• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Quad9 DNS-over-TLS setup with Unbound & forwarding in 2.4.4-RC

DHCP and DNS
6
17
5.7k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    jimp Rebel Alliance Developer Netgate @occamsrazor
    last edited by Sep 24, 2018, 4:55 PM

    @occamsrazor said in Quad9 DNS-over-TLS setup with Unbound & forwarding in 2.4.4-RC:

    Technically you could do it in one (block tcp/udp from any to ! LAN Address port <dnsports>)

    Wouldn't that block request from getting to pfSense? Or does the "!" mean invert match? Not sure quite how to do that in the GUI, but in any case I think I prefer having two rules, somehow seems easier to understand to me.

    The "!" inverts the match, there is a "not" checkbox in the firewall rule destination network options to make that happen. If you find it confusing, don't worry about using that syntax. Clarity is better than being concise, so if using two rules is easier for you to understand, that's just fine.

    Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

    Need help fast? Netgate Global Support!

    Do not Chat/PM for help!

    O 1 Reply Last reply Sep 24, 2018, 5:09 PM Reply Quote 1
    • O
      occamsrazor @jimp
      last edited by Sep 24, 2018, 5:09 PM

      @jimp said in Quad9 DNS-over-TLS setup with Unbound & forwarding in 2.4.4-RC:

      @occamsrazor said in Quad9 DNS-over-TLS setup with Unbound & forwarding in 2.4.4-RC:

      The "!" inverts the match, there is a "not" checkbox in the firewall rule destination network options to make that happen. If you find it confusing, don't worry about using that syntax. Clarity is better than being concise, so if using two rules is easier for you to understand, that's just fine.

      Thanks I understand now, I just didn't know the "!" referred to the invert match checkbox. That's much cleaner. Also, for some reason I thought I needed to explictly allow the DNS to reach LAN Address original rule I had, but now I see that was only necessary because of the way the "block all requests except those above this rule" was written. So basically I can delete the two rules and only use this:

      login-to-view

      pfSense CE on Qotom Q355G4 8GB RAM/60GB SSD
      Ubiquiti Unifi wired and wireless network, APC UPSs
      Mac OSX and IOS devices, QNAP NAS

      F 1 Reply Last reply Sep 26, 2018, 5:25 AM Reply Quote 0
      • F
        Forsaked @occamsrazor
        last edited by Sep 26, 2018, 5:25 AM

        @occamsrazor said in Quad9 DNS-over-TLS setup with Unbound & forwarding in 2.4.4-RC:

        @jimp said in Quad9 DNS-over-TLS setup with Unbound & forwarding in 2.4.4-RC:

        @occamsrazor said in Quad9 DNS-over-TLS setup with Unbound & forwarding in 2.4.4-RC:

        The "!" inverts the match, there is a "not" checkbox in the firewall rule destination network options to make that happen. If you find it confusing, don't worry about using that syntax. Clarity is better than being concise, so if using two rules is easier for you to understand, that's just fine.

        Thanks I understand now, I just didn't know the "!" referred to the invert match checkbox. That's much cleaner. Also, for some reason I thought I needed to explictly allow the DNS to reach LAN Address original rule I had, but now I see that was only necessary because of the way the "block all requests except those above this rule" was written. So basically I can delete the two rules and only use this:

        login-to-view

        This rule should be in the Wiki, instead of those other 2 rules there.

        https://www.netgate.com/docs/pfsense/dns/blocking-dns-queries-to-external-resolvers.html

        Am i am right that the only change to the redirect rule in the Wiki, would be Port 853 added as Destination and Redirect Target Port?

        pfSense: 2.4.3

        System: QOTOM-Q355G4
        CPU: Intel Core i5-5250U
        RAM: 8GB SK Hynix DDR3L-1600
        LAN: Intel I211-AT
        SSD: 256GB Lite-On

        O 1 Reply Last reply Sep 26, 2018, 7:59 AM Reply Quote 0
        • O
          occamsrazor @Forsaked
          last edited by occamsrazor Sep 26, 2018, 8:01 AM Sep 26, 2018, 7:59 AM

          @forsaked said in Quad9 DNS-over-TLS setup with Unbound & forwarding in 2.4.4-RC:

          Am i am right that the only change to the redirect rule in the Wiki, would be Port 853 added as Destination and Redirect Target Port?

