NextDNS CLI on Firewalla revisited (working DHCP host resolution in NextDNS logs)

Comments

70 comments

  • Avatar
    Brian Curtis

    I would assume that if NextDNS isn't running as expected (i.e., "something is wrong"), the network clients would experience general DNS failures, no?  That was the behavior I experienced when I concluded the NextDNS service itself was having a case of the hiccups.  I haven't killed NextDNS on purpose to test this theory (it would have to be off-hours as I don't want to deal with the complaints -- especially if I take more than a couple of minutes to restore service because I broke something).

    Going by the NextDNS logs you posted, it looks like a simple service restart to me (service goes down on command and restarts immediately).  Have you combed over the syslogs during those times to see if there's more pertinent messages?

    Is it possible your script is getting a false negative when checking the status of NextDNS service?

    [edit -- We seem to be posting over each other :) ]
    If DNS resolution isn't failing when your monitor script says NextDNS is down, it definitely seems like a false report of the service being down.  Can you temporarily disable the "restart on failure" feature of your monitoring script and see if anything changes?

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    @Brian,

    I just ran the command directly, "sudo nextdns status". There's not much way to screw that up—even for me. :) 

    Since it seems to recover quickly the answer to your question may be, "no". Why? there's some caching going on. If nextdns is restarting within a few seconds or less (as it seems to be) then clients might not notice it. Still doesn't make me very happy about using the service that goes down so often. 

    Have you combed over the syslogs during those times to see if there's more pertinent messages?

    Yes, but perhaps I didn't know what to look for. Any suggestions? 

    0
    Comment actions Permalink
  • Avatar
    Brian Curtis

    Since you got me digging, I found something interesting in syslog:

    Oct  4 17:45:01 localhost pi: Firewalla checkpoint every 5 mins
    Oct  4 17:46:08 localhost nextdns[15977]: Connected 208.89.60.14:443 (con=28ms tls=37ms, TCP, TLS13)
    Oct  4 17:47:27 localhost nextdns[15977]: Connected 208.89.60.14:443 (con=30ms tls=41ms, TCP, TLS13)
    Oct  4 17:47:50 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  4 17:47:50 localhost systemd[1]: Reloaded FireRouter DNS.
    Oct  4 17:47:57 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  4 17:47:57 localhost systemd[1]: Reloaded FireRouter DNS.
    Oct  4 17:50:01 localhost pi: Firewalla checkpoint every 5 mins
    Oct  4 17:51:16 localhost nextdns[15977]: Connected 208.89.60.14:443 (con=29ms tls=38ms, TCP, TLS13)
    Oct  4 17:52:08 localhost nextdns[15977]: Connected 208.89.60.14:443 (con=29ms tls=35ms, TCP, TLS13)
    Oct  4 17:52:50 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  4 17:52:50 localhost systemd[1]: Reloaded FireRouter DNS.
    Oct  4 17:52:57 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  4 17:52:57 localhost systemd[1]: Reloaded FireRouter DNS.
    Oct  4 17:55:01 localhost pi: Firewalla checkpoint every 5 mins
    Oct  4 17:55:10 localhost nextdns[15977]: Connected 208.89.60.14:443 (con=0ms tls=0ms, TCP, )
    Oct  4 17:56:23 localhost nextdns[15977]: Connected 208.89.60.14:443 (con=29ms tls=36ms, TCP, TLS13)
    Oct  4 17:57:44 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  4 17:57:44 localhost systemd[1]: Reloaded FireRouter DNS.
    Oct  4 17:57:55 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  4 17:57:55 localhost systemd[1]: Reloaded FireRouter DNS.
    Oct  4 18:00:01 localhost pi: Firewalla checkpoint every 5 mins

    And sure enough, a "nextdns status" that coincided with one of these "reloads" caused a "not installed" response.

    root@Firewalla:/var/log# grep "Reloading FireRouter DNS" syslog | more
    Oct  2 00:02:50 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  2 00:03:00 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  2 00:07:48 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  2 00:07:56 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  2 00:12:50 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  2 00:13:00 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  2 00:17:44 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  2 00:17:54 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  2 00:18:43 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  2 00:22:44 localhost systemd[1]: Reloading FireRouter DNS.
    Oct  2 00:22:54 localhost systemd[1]: Reloading FireRouter DNS.
    ...

    So, there's a scheduled job telling firewalla to do maintenance and reload/restart things (every 5 mins for me).  Would have to ping Firewalla support for more information as to why.  I may do just that when I get a chance (feel free to do so as well and report back, if you please), since restarting "FireRouter DNS" twice (with a ~10 second pause?) every 5 minutes doesn't seem very efficient.

