You need to add resolvers to the list of resolvers before hitting apply otherwise you will.have no internetCan anybody please suggest me what settings should I enable to use Stubby and bypass my ISP transparent DNS proxy server . Earlier I was using the Stubby script without changing the default DNS server and the script was able to bypass the ISP Proxy server. However, this alpha build isn't able to do that. My router is RT-86U.
If I enable DNS over TLS settings on this alpha build then internet stops. I am a bit confused with so many DNS settings under LAN, WAN and DNS filtering .
Edit- Isn't just enabling the TLS protocol sufficient to bypass the ISP Proxy server? Do I also have to change the DNSSEC settings? And what does this DNS rebound protection do? If I enable it then what would change?
Unmounted USB and formatted it to FAT32, then hard reset the router before installing the Alpha build. Again hard reset the router after the Alpha build was installed. Internet works only till I enable DOT.
Except don’t install Stubby since this is the alpha thread.Your steps are not complete or clear.
I would suggest the following:
At this point, you should have a working set up.
- Unmount and remove the USB drive and format it using a computer to NTFS.
- Do not insert it into the router yet.
- Using the GUI, do a full reset to factory defaults including checking the box that says 'initialize all settings'.
- After it reboots, do not change any settings in the WAN section except to get connected to your ISP, if any are required.
- Enable SSH in the router. Enable jffs scripts. Change the USB mode to USB 2.0. Reboot the router and wait for 10 minutes after it has booted up.
- Install amtm on the jffs partition.
- Insert the USB drive.
- Using the amtm 'fd' command, format the USB drive to Ext4 with journaling and make sure to Label the drive too. The router will reboot.
- Enable the disk checker utility in amtm with the 'dc' command.
- Create a swap file on the drive using amtm with the 'sw' command.
- Install Stubby using amtm.
Except don’t install Stubby since this is the alpha thread.
Post a shot of your WAN page. Alpha 3 includes an update that has stubby use the WAN dns as the initial resolver, so if your WAN DNS settings aren’t valid before enabling DoT, that could be an issue. If you’re just using your ISP DNS automatically maybe it’s unpredictable how it will behave, since they’re using a transparent proxy.I have formatted the usb and started from the scratch. Unmounted USB then formatted it to FAT32. Hard reset the router and then installed the Alpha build 3. Then again hard rest the router after installing the Alpha build. Everything works fine till I enable DNS over TLS.
One more question. Can I use both Google and cloudflare as DNS resolvers for DOT or should I stick with only one resolver?
I was surprised I was able to apply with DNS Privacy enabled, but no resolvers in the table. I would consider that an alphaYou need to add resolvers to the list of resolvers before hitting apply otherwise you will.have no internet
# cat /etc/stubby/stubby.yml
resolution_type: GETDNS_RESOLUTION_STUB
dns_transport_list:
- GETDNS_TRANSPORT_TLS
tls_authentication: GETDNS_AUTHENTICATION_REQUIRED
tls_query_padding_blocksize: 128
tls_ca_file: "/etc/ssl/certs/ca-certificates.crt"
appdata_dir: "/var/lib/misc"
resolvconf: "/tmp/resolv.conf"
edns_client_subnet_private: 1
dnssec_return_status: GETDNS_EXTENSION_TRUE
round_robin_upstreams: 1
idle_timeout: 9000
tls_connection_retries: 2
tls_backoff_time: 900
timeout: 3000
listen_addresses:
- 127.0.1.1@53
upstream_recursive_servers:
Yes and I believe it will cause you to lose connection. I thought of this because there is no pre configured servers like the stubby install script here has with cloudflare.I was surprised I was able to apply with DNS Privacy enabled, but no resolvers in the table. I would consider that an alpha bug?