          Oh I forgot about that rule that I also had in my NAT > Port Forwards. So if you want to block requests from going outside pfSense, but also to forward those requests to pfSense, then do you need to have both these rules? Don't they sort of cover the same thing? Or it just makes it extra sure?

          I followed the good advice of @jimp and created a "DNSPorts" alias which does make setting these up easier, so now my port-forward rule looks like this:

          login-to-view

          When using an alias containing two ports 53 and 853 for Dest. Ports and NAT Ports, is the system smart enough to realise that 53 should go to 53 and 853 to 853?

          pfSense CE on Qotom Q355G4 8GB RAM/60GB SSD
          Ubiquiti Unifi wired and wireless network, APC UPSs
          Mac OSX and IOS devices, QNAP NAS

          1 Reply Last reply Reply Quote 0
          • F
            Forsaked
            last edited by Sep 26, 2018, 10:00 AM

            I did the same thing, but since i don't have a client which natively supports DNS over TLS, i can't check if it works with just the Block and Redirect rule.

            pfSense: 2.4.3

            System: QOTOM-Q355G4
            CPU: Intel Core i5-5250U
            RAM: 8GB SK Hynix DDR3L-1600
            LAN: Intel I211-AT
            SSD: 256GB Lite-On

            O 1 Reply Last reply Sep 26, 2018, 10:14 AM Reply Quote 0
            • O
              occamsrazor @Forsaked
              last edited by Sep 26, 2018, 10:14 AM

              @forsaked Yes I donโ€™t have a way to test either. Just figured Iโ€™d set it up in case a device was used on my network that did (eg a visitor).
              PS - unrelated, but I have the exact same hardware as you, I like it.

              pfSense CE on Qotom Q355G4 8GB RAM/60GB SSD
              Ubiquiti Unifi wired and wireless network, APC UPSs
              Mac OSX and IOS devices, QNAP NAS

              I 1 Reply Last reply Jul 14, 2023, 1:38 AM Reply Quote 0
              • I
                italnsd @occamsrazor
                last edited by italnsd Jul 14, 2023, 1:38 AM Jul 14, 2023, 1:38 AM

                @occamsrazor The single rule that encompasses the four simple rules is definitely a nice way to compact the Firewall rule set. On the other hand, it gives less detailed information about what is going on, which can help debug issues. For example if the rules on port 853 are never hit, you know that there are not internal DNS over TLS queries. In general, the more compact the rules are, i.e., the more situations they cover, the less visibility into the system they provide.

                1 Reply Last reply Reply Quote 0
                • D
                  d.cgibson87 @occamsrazor
                  last edited by Nov 8, 2023, 6:26 PM

                  @occamsrazor what is the forwarding address?

                  M 1 Reply Last reply Nov 8, 2023, 6:28 PM Reply Quote 0
                  • M
                    MoonKnight @d.cgibson87
                    last edited by Nov 8, 2023, 6:28 PM

                    @d-cgibson87
                    Hi,
                    This is what I use:

                    login-to-view

                    --- 24.11 ---
                    Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
                    Kingston DDR4 2666MHz 16GB ECC
                    2 x HyperX Fury SSD 120GB (ZFS-mirror)
                    2 x Intel i210 (ports)
                    4 x Intel i350 (ports)

                    D 1 Reply Last reply Nov 8, 2023, 7:35 PM Reply Quote 0
                    • D
                      d.cgibson87
                      last edited by Nov 8, 2023, 7:33 PM

                      Do you know if it is IPSec PSK or RSA or MSCHAPv2

                      1 Reply Last reply Reply Quote 0
                      • D
                        d.cgibson87 @MoonKnight
                        last edited by Nov 8, 2023, 7:35 PM

                        @MoonKnight i am running on my galaxy s23. And it shuts my data out all together.

                        1 Reply Last reply Reply Quote 0
                        • J jimp locked this topic on Nov 8, 2023, 7:38 PM
                        • J
                          jimp Rebel Alliance Developer Netgate
                          last edited by Nov 8, 2023, 7:39 PM

                          This is a very old topic and you are straying from what it was meant for.

                          Please start your own topic for help with your setup.

                          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                          Need help fast? Netgate Global Support!

                          Do not Chat/PM for help!

                          1 Reply Last reply Reply Quote 1
                          • GertjanG Gertjan referenced this topic on Jul 22, 2024, 12:54 PM
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.