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    @Brian,

    Very interesting! That makes me feel slightly better as that means NextDNS is not failing. 

    0
    Comment actions Permalink
  • Avatar
    Richard Aldridge

    FWIW - after trying this for a couple weeks and seeing all sorts of odd behavior, I abandoned the idea for now and just did this with a couple Pi's I had laying around:

    https://pbxbook.com/other/pstubby.html

    It's noticeably faster.  I'm surprised how much so.

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    @Richard, interesting. Does this give you insight by device in nextDNS? Why is this better than just using  pihole by itself? 

    0
    Comment actions Permalink
  • Avatar
    Richard Aldridge

    It only shows which Pihole server made the request, but you can still use your main NextDNS profile and assocated rules, etc.  To see the per device insight, you have to look at the Pihole server and unless you're using Pihole DHCP (which I'm not) you'll need to custom label known IPs you're interested in seeing.  They do have a feature that you can forward name requests to the Firewalla, but Firewalla rejects such request and I've never been able to get this to work.

    I'd prefer to use NextDNS on the Firewalla, but after issues for the weeks I was using it, it wasn't worth it.  I have also used NextDNS Cli on a couple local machines and get all the features, but thought I'd play with Pihole.  I do think it's noticeable faster which I can't image a slightly faster DNS lookup making a difference, but it sure feels like it.

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    @Brian, 

    I tried modifying my script to first check to make sure firerouter is running before checking nextDNS. 

    sudo systemctl status firerouter | grep "Active: active (running)"

    That hasn't seemed to make any difference. Maybe that isn't the best test. I notice that sometimes I get this which I think means that the sudo nextdns status will fail even though FireRouter is running. 

    pi@firewalla:/data/logs (Gold) $ sudo systemctl status firerouter
    ● firerouter.service - FireRouter
       Loaded: loaded (/etc/systemd/system/firerouter.service; enabled; vendor preset: enabled)
       Active: active (running) since Thu 2022-10-06 11:41:40 PDT; 24h ago
     Main PID: 29137 (bash)
        Tasks: 20 (limit: 4529)
       CGroup: /system.slice/firerouter.service
               ├─29137 /bin/bash -c /home/pi/firerouter/bin/node bin/main.js 2>&1 | tee -a /home/pi/.forever/router.log &>/dev/null
               ├─29139 /bin/bash /home/pi/firerouter/bin/node bin/main.js
               ├─29140 tee -a /home/pi/.forever/router.log
               ├─29620 FireRouter
               ├─30549 ifplugd -pq -a -i eth0 -f -u 5 -d 5
               ├─30562 ifplugd -pq -a -i eth1 -f -u 5 -d 5
               ├─30575 ifplugd -pq -a -i eth2 -f -u 5 -d 5
               ├─30588 ifplugd -pq -a -i eth3 -f -u 5 -d 5
               ├─30591 sudo tail -F /var/log/rtw.log
               └─30592 tail -F /var/log/rtw.log

    Oct 07 12:03:06 firewalla sudo[4446]: pam_unix(sudo:session): session closed for user root
    Oct 07 12:03:19 firewalla sudo[5365]:       pi : TTY=unknown ; PWD=/home/pi/firerouter/service ; USER=root ; COMMAND=/bin/ping -n -q -m 102 -c 8 -W 3 -i 1 8.8.8.8
    Oct 07 12:03:19 firewalla sudo[5365]: pam_unix(sudo:session): session opened for user root by (uid=0)
    Oct 07 12:03:19 firewalla sudo[5371]:       pi : TTY=unknown ; PWD=/home/pi/firerouter/service ; USER=root ; COMMAND=/bin/ping -n -q -m 102 -c 8 -W 3 -i 1 9.9.9.9
    Oct 07 12:03:19 firewalla sudo[5371]: pam_unix(sudo:session): session opened for user root by (uid=0)
    Oct 07 12:03:19 firewalla sudo[5374]:       pi : TTY=unknown ; PWD=/home/pi/firerouter/service ; USER=root ; COMMAND=/bin/ping -n -q -m 102 -c 8 -W 3 -i 1 1.1.1.1
    Oct 07 12:03:19 firewalla sudo[5374]: pam_unix(sudo:session): session opened for user root by (uid=0)
    Oct 07 12:03:26 firewalla sudo[5365]: pam_unix(sudo:session): session closed for user root
    Oct 07 12:03:26 firewalla sudo[5371]: pam_unix(sudo:session): session closed for user root
    Oct 07 12:03:26 firewalla sudo[5374]: pam_unix(sudo:session): session closed for user root

