Jack Yaz
Part of the Furniture
Yes add it to /jffs/configs/dnsmasq.conf.addCan this be done in /jffs/configs/ ?
Yes add it to /jffs/configs/dnsmasq.conf.addCan this be done in /jffs/configs/ ?
Where are you selecting or coding dnssec validation? I'm confused a bit.Bit of a tangent (ish), I wonder if that's what dnscrypt needs for dnssec...
EDIT: added, so far so good (apparently i had already proxy-dnssec to my dnsmasq but not yet re-enabled dnssec validation, oops)
I admit I haven't kept up with dnscrypt v2. As I understand it, the proxy-dnssec statement is telling dnsmasq it should pass on the dnssec results from upstream in it's responses. I don't know if dnscrypt is doing it's own dnssec validation that would need to be passed on.Bit of a tangent (ish), I wonder if that's what dnscrypt needs for dnssec...
EDIT: added, so far so good (apparently i had already proxy-dnssec to my dnsmasq but not yet re-enabled dnssec validation, oops)
Currently there is no test for both. Test for DoT then turn on DNSSEC either in the gui or stubby.yml then check with dig.Thanks guys, I got it working. How does one test for DoT if the cloudflare site fails?
Outside of my fork, you can kill stubby, then restart it in the foreground with a loglevel of 7.....then you can watch the TLS negotiations take place (Beware....this generates LOTS of data )So to be clear there is no way to determine if they both work at the same time. I know their jobs are different but are they working is the question?
I'm a low traffic kind of guy. Just interested in security. I will take @john9527 advice that it is working, I have been following him for years now and never had bad advice. You rock @john9527Outside of my fork, you can kill stubby, then restart it in the foreground with a loglevel of 7.....then you can watch the TLS negotiations take place (Beware....this generates LOTS of data )
With that proxy-dnssec enabled, be it our router/stubby has dnssec verification enabled or not, the ad flag is always there as cloudflare already done the validation and passed on to us.I admit I haven't kept up with dnscrypt v2. As I understand it, the proxy-dnssec statement is telling dnsmasq it should pass on the dnssec results from upstream in it's responses. I don't know if dnscrypt is doing it's own dnssec validation that would need to be passed on.
Without the proxy-dnssec statement, the ad flag would be missing from dig output for example (at least it behaved that way in my testing)With that proxy-dnssec enabled, be it our router/stubby has dnssec verification enabled or not, the ad flag is always there as cloudflare already done the validation and passed on to us.
What does this command prove?Without the proxy-dnssec statement, the ad flag would be missing from dig output for example (at least it behaved that way in my testing)
kdig -d @1.1.1.1 +dnssec +tls-ca +tls-host=cloudflare-dns.com example.com
You can alter this command to look like this:Figured it out, this command should look like this to show both dnssec and DoT working (note the flags):
Code:kdig -d @1.1.1.1 +dnssec +tls-ca +tls-host=cloudflare-dns.com example.com
kdig -d @1.1.1.1 +dnssec +tls-ca +tls-host=cloudflare-dns.com asuswrt-lostrealm.ca
Dont think so...So what it mean? We handed the dnssec validation to cloudflare? Will last mile from cf to us be attacked?
The above command shows that both are working against the same site, this was run from a Ubuntu desktop Terminal.Dont think so...
Here is some good bedtime reading: https://labs.ripe.net/Members/willem_toorop/sunrise-dns-over-tls-sunset-dnssec
As I read that article, DoT and DNSSEC are needed together. It does not seem to matter if you use DNSSEC with Stubby or with dnsmasq. The security results should be the same. I have Asus routers working both ways. One on Merlin 384.7_2 with Stubby Entware and two on John's 36E9. Interesting that John's fork works well with Quad9 and my home router on Merlin does not like Quad9. I suspect it is my lousy DSL service at home!
As for now the girls are happy and oblivious to the added security for DNS. As long as the network stays up I have a happy home!
$ kdig -d @1.1.1.1 +tls-ca +tls-host=cloudflare-dns.com example.com
;; DEBUG: Querying for owner(example.com.), class(1), type(1), server(1.1.1.1), port(853), protocol(TCP)
;; DEBUG: TLS, imported 170 system certificates
;; DEBUG: TLS, received certificate hierarchy:
;; DEBUG: #1, C=US,ST=CA,L=San Francisco,O=Cloudflare\, Inc.,CN=\*.cloudflare-dns.com
;; DEBUG: SHA-256 PIN: yioEpqeR4WtDwE9YxNVnCEkTxIjx6EEIwFSQW+lJsbc=
;; DEBUG: #2, C=US,O=DigiCert Inc,CN=DigiCert ECC Secure Server CA
;; DEBUG: SHA-256 PIN: PZXN3lRAy+8tBKk2Ox6F7jIlnzr2Yzmwqc3JnyfXoCw=
;; DEBUG: TLS, skipping certificate PIN check
;; DEBUG: TLS, The certificate is trusted.
