bluzfanmr1
Senior Member
Does anyone ever see DoT in use using other than CF and their app? I haven't so far and wonder if that isn't more evidence that the CF test is broken/rigged?
I use Quad9 and this test...
http://0skar.cz/dns/en/
Does anyone ever see DoT in use using other than CF and their app? I haven't so far and wonder if that isn't more evidence that the CF test is broken/rigged?
What app do you use to confirm it's all working? I would like to go to Cleanbrowsing again if it works here.The CF test is not broken. Just has its limitations. It does verify that DoT or DoH is working. It does not test other resolvers. I have tested and use Quad9 and CleanBrowsing as well as Cloudflare. Usually do not use DNSSEC, with the Entware/Stubby install but this Alpha2 version seems to be running very well with DNSSEC enabled on Quad9.
Doubt it any time soon as only 1-2 routers support it because of kernel requirements.This is great! Any plans to have WireGuard implemented?
Would it be feasible to move the preset dropdown list to the Address field under "DNS-over-TLS Server List"? It would just seem more intuitive to me.
Live client's DNS traffic is encrypted.When I disable "Wan: Use local caching DNS server..." and enable DNS Privacy, I end up with 3 entries in /tmp/resolv.conf: WAN DNS1, WAN DNS2 and 127.0.1.1. In that scenario, the router resolver will likely never use DoT because the WAN DNS entries are first. Is that intentional, or what is the reasoning behind all 3 entries being added if DNS Privacy is the goal?
Worked for me too, thanks. Up until now thought the CF site was universal.
Now DNSSEC active & your link I am getting all success.
I don't know what that site is checking cause my DNSSEC is disabled and the results are all successful. It's possible it only checks if your DNS server is DNSSEC capable?Now DNSSEC active & your link I am getting all success.
Thank You, I was just now noticing that same information, as I turned the settings on/off.I don't know what that site is checking cause my DNSSEC is disabled and the results are all successful. It's possible it only checks if your DNS server is DNSSEC capable?
This seeming contradiction may be explained by dnsmasq having proxy-dnssec set.Thank You, I was just now noticing that same information, as I turned the settings on/off.
# grep proxy /etc/dnsmasq.conf
proxy-dnssec
I get success about half the time with DNSSEC on, always with it off. Using Quad 9 secure.Now DNSSEC active & your link I am getting all success.
Weird that Cloudflre wouldn't correctly verify.
With DNSSEC disabled, here's grep's result. Proxy-dnssec is not present.This seeming contradiction may be explained by dnsmasq having proxy-dnssec set.
If this is set, then the router does not actually check DNSSEC itself. Instead, the upstream DNS provider you have configured does the DNSSEC checking and the result is set in the DNS reply. In this way you essentially have the DNSSEC functionality. This is why the DNSSEC test succeeds.Code:# grep proxy /etc/dnsmasq.conf proxy-dnssec
/tmp/home/root# grep proxy /etc/dnsmasq.conf
/tmp/home/root#
IfWith DNSSEC disabled, here's grep's result. Proxy-dnssec is not present.
Not unless I'm in the wrong directory?Code:/tmp/home/root# grep proxy /etc/dnsmasq.conf /tmp/home/root#
Bullet 2 I don't know how to check but bullets 1 & 3 I'm sure are disabled. DOT(cloudflare) is primary DNS server used.If
are all disabled,
- DNSSEC from dnsmasq set from the router firmware
- (LAN > DHCP Server > DNS and WINS Server Setting > Enable DNSSEC support)
- DNSSEC from Stubby getdns
- ("stubby -i | grep -i dnssec" is NOT all GETDNS_EXTENSION_FALSE)
- Proxy DNSSEC from dnsmasq
- (grep proxy-dnssec /etc/dnsmasq.conf)
and your router is actually your DNS server,
then
- DNSSEC tests should fail
If
are all disabled,
- DNSSEC from dnsmasq set from the router firmware
- (LAN > DHCP Server > DNS and WINS Server Setting > Enable DNSSEC support)
- DNSSEC from Stubby getdns
- ("stubby -i | grep -i dnssec" is NOT all GETDNS_EXTENSION_FALSE)
- Proxy DNSSEC from dnsmasq
- (grep proxy-dnssec /etc/dnsmasq.conf)
and your router is actually your DNS server,
then
- DNSSEC tests should fail
:/tmp/home/root# stubby -i | grep -i dnssec
[21:23:52.419413] STUBBY: Read config from file /etc/stubby/stubby.yml
Result: Config file syntax is valid.
