Swistheater
Very Senior Member
You use the same one as the one for 9.9.9.9
9.9.9.9, 149.112.112.112Since the secondary Cloudflare server is listed in the drop-down, I was expecting the secondary quad9 to be in there as well. I added it manually. One question is what value to use for the TLS hostname for this server. When I do a reverse lookup on dns.quad9.net, I get 9.9.9.9 and 149.112.112.112, but when I do a lookup on 149.112.112.112, I get rpz-public-resolver1.rrdns.pch.net. I imagine that either is ok to use, but I'm not sure.
9.9.9.9, 149.112.112.112
2620:fe::fe, 2620:fe::9
In addition we support DNS-over-TLS on the standard port of 853 using the auth name of dns.quad9.net. For more information on the configuration of DNS-over-TLS see the DNS Privacy Project.^^^^from their website
Since the secondary Cloudflare server is listed in the drop-down, I was expecting the secondary quad9 to be in there as well. I added it manually.
I don't like the idea of dumping too much unrelated information in that frame, which is meant to only report the information specific to the WAN connection, as configured between you and your ISP. It's not meant to reflect every other configuration that might have been done and might impact how the connection is working (i.e. DNSFilter, DNS Privacy, VPN Clients with traffic redirection, and so on).
I can see if there's a clean way to mention that DNS Privacy is enabled, but at this time I'm not too fond of the idea of flooding this section with additional information, especially as the majority of users don't even realize this frame exists at all (I frequently get people asking me for a way to display that info, not knowing it's already there).
One unanticipated aspect is that DNSSEC and DoT won't work for DNS servers set for specific devices on the DNS Filter page, correct?
All of the web DNSSEC test pages only test that the upstream resolvers, your DNS servers, can do DNSSEC. Does not test your end.Confirmed, dirty flash is working smoothly for me. I'm running DoT with cloudflare on my ac86u no problems. I did have to disable DNSSEC in the webui, otherwise it breaks cloudflares DoT test page. Note that even with DNSSEC disabled, all DNSSEC test pages (including cloudflare) all test out OK. Incidentally, I'm also running the new ntpd from the webui, and that appears to be working fine as well (this replaced my manual script ntpd setup I used before). Also as a sidenote, AMTM, Diversion+pixelserv, Yazfi, and Skynet are also happily strumming along. I'll be sure to post if any issues crop up, but otherwise you've got my +1 for release.
Not unanticipated, working as intended. DNSFilter's goal is to bypass any existing client configuration. So if you force a client to use OpenDNS, then it's impossible for that client to use DoT, as OpenDNS servers don't support it.
Sorry, I meant unanticipated on my behalf. If I were to assign a DNSSEC+DoT capable DNS server to a specific client in the DNS Filter page, would DNSSEC and DoT be used for that server?
Merlin is correct 100 percent. Router forces the dot to be used on that device. You can globally specify router for all devices and make rules to specifically require certain devices to use other servers if you do not want them on DoT server. ---this would be devices that may be required to be on isp servers or maybe they require certain filtering like open dns provides.Set that client to use "Router" instead on the DNSFilter rules.
If you assign Quad9 in DNSFilter, even though it supports DoT, DNSFilter is still only passing old fashioned DNS over 53/udp.Sorry, I meant unanticipated on my behalf. If I were to assign a DNSSEC+DoT capable DNS server to a specific client in the DNS Filter page, would DNSSEC and DoT be used for that server?
Thanks for the fast, and insightful reply. So I guess those sites are kinda pointless then. FWIW, when I turn on dnssec in my router,All of the web DNSSEC test pages only test that the upstream resolvers, your DNS servers, can do DNSSEC. Does not test your end.
Sent from my SM-T380 using Tapatalk
dig +dnssec +multi asuswrt.lostrealm.ca @127.0.0.1
KDIG will only work reliably from a Ubuntu desktop or equivalent. It does in fact succeed. The command is (and can be modified):OTOH, the only way I know to test DoT is with cloudflare's page, but it fails the test when DNSSEC is enabled. Is there a reliable way to verify both dnssec and dot on my end from terminal? I read some info elsewhere about using kdig for this, but I don't have that on my router (yet)... plus rather get advice from the ground up on this.
kdig -d @1.1.1.1 +tls-ca +dnssec +tls-host=cloudflare-dns.com example.com
I think we’ve discussed this in the “old” Stubby thread, but this command is only testing your Linux client’s ability to use DoT directly with Cloudflare, bypassing your router and Stubby completely. Just don’t want to confuse anyone wanting to test the router’s ability to do DoT.KDIG will only work reliably from a Ubuntu desktop or equivalent. It does in fact succeed. The command is (and can be modified):make sure to exception the test rig from the DNSFilter.Code:kdig -d @1.1.1.1 +tls-ca +dnssec +tls-host=cloudflare-dns.com example.com
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!