Swistheater
Very Senior Member
I did notice I received a lot of errors running the two togetherfyi, as tured out earlier CF performs DNSSEC on its own, no need to enable it on router.
but might be useful with other DoT servers w/o "builtin" DNSSEC
I did notice I received a lot of errors running the two togetherfyi, as tured out earlier CF performs DNSSEC on its own, no need to enable it on router.
but might be useful with other DoT servers w/o "builtin" DNSSEC
It's added if you enable DNSSEC on the router. Are you asking for it to be included even if DNSSEC is off on the router?With alpha 3 my iOS Dig test did not return the "ad" flag. Created dnsmasq.conf.add with proxy-dnssec and restarted dnsmasq. Now Dig gets the "ad" flag.
Request proxy-dnssec be included in the next build.
Thanks
Sent from my SM-T380 using Tapatalk
It's added if you enable DNSSEC on the router. Are you asking for it to be included even if DNSSEC is off on the router?
Request proxy-dnssec be included in the next build.
It would be nice to include options to use getdns features as well in stead of built in dnssec
When I use "AdGuard" (any) I get random "page not found" type messages. Everything else like Google or Cloudfare for example is Ok.
Merlin, could we please have SafeDNS added (these do DNS over TLS + Content filtering) - this seems to be closest to OpenDNS (as OpenDNS don't do safe browsing in search engines or DNSSec or DNS over TLS). Also Cleanbrowsing do DNS over TLS but their filtering does adult+malicious+ads+safe search but doesn't allow blocking of dating web sites for example.
Also I was initially confused over how the section in WAN related to the DNS Filter section. In DNS Filter, you can set providers and then exclude for certain computers. With the section in WAN, it was assumed to apply to anything.
Also getting DNS automatically - shouldn't this be greyed out if the option for DNS over TLS is then chosen?
Ah rats! DNSSEC was not enabledIt already is... Just enable DNSSEC on the webui.
stubby.postconf will be the place to do it.
Ah, no. If you used one of the web DNSSEC tests they just prove that your chosen upstream resolvers can do DNSSEC. You must enable DNSSEC in your router!
By my understanding, proxy-dnssec should only be included if stubby is doing the dnssec validation (dnssec in stubby.yml) or dnssec is not set in either dnsmasq or stubby (the upstream stubby server is doing the validation). If dnsmasq is doing the dnssec validation, proxy-dnssec should not be specified.
So are you on the fence does it need to be turned on or off? I notice CF does do dnssec, but the router is the only thing that can mark the AD flag on the dig and drill test.unrelated. I've checked cf with more reliable tools like dig.
isn't "dnssec" too strict? unlike "dnssec_return_status" it'll drop all the GETDNS_DNSSEC_INTERMEDIATE replies.
[15:57:31.853532] STUBBY: Read config from file /etc/stubby/stubby.yml
"dnssec": GETDNS_EXTENSION_FALSE,
"dnssec_allowed_skew": 0,
"dnssec_return_all_statuses": GETDNS_EXTENSION_FALSE,
"dnssec_return_full_validation_chain": GETDNS_EXTENSION_FALSE,
"dnssec_return_only_secure": GETDNS_EXTENSION_FALSE,
"dnssec_return_status": GETDNS_EXTENSION_TRUE,
"dnssec_return_validation_chain": GETDNS_EXTENSION_FALSE,
"trust_anchors_verify_email": <bindata of "[email protected]">,
The sub-options are only active if the first plain "dnssec" option is turned on (TRUE)with "dnssec_return_status": GETDNS_EXTENSION_TRUE
that is interesting how does dig and drill test come back with the AD flag, if this is not true as far as the main Dnssec option up top.The sub-options are only active if the first plain "dnssec" option is turned on (TRUE)
My guess is:By my understanding, proxy-dnssec should only be included if stubby is doing the dnssec validation (dnssec in stubby.yml) or dnssec is not set in either dnsmasq or stubby (the upstream stubby server is doing the validation). If dnsmasq is doing the dnssec validation, proxy-dnssec should not be specified.
To me this would seem the correct approach that you listed above... but the new firmware alpha isMy guess is:
Choose one and only one:
- DNSSEC proxy by dnsmasq set by proxy-dnssec in /etc/dnsmasq.conf
- or
- DNSSEC direct by dnsmasq set by Merlin GUI LAN > DHCP Server > Enable DNSSEC support
- or
- DNSSEC direct by stubby set by dnssec: GETDNS_EXTENSION_TRUE and dnssec_return_all_statuses: GETDNS_EXTENSION_TRUE in stubby.yml
Is the gui dnssec option turned off?that is interesting how does dig and drill test come back with the AD flag, if this is not true as far as the main Dnssec option up top.
proxy-dnssec is turned on in dnsmasq.conf and "dnssec_return_status": GETDNS_EXTENSION_TRUE is on inside stubby.yml
Is the gui dnssec option turned off?

Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!