Skip to content

Conversation

@kleschenko
Copy link
Contributor

Describe your changes

This change explicitly disables DNSOverTLS for the Netbird wg interface on systems using systemd-resolved. Currently, if the system has DNS over TLS enabled globally then netbird interface will inherit it and DNS resolution ends up in a broken state. Disabling dnsovertls setting explicitly for interface fixes this issue.

Issue ticket number and link

Updates #1483

Stack

Checklist

  • Is it a bug fix
  • Is a typo/documentation fix
  • Is a feature enhancement
  • It is a refactor
  • Created tests that fail without the change (if possible)

By submitting this pull request, you confirm that you have read and agree to the terms of the Contributor License Agreement.

Documentation

Select exactly one:

  • I added/updated documentation for this change
  • Documentation is not needed for this change (explain why)

Docs PR URL (required if "docs added" is checked)

Paste the PR link from https://github.com/netbirdio/docs here:

https://github.com/netbirdio/docs/pull/__

@CLAassistant
Copy link

CLAassistant commented Oct 2, 2025

CLA assistant check
All committers have signed the CLA.

@sonarqubecloud
Copy link

sonarqubecloud bot commented Oct 2, 2025

@kleschenko
Copy link
Contributor Author

@mlsmaycon can someone please take a look at this change to see if it needs some additional work? We've noticed this problem with DNS on machines with DNSOverTLS enabled globally, and while there are proposed workarounds, it would be nice to get it fixed in the client

@lixmal
Copy link
Collaborator

lixmal commented Oct 10, 2025

Thanks @kleschenko

@lixmal lixmal merged commit bedd3ca into netbirdio:main Oct 10, 2025
36 of 37 checks passed
@kleschenko kleschenko deleted the disable-dnsovertls branch October 10, 2025 17:41
hurricanehrndz added a commit to hurricanehrndz/netbird that referenced this pull request Oct 24, 2025
* upstream/main: (135 commits)
  [signal] Fix HTTP/WebSocket proxy not using custom certificates (netbirdio#4644)
  [client] Fix active profile name in debug bundle (netbirdio#4689)
  [management] Add peer disapproval reason (netbirdio#4468)
  [misc] Update tag name extraction in install.sh (netbirdio#4677)
  [client] Clean up match domain reg entries between config changes (netbirdio#4676)
  [client] Delete TURNConfig section from script (netbirdio#4639)
  [client] Security upgrade alpine from 3.22.0 to 3.22.2 netbirdio#4618
  [client] Fix status showing P2P without connection (netbirdio#4661)
  [client] Support BROWSER env for login (netbirdio#4654)
  [client] Remove rule squashing (netbirdio#4653)
  Handle the case when the service has already been down and the status recorder is not available (netbirdio#4652)
  [client] Set default wg port for new profiles (netbirdio#4651)
  [client] Add bind activity listener to bypass udp sockets (netbirdio#4646)
  [client] Fix missing flag values in profiles (netbirdio#4650)
  [management] feat: Basic PocketID IDP integration (netbirdio#4529)
  [client] Force TLS1.2 for RDP with Win11/Server2025 for CredSSP compatibility (netbirdio#4617)
  [misc] Add service definition for netbird-signal (netbirdio#4620)
  [management] pass temporary flag to validator (netbirdio#4599)
  [client] Explicitly disable DNSOverTLS for systemd-resolved (netbirdio#4579)
  [management] sync all other peers on peer add/remove (netbirdio#4614)
  ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants