I have a device on my network, a Philips soundbar, that is making an obscene amount of PTR requests
Approx. 1 request every 3 seconds...20/21 requests per minute
Jul 20 13:27:49 dnsmasq[23400]: query[PTR] 1.0.168.192.in-addr.arpa from 192.168.0.213
Jul 20 13:27:49 dnsmasq[23400]: /etc/pihole/custom.list 192.168.0.1 is skyqhub.lan
Jul 20 13:27:52 dnsmasq[23400]: query[PTR] 1.0.168.192.in-addr.arpa from 192.168.0.213
Jul 20 13:27:52 dnsmasq[23400]: /etc/pihole/custom.list 192.168.0.1 is skyqhub.lan
Jul 20 13:27:55 dnsmasq[23400]: query[PTR] 1.0.168.192.in-addr.arpa from 192.168.0.213
Jul 20 13:27:55 dnsmasq[23400]: /etc/pihole/custom.list 192.168.0.1 is skyqhub.lan
No amount of searching is leading me to any solutions or even reasons why.
So i am started to clutch at straws a little.
Factory resetting the soundbar does not help.
Contacting Philips customer support is fruitless, they're about as useful as a chocolate teapot.
So doing a bit of digging about, i want to make sure I haven't changed anything in my pihole setup that may cause this.
As i understand, the PTR request is the soundbar asking for the name of the client at 192.168.0.1, which is my ISP provided router.
The main question here, is are the contents of my hosts files correct?
I cannot remember if I have modified them at some point, or why I would...but its possible I over tinkered
Im looking specifically at the 127.0.1.1 pihole and 127.0.0.1 localhost entry in /etc/hosts
should this be 127.0.0.1 pihole
Is there any conflict here?
IPV6 is disabled, so i do not know why there are IPV6 lines here
Thank for checking. That has put me at ease a little...at least I know I have accidently screwed something up
I totally agree that Pi-hole is doing what it should, I was just hoping there was something I had missed, that would explain why a device might be doing this.
Am not sure what dig command you did run but,
if its the 1.0.168.192.in-addr.arpa queries that are excessive,
also check for this one if the TTL is 60 seconds now with below:
Its a little hard to catch it in the logs as it is flooded by the constant requests, but running the shortened dig command, it returns nothing in the terminal.
Looking at the tailed pihole log, I see:
09:54:48: query[PTR] 1.0.168.192.in-addr.arpa from 192.168.0.213
09:54:48: config 192.168.0.1 is NXDOMAIN
09:54:50: query[PTR] 1.0.168.192.in-addr.arpa from ::1
09:54:50: config 192.168.0.1 is NXDOMAIN
09:54:51: query[PTR] 1.0.168.192.in-addr.arpa from 192.168.0.213
09:54:51: config 192.168.0.1 is NXDOMAIN
09:54:54: query[PTR] 1.0.168.192.in-addr.arpa from 192.168.0.213
09:54:54: config 192.168.0.1 is NXDOMAIN
I think it was the second query in the snippet at 09:54:50
The answer your Pi-hole provided has changed since you've started the topic, suggesting that you've changed yor configuration.
It doesn't seem to matter much though, since your misbehaving device would issue those PTR requests regardless of the actual answer (be it an IP address or NXDOMAIN).
In any case, this is moving away from your original question.
That has been answered:
Your further attempts to somehow educate your Philips soundbar to issue fewer DNS requests are not related to your hosts file.
I'm afraid that if that client isn't respecting TTLs, you're running out of Pi-hole's DNS configuration options to tackle this.
If you can't address this behaviour at the source, you may have to live with it, or return the device if its annoying you enough. Another option may be to configure that Philips soundbar to use a public DNS server, if you're ok with not filtering its requests.
There is a difference between getting an NXDOMAIN or IP returned.
An NXDOMAIN is without TTL.
And if answered with an IP (EDIT: or name) , it does provide a TTL.
You are right, I was experimenting with conditional forwarding, initial post contained logs with forwarding enabled, subsequent with it disabled (my normal setup). I should have been clearer on this! My bad
Yes, I suppose you are right
It seems so, I fully understand its not a pihole issue, was more hoping pihole could help me diagnose. to be honest, at this stage, its more that the constant requests are flooding my logs, and skewing all my stats...soundbar connected
How would I go about this, as there are no options on the soundbar itself to set any network settings, nor on any connected Philips app.
Would using pihole groups to have the soundbar bypass pihole work?
Or is there a dnsmasq trick?
Before you switch to device-specific DNS servers, you may want to examine my aforementioned apprehension's condition: The output you've provided so far isn't conclusive as to whether your soundbar would honor TTLs or not. (I think that's also what deHakkelaar indirectly refers to when pointing out that NXDOMAIN has no TTL value associated to it.)
I have set the soundbar to use another upstream DNS server, via a dnsmasq config.
I now no longer see the multiple requests in my pihole log.
But i am certain they are still being made, so this is more of a 'out of sight, out of mind' workaround, rather than a fix.
I will try and push Philips tech support again, but I don't hold much hope.
As always pihole was working flawlessly, and doing exactly what it should be.