mirror of
https://github.com/netbirdio/netbird.git
synced 2026-05-14 12:12:27 -04:00
The new Netbird DNS Resolver Forced activation cause more problems that the ones that solve #2133
Open
opened 2025-11-20 07:04:25 -05:00 by saavagebueno
·
25 comments
No Branch/Tag Specified
main
drop-candidateviaroutes-filter
ui-refactor
fix/rosenpass
ui-refactor-ui
e2e-windows-dns-combined
refactor-combined
wasm-websocket-dial
drop-dns-probes
feature/affected-peers
dependabot/go_modules/github.com/Azure/go-ntlmssp-0.1.1
debug-logs
reduce-embed-wg-pool
windows-dns-firewall
dependabot/go_modules/github.com/jackc/pgx/v5-5.9.2
fix/login-cmd-root-flags
feat/reseller-openapi-spec
github-issue-resolver
add-steamos-support
fix-darwin-uninstaller
flutter-test
dependabot/npm_and_yarn/proxy/web/postcss-8.5.12
ci/freebsd-pkg-bootstrap
cached-serial-check-on-sync
fix-mgmt-cache-bypass-overlay
revert-easyjson-5938
revert-ice-5820
revert-firewalld-5928
refactor/permissions-manager
wasm-js-func-release
revert-dns-5935-systemd-resolved
revert-dns-5935-5945
revert-dns-5945-mgmt-cache
feature/log-most-busy-peers
prototype/ui-wails
vnc-server
coderabbitai/utg/8ae8f20
feature/use-peer-fqdn-on-https
dependabot/go_modules/golang.org/x/image-0.38.0
feature/metrics-push-management-control
release/0.68.3
dependabot/go_modules/github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream-1.7.8
dependabot/go_modules/github.com/aws/aws-sdk-go-v2/service/s3-1.97.3
add-slack-channel
claude/rdp-token-passthrough-eNcqW
transparent-proxy
fix/macos-stale-route-eexist
crowdsec-selfhosted
fix/remove-otel-units
entire/checkpoints/v1
dependabot/go_modules/github.com/go-jose/go-jose/v4-4.1.4
fix/getting-started
feat/static-connectors-combined-server
feature/use-local-keys-embedded
feature/fleetdm
set-env-only-if-not-fork
feature/expose-has-channel
fix/connection-status-race
fix/filter-cgnat-cni-ice-candidates
feature/check-cert-locker-before-acme
test/proxy-fixes
test/proxy-mtu
prototype/ui-tauri
test/proxy-speed
fix-reused-ports
feat/migrate-to-embedded-idp
feature/add-serial-to-proxy-merged
deploy/proxy-serial
test/connection
feature/disable-legacy-port
feature/flag-to-disable-legacy-port
test/perftest
dependabot/go_modules/github.com/pion/dtls/v3-3.0.11
fix/http-redirect
poc-token-command
dn-reverse-proxy
prototype/reverse-proxy-rename
prototype/reverse-proxy-logs-pagination
feature/client-metrics
prototype/reverse-proxy-clusters
debug-dns-route
fix/win-dns-batch
add-extra-route-logs
job-stream-notify-disconnection-eof
deploy/secrets-manager
trigger-proxy-update
bug/update-ios-client-code-build-tags
sync-client-netmap-serial
log/conn-disconn
nmap/compaction-deploy
ci-win-test
feature/disk-encryption-check
wasm-debug
swap-dns-prio
fix/dex-config
feature/migrate-auto-groups-to-table
dependabot/go_modules/github.com/quic-go/quic-go-0.57.0
nmap/compaction
dex-nocgo-stub
feature/exclude-terraform-from-rate-limiting
test-freebsd
retries-refactor
coderabbitai/docstrings/b7e98ac
feat/integrate-zitadel
bug/ios-hanging-reconection
zitadel-idp
feat/network-map-serial
refactor/get-account-no-users
feat/auto-upgrade
feature/report-high-pat-id
feature/temporary-access-for-resource
fix/nmap-fwrules
