What router and firmware version are you using?@Xentrk hi im having problems with diversion particular when enable / restarting pixelserv stubby is stopping, blokking ads won't work in other words diversion don't work for me did you had also problems with diversion?
pixelserv-tls[20543]: Listening on :192.168.x.2:443
pixelserv-tls[20543]: Listening on :192.168.x.2:80
I still pass the test at https://www.cloudflare.com/ssl/encrypted-sni/. If you enabled DNSSEC on the router firmware, the site will report a fail for Secure DNS but a pass for DNSSEC. Run the install_stubby.sh again and retest. No need to select the uninstall option first.I have noticed today that I am no longer passing the DNSSEC check at https://www.cloudflare.com/ssl/encrypted-sni/
However I am still passing checks on other resolver tests such as https://cmdns.dev.dns-oarc.net/ and https://dnssec.vs.uni-due.de/ and http://en.conn.internet.nl/connection/
Though these tests seem to be taking longer than normal. Could this be a Cloudflare issue? Anyone else seeing a DNSSEC failure on the Cloudflare test page?
I still pass the test at https://www.cloudflare.com/ssl/encrypted-sni/. If you enabled DNSSEC on the router firmware, the site will report a fail for Secure DNS but a pass for DNSSEC. Run the install_stubby.sh again and retest. No need to select the uninstall option first.
My fork uses dnsmasq to do the dnssec validation, and I'm sure it works.On another note I've discovered that the stubby in John's fork does not use DNSSEC and I've not been able to prove it is as secure as this stubby add on.
The test site won't work, so it isn't important. If a guy can prove it out with a few commands, that works too.So far, so good....the trust anchors are being automatically downloaded and all the dnssec tests are passing.
It still causes the cloudflare /help page to fail however.
dnssec_return_status: GETDNS_EXTENSION_TRUE
server=127.0.0.1#5453
server=0::1#5453
proxy-dnssec
That is what I find too. Both the cloudflare help page and https://www.cloudflare.com/ssl/encrypted-sni/ (which supports DNSSEC) will report Secure DNS as not working.So far, so good....the trust anchors are being automatically downloaded and all the dnssec tests are passing.
It still causes the cloudflare /help page to fail however.
TEST 1
#tls_ca_file: "/rom/etc/ssl/certs/ca-certificates.crt"
dnssec_return_status: GETDNS_EXTENSION_FALSE
NO root anchors in /opt/var/cache/stubby
Results:
1. DNSSEC test sites work
2. Cloudflare test page works
3. https://www.cloudflare.com/ssl/encrypted-sni/
yes - SECURE DNS
yes - DNSSEC
4. stubby -l: STUBBY: DNSSEC Validation is OFF
TEST 2
tls_ca_file: "/rom/etc/ssl/certs/ca-certificates.crt"
dnssec_return_status: GETDNS_EXTENSION_TRUE
NO root anchors in /opt/var/cache/stubby
Results:
1. DNSSEC test sites DO NOT work
2. Cloudflare test page works
3. https://www.cloudflare.com/ssl/encrypted-sni/
yes - SECURE DNS
NO - DNSSEC
4. stubby -l: STUBBY: DNSSEC Validation is ON
TEST 3
#tls_ca_file: "/rom/etc/ssl/certs/ca-certificates.crt"
dnssec_return_status: GETDNS_EXTENSION_TRUE
root anchors in /opt/var/cache/stubby
Results:
1. DNSSEC test sites work
2. Cloudflare test page DOES NOT work
3. https://www.cloudflare.com/ssl/encrypted-sni/
No - SECURE DNS
yes - DNSSEC
4. stubby -l: STUBBY: DNSSEC Validation is OFF
TEST 4
tls_ca_file: "/rom/etc/ssl/certs/ca-certificates.crt"
dnssec_return_status: GETDNS_EXTENSION_FALSE
root anchor files in /opt/var/cache/stubby
Results:
1. DNSSEC test sites work
2. Cloudflare test page works
3. https://www.cloudflare.com/ssl/encrypted-sni/
No - SECURE DNS
yes - DNSSEC
What are you using for settings in regard to dnssec? Is it enabled in the .yml or is it enabled in the webui?Update. Have been running Stubby with DNSSEC for two days with good success! I am using Cloudflare resolvers in roundrobin configuration. I have tested Quad9 and CleanBrowsing secure but have had connection issues with their resolvers. I feel confident that DoT and DNSSEC are working as intended. Yes, the Cloudflare test site does not work with this configuration. Using dig does return the ad flag.
Sent from my SM-T380 using Tapatalk
Bit of a tangent (ish), I wonder if that's what dnscrypt needs for dnssec...yes....and you also need to add
proxy-dnssec
to /etc/dnsmasq.conf with an add or postconf script
Can this be done in /jffs/configs/ ?yes....and you also need to add
proxy-dnssec
to /etc/dnsmasq.conf with an add or postconf script
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!