Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    EU want to control everything and 5 eyes watching you out!

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    19 Posts 4 Posters 984 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      By default Unbound in pfSense is a caching DNS resolver.

      You can also install the bind pkg if you want even more options.

      A 1 Reply Last reply Reply Quote 0
      • A
        Antibiotic @stephenw10
        last edited by

        @stephenw10 Itought about bind pkg, but using pfblockerng as me understood he is tight with unbound only

        pfSense plus 24.11 on Topton mini PC
        CPU: Intel N100
        NIC: Intel i-226v 4 pcs
        RAM : 16 GB DDR5
        Disk: 128 GB NVMe
        Brgds, Archi

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Yes, pfBlocker-NG DNS filtering is with Unbound only. But Unbound can do pretty much anything you might want for a home install anyway.

          1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @Antibiotic
            last edited by

            @Antibiotic said in EU want to control everything and 5 eyes watching you out!:

            I'd specifically like to know if it's possible to run a DNS server on your own local network, _that actually has the zone information of the root DNS servers(for .com,.net,.org) domains.

            When you use unbound "as it should be" then the big 13 are already hard coded into the binary. The article calls the the root.hints file - the falmous 'bind' resolver has actually such a file in the config directory.
            Their host names and IP's (see table on the wiki page) never change.

            Maybe it's possible to create your own root server locally. All it contains is a list with all the known "official" Top Level domain servers - the ones that know all about com. org. net. etc etc. About 730+300 of them. As the article states, root server access is rather rare.

            TLD access happens all the time. As thousands of domain names are created every second, you'll be having a hard time keeping the content of all of them synced up locally.

            TLDs are, I guess copy-cloned all of the Internet. For example, the com. TLD has several (like many) clones on the Internet. The root server will give you probably one that is close to your 'WAN' IP.

            The job of the TLD is : it gives your resolver a list with all the domain names servers know for a domain name. There are always at least 2 of them.

            These domain name serves will give you the final answer to the question : what is the IPv6 of www.facebook.com.

            @Antibiotic said in EU want to control everything and 5 eyes watching you out!:

            I want it to have duplicate information that the big internet DNS servers have, but I'd like that information locally on my DNS server.

            Oh... that is exactly what unbound does. It caches every request ever made ones, and keeps it into the local (unbound pfSense) local DNS cache.

            When you check

            da98112d-7c2c-4217-9c22-f8ad3eb24dc5-image.png

            soon to be expired DNS info will get refreshed when the TTL goes to zero.
            So, ones you've asked www.facebook.com and the IP was obtained, the next request, later on, will not need any 'outside' interaction.
            So, basically, you only have to wait ones for a DNS request to be completed. Afterwards, the info will be avaible locally forever.
            One golden rule : don't (have) unbound get restarted often 😊

            Btw : other, non local DNS resolvers, like the DNS servers of your ISP, or the commercial ones, are not needed anymore. That said, everything is done so people believe they need them .... because (private) DNS info is a real cash cow.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            A 1 Reply Last reply Reply Quote 0
            • A
              Antibiotic @Gertjan
              last edited by Antibiotic

              @Gertjan Than why, when I use pfSense Unbound in default state with default options can not reach some sites they are blocked. It mean my ISP block them on DNS level?So unbound anyway asking some info from my ISP?Is it possible to bypass this without set third party dns in general settings and use Unbound in default state not as dns forwarder?

              pfSense plus 24.11 on Topton mini PC
              CPU: Intel N100
              NIC: Intel i-226v 4 pcs
              RAM : 16 GB DDR5
              Disk: 128 GB NVMe
              Brgds, Archi

              GertjanG 1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan @Antibiotic
                last edited by

                @Antibiotic said in EU want to control everything and 5 eyes watching you out!:

                Than why, .... my ISP block them on DNS level?

                Why they do this .... and lets go one step lower : why did you chose this ISP, is something I can not know.

                @Antibiotic said in EU want to control everything and 5 eyes watching you out!:

                can not reach some sites

                What some sites ?
                What happens do you see when you dig the info ?
                Example :

                [24.03-RELEASE][root@pfSense.bhf.tld]/root: dig www.facebook.com +trace +nodnssec
                
