Please follow the below template, it will help us to help you!
Expected Behaviour:
Operating System: Linux (ubuntu 18.04)
Two Docker Instances run on this machine
1- Pihole docker - Pihole - 172.90.0.5
2- mvance/unbound - Unbound - 172.90.0.6
Expected behavior is that when I run DNSSec validation test command using dig as per official guide with destination IP assigned to the docker Unbound instance or the PiHole instance I should receive a NOERROR response with resolved domain answer.
dig sigok.verteiltesysteme.net @172.90.0.6 -p 5335
Actual Behaviour:
When I run a DNSSec validation test command I receive a REFUSED response
;; ->>HEADER<<- opcode: QUERY, status: REFUSED, id: 28175;;
flags: qr rd ad; QUERY: 0, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0`
`;; WARNING: recursion requested but not available`
When I perform the same testing with loopback address 127.0.0.1, it works with no issues.
Not only that but even in PiHole, all DNS queries sent to PiHole keep getting forwarded to Unbound but no response back as in the PiHole Log below May 18 01:38:38 dnsmasq[539]: query[A] tesla.com.lan from X.X.X.X May 18 01:38:38 dnsmasq[539]: forwarded tesla.com.lan to 172.90.0.6 May 18 01:38:38 dnsmasq[539]: query[A] tesla.com.lan from X.X.X.X May 18 01:38:38 dnsmasq[539]: forwarded tesla.com.lan to 172.90.0.6
Thanks for your reply but I keep getting refused on all queries on Unbound assuming it should be handled with no issues (in terms of resolving part). And the main issue I am facing is why PiHole doesn't respond back to the DNS query made by any of the clients and shows requests being forwarded to Unbound and not returning back ?
These IPs do not match any private address range, specifically not 172.16.0.0/12 (which would only span addresses from 172.16.0.0 through 172.31.255.255) - which in turn means that you are using public IPs for your Pi-hole installation.
If you do not own 172.90.0.5 and 172.90.0.6, you should switch to use private IP addresses.
If you do indeed own those addresses, you may run an open resolver, which poses a potential threat for all Internet users, e.g. by serving as a multiplier in a DNS Amplification attack.
The Pi-hole team strongly discourages Pi-hole’s usage as an open resolver , and we won't provide support in that case.
I fixed it, it was an issue with Unbound config file, it should include access control. I understand it should be more specific but not including this line in config would refuse any requests not originating from the Loopback access-control: 0.0.0.0/0 allow