    and other times I get: 

    pi@firewalla:/data (Gold) $ sudo systemctl status firerouter
    ● firerouter.service - FireRouter
       Loaded: loaded (/etc/systemd/system/firerouter.service; enabled; vendor preset: enabled)
       Active: active (running) since Thu 2022-10-06 11:41:40 PDT; 24h ago
     Main PID: 29137 (bash)
        Tasks: 35 (limit: 4529)
       CGroup: /system.slice/firerouter.service
               ├─ 8256 /bin/sh -c sudo ping -n -q -m 102 -c 8 -W 3 -i 1 8.8.8.8 | grep "received" | awk '{print $4}'
               ├─ 8257 sudo ping -n -q -m 102 -c 8 -W 3 -i 1 8.8.8.8
               ├─ 8258 grep received
               ├─ 8259 awk {print $4}
               ├─ 8260 /bin/sh -c sudo ping -n -q -m 102 -c 8 -W 3 -i 1 9.9.9.9 | grep "received" | awk '{print $4}'
               ├─ 8262 /bin/sh -c sudo ping -n -q -m 102 -c 8 -W 3 -i 1 1.1.1.1 | grep "received" | awk '{print $4}'
               ├─ 8263 sudo ping -n -q -m 102 -c 8 -W 3 -i 1 9.9.9.9
               ├─ 8264 grep received
               ├─ 8265 awk {print $4}
               ├─ 8266 sudo ping -n -q -m 102 -c 8 -W 3 -i 1 1.1.1.1
               ├─ 8267 grep received
               ├─ 8268 awk {print $4}
               ├─ 8269 ping -n -q -m 102 -c 8 -W 3 -i 1 1.1.1.1
               ├─ 8270 ping -n -q -m 102 -c 8 -W 3 -i 1 8.8.8.8
               ├─ 8275 ping -n -q -m 102 -c 8 -W 3 -i 1 9.9.9.9
               ├─29137 /bin/bash -c /home/pi/firerouter/bin/node bin/main.js 2>&1 | tee -a /home/pi/.forever/router.log &>/dev/null
               ├─29139 /bin/bash /home/pi/firerouter/bin/node bin/main.js
               ├─29140 tee -a /home/pi/.forever/router.log
               ├─29620 FireRouter
               ├─30549 ifplugd -pq -a -i eth0 -f -u 5 -d 5
               ├─30562 ifplugd -pq -a -i eth1 -f -u 5 -d 5
               ├─30575 ifplugd -pq -a -i eth2 -f -u 5 -d 5
               ├─30588 ifplugd -pq -a -i eth3 -f -u 5 -d 5
               ├─30591 sudo tail -F /var/log/rtw.log
               └─30592 tail -F /var/log/rtw.log

    Oct 07 12:32:09 firewalla sudo[7810]: pam_unix(sudo:session): session opened for user root by (uid=0)
    Oct 07 12:32:16 firewalla sudo[7804]: pam_unix(sudo:session): session closed for user root
    Oct 07 12:32:16 firewalla sudo[7810]: pam_unix(sudo:session): session closed for user root
    Oct 07 12:32:16 firewalla sudo[7813]: pam_unix(sudo:session): session closed for user root
    Oct 07 12:32:29 firewalla sudo[8266]:       pi : TTY=unknown ; PWD=/home/pi/firerouter/service ; USER=root ; COMMAND=/bin/ping -n -q -m 102 -c 8 -W 3 -i 1 1.1.1.1
    Oct 07 12:32:29 firewalla sudo[8266]: pam_unix(sudo:session): session opened for user root by (uid=0)
    Oct 07 12:32:29 firewalla sudo[8257]:       pi : TTY=unknown ; PWD=/home/pi/firerouter/service ; USER=root ; COMMAND=/bin/ping -n -q -m 102 -c 8 -W 3 -i 1 8.8.8.8
    Oct 07 12:32:29 firewalla sudo[8257]: pam_unix(sudo:session): session opened for user root by (uid=0)
    Oct 07 12:32:29 firewalla sudo[8263]:       pi : TTY=unknown ; PWD=/home/pi/firerouter/service ; USER=root ; COMMAND=/bin/ping -n -q -m 102 -c 8 -W 3 -i 1 9.9.9.9
    Oct 07 12:32:29 firewalla sudo[8263]: pam_unix(sudo:session): session opened for user root by (uid=0)

    which seems to allow the sudo nextdns status to succeed.  