                ; <<>> DiG 9.18.20 <<>> www.facebook.com +trace +nodnssec
                ;; global options: +cmd
                .                       52505   IN      NS      e.root-servers.net.
                .                       52505   IN      NS      a.root-servers.net.
                .                       52505   IN      NS      i.root-servers.net.
                .                       52505   IN      NS      g.root-servers.net.
                .                       52505   IN      NS      k.root-servers.net.
                .                       52505   IN      NS      m.root-servers.net.
                .                       52505   IN      NS      h.root-servers.net.
                .                       52505   IN      NS      l.root-servers.net.
                .                       52505   IN      NS      f.root-servers.net.
                .                       52505   IN      NS      b.root-servers.net.
                .                       52505   IN      NS      c.root-servers.net.
                .                       52505   IN      NS      d.root-servers.net.
                .                       52505   IN      NS      j.root-servers.net.
                ;; Received 239 bytes from 127.0.0.1#53(127.0.0.1) in 2 ms
                
                com.                    172800  IN      NS      b.gtld-servers.net.
                com.                    172800  IN      NS      j.gtld-servers.net.
                com.                    172800  IN      NS      i.gtld-servers.net.
                com.                    172800  IN      NS      l.gtld-servers.net.
                com.                    172800  IN      NS      m.gtld-servers.net.
                com.                    172800  IN      NS      a.gtld-servers.net.
                com.                    172800  IN      NS      e.gtld-servers.net.
                com.                    172800  IN      NS      f.gtld-servers.net.
                com.                    172800  IN      NS      d.gtld-servers.net.
                com.                    172800  IN      NS      h.gtld-servers.net.
                com.                    172800  IN      NS      g.gtld-servers.net.
                com.                    172800  IN      NS      c.gtld-servers.net.
                com.                    172800  IN      NS      k.gtld-servers.net.
                ;; Received 844 bytes from 2001:dc3::35#53(m.root-servers.net) in 312 ms
                
                facebook.com.           172800  IN      NS      a.ns.facebook.com.
                facebook.com.           172800  IN      NS      b.ns.facebook.com.
                facebook.com.           172800  IN      NS      c.ns.facebook.com.
                facebook.com.           172800  IN      NS      d.ns.facebook.com.
                ;; Received 288 bytes from 192.41.162.30#53(l.gtld-servers.net) in 28 ms
                
                www.facebook.com.       3600    IN      CNAME   star-mini.c10r.facebook.com.
                ;; Received 74 bytes from 185.89.219.12#53(d.ns.facebook.com) in 39 ms
                

                Btw :
                +trcae because I want to see what happens.
                +nodnssec because I don't want to see all the DNSSEC stuff, something that facebook.com doesn't support (as they don't mind being spoofed - or something like that)

                You can clearly see the initial 'big 13' listed.
                Dig (bypasses unbound completely) chose one of them :

                Received 844 bytes from 2001:dc3::35#53(m.root-servers.net) in 312 ms

                which is quiet incredible : m.root-servers.net is in Japan - and me in France

                The answer from m.root-servers.net was a list of TLDs that handle "dot com".

                Dig chose

                ;; Received 288 bytes from 192.41.162.30#53(l.gtld-servers.net) in 28 ms

                and l.gtld-servers.net gave me the list of the facebook.com domain name servers.
                Di chose

                ;; Received 74 bytes from 185.89.219.12#53(d.ns.facebook.com) in 39 ms

                and d.ns.facebook.com gave me back a CNAME :

                www.facebook.com. 3600 IN CNAME star-mini.c10r.facebook.com.

                From there on, the request wasn't finshed yet.
                As dig default to asking for an A (IPv4) record, it will now start to interrogate the domain name servers of facebook (the ns.facebook.com servers)
                Like

                dig star-mini.c10r.facebook.com +trace +nodnssec A
                

                and this time no need to get for the root servers (the asnwer was cached - but dig digged anyway as it bypasses unbound) neither the TLD (same thing) so it (unbound) would go directly to the facebook domain servers to obtain :

                star-mini.c10r.facebook.com. 60 IN      A       163.70.128.35
                ;; Received 72 bytes from 129.134.30.12#53(a.ns.facebook.com) in 21 ms
                

                These request use mostly UDP, maybe some TCP, and go to remote DNS servers using port 53.
                An ISP could do whatever it wants with your traffic, true.
                Maybe they don't want you to visit facebook.
                Seriously ?

                And, you are using a VPN, right ? So your ISP can't block anyting as they can't 'see' what you do.
                And that rules out your ISP.

                A native, original, no thrills, no gadgets (so no VPN, no forwarding, no pfBlockerng, no squid or amavis, nothing) clean pfSense will work just fine.

                An example : you saw the recent N#rdVPN thread on this forum ? How this VPN decided to completely f#ck up your DNS requests ? After all, they also discovered that your DNS data is worth big €/$ so they intercept your DNS, and they did a bad job doing so.
                For the record, lets repeat it again : people are actually paying for this VPN punishment.

                @Antibiotic said in EU want to control everything and 5 eyes watching you out!:

                Is it possible to bypass this without set third party dns in general settings and use Unbound in default state not as dns forwarder?