dont-restart-dns
prototype/ui
update-gomobile
go-dns-for-ice
wasm-ldflags
test-ldflags
wasmbuild-test
feature/networks-s2s
vk/compare-nmaps
dbg/bothmaps
feature/changeset
reorder-dns-shutdown
fix/relay-reconnection-race
fix/nmap-exitnodes
vk/debug/nmap-both
move-licensed-code
feat/better-daemon-connection-lost-message
feat/auto-update-2
test/timings
refactor/getaccount-raw
tests/nmap-getaccount
refactor/nmap
refactor/nmap-limit-buffer
feature/detect-mac-wakeup
feature/extract-modules
quick-setings
feat/sync-limiter
feature/store-cache-impl
fix-install-version
feature/store-metrics
feature/metrics-on-store
feature/use-gorm-cache
loadtest-signal
unsymmetrical-squash
refactor/reducate-signaling
test/update-reduce
feature/store-cache
feature/remote-debug
cli-ws-proxy-backend-addr
feat/mgmt-map-serial
snyk-fix-d9d0081a4c7f9137bdb59d0d50a141a2
snyk-fix-7415cea5a11acd66753540ca2c598c63
job-yml-update
feature/android-allow-selecting-routes
fix/up-sequence
fix/dns-hash-update
snyk-fix-967adae9863f17f108ce8948d9117b8d
log/getaccount-by-peer
signal-suppressor
dns-exit-node
feature/auto-updates
feature/cache-srv-key
merged-fixes
fix/missed-offers-and-debug
debug-and-fixes
poc-wasm-clean-backend-s2s
test/remote-debug
debug-api
dependabot/go_modules/github.com/docker/docker-28.0.0incompatible
fix/remove-gpo-if-empty
fix/test-freebsd
fix/mysql-setup
fix/remove-logout-btn
handle-existing-domain-user
chore/unify-domain-validation
snyk-fix-c5fafc8a50ce1f29046e25a1fc346185
feat/profile-edit-btn
snyk-fix-a54966211e18d4cf67e5a2757cc006d1
log-short-id
feat/logout-ephemeral
log-checks
batch-wg-ops
nb-interface-default
feat/aws-integration
add/race-test
feature/relay-feature-versioning
fix/systemd-service-logs
poc/preprocessed-map
add-account-onboarding
bind-ipv6
fix/merge-main
logs/peerlogs-addpeer
feature/net-297-network-migration
feature/support-skip-auto-apply-exit-node-routes
set-cmd
set-command-with-cursor
feature/limit-update-channel
stop-using-locking-share
feature/poc-lazy-detection
feature/net-248-removal-of-sync-mutex-locks
test/multiple-peer-logging
preresolve
add-ns-punnycode-support
apply-routes-early
windows-search-domains
fix/connecting-route-filter
feature/management/rest-client/impersonate
debug-local-records
resource-fields-snake-case
test/grpc-rate-limit
traffic-correlation-policy
feature/rest-client-options
feat/events-metrics
feature/buf-cli
test/add-ratelimiter
test/remove-write-lock-on-add-peer
fix/add-peer-semaphore
feature/users-roles-endpoint
mlsmaycon-patch-1
debug-user-role
chore/primary-key-on-networks
feature/update-account-peers-buffer-startup
remove-ubuntu2004-runners
refactor/permissions-no-pat-allowed
ref/logrus-factory
use-conntrack-zone
deploy/permissions-account
feature/lazy-connection-idle
ref/improve-test-cov
restore-pr-3440
test/increase-grpc-timeouts
feat/buffer-account-peers-update
test/networkmapgeneration-changes
feature/base-manager
feature/flow-receiver
chore/benchmark-with-large-runner
refactor/handshake-initiator
client/ui-update-systray-icons
userspace-router
wgwatcher-test
output-if-key-already-exists
fix/relay-reconnection
feature/port-forwarding-client-codecleaning
detached2
test/callbacks-nil-iceconninfo