    I suppose I could just trust that nextDNS is running but I don't love that answer. 

    0
    Comment actions Permalink
  • Avatar
    Brian Curtis

    There's so much going on in these things, I couldn't tell you what would be a reliable way to monitor a process status.  Maybe add in a sleep/wait routine for a short while on the first detected service failure, then check again to confirm before responding with a "down" message?

    In my older age, I find myself leaning more towards the KISS principle.  NextDNS has been working 99% reliably (no linux service related issues that I'm aware of), so I just leave it be.  If it were to fail/crash/whatever, I'd know pretty quick as the DNS resolve errors would be fairly evident.

    Not too long ago I was encountering an issue where my firewalla was becoming unresponsive for a good 10-15 minutes about once a week (basically taking the entire network down with it).  Being an intermittent issue, it was annoying to say the least.  I finally tracked it down to a corrupted filesystem on the SD card I was using in the firewalla to serve a Unifi controller docker container.  Since I only run a handful of APs for wireless access, and while the stats are nice but not necessary, I ditched the whole idea of running the controller on the firewalla.  Now I just fire up the Windows version of the controller if/when I need to tweak something on the APs and the firewalla is back to being happy.

    0
    Comment actions Permalink
  • Avatar
    JeeHaa

    Just wondering: wouldn't a simple nslookup check on the IP/port that nextdns is listening on be a good health probe?

    Since nextdns cli does not seem to be completely stable yet I am still debating:

    1) Use the 2 regular ipv4 nextdns servers in LAN dhcp settings (or use FW IP 192.168.1.1 and set nextdns dns on WAN) 

    2) Use nextdns as DOH in FW, which will reroute all dns lookups to nextdns

    3) Set my nas IP in dns settings in LAN dhcp (nextdns cli installed on NAS), bypassing dns in FW completely

    Using options 1 and 2 I will loose client specific logging in nextdns, but I hardly ever use it anyway, and I could see fqdn's in Flows on FW. I'm not too worried about having DOH or not. I am currently using option 1 with nextdns on WAN and LAN dhcp dns on the FW IP.

    BTW: While on option 3) I shortly noticed a dns issues on my PC a few days ago, but I'm not sure if this was caused by nextdns or an issue my NAS or wifi.

    Still if the nextdns cli would run reliably on FW it would be my pereferred option! Like I said it has been working fine on my Syno NAS for almost a year.

    0
    Comment actions Permalink
  • Avatar
    Brian Curtis

    @JeeHaa

    Personally, I would say NextDNS CLI on the Firewalla (Purple in my case) is stable.  I've only run into two DNS issues in the past couple months and I couldn't attribute either of those to the service on the Firewalla.  By the time I started digging around to diagnose the issue, it was resolved so I didn't proceed further (I suspect one issue was ISP related, and the other seemed to coincide with what seemed like a complete NextDNS service outage but I cannot confirm that).  I've never had to touch the NextDNS service on my box since setting it up.

    I work from a home office and am online for a minimum of 60+ hours a week.  The same Firewalla also provides service for home entertainment (i.e., streaming TV/movies/music) so that's at least an additional 20+ hours a week.

    0
    Comment actions Permalink
  • Avatar
    JeeHaa

    @Brian Thanks, I'll see if I can set it up using Michaels script! Just have to wait for a quiet time to prevent the rest of the family from experiencing issues. :)

    Does installing Nextdns disable FW DNS Booster and/or related functionality, or is that taken care of by the dnsmasq part (don't see any reference to that in the uninstall script btw)?

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    @jeehaa you should not not disable DNS Booster. They will work done together. 

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    @Brian 

    There's so much going on in these things, I couldn't tell you what would be a reliable way to monitor a process status.  Maybe add in a sleep/wait routine for a short while on the first detected service failure, then check again to confirm before responding with a "down" message?

    There is a lot going on.

    First I had a sleep retry in the script followed by a restart nextdns. That was showing a failure at random times but almost always was successful after the restart. 

    Then I looked through some of Firewalla scripts and thought o.k. if 

    sudo systemctl status firerouter

    reports it is up, good chance I can then test 

    sudo nexdns status

    But that was not reliable either. 

    but your idea is slightly different. Test, if NOT up wait and then try again. I had immediately restarted nextdns. I'll give it a try and report back. 

    So far nextdns does seem stable so maybe I'm making things more complicated than it needs to be. 

