Curious, if this unbound implementation has the ability to work directly as a resolver and not just a forwarder to other public resolvers, i.e. cloudfare, google, etc ...?
I switched to pfsense, outstanding router software, at my home but still manage my folks place with Asus merlin. Anyway, I went setup DNS over TLS on pfSense unbound, which was quite easy.
Upon further reading, I realized that DOT was only making private my forwarded DNS request from my home network to the public resolver. After that the public resolver, i.e. cloudfare, google, etc ..., functions as a resolver and request the DNS from authoritative name servers. This means I have hidden the DNS request from my ISP. To my knowledge, none of the authoritative name servers accept DOT or DOH request. So our request from the public resolvers we choose are not encrypted to the authoritative name servers and the cloudfare, google etc have access to our DNS request history (we have to trust them not to use it). Most if not all authoritative name servers do DNSSEC.
Using Unbound in resolver mode simply cuts out the middle man, cloudfare, google, etc, and Unbound takes their place going directly the authoritative name servers. Given my internet providers' network latency, I find this implementation to generally be more responsive as well.
https://discourse.pi-hole.net/t/general-consensus-to-use-cloudflare-proxy-or-unbound/19120/2
I switched to pfsense, outstanding router software, at my home but still manage my folks place with Asus merlin. Anyway, I went setup DNS over TLS on pfSense unbound, which was quite easy.
Upon further reading, I realized that DOT was only making private my forwarded DNS request from my home network to the public resolver. After that the public resolver, i.e. cloudfare, google, etc ..., functions as a resolver and request the DNS from authoritative name servers. This means I have hidden the DNS request from my ISP. To my knowledge, none of the authoritative name servers accept DOT or DOH request. So our request from the public resolvers we choose are not encrypted to the authoritative name servers and the cloudfare, google etc have access to our DNS request history (we have to trust them not to use it). Most if not all authoritative name servers do DNSSEC.
Using Unbound in resolver mode simply cuts out the middle man, cloudfare, google, etc, and Unbound takes their place going directly the authoritative name servers. Given my internet providers' network latency, I find this implementation to generally be more responsive as well.
https://discourse.pi-hole.net/t/general-consensus-to-use-cloudflare-proxy-or-unbound/19120/2
With unbound (in resolver mode), you avoid upstream providers completely and your local resolver (unbound) deals directly with the authoritative name servers (the same ones the upstream providers use). The DNS traffic is not encrypted, but it is authenticated with DNSSEC, so the reply you receive is validated as being the answer that was sent. Unbound uses a few techniques to send as little data to the nameservers as possible and to maximize your privacy - qname minimization is one method. Since you communicate directly with the authoritative name servers, the replies are not filtered in any way. Unbound also has a very efficient cache, so after it’s been in use for a while it does not have to communicate with the name servers as often. Most users find that unbound is typically faster overall than using an upstream provider, once the cache is populated.
For these reasons, I prefer unbound to encrypted DNS:
- No upstream DNS provider has your DNS history.
- The results are unfiltered.
- You have equal assurance that the DNS traffic has not been altered in transit.
- There is no less privacy from the ISP.
- Generally faster.
- I have complete control over my DNS resolver.