refactor/optimize-peer-expiration
enable-udp-port-for-docker-template
fix/relay-update
feature/apply-posture-netmap
fix/group-update-existing-resource
conntrack-stats
upgrade-okta-sdk
multi-price
test/conn-stat
set-min-parallel-tests-for-management
dns-interceptor
debug-dns
router-dns
add-static-system-info
debug-0.29.4
debug-0.33.0
account-refactoring
relay/2800_quic
route-get-account-refactoring
test/seed-random-routes
feature/get-account-refactoring
test/reconnect-race-condition
refactor/get-account-usage
feature/add-session-id-to-update-channel
improve-ipv4conn
fix/async-pion-event-handling
debug
add-offload
feature/validate-group-association-debug
fix/limit-conn-for-sqlite
test/engine-iface
test/transaction-for-jwt-sync
fix/engine-stop-in-foreground
feature/add-mysql-support
test-migration
refactor/header-size-values
relay/eliminate-gob
test/signal-dispatcher-with-relay
relay/debug
validate-icon
feature/ipv6-support
use-pre-expanded-peers-map
feature/use-signal-dispatcher
validate/peer-status
add-read-write-times
fix/sync-peer-race
feature/relay-status
netmap
evaluate/network-map-hash
fix/lower-dns-resolve-interval-on-fail
feature/relay
fix/go-mod-version
upgrade-nftables
synology-userspace-mode
fix/use-ip-for-default-routes-on-darwin
fix/proxy_close
enable-release-workflow-on-pr
deploy/peer-performance
feature/permanent-turn
feature/permanent-turn-proxy
deploy/posture-check-sqlite
feature/optimize_sqlite_save
debug-ios-behavior
fix/delete-route-only-after-adding
tshoot/windows-logger
remove-new-routing
refactor/eliminate-repo-dependency
add-arm-to-ci
refactor-demo-account-object
test/abc2
test/abc
send-ssh-rosenpass-config-meta
refactor-demo
ensure-schedule-never-runs-non-positive
feature/peer-validator-groupmgm
feature/peer-validator-fix
fix/include-active-dashboard-users
fix/handle-canceling-schedule
fix/geo-download
debug-google-workspace
yury/resolve-ip-to-location
feature/extend-sysinfo
sqlite-async-peer-status
yury/add-postgresql-store
fix/route
test-build
posture-checks-poc
debug-keycloak-idp
poc/netstack
for-pascal-tmp
peer-logout-management
manual-peer-logout
detached
chore/refactor-management
test/dns-bind
fix/enforce-acl-for-containers
yury/use-sync-map-in-updatechannel
fix/events-key-handling
filter-cache-on-load-account
fix/user-expiration
handle-user-context-cancellation
nb-client-k8s-statefulset
fake-addr
fix/iptables_in_docker
ebpf-debug
update-getting-started-flow-use-postgres
fix/peer_list_notification
feature/device-authentication-with-client-secret
feature/keep_alive
feat-groups-from-jwt
separate_proxy_from_wgconfig
fix/wg_conn
wg_conn_fix
wg_bind_parallel_processing
fix-rollback-get-acls
proxy_cfg_cleanup
performance-improvement-rego
update-lock-log-level
feat-client-side-acl
refactor/move_grpcserver_logic_to_account_manager
feature/event-storage
feature/update-idp-redeeming-invite
feature/api-peer-info
return-groupminimum-setupkey
feature/interface-bind
documentation_enhancement
fix-peer-registration
ssh
users_cache
pass-client-caller
client_caller_type
revert-283-feat-fix-windows-installer
periodic-peer-updates
ebpf
braginini/wasm
v0.70.5
v0.70.4
v0.70.3
v0.70.2
v0.70.1
v0.70.0
v0.69.0
v0.68.3
v0.68.2
v0.68.1