    0
    Comment actions Permalink
  • Avatar
    JeeHaa

    Looks like my previous post had to be manually approved, so it was probably not visible for others until now.

    But nextdns has been running on the Purple for the last 3d, and I have not experienced any issues from a functional perspective so far. :)

    Note: I have seen the "nextdns status" command fail on my NAS on several occasions in the past as well, but nextdns was always still resolving at that time. So that command is probably not the most reliable probe.

     

    0
    Comment actions Permalink
  • Avatar
    Brian Curtis

    @JeeHaa

    The reason I didn't use setup-router is it was causing problems for me.  It worked the first few times I was playing with NextDNS CLI, but then it wanted to clobber dnsmasq on port 53 for some reason (from my understanding, setup-router is supposed to move the local DNS client to a different port).  No matter what I tried, I couldn't get things working with setup-router after the first few attempts.  That's why in my config NextDNS CLI listens on port 5555 and dnsmasq is specifically told to route DNS requests through the NextDNS IP/port.

    Since we're manually setting up NextDNS CLI IP/port and reconfiguring dnsmasq, auto-activate isn't necessary.

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    @JeeHaa Thanks. Great feedback. Changes made and update posted. 

     sudo apt install ca-certificates

    This didn't used to be a problem, but I noticed this when I reinstalled recently. Not sure why this is necessary but I don't think it hurts either. 

    RE: /24 I tried to make this clearer. Short of having a bunch of prompts to have people enter info, some user config is necessary. I tried to make it more "bullet proof". Suggestions welcome. 

    vi is already installed on Firewalla but I added a note to tell users and fixed the instructions so they don't try to use curl after editing the file. 

    Unfortunately, 

    sudo nextdns status

    does not play well with Firewalla because they manage their DNS process and restart it randomly. Try as I might I have not found a 100% solid way of knowing if nextdns is running but it does seem to be pretty robust. 

    Have a great weekend.

     

    0
    Comment actions Permalink
  • Avatar
    JeeHaa

    Thanks for the update, I think these changes make it an even better out-of-the-box experience, with client info working! I'm really happy that nextdns seems to be as stable on Purple as it was on my NAS! :)

    I am still not entirely sure what the optimal cache-max-age and max-ttl settings would be on this setup (in combination with dnsmasq of FW) , but looking at comparable setup on Ubiquity routers the settings of 0 for nextdns may do the trick.

    [Update] Just a fyi: Nextdns has been running 100% stable on my NAS over the last month.

    0
    Comment actions Permalink
  • Avatar
    Kyle Button

    Does anyone have any suggestions on getting this to work with ISP that prefer IPV6? My IPV6 seems to default route on my Spectrum modem, and this script stops working after a few days. 

    0
    Comment actions Permalink
  • Avatar
    w m

    Hi so apologies and I feel like a boneheaded but total admitted novice at this, but I’ve tried the install a few ways including Michael’s script “thank you by the way your GitHub is a n00bs paradise. But nextdns runs just fine then I’ll do a port scan after on and see that port 53 is suddenly open….am I doing something wrong?

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    WM something is off, I think. How are you doing the port scan? 

    0
    Comment actions Permalink
  • Avatar
    JeeHaa

    Just a FYI: after having reset my Blue a while ago and having used Nextdns configured in the built-in Firewalla DOH (client name in Nextdns log is always Firewalla), I decided today it was time to revisit the script and install the NextDns Cli to profit from client names in the Nextdns logging again.

    I downloaded the script, added the Nextdns Id + FW IP and it worked flawlessly. :)
    Will be keeping an eye on stability for the next few days...

    [Update] After 9 days still no issues at all.

    [Update 2] One more week later and I just noticed that my PC (configured to use the FW IP as dns from dhcp as expected)  somehow was using Cloudflare (configured on the WAN interface) instead of Nextdns according to test.nextdns.io, and I have no clue why. nextdns status was running, and I saw the cache entries increasing from other clinets. I decided to disable the Nextdns service on FW for now, and just configure the Ipv4 nextdns servers on WAN (so no client names in the Nextdns log any more, but no hassle).

    0
    Comment actions Permalink
  • Avatar
    Derek Seaman

    Randomly I stop getting client names in the NextDNS cloud logs. A restart of the FW NextDNS service does the trick to reset it. Is there a safe way to do an auto restart, like once a day at midnight? I figure the monitoring piece is still not reliable, so a quick daily restart might head off issues?

