ColinTaylor
Part of the Furniture
OK. So in the Yandex example any DNS query that isn't destined for Yandex's IPv6 DNS servers is dropped, presumably making the client retry using IPv4 and intercepted by those rules.
So we want it to do the same thing for all IPv6 DNS queries, not just Yandex. But it doesn't seem to be creating the rules properly.
So after setting the Global Filter Mode to Router you need to add the missing rules:
Try putting that in firewall-start and seeing what the end result looks like.
EDIT: We might end up with some duplicated rules in certain circumstances but hopefully that won't cause a problem.
So we want it to do the same thing for all IPv6 DNS queries, not just Yandex. But it doesn't seem to be creating the rules properly.
So after setting the Global Filter Mode to Router you need to add the missing rules:
Code:
ip6tables -t mangle -N DNSFILTERF
ip6tables -t mangle -N DNSFILTERI
ip6tables -t mangle -A INPUT -i br0 -p udp -m udp --dport 53 -j DNSFILTERI
ip6tables -t mangle -A INPUT -i br0 -p tcp -m tcp --dport 53 -j DNSFILTERI
ip6tables -t mangle -A FORWARD -i br0 -p udp -m udp --dport 53 -j DNSFILTERF
ip6tables -t mangle -A FORWARD -i br0 -p tcp -m tcp --dport 53 -j DNSFILTERF
ip6tables -t mangle -A DNSFILTERI -j DROP
ip6tables -t mangle -A DNSFILTERF -j DROP
Try putting that in firewall-start and seeing what the end result looks like.
EDIT: We might end up with some duplicated rules in certain circumstances but hopefully that won't cause a problem.
Last edited: