• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox

Scheduled Pinned Locked Moved DHCP and DNS
85 Posts 19 Posters 45.1k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    jimp Rebel Alliance Developer Netgate
    last edited by Aug 18, 2018, 2:45 PM

    That's a tough one to answer.

    I did see a post on Reddit earlier this week from someone who claimed association with Mozilla that said they no longer plan on ever making this the default, only available as a GUI option. I'm not holding my breath waiting on that to be verified, but it is at least a bit of hope that we won't have to jump through hoops.

    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

    Need help fast? Netgate Global Support!

    Do not Chat/PM for help!

    1 Reply Last reply Reply Quote 0
    • J
      johnpoz LAYER 8 Global Moderator
      last edited by Aug 18, 2018, 2:47 PM

      Thanks for the info - lets hope they don't try and enable this on the sly in the background ;) Doing such a thing for sure would force me to rethink my browser choice..

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • B
        bcruze
        last edited by Nov 29, 2018, 1:06 PM

        this is why i use firefox ESR.

        the version that would get this automagically would be the standard version of FF

        1 Reply Last reply Reply Quote 0
        • J
          johnpoz LAYER 8 Global Moderator
          last edited by johnpoz Sep 8, 2019, 4:12 PM Sep 8, 2019, 3:57 PM

          So it looks like mozilla is on course for enabling this by default... UGGHHH!
          https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/

          And upon checking seems somehow somewhere in some past update my setting of network.trr.mode to 5 got reset to 0..

          I am really curious once they start turning this on, if turning it off in the options will be enough.. I do not want this, stay away from my dns.. They should use what the OS uses, if you want to offer doh or dot - great, it should be OPT IN ONLY!!! Turning this on be default is BS plain and simple..

          Seems they are using the canary domain use-application-dns.net so if your dns resolves NX their doh should not be used.

          you can set that in unbound like this
          local-zone: "use-application-dns.net" static

          Which I have already done on my network.

          I believe you can also set
          security.enterprise_roots.enabled

          To true, to stop it...

          I will be keeping an eye on this.. Stay away from my dns mozilla...

          Looks like pihole already has commit to disable it via the canary.. I would hope pfblocker will be doing something similar
          https://github.com/pi-hole/pi-hole/pull/2915

          I think I will reach out to bbcan177 and ask..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          C 1 Reply Last reply Sep 8, 2019, 4:33 PM Reply Quote 1
          • C
            chpalmer @johnpoz
            last edited by chpalmer Sep 8, 2019, 7:25 PM Sep 8, 2019, 4:33 PM

            @johnpoz said in HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox:

            And upon checking seems somehow somewhere in some past update my setting of network.trr.mode to 5 got reset to 0..

            Just checked and so did mine. Back to Waterfox for me..

            Triggering snowflakes one by one..
            Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

            1 Reply Last reply Reply Quote 0
            • K
              kiokoman LAYER 8
              last edited by Sep 8, 2019, 5:35 PM

              good, time to uninstall and change to another browser

              ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
              Please do not use chat/PM to ask for help
              we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
              Don't forget to Upvote with the 👍 button for any post you find to be helpful.

              1 Reply Last reply Reply Quote 0
              • P
                Pippin
                last edited by Sep 8, 2019, 5:44 PM

                I'm on latest FF (Linux Mint 18.3), my setting 5 did not get changed.

                I gloomily came to the ironic conclusion that if you take a highly intelligent person and give them the best possible, elite education, then you will most likely wind up with an academic who is completely impervious to reality.
                Halton Arp

                1 Reply Last reply Reply Quote 0
                • T
                  tman222
                  last edited by Sep 8, 2019, 6:55 PM

                  I have a few Linux systems that use the ESR version of Firefox (60.x). On those systems the default setting is 0 and setting it to 5 appears to break DNS altogether. So I'm guessing 5 is not a supported option on the ESR version. Checking out a more recent version of Firefox on a couple Mac's did allow me to set the option to 5 and everything still works.

                  Some more info about disabling DoH from Mozilla:

                  https://support.mozilla.org/en-US/kb/configuring-networks-disable-dns-over-https

                  Glad that Pi-hole is already had a PR on this.

                  @johnpoz - can you explain what "local-zone: "use-application-dns.net" static" does exactly and how in NXDOMAIN being returned? Thanks in advance.

                  1 Reply Last reply Reply Quote 0
                  • J
                    johnpoz LAYER 8 Global Moderator
                    last edited by johnpoz Sep 8, 2019, 7:32 PM Sep 8, 2019, 7:23 PM

                    So per their disable article you linked to, if that domain returns a NX vs actual IP then firefox is not suppose to use doh..

                    So if you set that in your options box.
                    server:
                    local-zone: "use-application-dns.net" static

                    When a query is done for that - it will return NX.

                    $ dig @192.168.9.253 use-application-dns.net
                    
                    ; <<>> DiG 9.14.4 <<>> @192.168.9.253 use-application-dns.net
                    ; (1 server found)
                    ;; global options: +cmd
                    ;; Got answer:
                    ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23041
                    ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
                    
                    ;; OPT PSEUDOSECTION:
                    ; EDNS: version: 0, flags:; udp: 4096
                    ;; QUESTION SECTION:
                    ;use-application-dns.net.       IN      A
                    
                    ;; Query time: 0 msec
                    ;; SERVER: 192.168.9.253#53(192.168.9.253)
                    ;; WHEN: Sun Sep 08 14:22:35 Central Daylight Time 2019
                    ;; MSG SIZE  rcvd: 52
                    

                    Notice the
                    status: NXDOMAIN

                    I have sent a PM to bbcan177, but haven't heard anything back yet... But yeah would be nice if pfsense works out something - say if pfblocker is being used, unbound will auto return the NX for that, or something..

                    Or maybe pfsense could put in a check box to have that return NX..

                    I really don't now what Mozilla is thinking here.. That is great you want to offer this for your clients - but it really should be OPT IN ONLY!!! Run a PR campaign to get your users to set it.. but making it default is WRONG..

                    I have set the network.trr to 5 again, will keep an eye on that, and have set
                    security.enterprise_roots.enabled
                    To true as well.. so will be watching that as well, when the next update comes out.. Running 69.0 currently of firefox.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    T 1 Reply Last reply Sep 8, 2019, 7:33 PM Reply Quote 1
                    • T
                      tman222 @johnpoz
                      last edited by Sep 8, 2019, 7:33 PM

                      @johnpoz said in HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox:

                      local-zone: "use-application-dns.net" static

                      Thanks @johnpoz - I appreciate the follow up an explanation. I was actually more curious what that configuration line did exactly and why you chose it specifically to solve this issue?

                      Is the idea just to create a local DNS Zone with this domain, but since no actual (local) records exist for it, it will simple return NXDOMAIN?

                      Thanks again!

                      1 Reply Last reply Reply Quote 0
                      • J
                        johnpoz LAYER 8 Global Moderator
                        last edited by johnpoz Sep 8, 2019, 7:36 PM Sep 8, 2019, 7:34 PM

                        Exactly, when you set the local zone as static, and no local entries - NX gets returned. So when NX gets returned when the browser looks for that, it is suppose to not enable DOH because local filtering is in place and the user has opted to use that vs doh.

                        edit: I can foresee future posts about why pfblocker is not working because browser is using doh vs asking the local dns which is using pfblocker.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • T
                          tman222
                          last edited by Sep 8, 2019, 7:50 PM

                          Thanks @johnpoz - when entering into Unbound's option box, for multiple configuration options, is the correct syntax:

                          server:
                          config line 1
                          config line 2

                          OR

                          server:
                          config line 1

                          server:
                          config line 2

                          Apologies, I can never quite remember. Thanks again for your help.

                          1 Reply Last reply Reply Quote 0
                          • K
                            kiokoman LAYER 8
                            last edited by Sep 8, 2019, 7:56 PM

                            bind9 + rpz
                            cloudflare-dns.com IN CNAME .

                            😤

                            ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                            Please do not use chat/PM to ask for help
                            we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                            Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                            1 Reply Last reply Reply Quote 0
                            • J
                              johnpoz LAYER 8 Global Moderator
                              last edited by johnpoz Sep 9, 2019, 2:37 AM Sep 9, 2019, 2:37 AM

                              You only need 1 server: at the top

                              For example here are all my entries.
                              server:
                              private-domain: "plex.direct"
                              local-zone: "use-application-dns.net" static
                              so-reuseport: no
                              #log-queries: yes
                              #log-replies: yes
                              #private-address: ::/0 # filters out all AAAA !

                              I leave the log entries in there and the private address thing to stop AAAA because I enable them on the fly sometimes for testing.. I just leave them # out normally when I don't need them. I think I can remove that so-reuseport: no since I think that was changed in an update a while back.. Not sure on that one. But yeah you only need the one server: entry.

