Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Filterdns has stopped resolving hostnames in firewall aliases

    Scheduled Pinned Locked Moved DHCP and DNS
    24 Posts 5 Posters 2.3k Views 5 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S Offline
      slu @SteveITS
      last edited by

      @SteveITS did you test/saw this:
      https://docs.netgate.com/pfsense/en/latest/troubleshooting/filterdns-thread-errors.html

      Maybe we hit a limit because of pfBlockerNG?

      pfSense Gold subscription

      S 1 Reply Last reply Reply Quote 0
      • S Offline
        SteveITS Galactic Empire @slu
        last edited by

        @slu That's the "Unable to create monitoring thread" error; not seeing that here.

        Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
        Upvote ๐Ÿ‘ helpful posts!

        S 1 Reply Last reply Reply Quote 0
        • S Offline
          slu @SteveITS
          last edited by

          @SteveITS not seeing this error, but I increase the value anyway and for the moment both systems working again. Monitoring that for the next days...

          pfSense Gold subscription

          1 Reply Last reply Reply Quote 0
          • GertjanG Offline
            Gertjan @slu
            last edited by

            @slu said in Filterdns has stopped resolving hostnames in firewall aliases:

            Maybe this is the issue, because ACME doesn't work if all lists are enabled/blocked.

            I've checked them all, and activated, for years now :

            d96deaf1-e558-4e6a-9680-b0a8f6951c16-image.png

            I also use the ACME pfSense package for a long time now.
            No issues what so ever.

            the acme.sh shell script uses the available DNS to find the Letsencrypt server (or alternative) for the renewal request. As pfSense resolves by default, it doesn't care and won't use any 'DoH' DNS servers.

            If you set up pfSense, the resolver, as a forwarder, and you forward to a 'DoH/DoT/DoQ' listed server, then unlist that DNS server.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            S 1 Reply Last reply Reply Quote 0
            • S Offline
              slu @Gertjan
              last edited by slu

              @Gertjan said in Filterdns has stopped resolving hostnames in firewall aliases:

              I also use the ACME pfSense package for a long time now.
              No issues what so ever.

              Off topic:
              Thanks for the feedback, interesting this works in your setup. For some reason the ACME script try different DNS server and get a timeout because pfBlockerNG reply (for example) for one.one.one.one NXDOMAIN. Maybe its relevant how ACME is configured.

              Since we use the DNS servers from our ISP this can't be the issue here.

              pfSense Gold subscription

              GertjanG 1 Reply Last reply Reply Quote 0
              • GertjanG Offline
                Gertjan @slu
                last edited by

                @slu said in Filterdns has stopped resolving hostnames in firewall aliases:

                aybe its relevant how ACME is configured.

                Nice catch !
                This :

                7f044d98-4fe3-4b61-9697-d44d3c9bd573-image.png

                implies that when you set DNS Sleep to '0', it's the script itself that starts polling every 'x' seconds the domain name servers.
                If its using one of the Doh etc, (which you've blocked with pfBlockerng) then yeah, that fails ...

                Set DNS Sleep to "200" or so and solved ^^

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                1 Reply Last reply Reply Quote 1
                • S SteveITS referenced this topic on
                • O Offline
                  ohbobva @SteveITS
                  last edited by

                  @SteveITS This has been an issue for me for YEARS. But it only crops up every so often (like today). It's long enough apart that I forget about the filterdns issue and waste several hours looking at the wrong things.

                  Maybe I just need to set up a cron job to kill and restart filterdns every hour? Would that work? Break something else?

                  S 1 Reply Last reply Reply Quote 0
                  • S SteveITS referenced this topic
                  • S SteveITS referenced this topic
                  • S Offline
                    SteveITS Galactic Empire @ohbobva
                    last edited by

                    I ran across https://redmine.pfsense.org/issues/14734 which sounds like a possible cause...the IP is incorrectly removed if an FQDN resolving to it changes IPs.

                    Also per https://forum.netgate.com/topic/199152/unexpected-alias-behaviour-two-ranges/ aliases that contain IPs and an FQDN may fail to populate all the IPs.

                    Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
                    Upvote ๐Ÿ‘ helpful posts!

                    S 1 Reply Last reply Reply Quote 0
                    • S Offline
                      SteveITS Galactic Empire @SteveITS
                      last edited by

                      14734 was marked as a duplicate of https://redmine.pfsense.org/issues/13792.

                      I am trying to think of a way around that...have a separate alias+rule for FQDNs that might ever overlap, say for each laptop...?

                      Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                      When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
                      Upvote ๐Ÿ‘ helpful posts!

                      P 1 Reply Last reply Reply Quote 0
                      • P Offline
                        Patch @SteveITS
                        last edited by Patch

                        Agree
                        That bug really does make alias much less useful. Two example I currently use aliases for which will fail with this bug

                        White list for remote access to work server from periheral sites. The laptops will roam between sites

                        • Peripheral site DDNS FQDN
                        • Peripheral site relatively static IPv4 addresses
                        • Laptop 1 DDNS FQDN
                        • Laptop 1 DDNS FQDN

                        White list from a VoIP supplier with redundant servers in multiple cities. During fault conditions the supplier redirects traffic to better functioning servers in another city

                        • city1.Voipsuppler.com
                        • city2.Voipsuppler.com
                        • city3.Voipsuppler.com
                        • city4.Voipsuppler.com
                        • city5.Voipsuppler.com
                        • city6.Voipsuppler.com
                        • city7.Voipsuppler.com
                        • city8.Voipsuppler.com

                        Imo
                        The variable FQDN component of an alias should be completely recalculated from scratch then combined with the constant (explicitly specified) IPs each time. After which only changes from the current IP addressees written to filterdns to update the firewall filtering.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.