What's new
  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Control D DNS and possible DNS-rebind attacks

bbunge

Part of the Furniture
I have recently noticed another pre loaded DNS service on the Asus firmware. Control D seems to be a "real deal" and has a fancy web site. They have many "free" configuration options.
However, when I select any of the pre loaded DNS options or manually add one of their other services I immediately begin seeing "possible DNS-rebind attack detected:" in the router system log. Going back to Quad9 or Cloudflare and the suspected attacks stop. These "attacks" also happen with DNSSEC or DoT enabled ( I do not use DNSSEC and DoT at the same time).
Is this just me or is there a real problem with Control D DNS?
 
Most likely your router settings, disable rebind protection. It will generate this log message when upstream service filters something.
 
Most likely your router settings, disable rebind protection. It will generate this log message when upstream service filters something.
Makes a lot of sense to disable a protection feature that is giving a warning...

Router settings?

Can you explain why this happens on Control D but not on Quad9, CleanBrowsing, Cloudflare, AdGuard, Google and even my ISP default of Level 3? Also happens on Merlin and Asus firmware...
 
If the filtering server upstream is returning 0.0.0.0 you get the possible rebind attack detected message. I've seen it with Cloudflare and AdGuard, Google and perhaps the ISP have no filtering, don't know about Quad9 and CleanBrowsing. It's a false alarm.
 
I just started using Control D, and also I see the google of 'possible rebind attacks' msgs. (Quad 9 was giving me too many failures, so I'm trying other services.)

Something from 2022 says that Control D free doesn't support rebind attacks ...

Interesting info from Ctrl D, saying to turn off all the options (in the context of a paid account, I believe)
 
Last edited:
I just started using Control D, and also I see the google of 'possible rebind attacks' msgs. (Quad 9 was giving me too many failures, so I'm trying other services.)

Something from 2022 says that Control D free doesn't support rebind attacks ...

Interesting info from Ctrl D, saying to turn off all the options (in the context of a paid account, I believe)
That Asus router guide has some age to it. Lots has changed with the Asus firmware since that was written. Control D is supposed to have an add-on for Merlin firmware but I suspect it is not current.
As for Quad9, I used to have issues with it when my ISP routed the Anycast address for Quad9 to servers over a thousand miles away. Now it is less than 100 miles. Control D has servers in the same area as Quad9 and Cloudflare and connections to all three are great!
 
It shows the configuration you need:

1745190121147.png
 
Steps setting it up look right to me, but I personally don't like layered filtering approach because identifying false positives becomes harder. I would prefer local filtering with unfiltered reliable and local to my location DNS service upstream. This way I know where the issue is if something doesn't work. Simplicity and reliability is the real deal for me.
 
I've been using Control D almost since they started up a few years ago. They are very customer friendly and offer a ton of great customizable services, some for free. I believe one of the main guys there has posted on here before to help solve issues cropping up between Asus routers and Control D. I don't remember exactly what it was, but they were very helpful in solving an issue I had with DoT and my Asus router in the early days. Highly recommend.
 
Hmmm, I am not seeing any rebind attack warnings in syslog, even with such warnings enabled on the router

Control_D.png
 
Depends on the Block Response configured in the Control-D portal.
I am not a paying customer with an account. I am using one of the free standard profiles which are not configurable. It appears the default blocked query response is NXDOMAIN from /opt/var/log/dnsmasq.log. However, the Control D documentation says that the default response is 0.0.0.0, so I cannot explain. Diversion is configured with NXDOMAIN, so maybe I will see NXDOMAIN when Diversion blocks and 0.0.0.0 when Control D blocks.
 
Last edited:
@EmeraldDeer, according to these instructions from Control-D, the DoT servers for their free service are 76.76.2.11 and 76.76.10.11, unlike what is seen in your previous screenshot. Although I suspect that's not the case, I wonder if that may have any impact to the DNS-rebind attack messages.

Code:
3. Under the DNS-over-TLS server list, enter your DoT resolver under the “TLS Hostname” section and point the resolver to 76.76.2.22 and 76.76.10.22 if you’re a paid customer and to 76.76.2.11 and 76.76.10.11 if you are using a free resolver.
 
I've been using Control D almost since they started up a few years ago. They are very customer friendly and offer a ton of great customizable services, some for free. I believe one of the main guys there has posted on here before to help solve issues cropping up between Asus routers and Control D. I don't remember exactly what it was, but they were very helpful in solving an issue I had with DoT and my Asus router in the early days. Highly recommend.
Maybe back then. Now support seems to be Ai-driven as the first layer, no way to get direct contact to a human or ticket system. :(
 
@EmeraldDeer, according to these instructions from Control-D, the DoT servers for their free service are 76.76.2.11 and 76.76.10.11, unlike what is seen in your previous screenshot. Although I suspect that's not the case, I wonder if that may have any impact to the DNS-rebind attack messages.

Code:
3. Under the DNS-over-TLS server list, enter your DoT resolver under the “TLS Hostname” section and point the resolver to 76.76.2.22 and 76.76.10.22 if you’re a paid customer and to 76.76.2.11 and 76.76.10.11 if you are using a free resolver.
No difference seen here when using the ‘11’ servers, rather than the ‘2’ servers with DoT.

I find any dns using the DoT/dnsmasq of the router to have very high latency. A new page load can take up to 10+ seconds easily. (Cloudflare, Controld, Quad9 all alike in this regard).

Stock or Merlin firmware, no different in this regard.

A stubby issue possibly?

Meanwhile, using an Apple dns profile to use the same servers is blazing fast. (Mostly Apple clients here.)
Added bonus, my ad/malware blocking with a profile is portable, goes with me wherever I go, handy on phone!

I would much prefer to use the router’s facility, but this is where I’m at.
 
Last edited:
A new page load can take up to 10+ seconds easily.

There is an exact match thread here:


...and back then you had a fix for this issue.
 
There is an exact match thread here:


...and back then you had a fix for this issue.
Good catch! I’ve had a sleep or two since then……
Plus, I don’t think I knew about dns profiles then?

Pixelserv of course is no longer with us. Using a single server with DoT is an improvement, but still way sub par compared with a dns profile.

IMHO, it’s not a server problem, or a Merlin problem, because I have the problem regardless of server, or firmware.

Stubby is the only one left?
 

Similar threads

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Back
Top