it wrote an incomplete config:
Code:# cat /etc/stubby/stubby.yml resolution_type: GETDNS_RESOLUTION_STUB dns_transport_list: - GETDNS_TRANSPORT_TLS tls_authentication: GETDNS_AUTHENTICATION_REQUIRED tls_query_padding_blocksize: 128 tls_ca_file: "/etc/ssl/certs/ca-certificates.crt" appdata_dir: "/var/lib/misc" resolvconf: "/tmp/resolv.conf" edns_client_subnet_private: 1 dnssec_return_status: GETDNS_EXTENSION_TRUE round_robin_upstreams: 1 idle_timeout: 9000 tls_connection_retries: 2 tls_backoff_time: 900 timeout: 3000 listen_addresses: - 127.0.1.1@53 upstream_recursive_servers:
As stated earlier in other post, my ISP is using transparent ISP proxy server and in order to bypass that i was using the stubby script via AMTM terminal. Now, with this Alpha build i aspire to achieve the same thing (i.e. bypassing my ISP transparent proxy server) and route all the traffic to either Cloudflare or Google DNS because the DNS which my ISP uses gives poor pings while gaming.You can, as long you keep in mind that they may all be used. So if you add a specific server for its filtering capabilities (like AdGuard), then only queries using that specific server will benefit from it.
But if you just want redundancy, you can add up to 8 servers without any problem (probably a bit less if on an RT-AC86U or RT-AX88U due to nvram size limitations).
As stated earlier in other post, my ISP is using transparent ISP proxy server and in order to bypass that i was using the stubby script via AMTM terminal. Now, with this Alpha build i aspire to achieve the same thing (i.e. bypassing my ISP transparent proxy server) and route all the traffic to either Cloudflare or Google DNS because the DNS which my ISP uses gives poor pings while gaming.
So, once again i installed the Alpha 3 firmware on my RT-86U router and this time i configured it properly by following the L&D's guide.
Now, i am using all the default DNS settings along with the DOT protocol enabled for cloudflare DNS. The good thing with this build is that i am able to bypass the ISP transparent proxy server without using any other script.
However, every time i reboot the router the DOT protocol stops working (though it remains enabled in web ui) but instead of the cloudflare's DNS my ISP's DNS shows on https://www.dnsleaktest.com/
So. in order to bypass the ISP proxy after every reboot of the router, i have to manually disable and then re-enable the DOT setting in the router's Web UI.
Maybe try turning on DNS FILTER mode and Choose global option to be router. Then reboot your router. see if your back to your ISP DNS or if you are using Cloudflare.As stated earlier in other post, my ISP is using transparent ISP proxy server and in order to bypass that i was using the stubby script via AMTM terminal. Now, with this Alpha build i aspire to achieve the same thing (i.e. bypassing my ISP transparent proxy server) and route all the traffic to either Cloudflare or Google DNS because the DNS which my ISP uses gives poor pings while gaming.
So, once again i installed the Alpha 3 firmware on my RT-86U router and this time i configured it properly by following the L&D's guide.
Now, i am using all the default DNS settings along with the DOT protocol enabled for cloudflare DNS. The good thing with this build is that i am able to bypass the ISP transparent proxy server without using any other script.
However, every time i reboot the router the DOT protocol stops working (though it remains enabled in web ui) but instead of the cloudflare's DNS my ISP's DNS shows on https://www.dnsleaktest.com/
So. in order to bypass the ISP proxy after every reboot of the router, i have to manually disable and then re-enable the DOT setting in the router's Web UI.
i just tried the same thing and it worksMaybe try turning on DNS FILTER mode and Choose global option to be router. Then reboot your router. see if your back to your ISP DNS or if you are using Cloudflare.
I Figured it would break the transparent proxy. The cool thing about the DNS filter is let's say you have a device that is required to use the transparent proxy you can always add that device by its mac address and turn on No -filter for it individually.i just tried the same thing and it works
thanks bro! for your help.
Also, here is an example of the DNSSEC plugin available in Firefox:
View attachment 17085
Green color means that DNSSEC is enabled on the website. Red color means the website does not support DNSSEC. You may be surprised at how many websites don't support DNSSEC.
But do you have graphs of the accuracy? ;-)NTP server working as intended.
View attachment 17088
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!