1
23.7 Legacy Series / Re: Boot delay for WAN for slow modem calling in
« on: September 01, 2023, 09:51:08 am »
May this is a similar issue I have too: https://forum.opnsense.org/index.php?topic=35707.0
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
root@fw:~ # pkg info | grep wire
os-wireguard-1.11 WireGuard VPN service
wireguard-go-0.0.20220316_3,1 WireGuard implementation in Go
wireguard-kmod-0.0.20220615 WireGuard implementation for the FreeBSD kernel
wireguard-tools-1.0.20210914_1 Fast, modern and secure VPN Tunnel
root@fw:~ # opnsense-revert wireguard-kmod
Updating OPNsense repository catalogue...
OPNsense repository is up to date.
All repositories are up to date.
The following packages will be fetched:
New packages to be FETCHED:
wireguard-kmod: 0.0.20220615 (40 KiB: 100.00% of the 40 KiB to download)
Number of packages to be fetched: 1
40 KiB to be downloaded.
Fetching wireguard-kmod-0.0.20220615.pkg: 100% 40 KiB 40.6kB/s 00:01
wireguard-kmod-0.0.20220615: already unlocked
Updating OPNsense repository catalogue...
OPNsense repository is up to date.
All repositories are up to date.
Checking integrity... done (0 conflicting)
The following 1 package(s) will be affected (of 0 checked):
Installed packages to be REINSTALLED:
wireguard-kmod-0.0.20220615
Number of packages to be reinstalled: 1
[1/1] Reinstalling wireguard-kmod-0.0.20220615...
[1/1] Extracting wireguard-kmod-0.0.20220615: 100%
root@fw:~ # kldstat
Id Refs Address Size Name
1 51 0xffffffff80200000 215db98 kernel
2 1 0xffffffff8235e000 4b58 if_enc.ko
3 1 0xffffffff82363000 181d0 if_lagg.ko
4 2 0xffffffff8237c000 3538 if_infiniband.ko
5 1 0xffffffff82380000 e318 pfsync.ko
6 3 0xffffffff8238f000 741a8 pf.ko
7 1 0xffffffff82404000 3b18 pflog.ko
8 1 0xffffffff82408000 ba48 if_gre.ko
9 1 0xffffffff82414000 e4d0 if_bridge.ko
10 2 0xffffffff82423000 7870 bridgestp.ko
11 1 0xffffffff8242c000 f460 carp.ko
12 1 0xffffffff82a11000 3530 fdescfs.ko
13 1 0xffffffff82a15000 4480 vmmemctl.ko
14 1 0xffffffff82a1a000 4b58 vmblock.ko
15 1 0xffffffff82a1f000 3218 intpm.ko
16 1 0xffffffff82a23000 2180 smbus.ko
17 1 0xffffffff82a26000 7490 vmci.ko
18 1 0xffffffff82a2e000 34568 if_wg.ko
19 2 0xffffffff82a63000 27048 ipfw.ko
20 1 0xffffffff82a8b000 12520 dummynet.ko
can you please check again what kind of requests the unbound forwards exactly?
for example, the request forCode: [Select]server1.internal.my-domain.tld.my-domain.tld
should be forwarded. unbound does not own "tld.my-domain.tld" zone
real hostname: accesspoint1.internal.my-domain.tld
dns request on public resolver: accesspoint1.internal.my-domain.tld.my-domain.tld
The client who has made this DNS query is my monitoring system where hostname is specified as "accesspoint1.internal.my-domain.tld"a more radical way is also possible if there are few records for the domain on the external servers. in this case, you can take the entire "my-domain.tld" domain to static local-zone and add the required records to the host override
local-zone: "internal.my-domain.tld" static
local-zone: "dmz.my-domain.tld" static
server1.dmz.my-domain.tld.internal.my-domain.tld
server1.internal.my-domain.tld.my-domain.tld
server1.internal.my-domain.tld.dmz.my-domain.tld
google.com.my-domain.tld
so that requests to addresses for these domains are not forwarded imho you need to make local-zones with the "static" type for this domains (looks like there is no gui param for making this for domains from DHCP "domain search list" option. for System Domain it generates local-zone with "local zone type" from unbound general settings. ie at least for the system domain, you can set the zone type to 'static' in Services: Unbound DNS: General)
local-zone: "domain.tld" static
local-zone: "otherdomain.tld" static
local-zone: "use-application-dns.net" always_nxdomain
googleapis.com.domain.tld
local-server1.domain.tld.domain.tld
www.googleapis.com.domain.tld
hi
just add closing "." when checking via nslookup )
[2021-07-12 16:46:13] 127.0.0.1 office365.com DS PASS 11ms NextDNS-Primary
[2021-07-12 16:46:13] 127.0.0.1 office365.com DS PASS 0ms -
[2021-07-12 16:46:13] 127.0.0.1 office365.com DS PASS 0ms -
[2021-07-12 16:46:13] 127.0.0.1 office365.com DS PASS 0ms -
[2021-07-12 16:46:13] 127.0.0.1 office365.com DS PASS 0ms -
[2021-07-12 16:46:13] 127.0.0.1 office365.com DS PASS 0ms -
[2021-07-12 16:46:22] 127.0.0.1 community.librenms.org A PASS 0ms -
[2021-07-12 16:46:22] 127.0.0.1 librenms.org DS PASS 0ms -
[2021-07-12 16:46:22] 127.0.0.1 librenms.org DS PASS 0ms -
[2021-07-12 16:46:22] 127.0.0.1 librenms.org DS PASS 0ms -
[2021-07-12 16:46:22] 127.0.0.1 librenms.org DS PASS 0ms -
[2021-07-12 16:46:22] 127.0.0.1 librenms.org DS PASS 0ms -
[2021-07-12 16:46:22] 127.0.0.1 librenms.org DS PASS 0ms -
[2021-07-12 16:46:22] 127.0.0.1 beacons.gvt2.com A PASS 0ms -
server:
tls-cert-bundle: "/etc/ssl/cert.pem"
local-zone: "use-application-dns.net" always_nxdomain
do-not-query-localhost: no
forward-zone:
name: "."
forward-addr: 127.0.0.1@5354
host1.localdomain.tld.localdomain.tld
google.com.localdoman.tld
So... I don't get why this happens. forward-zone:
name: "."
forward-tls-upstream: yes
forward-addr: x.y.z.a@853#dnsserver.domain.tld
If I used Opnsense for prod , I would have CERPed it. Snapshoting the memory is quite pointless.