Use “forward only:” for your local zones. 
-- 
Mark Andrews

> El 13 sept 2025, a las 4:58, Jarrod Spencer Farrell <[email protected]> 
> escribió:
> 
> I'm setting up a private VPN containing mobile devices and the home's LAN 
> through a firewall part of the VPN network, and I'd like to use the FQDN of a 
> LAN device and get the response from the home firewall.
> 
> So on my phone—part of the VPN—I configured it to use the IP of the firewall, 
> then had a thought: it'd make more sense for the VPS to be the first to reply 
> if it can to avoid additional latency waiting for the firewall to reply. The 
> VPS is in a data center after all with faster links to public DNS servers 
> compared to trying to go down a residential link for every DNS query.
> 
> So the plan is BIND on the VPS to use public resolvers, **except** when it's 
> being asked something under the home's domain (this example: my-home.net.lan) 
> where it should ask the home firewall for the IP. After some tries, this is 
> what I have:
> 
> ```named.conf, generated by nix
> include "/etc/bind/rndc.key";
> controls {
>  inet 127.0.0.1 allow {localhost;} keys {"rndc-key";};
> };
> 
> acl cachenetworks {  127.0.0.0/24;  ::1/128;  10.0.10.0/24; };
> acl badnetworks {  };
> 
> options {
>  listen-on {  any;  };
>  listen-on-v6 {  any;  };
>  allow-query-cache { cachenetworks; };
>  blackhole { badnetworks; };
>  forward first;
>  forwarders {  9.9.9.9;  149.112.112.112;  2620:fe::fe;  2620:fe::9;  };
>  directory "/run/named";
>  pid-file "/run/named/named.pid";
>  dnssec-must-be-secure xmit.net.lan no;
> 
> };
> 
> zone "my-home.net.lan" {
>  type forward;
>  forwarders { 10.0.10.101; };
> };
> ```
> 
> And we try to resolve the home's firewall using it's FQDN from my phone over 
> cell, watching `tcpdump` at the VPS:
> 
> ```
> IP 10.0.10.4.59410 > 10.0.10.100.domain: 51824+ A? firewall.my-home.net.lan. 
> (39)
> IP 10.0.10.100.30301 > 10.0.10.101.domain: 684+% [1au] A? 
> firewall.my-home.net.lan. (62)
> IP 10.0.10.101.domain > 10.0.10.100.30301: 684* 1/0/1 A 10.96.48.1 (66)
> IP 10.0.10.100.domain > 10.0.10.4.59410: 51824 NXDomain 0/1/0 (114)
> 
> ```
> 
> It's returning NXDomain, even though it just got a response from the 
> firewall. Other queries (google.com, etc) work fine by querying the public 
> DNS resolvers first like I want. What's going on?
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
> this list.

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list.

Reply via email to