Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS Resolver security implications

    Scheduled Pinned Locked Moved DHCP and DNS
    9 Posts 4 Posters 544 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      luquinhasdainfra
      last edited by

      Hi,

      How safe is to use PfSense DNS Resolver in forward mode to CloudFlare DNS Servers?

      There are any DNS CVE in 2.6.0-RELEASE? What are the best practices do implement it well?

      That's my config, is it good enough?

      aad47199-1d3b-48cd-8ca1-a529592de1b8-image.png

      Best regards.

      R 1 Reply Last reply Reply Quote 0
      • R
        rcoleman-netgate Netgate @luquinhasdainfra
        last edited by

        @luquinhasdainfra said in DNS Resolver security implications:

        How safe is to use PfSense DNS Resolver in forward mode to CloudFlare DNS Servers?

        I'm curious why you would limit yourself to their servers only -- if they are offline you lose all DNS service.

        Ryan
        Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
        Requesting firmware for your Netgate device? https://go.netgate.com
        Switching: Mikrotik, Netgear, Extreme
        Wireless: Aruba, Ubiquiti

        L 1 Reply Last reply Reply Quote 1
        • L
          luquinhasdainfra @rcoleman-netgate
          last edited by

          @rcoleman-netgate

          Sorry, my mistake

          I'm actually using Cloudflare AND OpenDNS servers

          GertjanG johnpozJ 2 Replies Last reply Reply Quote 0
          • GertjanG
            Gertjan @luquinhasdainfra
            last edited by

            @luquinhasdainfra said in DNS Resolver security implications:

            I'm actually using Cloudflare AND OpenDNS servers

            So, again, when they do not work (overloaded, etc) you lose your DNS.

            You don't need to forward. It's some kind of 'plan B' solution. pfSense, out of the box, has a working DNS, and it doesn't forward.
            'Plan A' is as the internet was designed way back in around 1970 : resolve.

            Btw : when you forward, disable DNSSEC.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            L 1 Reply Last reply Reply Quote 1
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @luquinhasdainfra
              last edited by

              @luquinhasdainfra said in DNS Resolver security implications:

              I'm actually using Cloudflare AND OpenDNS servers

              This is not good idea.. One filters, other doesn't - so you have no idea which one your going to ask. So something might be filtered, or it might not. Even when they both filter, they sure will not be filtered exactly the same..

              If your going to forward, you want to make sure that any of the servers your going to forward too are using the same filtering list, or do not filter at all, etc.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              L 1 Reply Last reply Reply Quote 1
              • L
                luquinhasdainfra @Gertjan
                last edited by

                @Gertjan

                Hi,

                Thanks for your anwser

                But why do i have to disable DNSSEC when forwarding?

                GertjanG 1 Reply Last reply Reply Quote 0
                • L
                  luquinhasdainfra @johnpoz
                  last edited by

                  @johnpoz

                  Hi,

                  Thanks for your anwser,

                  Found out that CloudFlare has some filters and i remove it,

                  Now i using servers that do not do validation but i'm using PfBlocker to block malicious domains,

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @luquinhasdainfra
                    last edited by

                    @luquinhasdainfra said in DNS Resolver security implications:

                    Now i using servers that do not do validation

                    Most dns services do dnssec on there own - there is no reason to set it in unbound if your forwarding.. Dnssec is for a resolver.. If you forward and you want dnssec, then make sure where you forward to is doing it.

                    https://support.quad9.net/hc/en-us/articles/4409274993677-DNS-Forwarders-Best-Practices

                    1. Disable DNSSEC Validation

                    Since Quad9 already performs DNSSEC validation, DNSSEC being enabled in the forwarder will cause a duplication of the DNSSEC process, significantly reducing performance and potentially causing false BOGUS responses.

                    What dns are you forwarding too - some of them have special IPs that don't do dnssec, but you still shouldn't turn it on if forwarding. dnssec again is for a resolver.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 2
                    • GertjanG
                      Gertjan @luquinhasdainfra
                      last edited by

                      @luquinhasdainfra said in DNS Resolver security implications:

                      But why do i have to disable DNSSEC when forwarding?

                      A clean, short and precise anwer exists already on this forum, here in the DNS forum.

                      The most smallest answer (more a declarartion) is : When you forward, DNSSEC is not for you.
                      DNSSEC needs the resolver (the function you out sourced) to resolve from top to bottom.

                      A bit longer :
                      Consider a DNSSEC enabled domain : https://dnsviz.net/d/test-domaine.fr/dnssec/ (I 'own' that domain name, as the used domain name servers).

                      At the top is the current DNSSEC root key. the one with the id=20326.
                      This root certicate signs the root servers.
                      The root servers will give you the TLD '.fr.'in this case. The TLD's are signed by the root servers.
                      The TLD will give you the two (my own) domain name servers. These have records signed by the TLD server.
                      In parallel with the classic record A (or AAAA) resolving, the DS key info is also resolved. The certificate chain has to match all the way. If it works out, a flag indicates that the DNS answer 'rock solid'.

                      dig test-domaine.fr +trace +dnssec
                      

                      Btw : 1.1.1.1 does DNSSEC checking.
                      You 'only' have to trust that they didn't 'lie' to you when they answered you.
                      Doing your own DNSSEC tests in parallel yourself (by unbound) removes completely the one and only advantage they offer : an answer a bit faster.

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      1 Reply Last reply Reply Quote 1
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.