Vexira
Part of the Furniture
It is possibleHmmm, I set a static on the device settings and for good measure the Mac binding on router. Possible they conflicting now with new firmware? [emoji848]
Sent from my iPhone using Tapatalk
It is possibleHmmm, I set a static on the device settings and for good measure the Mac binding on router. Possible they conflicting now with new firmware? [emoji848]
Sent from my iPhone using Tapatalk
If the device IP is set statically, it probably isn’t going to query DHCP at all.Hmmm, I set a static on the device settings and for good measure the Mac binding on router. Possible they conflicting now with new firmware? [emoji848]
Sent from my iPhone using Tapatalk
I noticed alot of improvements with beta1b once i changed the DNS1 and DNS2 from automatic (using my isp dns) to like say for example cloudflare. I know this isn't ideal for initial connections because it isn't main ISP, but i feel like it take less control away from the ISP as far as the possibilities of them redirecting traffic.I have reported before that I'm not exactly pleased with the way DoT via Stubby is set up(port and loopback IP address used). Not that it is wrong but it is not the way Stubby was recommended for unbound and the way we tested with the Entware installer script. I feel that something other than port 53 should be used between dnsmasq and stubby. IPV6 listen address should also be in stubby.yml/dnsmasq.
Also noted that when Quad9 was used for DoT Stubby connected to a data center on the west coast of US. Cloudflare connected to a data center about 100 miles away and CleanBrowsing went about 150 miles. Was wondering if there was an issue with the way Merlin had stubby configured. So I took the time to go back to 384.10_2 and installed Entware/Stubby. Did the same "tests" to the same resolvers and pretty much got the same results as with 384.11 B1. Repeating the same tests with DoT off and the resolvers in DNS Server 1 and 2 returned faster results and closer data centers!
This got me wondering if ISP's are messing with anycast IP addresses? Using "normal" DNS via port 53 works as it always has worked for me. Using DoT over port 853 seems to throw a wrench in the works for some resolvers. I realize that encryption may slightly increase DNS lag. But should querries be sent past a half dozen datacenters to one 2,700 miles away?
Thought I would lay these things out for discussion.
I've been away for months - lost engagement when Merlin firmware for my 56U stopped. Now have finally ordered a 86U. Not opening the box untill 384.11 lands which it might before my 86U arrives
I feel that something other than port 53 should be used between dnsmasq and stubby
IPV6 listen address should also be in stubby.yml/dnsmasq.
This got me wondering if ISP's are messing with anycast IP addresses? Using "normal" DNS via port 53 works as it always has worked for me. Using DoT over port 853 seems to throw a wrench in the works for some resolvers. I realize that encryption may slightly increase DNS lag. But should querries be sent past a half dozen datacenters to one 2,700 miles away?
The only issues I am noticing is DNSMAQ DNSSEC vs. STUBBY DNSSEC - I see alot more server fails on good dnssec checks with dnsmasq dnssec v.s. stubby dnssec (seems to load alot cleaner without any issues as far a verifying and validation).
The issues I am seeing is actually from dnssec not properly resolving signed zones v.s. Simply refusing to resolve an invalid signed zone. I can turn off DoT with the same dnsmasq dnssec parameters and it will resolve no problem.Probably dnsmasq being stricter, as by default it will reject unsigned replies coming from a signed zone. Which is basically DNSSEC doing what it's supposed to do.
The issues I am seeing is actually from dnssec not properly resolving signed zones v.s. Simply refusing to resolve an invalid signed zone. I can turn off DoT with the same dnsmasq dnssec parameters and it will resolve no problem.
Sounds worth a try.I know in the past people mentionned having odd DNSSEC-related issues when using 1.1.1.1 (either with DoT or as native DNS servers). Might be worth trying with Google's Quad8 just to compare.
"View List" for clients on the Network Map page always displays zero now for me. I understand this is an ASUS issue, but it at least used to be inconsistent. Now it's consistently zero. FYI. (Beta1b)
Mine works better than in previous builds. Only items I have issues with are those that are notorious to be oblivious to network map. Every now and then I may have to hit refresh but not like I use to on other builds.Works for me.
I am from NewZealand as wellI've never been even slightly tempted to use beta firmware on a router ever before but "DNS-over-TLS support" was just too good to pass up trying.
Applied 384.11 beta 1b to an RT-AC68U. Works! Yay!
Notes:
- The Adguard TLS server is disappointingly very unreliable & slow from my location in New Zealand. (Unencrypted Adguard DNS is reasonably fast so I guess the problem lays with them)
Massive thanks to Merlin for implementing this.
- Quad9, Cloudflare & Neustar/Neutopia are very fast and reliable. I used the dnsperftool (https://github.com/cleanbrowsing/dnsperftest) to check DNS server speeds from my location & good old fashioned dig.
- Neustar/Neutopia the best for me. (I prefer to send the queries over port 443 to mix them in with all the other traffic. Seems a little faster also.)
Kia-ora FrankI am from NewZealand as well
hi chris
my name is Craig
I use Spark fiber cant you get a Static ip with Skinny
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!