Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Protecting DNS servers behind pfSense.

    Scheduled Pinned Locked Moved DHCP and DNS
    14 Posts 4 Posters 2.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J Offline
      Joschide
      last edited by

      @chris4916:

      What do mean when writing "exposure"?

      I'm hosting 2 DNS Servers.  I only want to allow DNS queries from the internet to my DNS server if they are for mydomain.com or mydomain.net, etc…

      1 Reply Last reply Reply Quote 0
      • C Offline
        chris4916
        last edited by

        @Joschide:

        I'm hosting 2 DNS Servers.  I only want to allow DNS queries from the internet to my DNS server if they are for mydomain.com or mydomain.net, etc…

        This is usually done using "views" AKA split-DNS which allows to sned back different answer to DNS request depending on requester source. But not available with either DNS Resolver or Forwarder.
        What's your DNS software?

        Jah Olela Wembo: Les mots se muent en maux quand ils indisposent, agressent ou blessent.

        1 Reply Last reply Reply Quote 0
        • J Offline
          Joschide
          last edited by

          @chris4916:

          What's your DNS software?

          Currently, windows server DNS

          1 Reply Last reply Reply Quote 0
          • C Offline
            chris4916
            last edited by

            Oh! I realize that your question is not to prevent "exposure" but to only resolve local domain for local clients, meaning your DNS is not exposed to internet  :-[
            Am I correct?

            Jah Olela Wembo: Les mots se muent en maux quand ils indisposent, agressent ou blessent.

            1 Reply Last reply Reply Quote 0
            • J Offline
              Joschide
              last edited by

              Yes they are exposed to the internet.  They are the SOA for my hosted domains :)  Perhaps, what I'm asking to do is not really necessary?  I was able to do this in my Watchguard firewall.  I assumed it was a good practice and wanted to do it with pfsense.

              1 Reply Last reply Reply Quote 0
              • M Offline
                muswellhillbilly
                last edited by

                Not really a pfSense question. But perhaps this might help.

                https://technet.microsoft.com/en-us/library/cc786343%28v=ws.10%29.aspx

                1 Reply Last reply Reply Quote 0
                • J Offline
                  Joschide
                  last edited by

                  @muswellhillbilly:

                  Not really a pfSense question. But perhaps this might help.

                  https://technet.microsoft.com/en-us/library/cc786343%28v=ws.10%29.aspx

                  Thank you for the link.  I didn't know if it was possible in pfSense.  It was easy enough in my old Watchguard firewall :)

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ Online
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    "For example, only allow DNS queries for my domains."

                    So you don't want to allow recursive, ie you are authoritative for domain.tld and you don't want people to ask you for google.com – that is configured in your dns server..  While it could be possible with a application firewall to inspect every dns query and not send it to the name server if a recursive query for something other than your domain.. That is not the design of pfsense..

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

                    1 Reply Last reply Reply Quote 0
                    • J Offline
                      Joschide
                      last edited by

                      @johnpoz:

                      "For example, only allow DNS queries for my domains."

                      So you don't want to allow recursive, ie you are authoritative for domain.tld and you don't want people to ask you for google.com – that is configured in your dns server..  While it could be possible with a application firewall to inspect every dns query and not send it to the name server if a recursive query for something other than your domain.. That is not the design of pfsense..

                      Okay thank you for your response.

                      1 Reply Last reply Reply Quote 0
                      • C Offline
                        chris4916
                        last edited by

                        @Joschide:

                        Yes they are exposed to the internet.  They are the SOA for my hosted domains :)  Perhaps, what I'm asking to do is not really necessary?  I was able to do this in my Watchguard firewall.  I assumed it was a good practice and wanted to do it with pfsense.

                        I don't understand how firewall could implement such feature.
                        FW can, obviously control source and destination in term of port and address but can't do anything at protocol level. Th best you can do is to ensure that only requests on port 53 are allowed from internet to your internal DNS server (assuming this server in on DMZ or specific network)

                        Jah Olela Wembo: Les mots se muent en maux quand ils indisposent, agressent ou blessent.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ Online
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          you would need a application layer firewall that could look at the traffic and determine if should be allowed.. That is not the function of pfsense firewall.

                          Watchguard has what they call application control
                          http://www.watchguard.com/solutions/business-need/application-control.asp

                          Which could allow you to do such a thing.

                          Watchguard also has a dns proxy that he could of been using even inbound to his dns that allows for limits on types of queries.  Again pfsense has no feature.
                          http://www.watchguard.com/help/docs/wsm/xtm_11/en-US/index.html#cshid=en-US/proxies/dns/dns_proxy_query_types_c.html

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

                          1 Reply Last reply Reply Quote 0
                          • J Offline
                            Joschide
                            last edited by

                            @johnpoz:

                            you would need a application layer firewall that could look at the traffic and determine if should be allowed.. That is not the function of pfsense firewall.

                            Watchguard has what they call application control
                            http://www.watchguard.com/solutions/business-need/application-control.asp

                            Which could allow you to do such a thing.

                            Watchguard also has a dns proxy that he could of been using even inbound to his dns that allows for limits on types of queries.  Again pfsense has no feature.
                            http://www.watchguard.com/help/docs/wsm/xtm_11/en-US/index.html#cshid=en-US/proxies/dns/dns_proxy_query_types_c.html

                            Correct.  Thank you johnpoz

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.