Reboot worked without issues. @RMerlin @themiron clearly the proxy-dnssec does not need to be there, if using the webui settings.
it must be there, othercase authenticated status of reply from stubby will be lost in dnsmasq and will never reach lan clients.
Still trying to get an answer why this entry is in stubby.yml: resolvconf: "/tmp/resolv.conf"
because this file is the only valid path with upstream (isp) nameservers that stubby can use.
I think of it similar to how many people add "server=/pool.ntp.org/1.1.1.1/" to dnsmasq.conf so that ntp can sync before everything is up and running fully.
right, not a really great idea to have it configured, taking into account ntp issue was fixed in alpha2 and dnsmasq will always try to resolve all [*.]pool.ntp.org via 1.1.1.1 w/o dot/dnssec/etc with this record even if internet connection was not built or can't be built yet (think about pptp/l2tp or pppoe+dhcp, or other vpn-foo).
/tmp/resolv.conf will always point to your WAN DNS servers, which is why I think it's a bad idea to set WAN DNS to your router LAN IP nowadays.
yes, it's bad idea causing dns loop.
So far the only difference in mine from the original is that I added some other servers, but durring reboot it takes alonger for connection to be restored. Is there a more graceful way of doing this?
yep, add that servers via web ui.
In the current Alpha 4, you only have to enable DNSSEC and it turns on DNSSEC in Stubby and enables dnsmasq to proxy and cache the "AD" flag from Stubby to clients. The three options mentioned are only valid for John's fork. Adding Cloudflare DoT is no sweat either. But DNSSEC is always a controversial debate around here, so everyone is always prepared to be wrong.
things were changed, seems dnsmasq's dnssec works a bit faster unlike stubby with its additional uncached dot checking requests for every incoming one. so, dnsmasq now is used for dnssec for all non-dot + dot cases.
automatic anchor download is a good feature, but not a big deal.
Is this difference in settings (dnssec vs dnssec_return_status) equivalent to the current DNSSEC Strict Validation parameter? It seems the firmware only toggles dnsmasq settings and not Stubby when this is set.
no, they are different.
strict validation is about deeper checking of unsigned replies, dnsmasq takes steps to be sure they are really not signed. dnssec vs dnssec_return_status is more about bad/changed replies at the time when they can't be checked at all (due no root keys accesible, blocked by firewall, routing or so) and therefore dnssec validation is not functional.