;; TLS session (TLS1.3)-(ECDHE-SECP256R1)-(ECDSA-SECP256R1-SHA256)-(AES-256-GC
;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 58548
;; Flags: qr rd ra; QUERY: 1; ANSWER: 1; AUTHORITY: 0; ADDITIONAL: 1
;; EDNS PSEUDOSECTION:
;; Version: 0; flags: ; UDP size: 1536 B; ext-rcode: NOERROR
;; PADDING: 408 B
;; QUESTION SECTION:
;; example.com. IN A
;; ANSWER SECTION:
example.com. 2347 IN A 93.184.216.34
;; Received 468 B
;; Time 2018-03-31 15:20:57 PDT
;; From 1.1.1.1@853(TCP) in 12.6 ms
kdig -d @1.1.1.1 +dnssec +tls-ca +tls-host=cloudflare-dns.com asuswrt-lostrealm.ca
Try it again without asuswrt-lostrealm.caCheck for "ad" flag...
You are right sir:Try it again without asuswrt-lostrealm.ca
Since you are interested in communication with a resolver only use a resolver in the dig test.
Sent from my SM-T380 using Tapatalk
kdig -d @1.1.1.1 +dnssec +tls-ca +tls-host=cloudflare-dns.com
;; DEBUG: Querying for owner(.), class(1), type(2), server(1.1.1.1), port(853), protocol(TCP)
;; DEBUG: TLS, imported 133 system certificates
;; DEBUG: TLS, received certificate hierarchy:
;; DEBUG: #1, C=US,ST=CA,L=San Francisco,O=Cloudflare\, Inc.,CN=*.cloudflare-dns.com
;; DEBUG: SHA-256 PIN: yioEpqeR4WtDwE9YxNVnCEkTxIjx6EEIwFSQW+lJsbc=
;; DEBUG: #2, C=US,O=DigiCert Inc,CN=DigiCert ECC Secure Server CA
;; DEBUG: SHA-256 PIN: PZXN3lRAy+8tBKk2Ox6F7jIlnzr2Yzmwqc3JnyfXoCw=
;; DEBUG: TLS, skipping certificate PIN check
;; DEBUG: TLS, The certificate is trusted.
;; TLS session (TLS1.2)-(ECDHE-ECDSA-SECP256R1)-(AES-256-GCM)
;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 52206
;; Flags: qr rd ra ad; QUERY: 1; ANSWER: 14; AUTHORITY: 0; ADDITIONAL: 1
;; EDNS PSEUDOSECTION:
;; Version: 0; flags: do; UDP size: 1452 B; ext-rcode: NOERROR
;; PADDING: 215 B
;; QUESTION SECTION:
;; . IN NS
;; ANSWER SECTION:
. 6014 IN NS c.root-servers.net.
. 6014 IN NS d.root-servers.net.
. 6014 IN NS e.root-servers.net.
. 6014 IN NS f.root-servers.net.
. 6014 IN NS g.root-servers.net.
. 6014 IN NS h.root-servers.net.
. 6014 IN NS i.root-servers.net.
. 6014 IN NS j.root-servers.net.
. 6014 IN NS k.root-servers.net.
. 6014 IN NS l.root-servers.net.
. 6014 IN NS m.root-servers.net.
. 6014 IN NS a.root-servers.net.
. 6014 IN NS b.root-servers.net.
. 6014 IN RRSIG NS 8 0 518400 20181114170000 20181101160000 2134 . p4c0G2IIb6Yq7Vwj3vJ7JQnRHfkNQ6oBFmio3gRspgIHfRi5nluTq5P8HUB2QljeBaTB+YIjjAzMCWqmDF8edaRLHwOrFHerhUUlQuUNskg1CxR8eqdInCNchKGMoZ9qeaP51mT93DtvnbvsQFuLYEhgX169VzUzcWPDYaUeHwxJd4fQ2IH9qf7J5EEf+LXvDbuU3DVpuYNafzXI2BS7huJfjJt+tKblnGH1YRrwn6/C8NsYZ6XutVi+9pCe4mhKSAqxRhrGcJ67c79GY3nH57KVVWyr4Tt5J/g38DEmFCRCGseES15It59SRCiFdHn4COsg9yWQM+APARq4DC95ww==
;; Received 936 B
;; Time 2018-11-01 20:23:43 CST
;; From 1.1.1.1@853(TCP) in 22.1 ms
Interesting! I saw that setting in the OpenWRT tutorial I used as a guide for implementing on Asuswrt Merlin. But I thought it was a setting specific to OpenWRT. I can easily update the installer to include it. I can only monitor how testing goes for everyone right now. I am hindered from making changes as my laptop is in the shop for repair.yes....and you also need to add
proxy-dnssec
to /etc/dnsmasq.conf with an add or postconf script
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!