Example nslookup, Google DNS works, Mikrotik DNS fails:
> server 8.8.8.8
Default Server: google-public-dns-a.google.com
Address: 8.8.8.8
> 192-168-1-47.d3628f4938a748af9a3e90f5ef365efa.plex.direct
Server: google-public-dns-a.google.com
Address: 8.8.8.8
Non-authoritative answer:
Name: 192-168-1-47.d3628f4938a748af9a3e90f5ef365efa.plex.direct
Address: 192.168.1.47
> server 192.168.1.1
Default Server: [192.168.1.1]
Address: 192.168.1.1
> 192-168-1-47.d3628f4938a748af9a3e90f5ef365efa.plex.direct
Server: [192.168.1.1]
Address: 192.168.1.1
*** No internal type for both IPv4 and IPv6 Addresses (A+AAAA) records available for 192-168-1-47.d3628f4938a748af9a3e90f5ef365efa.plex.direct
>
Ho do I allow DNS rebinding on the Mikrotik DNS server?
The address is dynamic, the GUID looking part of the name is a dynamically generated security token, so adding a static entry will not work, or will work for a short time, until the token is regenerated.
In dnsmasq the equivalent option is “rebind-domain-ok=/plex.direct/”
In pfSense the equivalent option is “private-domain: “plex.direct””
I’m looking for an equivalent configuration option?
I don’t think it’s the router, I’ve never encountered any kind of such filtering in RouterOS. It’s most likely filtered by parent resolvers, i.e. those set in IP->DNS.
That’s it, thank you.
I tested local vs. Google, but I am using OpenDNS as DNS.
> server 208.67.222.222
Default Server: resolver1.opendns.com
Address: 208.67.222.222
> 192-168-1-47.d3628f4938a748af9a3e90f5ef365efa.plex.direct
Server: resolver1.opendns.com
Address: 208.67.222.222
*** No internal type for both IPv4 and IPv6 Addresses (A+AAAA) records available for 192-168-1-47.d3628f4938a748af9a3e90f5ef365efa.plex.direct
> server 8.8.8.8
Default Server: google-public-dns-a.google.com
Address: 8.8.8.8
> 192-168-1-47.d3628f4938a748af9a3e90f5ef365efa.plex.direct
Server: google-public-dns-a.google.com
Address: 8.8.8.8
Non-authoritative answer:
Name: 192-168-1-47.d3628f4938a748af9a3e90f5ef365efa.plex.direct
Address: 192.168.1.47
>
I found a setting in OpenDNS that turns of “Suspicious Responses” / “Block internal IP addresses”, and that solved the problem.
Unfortunately there is no support in OpenDNS (at least in my home plan) that allows per domain exclusions.