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              pfSenseTestP 1 Reply Last reply Sep 9, 2019, 11:53 AM Reply Quote 0
                              • pfSenseTestP
                                pfSenseTest @johnpoz
                                last edited by Sep 9, 2019, 11:53 AM

                                @johnpoz said in HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox:

                                I think I can remove that so-reuseport: no since I think that was changed in an update a while back.. Not sure on that one.

                                I was wondering about this myself and haven't been able to confirm if it is still needed or not.

                                2x SG-5100 | MBT-4220 (retired) | SG-1000 (retired)

                                1 Reply Last reply Reply Quote 0
                                • J
                                  johnpoz LAYER 8 Global Moderator
                                  last edited by johnpoz Sep 9, 2019, 1:08 PM Sep 9, 2019, 1:04 PM

                                  @johnpoz said in HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox:

                                  so-reuseport: no

                                  I just commented it out and restarted unbound, and there are still multiple threads.. So its no longer needed..
                                  https://forum.netgate.com/post/809158

                                  JimP goes over in that post

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                                  1 Reply Last reply Reply Quote 0
                                  • JeGrJ
                                    JeGr LAYER 8 Moderator
                                    last edited by Sep 10, 2019, 10:26 AM

                                    The whole use case Mozilla and the DoH folks that promote it that much are telling is falling apart IMHO. If a simple NXDOMAIN for the use-application-dns.net Zone is "blocking" the use of DoH in Firefox alltogether, how in the hell is the DoH implementation in Firefox well-thought in the first place? They are pointing fingers at MITM or Rogue ISPs etc. to protect your data and privacy against. OK, fair point, but how in the hell is that protecting if you

                                    1. completely screw up a fine configured local DNS resolver setup with internal domains by using a DoH server from an external source (and handing your DNS data to them!?)
                                    2. can override your privacy-DoH-firefox-thingy by said rogue ISP to simply hand out a nxdomain for the use-application-dns.net zone?
                                    3. begin to segregate DNS into "per application use"? Firefox using DoH with Cloudflare, System using local resolver with internal domains, next Browser/Application uses whatever the f*** they want? How is that transparent and protecting anything about your privacy if you don't have a clue anymore what your system does? It's something like the whole Linux-systemd-everything. NTP? DNS resolving? Yay let's put it into systemd, too! What!?

                                    Narf 👿

                                    Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                                    If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                                    1 Reply Last reply Reply Quote 2
                                    • K
                                      kiokoman LAYER 8
                                      last edited by Sep 10, 2019, 10:31 AM

                                      simple. privacy is a businness after all. it will not be strange if that work was sponsorized by cloudflare and the like. they are only selling all your data to them and telling you that this way you are more protected ☺
                                      i hate when company make fun of customers. if they left it as an option instead of imposing it as a default it would have been something else

                                      ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                                      Please do not use chat/PM to ask for help
                                      we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                                      Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        johnpoz LAYER 8 Global Moderator
                                        last edited by johnpoz Sep 11, 2019, 1:37 PM Sep 11, 2019, 1:32 PM

                                        Now it seems google/chrome wants to join in on the data mining fun.. WTF!!!
                                        https://www.zdnet.com/article/google-to-run-dns-over-https-doh-experiment-in-chrome/

                                        dot is easy to block since uses its own port... But guess its time to start compiling list of all known doh servers and blocking them.. Gawd Damn it!!!

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                                        1 Reply Last reply Reply Quote 1
                                        • JeGrJ
                                          JeGr LAYER 8 Moderator
                                          last edited by Sep 11, 2019, 2:41 PM

                                          @johnpoz said in HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox:

                                          But guess its time to start compiling list of all known doh servers and blocking them.. Gawd Damn it!!!

                                          They are also contradicting their own argumentation. Mozilla for example arguments over governmental or rogue ISPs grabbing your data. At the same time they 1) send all your data to a single provider instead of using resolvers to dsitribute the DNS calls to a wide range of servers and 2) use use-application-dns.net as their canary to determine wether or not to disable automagic DoH. So we roll out some application specific black magic BS that breaks your local setup but hand out the free pass for their own attackers to disable it. WTF? How is that thought-out? 🤦 First thing a rogue ISP or anyone else would be to hand out NXDOMAIN to use-application-dns.net calls to disable that. And if anyone does that... yeah.

                                          Pushing OS developers to include DoT and DoH in their base OS and as next step push all DNS servers to wide-range adaption of both protocols would be the right way. Then you could just tell your local resolver to use either DoH/DoT for resolving (and do or don't fallback to normal udp/53 DNS). Their tactic? No just send it all to Google/Cloudflare etc. Right...

                                          Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                                          If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            [[user:consent.lead]]
                                            [[user:consent.not_received]]