GCM)
      ;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 1939
      ;; Flags: qr aa rd ra; QUERY: 1; ANSWER: 1; AUTHORITY: 0; ADDITIONAL: 1
      
      ;; EDNS PSEUDOSECTION:
      ;; Version: 0; flags: ; UDP size: 4096 B; ext-rcode: NOERROR
      ;; PADDING: 406 B
      
      ;; QUESTION SECTION:
      ;; nas.home.arpa.               IN      A
      
      ;; ANSWER SECTION:
      nas.home.arpa.          3600    IN      A       192.168.9.10
      
      ;; Received 468 B
      ;; Time 2024-11-04 11:00:02 CST
      ;; From 192.168.2.253@853(TCP) in 43.8 ms
      user@UC:/$ 
      

      Notice it listed 147 now, since I added my homeca

      This is how sane client doing dot or doh should function, the cert being used should match cn/san and the CA that signed/issued that cert should be trusted by the system. Off the top I am not sure if when you forward with unbound if either of those is being done.. I am not a fan of doh or dot, I have no actual use case for them.. I resolve.. Only reason I fired up unbond to be able to do doh and dot was as a learning experience.. I have a thread around here somewhere where went over how to let unbound serve up doh to your local network, etc. I don't actually use it.. but I set it up and it works.

      Normally clients themselves would use doh, dot is more for NS to NS.. while you can click to get dot working with unbound internally, you need to add couple custom options to have it do doh.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.