Tech Junky
Part of the Furniture
Instead of blocking in forward block it on output at the top of the chain.That's exactly what he's doing and the entire point of this thread. See post #1.
Instead of blocking in forward block it on output at the top of the chain.That's exactly what he's doing and the entire point of this thread. See post #1.
The FORWARD chain is the correct place. The OUTPUT chain would have no affect on requests from the LAN.Instead of blocking in forward block it on output at the top of the chain.
This is incorrect. I explained this to you before here.DNS to external servers would need OUTPUT to exit that LAN to do a lookup.
What argument? It's quite easy to test. The forwarded traffic does not traverse the filter/OUTPUT chain.I'm done arguing about it @ColinTaylor
@ColinTaylor Both actually.When you say "DNS filter enabled" are you referring the company and their DNS servers (https://www.dnsfilter.com/), or are you referring to the Asus router feature called DNSFilter? If it's the latter what do those rules look like?
chrome.cloudflare-dns.com
) to get a local DNS IP address. This local IP address in Clouflare's case is not 1.1.1.1 or 1.0.0.1. For me it resolves to 104.18.42.171
and 172.64.145.85
. From that point on it uses these addresses for DNS. That's why your iptables rules don't block it, and why it's only happens in Chrome.Use pihole or some other DNS based blocking to prevent injecting DNS IPs.Or is there a way to block DoH domains?
As the posts above said, if you're already running some sort of ad-blocker like Diversion or Pi-hole you could addThanks for figuring it out! This is helpful.
Would the solution then be to find out what Cloudflare's ip resolves to and add those addresses to my firewall-start blocking script? If so, how can I go about doing that?
Or is there a way to block DoH domains?
chrome.cloudflare-dns.com
to the blacklist.chrome.cloudflare-dns.com
. If you have enabled custom scripts in Merlin's firmware you can achieve this by entering the following commands in SSH:echo "address=/chrome.cloudflare-dns.com/" >> /jffs/configs/dnsmasq.conf.add
service restart_dnsmasq
Bingo you nailed it! If the OP is interested I can give them a list of domains to block that block all domains used to bypass the ordinary exchange of information. But @ColinTaylor is right DoH/DoT must be able to reach out over dns to resolve the server hostname in order to remotely connect to it. If it fails to do such then the browser will fall back to using the routers DNS.As the posts above said, if you're already running some sort of ad-blocker like Diversion or Pi-hole you could addchrome.cloudflare-dns.com
to the blacklist.
These methods typically return address 0.0.0.0 for the blocked domain. So it will have the desired affect in Chrome, but is not ideal because Chrome will be constantly retrying the query hoping to get a valid address.
The best solution would be for the DNS query to return NXDOMAIN forchrome.cloudflare-dns.com
. If you have enabled custom scripts in Merlin's firmware you can achieve this by entering the following commands in SSH:
Code:echo "address=/chrome.cloudflare-dns.com/" >> /jffs/configs/dnsmasq.conf.add service restart_dnsmasq
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!