                That is the defaut setup.
                unbiound uses the root servers, and doesn't care about the DNS upstream ISP router - if your pfSense using DHCP on its wan. pfSense doesn't use (it throws it away) the DNS you got from your ISP.
                pfSense doesn't need you to use any forwarder.
                pfSense / unbound resolves out of the box. And doing so, it can give you a nice bonus : if DNSSEC is supported, it will use it.

                Just be aware : the classic DNS resolving goes out of the internet non encrypted.
                So : when will the original DNS system, as it exist since 1970 ? - use TLS ?
                The question has been asked many times already (fire up Google ans check yourself).
                Answer : probably never. because : basic UDP and TCP DNS traffic is very small, most often less then one internet packet. TLS needs "one 1000" more "CPU" resources, and way more bandwidth.
                Btw : 100 times more resouces also means 1000 times more energy needed : nice, DNS is now safe, and not free anymore.
                Current infrastructure isn't ready yet for the "all TLS".

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                A 1 Reply Last reply Reply Quote 0
                • A
                  Antibiotic
                  last edited by

                  @Gertjan said in EU want to control everything and 5 eyes watching you out!:

                  Why they do this .... and lets go one step lower : why did you chose this ISP, is something I can not know.

                  This is not only my ISP, this law going by whole EU, for example russian.rt.com!

                  pfSense plus 24.11 on Topton mini PC
                  CPU: Intel N100
                  NIC: Intel i-226v 4 pcs
                  RAM : 16 GB DDR5
                  Disk: 128 GB NVMe
                  Brgds, Archi

                  1 Reply Last reply Reply Quote 0
                  • A
                    Antibiotic
                    last edited by Antibiotic

                    @Gertjan said in EU want to control everything and 5 eyes watching you out!:

                    What some sites ?
                    What happens do you see when you dig the info ?

                    ; <<>> DiG 9.20.2 <<>> www.russian.rt.com +trace +nodnssec
                    ;; global options: +cmd
                    . 86361 IN NS d.root-servers.net.
                    . 86361 IN NS e.root-servers.net.
                    . 86361 IN NS f.root-servers.net.
                    . 86361 IN NS g.root-servers.net.
                    . 86361 IN NS h.root-servers.net.
                    . 86361 IN NS i.root-servers.net.
                    . 86361 IN NS j.root-servers.net.
                    . 86361 IN NS k.root-servers.net.
                    . 86361 IN NS l.root-servers.net.
                    . 86361 IN NS m.root-servers.net.
                    . 86361 IN NS a.root-servers.net.
                    . 86361 IN NS b.root-servers.net.
                    . 86361 IN NS c.root-servers.net.
                    ;; Received 239 bytes from 127.0.0.1#53(127.0.0.1) in 1 ms

                    www.russian.rt.com. 1 IN A 10.42.254.3
                    ;; Received 70 bytes from 170.247.170.2#53(b.root-servers.net) in 0 ms
                    ea45bbaa-b4b1-4359-ba38-904d68fe8d0c-image.png

                    I did set unbound default option and did to pass traffic without VPN and result cannot reach this site and a lot of other sites!

                    pfSense plus 24.11 on Topton mini PC
                    CPU: Intel N100
                    NIC: Intel i-226v 4 pcs
                    RAM : 16 GB DDR5
                    Disk: 128 GB NVMe
                    Brgds, Archi

                    GertjanG 1 Reply Last reply Reply Quote 0
                    • A
                      Antibiotic @Gertjan
                      last edited by

                      @Gertjan said in EU want to control everything and 5 eyes watching you out!:

                      if your pfSense using DHCP on its wan. pfSense doesn't use (it throws it away) the DNS you got from your ISP.

                      Not clear , do I need to set WAN dchp or static? Because any of these 2 options working for me!

                      pfSense plus 24.11 on Topton mini PC
                      CPU: Intel N100
                      NIC: Intel i-226v 4 pcs
                      RAM : 16 GB DDR5
                      Disk: 128 GB NVMe
                      Brgds, Archi

                      1 Reply Last reply Reply Quote 0
                      • GertjanG
                        Gertjan @Antibiotic
                        last edited by Gertjan

                        @Antibiotic

                        63807cc4-f83e-4ce5-8e9d-bf84600388af-image.png

                        Is that so ?

                        Why not asking some one else to test :

                        Verdict :
                        https://www.zonemaster.net/en/result/93a5d5b513f81ccb

                        rt.com exists.
                        russian.rt.com doesn't. Even rt.com doesn't announce it. Or there are geo restrictions happening.

                        Try again with a (VPN) IP in Moscou ?

                        dig russian.rt.com +trace +nodnssec
                        

                        Just .... time out. For some reason "rttv.ru" domain names serves won't give me an answer.