v0.68.0
v0.67.4
v0.67.3
v0.67.2
v0.67.1
v0.67.0
v0.66.4
v0.66.3
v0.66.2
v0.66.1
v0.66.0
v0.65.3
v0.65.2
v0.65.1
v0.65.0
v0.64.6
v0.64.5
v0.64.4
v0.64.3
v0.64.2
v0.64.1
v0.64.0
v0.63.0
v0.62.3
v0.62.2
v0.62.1
v0.62.0
v0.61.2
v0.61.1
v0.61.0
v0.60.9
v0.60.8
v0.60.7
v0.60.6
v0.60.5
v0.60.4
v0.60.3
v0.60.2
v0.60.1
v0.60.0
v0.59.13
v0.59.12
v0.59.11
v0.59.10
v0.59.9
v0.59.8
v0.59.7
v0.59.6
v0.59.5
v0.59.4
v0.59.3
v0.59.2
v0.59.1
v0.59.0
v0.58.2
v0.58.1
v0.58.0
v0.57.1
v0.57.0
v0.56.1
v0.56.0
v0.55.1
v0.55.0
v0.54.2
v0.54.1
v0.54.0
v0.53.0
v0.52.2
v0.52.1
v0.52.0
v0.51.2
v0.51.1
v0.51.0
v0.50.3
v0.50.2
v0.50.1
v0.50.0
v0.49.0
v0.48.0-dev2
v0.48.0
v0.47.2
v0.47.1
v0.47.0
v0.46.0
v0.45.3
v0.45.2
v0.45.1
v0.45.0
v0.44.0
v0.43.3
v0.43.2
v0.43.1
v0.43.0
v0.42.0
v0.41.3
v0.41.2
v0.41.1
v0.41.0
v0.40.1
v0.40.0
v0.39.2
v0.39.1
v0.39.0
v0.38.2
v0.38.1
v0.38.0
v0.37.2
v0.37.1
v0.37.0
v0.36.7
v0.36.6
v0.36.5
v0.36.4
v0.36.3
v0.36.2
v0.36.1
v0.36.0
v0.35.2
v0.35.1
v0.35.0
v0.34.1
v0.34.0
v0.33.0
v0.32.0
v0.31.1
v0.31.0
v0.30.3
v0.30.2
v0.30.1
v0.30.0
v0.29.4
v0.29.3
0.29.3
v0.29.2
v0.29.1
v0.29.0
v0.28.9
v0.28.8
v0.28.7
v0.28.6
v0.28.5
v0.28.4
v0.28.3
v0.28.2
v0.28.1
v0.28.0
v0.27.10
v0.27.9
v0.27.8
v0.27.7
v0.27.6
v0.27.5
v0.27.4
v0.27.3
v0.27.2
v0.27.1
v0.27.0
v0.26.7
v0.26.6
v0.26.5
v0.26.4
v0.26.3
v0.26.2
v0.26.1
v0.26.0
v0.25.9
v0.25.8
v0.25.7
v0.25.6
v0.25.5
v0.25.4
v0.25.3
v0.25.2
v0.25.1
v0.25.0
v0.24.4
v0.24.3
v0.24.2
v0.24.1
v0.24.0
v0.23.9
v0.23.8
v0.23.7
v0.23.6
v0.23.5
v0.23.4
v0.23.3
v0.23.2
v0.23.1
v0.23.0
v0.22.7
v0.22.6
v0.22.5
v0.22.4
v0.22.3
v0.22.2
v0.22.1
v0.22.0
v0.21.11
v0.21.10
v0.21.9
v0.21.8
v0.21.7
v0.21.6
v0.21.5
v0.21.4
v0.21.3
v0.21.2
v0.21.1
v0.21.0
v0.20.8
v0.20.7
v0.20.6
v0.20.5
v0.20.4
v0.20.3
v0.20.2
v0.20.1
v0.20.0
v0.19.0
v0.18.1
v0.18.0
v0.17.0
v0.16.0
v0.15.3
v0.15.2
v0.15.1
v0.15.0
v0.14.6
v0.14.5
v0.14.4
v0.14.3
v0.14.2
v0.14.1
v0.14.0
v0.13.0
v0.12.0
v0.11.6
v0.11.5
v0.11.4
v0.11.3
v0.11.2
v0.11.1
v0.11.0
v0.10.10
v0.10.9
v0.10.8
v0.10.7
v0.10.6
v0.10.5
v0.10.4
v0.10.3
v0.10.2
v0.10.1
v0.10.0
v0.9.8
v0.9.7
v0.9.6
v0.9.5
v0.9.4
v0.9.3
v0.9.2
v0.9.1
v0.9.0
v0.8.12
v0.8.11
v0.8.10
v0.8.9
v0.8.8
v0.8.7
v0.8.6
v0.8.5
v0.8.4
v0.8.3
v0.8.2
v0.8.1
v0.8.0
v0.7.1
v0.7.0
v0.6.4
v0.6.3
v0.6.2
v0.6.1
v0.6.0
v0.5.11
v0.5.10
v0.5.1
v0.5.0
v0.4.0
v0.3.5
v0.3.4
v0.3.3
v0.3.2
v0.3.1
v0.3.0
v0.2.3
v0.2.2-beta.1
v0.2.1-beta.5
v0.2.0-beta.5
v0.2.0-beta.4
v0.2.0-beta.3
v0.2.0-beta.2
v0.2.0-beta.1
v0.1.0-beta.3
v0.1.0-beta.2
v0.1.0-beta.1
v0.1.0-rc.2
v0.1.0-rc-1
v0.0.8-hotfix-1
v0.0.8
v0.0.7
v0.0.6
v0.0.5
v0.0.4
v0.0.3
v0.0.2
v0.0.1
v0.0.0
Labels
Clear labels
2021 Q4
2022 Q1
2022 Q1
accessibility
acl
agent
agent
Android
Android
api
authentik
automation
azure
battery-usage
bug
cache
client
client-ui
cloud
cloud-only
cloudflare
community
compatibility
config-idp
config-issue
connection
contribution
coturn
cross-vpn
dashboard
data-usage
distribution
dns
docker
documentation
duplicate
enhancement
enhancement
event-stream
feature-request
freebsd
getting-started
go
good first issue
gui
help wanted
home-assistant
idp
inconsistency
integration
integrations
ios
ipv6
jwt
k8s
keycloak
linux
login
macos
management-service
missing-docs
mobile
