IPv6 always resolves to localhost

Comments

7 comments

  • Avatar
    Firewalla

    would you mind post the full command line you used and the response from the cmd?

    0
    Comment actions Permalink
  • Avatar
    Firewalla Team

    I got your case. It's designed to avoid any local DNS requests leaking to external sources while integrated with other DNS services like DoH, etc. 

    0
    Comment actions Permalink
  • Avatar
    Fnord

    Is there a solution or workaround to avoid this? I'm seeing it a lot for local server names that resolve to 192.168.10.x, 192.168.15.x, other IPs on local VLANs - the Firewalla also returns a bogus :: AAAA record, confusing a lot of processes that are trying to connect to the servers.

    0
    Comment actions Permalink
  • Avatar
    Firewalla

    Can you give us an example the bogus AAAA record? 

    0
    Comment actions Permalink
  • Avatar
    Fnord

    Sample. One internal server, querying for another, via the firewalla router IP as resolver. In reality, the host qbit.nat.cosanostra.net ONLY has an A record, and resolves accordingly from the open internet. The gold pro has decided to generate a false :: answer which is loopback, not an empty/non-answer. It doesn't do it for all hosts, it doesn't do it for all interfaces on different VLANs of the same host, and it sometimes comes and goes.

    r740:~# host qbit.nat.cosanostra.net

    qbit.nat.cosanostra.net has address 192.168.15.18

    qbit.nat.cosanostra.net has IPv6 address ::

    r740:~# dig @192.168.15.1 qbit.nat.cosanostra.net a

    ; <<>> DiG 9.18.33-1~deb12u2-Debian <<>> @192.168.15.1 qbit.nat.cosanostra.net a

    ; (1 server found)

    ;; global options: +cmd

    ;; Got answer:

    ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26010

    ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

     

    ;; OPT PSEUDOSECTION:

    ; EDNS: version: 0, flags:; udp: 4096

    ;; QUESTION SECTION:

    ;qbit.nat.cosanostra.net.       IN      A

     

    ;; ANSWER SECTION:

    qbit.nat.cosanostra.net. 0      IN      A       192.168.15.18

     

    ;; Query time: 2 msec

    ;; SERVER: 192.168.15.1#53(192.168.15.1) (UDP)

    ;; WHEN: Sun Mar 23 19:06:26 EDT 2025

    ;; MSG SIZE  rcvd: 68

    r740:~# dig @192.168.15.1 qbit.nat.cosanostra.net aaaa

     

    ; <<>> DiG 9.18.33-1~deb12u2-Debian <<>> @192.168.15.1 qbit.nat.cosanostra.net aaaa

    ; (1 server found)

    ;; global options: +cmd

    ;; Got answer:

    ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51271

    ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

     

    ;; OPT PSEUDOSECTION:

    ; EDNS: version: 0, flags:; udp: 4096

    ;; QUESTION SECTION:

    ;qbit.nat.cosanostra.net.       IN      AAAA

     

    ;; ANSWER SECTION:

    qbit.nat.cosanostra.net. 0      IN      AAAA    ::

     

    ;; Query time: 1 msec

    ;; SERVER: 192.168.15.1#53(192.168.15.1) (UDP)

    ;; WHEN: Sun Mar 23 19:08:05 EDT 2025

    ;; MSG SIZE  rcvd: 80

     

    0
    Comment actions Permalink
  • Avatar
    Fnord

    For what it's worth, I've started manually adding the A record under "Custom DNS rules" when I see the problem pop up, which seems to stop it from generating a bogus AAAA record. But that's not scalable, won't handle any records besides A type as far as I know, and could cause internal DNS and external DNS to get out of sync in the long run. I keep everything in DNS for consistency, having to duplicate records in the firewall manually doesn't really help that.

    If this is a partial attempt at something related to DNS Rebind protection or similar, it needs to be configurable. I expect public DNS to return valid RFC1918 addresses for my internal networks without extra junk records that break stuff.

    0
    Comment actions Permalink
  • Avatar
    Firewalla Team

    We used to hear that the host would raise more DNS queries if no response was received. It's a new case for us. Let me pass it to the team and see if there is a better solution to cover both use cases. 

    0
    Comment actions Permalink

Please sign in to leave a comment.