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    You can, but you shouldn’t need to. I have run NextDNS cli for almost two years and it is decently solid. Can you share your NextDNS config?

    0
    Comment actions Permalink
  • Avatar
    Tyler Derosier

    Hey guys, I have a question regarding using the script provided by Michael Bierman and assigning specific devices on the network with different NextDNS profiles. I noticed the following in the documentation: 

    Note you can set up different devices using different NextDNS configurations including VPN connections. For example, I have Apple TVs in a different nextDNS configration so I can tune them. Simply add a line like this:

    -config macaddress=nextdnsconfiguration ID \

    I'm confused on where to add -config macaddress=nextdnsconfiguration ID \. I've already added my LAN IP and main NextDNS ID which has been working fine, but how do I add these additional mac address associated configs? If someone could write out an example, that would be awesome. Thanks!

    0
    Comment actions Permalink
  • Avatar
    Raymond T

    Hi All!

    I have been using this NextDNS CLI setup for years, it has been perfect!

    Until today... my box updated itself to 1.979 and now it's not working as intended. It works. But every request shows as coming from my "Fallback" profile.

     

    I have 4 different networks, my install command looks something like:


    sudo nextdns install -config 10.0.101.1/24=aaaaaa -config 10.0.102.1/24=bbbbbb -config 10.0.100.1/24=cccccc -config ffffff -report-client-info -cache-size=10MB -max-ttl=5s -discovery-dns 10.99.0.1 -listen 10.99.0.1:5555

    Yet, now everything shows as my fallback profile and only from my Discovery IP.
    No client information or recognition is working. I have done some basic testing and troubleshooting, NextDNS is running without errors, config command looks right.

    Anyone else with issues? It feels like the new box version has broken something. Likely with the new VLAN flow detection incoming, maybe.

     

    Thank you for any help!

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    Hi Raymond, 

    I'm seeing the same. I'll see what I can figure out. 

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    @Raymond,

    I have some partial success. With the following I can get the IP of the devcie to the nextDNS logs. Note "config" has changed to "profile" 

    sudo nextdns install \
    -profile=fff \
    -hardened-privacy=false \
    -use-hosts=false \
    -log-queries=true \
    -bogus-priv=false \
    -report-client-info=true \
    -discovery-dns $IP \
    -cache-size=10MB \
    -max-ttl=5s \
    -listen $IP:5555

    It seems that the discovery DNS IP and listen IP work equally if they are 127.0.0.1 or or the LAN IP of the firewalla. 

    I am trying to get some help from nextDNS but as usual, they are largely unresponsive. I don't know why the device name is not going upstream. 

    0
    Comment actions Permalink
  • Avatar
    Raymond T

    @Michael,

    Thank you very much for your replies, you have set me on a path to improvement.

    The following commands have me operational again. BUT, I am also still seeing "Device #2DDAA" which is quite annoying, as something has clearly changed from Firewalla OS point of view. The change from listening/discovery IP of one of my LAN IPs to localhost IP resolved most issues, so definitely looks like some default intra-VLAN security coming from Firewalla, as no settings have been changed from me, just a reboot and upgrade broke it.

     

    EDIT: The only device name that DOES appear in the logs is "Firewalla" and if you do a:

    cat /etc/hosts

    The only reply is:

    127.0.0.1   localhost Firewalla

    Which seems too much of a coincidence to not be linked. But this is outcome is the same whether "use-hosts" is set to true or false and with "discovery-ip" set to a LAN IP, localhost IP or unset.

    sudo nextdns install \
    -profile 10.0.101.0/24=AAAAAA \
    -profile 10.0.102.0/24=BBBBBB \
    -profile 10.0.100.0/24=CCCCCC \
    -profile DDDDDD \
    -report-client-info=true \
    -log-queries=true \
    -cache-size=10MB \
    -max-ttl=5s \
    -discovery-dns 127.0.0.1 \
    -listen 127.0.0.1:5555

    cat > /home/pi/.firewalla/config/dnsmasq/mynextdns.conf << EOF
    server=127.0.0.1#5555
    add-mac
    add-subnet=32,128
    EOF
    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    Yes, all correct Raymond. I'm not sure if it is something Firewalla did or nextDNS. Their github repo seemed to have recently changed some stuff around dnsmasq. The device name was surely nice. Having the IP is something but I'm not as happy. 

    I don't think /etc/hosts was ever an issue. Dnsmasq is where the hostinfo came from. I'm not sure why it isn't picked up anymore. 

    0
    Comment actions Permalink

Please sign in to leave a comment.