moved-internal
needs-review
netbird-ui
networking
new-platform
nginx
notification
okta
openwrt
packaging
peer-management
peer-management
peer-management
performance
postgres
posture-checks
psk
pull-request
question
refactor
relay
release
rfc
routes
security
security-related
self-hosting
server
signal
sleep-issue
ssh
ssl
status
store
synology
system-compatibility-issue
test-suite
third-party-integration
triage
triage-needed
troubleshooting
UX
waiting-feedback
windows
wontfix
zitadel
Mirrored from GitHub Pull Request
Milestone
No items
No Milestone
Projects
Clear projects
No project
Assignees
saavagebueno
Clear assignees
No Assignees
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: SVI/netbird#2133
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @buzzzo on GitHub (Jul 30, 2025).
Describe the problem
The forceful setting of netbird dns resolver cause issue on some system
First of all: not all systems needs to have enabled the netbird dns resolver, so the decision to force it enabled no matter what is configured on the dns settings is not the most clever one.
Secondly on some system the config is not applied resulting in the total break of dns resolution (that is: the nameserver row in resolv.conf reports invalid ip/hostname).
Thirdly: on some mail relay system that rely on rbl checking via dns it reports bogus dns query with the reject of mails due to misleading rbl query.
Currently there is not a way to disable the auto management of configuration, even if the peer group is added to the exclusion list.
@buzzzo commented on GitHub (Jul 30, 2025):
To add a just discovered other side effect.
Netbird add its own domain BEFORE the system one (eg: vpn.foo.org is netbird domain and foo.org is domain).
So if BEFORE i could reach mickey.foo.org just typing mickey AFTER the netbird addition result in automatically resolver mickey in michey.vpn.foo.org).
This is fine for desktop system but totally wrong for servers.
Please make this feature as selectable.
@buzzzo commented on GitHub (Jul 30, 2025):
Seems that 0.52.1 fixed the possibility to disable dns management with peer group.
@LordAnchemis commented on GitHub (Jul 30, 2025):
TLDR: 0.52.1 has buggy DNS resolution
For me it was apt update failing as DNS couldn't resolve debian.org (lol)
@Pamalosebi commented on GitHub (Jul 30, 2025):
When netbird 0.52.1 is activated on my systems I get stuff like
And It resolves when I disable netbird
sudo netbird down@nazarewk commented on GitHub (Jul 30, 2025):
Can I ask you to enable
tracelogs ("permanently", so it starts with those) and gather debug bundles? You can trynetbird debug bundle -U, but feel free to mail those to support@netbird.io if the upload fails.See https://docs.netbird.io/how-to/troubleshooting-client#on-other-linux-and-mac-os for instructions on changing log levels
@buzzzo commented on GitHub (Jul 30, 2025):
This is because netbird creates a bogus config and the system (linux itself) cannot parse it correctly. The solution would be to upgrade netbird to the latest version AND add the linux peers to the dns exclusion. This seems (at least on my systems) to ignore completely the netbird dns rules and revert to the original resolv.conf.