"dnssec": GETDNS_EXTENSION_FALSE,
"dnssec_allowed_skew": 0,
"dnssec_return_all_statuses": GETDNS_EXTENSION_FALSE,
"dnssec_return_full_validation_chain": GETDNS_EXTENSION_FALSE,
"dnssec_return_only_secure": GETDNS_EXTENSION_FALSE,
"dnssec_return_status": GETDNS_EXTENSION_FALSE,
"dnssec_return_validation_chain": GETDNS_EXTENSION_FALSE,
"trust_anchors_verify_email": <bindata of "[EMAIL]dnssec@iana.org[/EMAIL]">,
:/tmp/home/root#
Yes, just run the command and same results as yours. So, the site seems to just check if DNS server being used is DNSSEC capable just like this site.2. Ran that command and got:
Code::/tmp/home/root# stubby -i | grep -i dnssec [21:23:52.419413] STUBBY: Read config from file /etc/stubby/stubby.yml Result: Config file syntax is valid. "dnssec": GETDNS_EXTENSION_FALSE, "dnssec_allowed_skew": 0, "dnssec_return_all_statuses": GETDNS_EXTENSION_FALSE, "dnssec_return_full_validation_chain": GETDNS_EXTENSION_FALSE, "dnssec_return_only_secure": GETDNS_EXTENSION_FALSE, "dnssec_return_status": GETDNS_EXTENSION_FALSE, "dnssec_return_validation_chain": GETDNS_EXTENSION_FALSE, "trust_anchors_verify_email": <bindata of "[EMAIL]dnssec@iana.org[/EMAIL]">, :/tmp/home/root#
3. The command came out empty.
With this, the DNSSEC tests still say that it's enabled. Just enabling DNS over TLS seems to be enough. Everything is green here: http://0skar.cz/dns/en/
I don't know what that site is checking cause my DNSSEC is disabled and the results are all successful. It's possible it only checks if your DNS server is DNSSEC capable?
Ha! I removed proxy-dnssec from /etc/dnsmasq.conf, service restart_dnsmasq, flushed DNS on Windows and restarted browser. DNSSEC is still working as if it was proxied. From Chrome on Windows and I am even seeing "ad" in the dig flags of websites with DNSSEC from ssh on the router. This is interesting.1. I have no such DNSSEC setting here. The DNS Server 1 & 2, and the WINS Server are all blank. In the WAN -> WAN DNS section, DNSSEC is NOT enabled here. I do have DNS-Over-TLS (DoT) enabled.
2. Ran that command and got:
Code::/tmp/home/root# stubby -i | grep -i dnssec [21:23:52.419413] STUBBY: Read config from file /etc/stubby/stubby.yml Result: Config file syntax is valid. "dnssec": GETDNS_EXTENSION_FALSE, "dnssec_allowed_skew": 0, "dnssec_return_all_statuses": GETDNS_EXTENSION_FALSE, "dnssec_return_full_validation_chain": GETDNS_EXTENSION_FALSE, "dnssec_return_only_secure": GETDNS_EXTENSION_FALSE, "dnssec_return_status": GETDNS_EXTENSION_FALSE, "dnssec_return_validation_chain": GETDNS_EXTENSION_FALSE, "trust_anchors_verify_email": <bindata of "[EMAIL]dnssec@iana.org[/EMAIL]">, :/tmp/home/root#
3. The command came out empty.
With this, the DNSSEC tests still say that it's enabled. Just enabling DNS over TLS seems to be enough. Everything is green here: http://0skar.cz/dns/en/
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!