Purpose
This article describes getting Power DNS 4.9.3 running inside a jail using Bastille 0.13, on FreeBSD 14.2-RELEASE. There are not many steps to getting the bare minimum service running, and it focuses on the nuances in the jail environment.
Why Power DNS
dnsmasq has been my favourite DNS service. In one simple file it manages DNS forwarding, domain name overwrites (how Pi-Hole works to block bad domains), and more.
Power DNS has features not available in dnsmasq; including dynamic DNS, API and CLI management, and more. You should understand what feature are key in your decision on the DNS.
STEP: Prepare your jail
There a a few ways to spin up jails, including the slightly more complex vnet setups. This article is only tested on the loopback config as documented in the Bastille site using the loopback (lo0) interface and a static IP. The same steps should work regardless of jail config.
Spinning up a jail instance is out of scope for this article.
STEP: Install and enable service
It is probably easier to console into the jail and install packages within:
pkg install -y powerdns
If installing from host:
sudo bastille pkg <jailname> install -y powerdns
Enable the service:
service pdns enable
STEP: Config service
Power DNS comes with an 'empty' config by default. There are default settings
e.g. port. The folloing needs to be explicitly added in
/usr/local/etc/pdns/pdns.conf
:
# FILE: /usr/local/etc/pdns/pdns.conf
# Defaults to 0.0.0.0 which does not seem to work in the loopback config
# Replace with the jail IP
local-address=192.168.10.5
# Use the simplest database hosted within the jail
launch=gsqlite3
gsqlite3-database=/var/db/pdns/pdns.sqlite3
The sqlite db needs the schema set up:
mkdir -p /var/db/pdns
sqlite3 /var/db/pdns/pdns.sqlite3 < /usr/local/share/doc/powerdns/schema.sqlite3.sql
sudo chown -R pdns:pdns /var/db/pdns
Restart the service and test its response. Note that until a domain is configured, returning an empty response is expected.
service pdns restart
drill www.google.com @192.168.10.5
# Returns:
#;; ->>HEADER<<- opcode: QUERY, rcode: REFUSED, id: 47397
#;; flags: qr rd ; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
#;; QUESTION SECTION:
#;; www.google.com. IN A
#
#;; ANSWER SECTION:
#
#;; AUTHORITY SECTION:
#
#;; ADDITIONAL SECTION:
#
#;; Query time: 0 msec
#;; SERVER: 10.0.25.5
#;; WHEN: Wed Feb 12 13:23:00 2025
#;; MSG SIZE rcvd: 32
STEP: Config data
Almost there! Now that the service is running, create a domain it is authoritative for (modified from powerdns.com).
pdnsutil create-zone example.com ns1.example.com
# Creating empty zone 'example.com'
# Also adding one NS record
pdnsutil add-record example.com. www A 192.0.2.1
# New rrset:
# www.example.com. 3005 IN A 192.0.2.1
No need to restart service. Test the A record and expect the updated response!
STEP: Exposing to the network
This step is optional; required when the jail loopback config is used. The jail IP may be blocked by the firewall (pf), and the 'proper' way to expose it is via rdr:
# drill uses udp
sudo bastille rdr <jailname> udp 53 53
# optional for tcp lookups
sudo bastille rdr <jailname> tcp 53 53