You could also try to create a dns rules (on the dashboard) with your internal dns servers matching group "all". In this way you are telling to netbird to redirect ALL dns request to your dns server, but in any case netbird rewrite the resolv.conf of your system adding as nameserver its netbird peer ip.
@Pamalosebi commented on GitHub (Jul 30, 2025):
My system was unusable so I reverted to an older version... That did work.
I did put netbird in my package managers (pacman) exclusion list for now.
@LordAnchemis commented on GitHub (Jul 30, 2025):
DNS name resolution is broken
Netbird forces its own nameservers (100.x.x.x) into /etc/resolv.conf
Although it does backup the original file (with the old name servers), you cannot edit resolv.conf while netbird is up
If you haven't defined a name server in the dashboard and your client relies on IPv4 DNS - domain names are no longer resolved system-wide - it will try to look up the name server at 100.x.x.x, which then points to nothing = fail
You can bypass the issue by using either IPv6 (if your system/network/ISP supports it) or set up a custom name server (in the dashboard) that points to your 'old' DNS resolver (ie. the router/gateway IP address)
But this is only a 'temporary' fix - as netbird should NOT break core system functionality (like DNS out of the box)
Users should be allowed to choose which DNS server they want (ie. router/gateway or netbird's) and what priority etc. - or at least fall back to the default/old DNS if there is no custom name server defined in the dashboard
Don't need logs - as a few of us (@buzzzo) have already done the digging around and diagnosed the issue this morning
@lixmal commented on GitHub (Jul 30, 2025):
Can you describe what needs to be fixed or provide a PR? I haven't figured out what's broken yet without logs
@braginini commented on GitHub (Jul 30, 2025):
Logs help fixing things as they contain information that may be specific to certain environments and just speed things up when debugging. Not everyone has the issue. Would be great if you could share the logs
@LordAnchemis commented on GitHub (Jul 30, 2025):
@buzzzo commented on GitHub (Jul 30, 2025):
IMHO the point on this issue is not related to find a possible bug or not but on the opportunity to force a configuration on a system which could potentially (and it did) create severe disruption of service.
From what i've seen, let's imagine the following case:
So imagine to upgrade netbird on host A, as soon as netbird gets upgraded the newest service starts to do the following things on host A:
From now on the life lets get started complicated:
imagine that for whatever reason the netbird service is unable to create a valid config on host A:
So in the end i will have a broken dns resolver, with all the relative consequences.
Some of the problems found with this approach:
So my first concern is the approach that Netbird's Team has used in implementing a breaking (in all senses) change feature.
POSSIBLE WORKAROUNDS:
@LordAnchemis commented on GitHub (Jul 30, 2025):
I agree with @buzzzo
Or at least install the DNS resolver to another file like /etc/netbird/nameservers or something - rather than hijack the system resolv.conf (which is naughty)
And give the user ability to select which DNS resolver to use
@buzzzo commented on GitHub (Jul 30, 2025):
If it done properly the config should work but imho the choice of enabling/disabling should be an admin responsability.
@lixmal commented on GitHub (Jul 30, 2025):
https://github.com/netbirdio/netbird/releases/tag/v0.52.2 is on the way
@buzzzo commented on GitHub (Jul 30, 2025):
Is it supposed to fix some of the DNS management issues ?
@Blackclaws commented on GitHub (Jul 31, 2025):
My guess is that the upstream resolvers are not picked up correctly by netbird, hence resolution is failing.
@buzzzo
it creates a resolv.conf file which a line starting like: nameserver BROKEN_ip (yes i've find in my resolv.conf something like that)
What is the BROKEN_ip here? isn't it the netbird peer local address?
@buzzzo commented on GitHub (Jul 31, 2025):
It's certainly a race condition: but BEFORE commiting a conf on a vital file on the system imho netbird should be verify that the conf works.