                        What was it that you say ?
                        Oh, yeah ...

                        EU want to control everything ....

                        Right.
                        Because dot ru domain name servers are in Europe now ?

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        A 1 Reply Last reply Reply Quote 0
                        • A
                          Antibiotic @Gertjan
                          last edited by Antibiotic

                          @Gertjan So it mean without VPN and/or third party dns provider impossible to reach this site?Because tried to pass all traffic over VPN and use Unbound in default state cannot reach this site and only set to third party DNS provider in general settings assist me to get this site. I'm really mad. If use all time VPN have bufferbloat and limiters don't work as expected for gaming.

                          pfSense plus 24.11 on Topton mini PC
                          CPU: Intel N100
                          NIC: Intel i-226v 4 pcs
                          RAM : 16 GB DDR5
                          Disk: 128 GB NVMe
                          Brgds, Archi

                          GertjanG 1 Reply Last reply Reply Quote 0
                          • GertjanG
                            Gertjan @Antibiotic
                            last edited by

                            @Antibiotic said in EU want to control everything and 5 eyes watching you out!:

                            Because tried to pass all traffic over VPN and use Unbound in default state cannot reach this site

                            If "all traffic" goes out over the VPN connection, then this included DNS requests initiated by unbound.
                            This means that the dns root servers, the TDL servers and the domain name servers will see the VPN end point IP as the requesting IP.
                            This can make connection possible that didn't work before.

                            But, and we always knew it, and now we are sure : the Russians are not stupid.
                            As the Europeans, the Americans, the Chinese etc etc, every knows all the VPN end point IPs. So, if a DNS request was reaching a Russian domain name server, it knows that it comes from an VPN IP. And these are (check Russians recently adopted laws) now refused.
                            So you need to use plan B.
                            Do not use a main stream commercial VPN ISP (actually, never use them anyway, as it is such a BS).
                            Go contact a person in Russia with an ordinary internet connection using an ordinary Russian ISP.
                            Ask him if you can set up a VPN server on his equipment.
                            From now on you use a this Russian IP, like all the Russians.
                            Use this VPN end point and ..... Russian sites are now all ok for you.
                            Be aware : be careful with what you do with this VPN connection. If you 'do' something with that IP that doesn't please the locals, they won't knock on your door, but your Russian friend's door. The Black Helicopter scene.
                            Consequences can be, how to say, pretty huge, not like here in Europe (I presume of course).
                            Be ware that a incoming VPN connection - from your place to some Russian ISP 'civilian' as the end point, can be detected.

                            Btw : I used the word Russia and Russian here as an example.
                            But it could be France and frenchmen, or China and Chinese. Take your pick.

                            No "help me" PM's please. Use the forum, the community will thank you.
                            Edit : and where are the logs ??

                            A 1 Reply Last reply Reply Quote 0
                            • A
                              Antibiotic @Gertjan
                              last edited by

                              @Gertjan I do think that is blocking by Russia. Because i can get other not political sites if use VPN( and even without VPN). I think EU is blocking. But don't understand how it's working. If even i set in unbound "outgoing network interface" to go over VPN anyway cannot reach some sites. Only assist to set dns resolver in forward mode and set third party DNS provider as cloudflare for example which do not filter any dns request.

                              pfSense plus 24.11 on Topton mini PC
                              CPU: Intel N100
                              NIC: Intel i-226v 4 pcs
                              RAM : 16 GB DDR5
                              Disk: 128 GB NVMe
                              Brgds, Archi

                              GertjanG 1 Reply Last reply Reply Quote 0
                              • GertjanG
                                Gertjan @Antibiotic
                                last edited by

                                @Antibiotic said in EU want to control everything and 5 eyes watching you out!:

                                I think EU is blocking

                                You have a VPN, right ? So there is no reason to "think", you can test for yourself.
                                Why wait ?
                                Fire it up pointing to Ankara (Turkey) or, dono, Cairo (Egypt) or Bhanka (Bangladesh) and try again.
                                It still doesn't work ? You need to keep on looking why, but you've just excluded 'EU'. Except if you believe that your VPN can be MITM'ed.
                                It does work ? Then you still do not have a proof it was 'EU' (blocking) : it could be the VPN end point that was accepted, and not the previous one you used.

                                I'm not implying EU doesn't block things. They probably are.
                                We lost the piratebay.com remember ? :)

                                @Antibiotic said in EU want to control everything and 5 eyes watching you out!:

                                cloudflare for example which do not filter any dns request.

                                cloudflare probably accepts all DNS request.
                                But do they have access to "everybody" and "everywhere" ? So, this boils down to : do you get an answer for "everybody" and "everywhere" ?
                                You could rephrase that to a simple : you - and me - are always filtered.

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.