What's new

Unbound Unbound Tuning for gaming

  • For a home router, this is pointless
  • These waste memory on unused features
  • Many of these are advanced performance tuning options meant for high-traffic public resolvers
  • Most have undocumented or unclear effects on embedded systems
  • Some values are aggressive
  • Others conflict with the philosophy of a conservative router config
  • Unnecessary complexity for home router

For those 14K viewers of this thread watching while eating their popcorn from their armchairs, I think these points pretty much sum the contents of these configs posted in this thread.

At least we have AI proof of total nonsense in addition to HI. This sentence is spot on:
  • Don't add dozens of advanced parameters without understanding each one

Say what you will about using AI when it comes to analyzing settings and determining the outcome of the effects of changing these settings, but I think it's a perfect use-case.

I think what would be more useful in this case is starting a thread that can recommend some generally-used conservative tweaks based on the the vanilla config that would actually improve security and performance for unbound and our routers in general, instead of this "Unbound for Gaming" mumbo-jumbo garbage.
 
The best setup for Gaming is fiber ISP service with fast large cache upstream DNS resolver like Google or Cloudflare <10ms away, no DNS encryption, local DNS caching proxy <1ms away and Ethernet connected PC/Console. Unbound in any configuration will be slower, waste of resources needless complication.
 
Lol, it's as if the Swedish Chef turned hacker.
Swedish_poser.webp
 
The best setup for Gaming browsing is fiber ISP service with fast large cache upstream DNS resolver like Google or Cloudflare <10ms away, no DNS encryption, local DNS caching proxy <1ms away and Ethernet connected PC/Console. Unbound in any configuration will be slower, waste of resources needless complication.
Fixed that for you.
 
This is old news and has been mentioned in the past when you have specified 'edns-buffer-size:' to a value other than 1232.

Your never-ending config changes/updates without any explanation of what they achieve in comparison to the default settings is puzzling in the extreme.
You are convinced that they do 'something' BUT don't explain what it is to anyone else !!!???
Who is your intended audience ?

I am prepared to be convinced IF you can explain what it is you are achieving !!!
 
Who is your intended audience ?
Whoever reads this thread. The member has just turned this into a vlog.
Suggestion: ignore the member and ignore this thread (they're already on my ignore list but you posted)
If we turned this into a chat about jam (jelly) they'd probably never notice.
 
This is old news and has been mentioned in the past when you have specified 'edns-buffer-size:' to a value other than 1232.

Your never-ending config changes/updates without any explanation of what they achieve in comparison to the default settings is puzzling in the extreme.
You are convinced that they do 'something' BUT don't explain what it is to anyone else !!!???
Who is your intended audience ?

I am prepared to be convinced IF you can explain what it is you are achieving !!!
those views are going up everyday its at 16000 now. I'd say that is a big audience. I must be very popular
 
Whoever reads this thread. The member has just turned this into a vlog.
Suggestion: ignore the member and ignore this thread (they're already on my ignore list but you posted)
If we turned this into a chat about jam (jelly) they'd probably never notice.
Ahhh !!!!

The great 'Jam' vs 'Jelly' question !!!
Now you have opened the portal to Hell itself !!!

:eek:😕:oops:🤢o_O

(Point taken ... I had to ask !!!)

P.S. Blackcurrant is my favourite if it is a 'Jam' ... never if it is a 'Jelly' !!!
P.P.S. I also like Marmite (See my Name !!!) ... don't mention Vegemite it is too salty for my taste !!!

Cue 'Marmite/Vegemite Wars' 2026.
 
those views are going up everyday its at 16000 now. I'd say that is a big audience. I must be very popular
Or its bots and people slowly passing by to repeatedly gawk at the continuing and ongoing trainwreck. 🤷‍♂️
 
Most of these views are bots, crawlers and AI's though, that's how internet works these days...
My thread got over 33k views just because of it containing popular keyword.
 