@hurricanehrndz commented on GitHub (Jul 31, 2025):
I think most ppl would like to know what the purpose of the change or more specifically this PR is. Also if you are going to be the system resolver it would be best that you ensure you are adhering to the RFCs and the standard:
https://github.com/netbirdio/netbird/issues/4242
I am in agreeance with everyone else here though, on linux it should be the admin's job to decide what system configurations get applied.
@hurricanehrndz commented on GitHub (Jul 31, 2025):
Does anyone know what problems the change was trying to fix
@andreascschmidt commented on GitHub (Aug 1, 2025):
I have 0.52.2 and the whole DNS is still fubar. But I also note that on all nodes since the 0.52 update, the routing itself seems broken .. Like it's actually not picking the netbird network at all hence cant resolve the "custom" DNS.
@hurricanehrndz commented on GitHub (Aug 3, 2025):
I have not seen this, and also I understand now what the team was trying to
fix. I am sure that they will solve the issue.
On Fri, Aug 1, 2025 at 1:37 PM Andreas @.***> wrote:
@ben-nrth commented on GitHub (Aug 5, 2025):
I've had ongoing issues with the local netbird dns resolver in windows:
The latest version (0.52.2) has seemingly borked a linux server by forcing the local netbird resolver, which then appears to fail to resolve some domains. Weirdly, nslookup works for the same domain, which seems to be using the local resolver, but the application running (a microsoft backup from a synology server) fails with an ip address lookup error.
client debug output:
2025-08-06T09:41:47+10:00 WARN [request_id: b2a211d2] client/internal/dns/upstream.go:138: upstream 8.8.8.8:53 timed out for question domain=login.microsoftonline.com.
2025-08-06T09:41:47+10:00 ERRO [request_id: b2a211d2] client/internal/dns/upstream.go:161: all queries to the upstream [8.8.8.8:53] failed for question domain=login.microsoftonline.com.
2025-08-06T09:41:48+10:00 WARN [request_id: 3e12de2f] client/internal/dns/upstream.go:138: upstream 8.8.8.8:53 timed out for question domain=login.microsoftonline.com.
2025-08-06T09:41:48+10:00 ERRO [request_id: 3e12de2f] client/internal/dns/upstream.go:161: all queries to the upstream [8.8.8.8:53] failed for question domain=login.microsoftonline.com.
2025-08-06T09:41:48+10:00 WARN [request_id: a763676b] client/internal/dns/upstream.go:138: upstream 8.8.8.8:53 timed out for question domain=login.microsoftonline.com.
2025-08-06T09:41:48+10:00 ERRO [request_id: a763676b] client/internal/dns/upstream.go:161: all queries to the upstream [8.8.8.8:53] failed for question domain=login.microsoftonline.com.
yet nslookup output:
ben@racku:~$ nslookup login.microsoftonline.com.
Server: 100.68.255.254
Address: 100.68.255.254#53
Non-authoritative answer:
login.microsoftonline.com canonical name = login.mso.msidentity.com.
login.mso.msidentity.com canonical name = ak.privatelink.msidentity.com.
ak.privatelink.msidentity.com canonical name = www.tm.a.prd.aadg.trafficmanager.net.
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 20.190.142.166
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 20.190.142.164
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 40.126.14.162
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 40.126.14.160
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 40.126.14.164
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 20.190.142.167
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 20.190.142.163
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 20.190.142.165
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 2603:1016:1400:70::4
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 2603:1017:0:78::2
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 2603:1016:1400:70::2
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 2603:1016:1400:68::3
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 2603:1017:0:78::1
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 2603:1017:0:78::
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 2603:1016:1400:68::2
Name: www.tm.a.prd.aadg.trafficmanager.net
Address: 2603:1016:1400:68::5
Apologies is this is going outside the scope of this ticket - a lot of the issues appear to be related to the local resolver, so I've included it here.
@bionemesis commented on GitHub (Oct 27, 2025):
Just want to post here that we are seeing the same issue as @ben-nrth with Synology Active Backup for Microsoft 365 failing with DNS issues. Uninstalling Netbird fixes the issue.
@ben-nrth commented on GitHub (Oct 27, 2025):
In the end, so that I could continue using Netbird with the Synology server, I used "--disable-dns" when bringing up the client.
If you don't need the .netbird domains, this is an easy workaround.