Last edited:
Or its bots and people slowly passing by to repeatedly gawk at the continuing and ongoing trainwreck. 🤷‍♂️
Personally, I'm here for the pure comedy gold! 💰
 
Ping 60 and ping‑restart 180 are a good fit for this Unbound‑over‑VPN setup because they match your DNS timing and Unbound’s tolerance for upstream “hiccups” while keeping the tunnel stable.
infra-cache-min-rtt: 60
Unbound treats anything below about 60 ms as “fast”, but this also means it expects some latency and variability from upstream servers. A 60‑second VPN ping interval doesn’t interfere with this; it simply keeps the tunnel alive, while the DNS layer is tuned to tolerate realistic WAN RTTs and short spikes.
infra-cache-max-rtt: 180000
This allows Unbound to keep knowledge about server responsiveness for up to 180 seconds (and beyond, in ms). If your VPN “ping restart” is 180 seconds,

Within that 3‑minute window, Unbound can still consider a server usable and simply see temporary slowness.
After 3 minutes of no replies, the VPN will restart, which aligns with Unbound deciding that path is effectively unusable and trying again over the re‑established tunnel.

Why 60 / 180 works well for DNS over VPN

60‑second ping keeps the tunnel NAT state alive.
Your DNS traffic is not constant; a 60‑second keepalive avoids idle timeouts on home routers/ISPs without wasting bandwidth, so Unbound’s queries do not suddenly fail after short idle periods.
3‑minute restart matches “real” failures, not brief glitches.
Many short WAN or VPN blips last a few seconds to a minute. A 180‑second restart lets Unbound ride out transient issues

serve-expired: yes and serve-expired-ttl: 86400
So clients still get answers from cache while the tunnel is flaky.
outbound-msg-retry: 5 and max-query-restarts: 11
Unbound will retry queries and switch servers before giving up, which fits well inside that 3‑minute restart window.
The combination avoids thrashing.
If ping‑restart were too short (e.g., 30–60 seconds), the tunnel might be torn down and rebuilt repeatedly during a few lost packets, exactly when Unbound is already retrying and serving expired data. 180 seconds gives Unbound time to use its recovery features before the VPN itself is reset.
In practice, that 60‑second keepalive plus 180‑second restart line up with your Unbound timeouts and retry behavior

Short VPN or upstream issues are masked by cache and retries, keeping DNS “smooth” for users.

True, longer‑term failures trigger a tunnel restart around the time Unbound would consider the path bad anyway, avoiding long hangs without causing excessive reconnects.

VPNs often impose MTU limits (e.g., 1400-1450 bytes post-encryption), causing packet fragmentation or blackholing for oversized DNSSEC-validated responses. Your tcp-mss: 1200 and outgoing-tcp-mss: 1150 pair with EDNS to clamp sizes, favoring UDP where possible (do-udp: yes) but falling back to TCP seamlessly (incoming-num-tcp: 950). Paired with pad-responses and pad-queries, it mitigates padding-oracle attacks and ensures consistent VPN tunnel performance without leaks.

EDNS (Extension Mechanisms for DNS) extends traditional DNS protocol limits, allowing bigger packets for DNSSEC signatures and other data without fragmentation. In your config, edns-buffer-size: 1200 caps outgoing queries conservatively to reduce drops on MTU-sensitive VPN tunnels (common with WireGuard/OpenVPN overhead), while max-udp-size: 2505 handles larger inbound responses from authoritative servers. This prevents truncation issues where standard 512-byte DNS UDP fails under load.
 
Last edited:
At the end of the day you can't fit a big pipe into a small pipe. Everything was tuned mathematically. I think that is explanation enough, now do your own research I'm outta here.
 
Most of these views are bots, crawlers and AI's though, that's how internet works these days...
My thread got over 33k views just because of it containing popular keyword.
Your gonna burn out that usb or do you go through them often. Use a ssd with pi-hole. or better yet get Suricata going. Now that would be impressive.
 
Your gonna burn out that usb or do you go through them often.
My what? Did you mean to write "You're" there?
No issue - I have a daily backup of the whole drive - I'll just get another stick and restore.
My current stick still didn't fail even after 84289.22 MB (~150 MB daily) of writes (so far).
I've been using the same noname 16G stick since I started working on my project.

Use a ssd with pi-hole.
Pi-hole's developers have it optimized to run from the SD cards - random flash drive is good enough.

or better yet get Suricata going. Now that would be impressive.
Pi-hole does a completely different thing than Suricata.
I'm not paranoid, I definitely do not have to block the whole world.
Suricata could potentialy increase jitter and ping and that would definitely not be good for gaming.
 

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Back
Top