Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Quad9 and DNS Resolver

    Scheduled Pinned Locked Moved DHCP and DNS
    28 Posts 2 Posters 7.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DaddyGoD
      DaddyGo
      last edited by

      @cburbs said in Quad9 and DNS Resolver:

      Static DHCP: unchecked

      What I forgot: :-)
      if you decide to... and use DHCP on your network, check this as well: Static DHCP: to checked (this is in view of my previous remark)

      Cats bury it so they can't see it!
      (You know what I mean if you have a cat)

      1 Reply Last reply Reply Quote 0
      • C
        cburbs @DaddyGo
        last edited by

        @DaddyGo

        So DNS should be pointing to my pfsense box?

        When I go to dnsleaktest I Get the following -
        207.162.219.52 None Lightpoint Colocation & Hosting LLC Beaverton, United States
        66.96.115.176 res100.pdx.rrdns.pch.net. WoodyNet United States
        66.96.115.177 res200.pdx.rrdns.pch.net. WoodyNet United States
        66.96.115.178 res300.pdx.rrdns.pch.net. WoodyNet United States

        The last 3 I believe show quad9 is working correctly just not sure why I am getting the top IP which is a Colocation/Hosting place in my area? Why would this one show up?

        1 Reply Last reply Reply Quote 0
        • DaddyGoD
          DaddyGo
          last edited by

          @cburbs said in Quad9 and DNS Resolver:

          @DaddyGo
          So DNS should be pointing to my pfsense box?
          When I go to dnsleaktest I Get the following -
          207.162.219.52 None Lightpoint Colocation & Hosting LLC Beaverton, United States
          66.96.115.176 res100.pdx.rrdns.pch.net. WoodyNet United States
          66.96.115.177 res200.pdx.rrdns.pch.net. WoodyNet United States
          66.96.115.178 res300.pdx.rrdns.pch.net. WoodyNet United States
          The last 3 I believe show quad9 is working correctly just not sure why I am getting the top IP which is a Colocation/Hosting place in my area? Why would this one show up?

          You will never see pure 9.9.9.9 DNS resolution, quad9 doesn't have its own network, therefore using CDN, as you can see WoodyNet, so I don't use it for 9.9.9.9 never, hmmmmm (https://www.snbforums.com/threads/cloud9-dns.56918/)

          Cats bury it so they can't see it!
          (You know what I mean if you have a cat)

          1 Reply Last reply Reply Quote 0
          • C
            cburbs
            last edited by

            So it does seem to be working on that part then.

            Do you also use this in your setup?

            https://docs.netgate.com/pfsense/en/latest/dns/blocking-dns-queries-to-external-resolvers.html

            1 Reply Last reply Reply Quote 0
            • DaddyGoD
              DaddyGo
              last edited by

              @cburbs said in Quad9 and DNS Resolver:

              So it does seem to be working on that part then.
              Do you also use this in your setup?

              There can be many approaches to this theme:

              Use what I have already described above for 853 DNSoverTLS + DNSSEC (https://dnssec.vs.uni-due.de/) and then you can also block port 53 on the firewall as a rule.
              Don't forget the firewall is blocking all unsolicited traffic by default, this is the rule on pfSense.
              Another solution is to use Suricata and/or Snort with ET DNS rules, for example

              Cats bury it so they can't see it!
              (You know what I mean if you have a cat)

              1 Reply Last reply Reply Quote 0
              • DaddyGoD
                DaddyGo
                last edited by

                Addition: the pfSense is blocked from the WAN side, so if you think about the LAN side you can disable the external DNS query for the clients or as I mentioned ET DNS rules set will be the solution (IPS on LAN)

                Cats bury it so they can't see it!
                (You know what I mean if you have a cat)

                1 Reply Last reply Reply Quote 0
                • DaddyGoD
                  DaddyGo
                  last edited by

                  @cburbs said in Quad9 and DNS Resolver:

                  207.162.219.52

                  Your first DNS point is suspicious: https://www.reddit.com/r/pihole/comments/efi7u8/google_cloud_openvpnpihole_instance_leads_to_an/

                  Cats bury it so they can't see it!
                  (You know what I mean if you have a cat)

                  1 Reply Last reply Reply Quote 0
                  • C
                    cburbs
                    last edited by

                    Yep but I can't figure out why it is showing up.

                    1 Reply Last reply Reply Quote 0
                    • DaddyGoD
                      DaddyGo
                      last edited by

                      @cburbs said in Quad9 and DNS Resolver:

                      Yep but I can't figure out why it is showing up.

                      This is a typical DNA leak from your OS, I think.
                      Even if the NIC settings only point to the router in terms of DNS.

                      I had a similar experience with a module of Avast antivirus software that was "trusted sites", if it is enabled then Avast will also connect to its own DNS server to check the sites you visit and of course log your browsings :-).
                      Do you have similar software on your system?

                      Cats bury it so they can't see it!
                      (You know what I mean if you have a cat)

                      1 Reply Last reply Reply Quote 0
                      • C
                        cburbs
                        last edited by cburbs

                        No and i get the same results off of my phone.

                        Also if I switch to cloudfare and run dnsleaktest

                        IP Hostname ISP Country
                        172.68.173.29 None Cloudflare Portland, United States

                        Also Do you have any rules under firewal/rules/wan?

                        1 Reply Last reply Reply Quote 0
                        • DaddyGoD
                          DaddyGo
                          last edited by

                          @cburbs said in Quad9 and DNS Resolver:

                          172.68.173.29

                          Try looking in the state table for what is associated with this IP address. (Diagnostics / States / States)
                          I will be more and more curious....

                          With the settings discussed, the dnsleak test should show something like this....

                          ac2c7655-4bd1-4961-85a8-cce32b9a4edd-image.png

                          The only difference between the DNS settings of our systems is that I perform DNS queries through a VPN tunnel. (ExpressVPN)
                          since the datacenter is two blocks away from me and both the Cloudflare and VPN provider ping times are 2 to 4 ms (therefore, DNS over VPN also provides very good speed)

                          BTW, Do you have a VPN?

                          Cats bury it so they can't see it!
                          (You know what I mean if you have a cat)

                          1 Reply Last reply Reply Quote 0
                          • C
                            cburbs
                            last edited by

                            No VPN here just trying to tweak my Pfsense box as a starting point. Lock things down better.

                            1 Reply Last reply Reply Quote 0
                            • DaddyGoD
                              DaddyGo
                              last edited by

                              @cburbs said in Quad9 and DNS Resolver:

                              Also Do you have any rules under firewal/rules/wan?

                              Yeeeepppp is actually the box for that.

                              to your previous question: Also Do you have any rules under firewal/rules/wan?

                              • I don't like to load the WAN side with rules, it's like drilling a hole in a sieve, pfSense block all unsolicited traffic on the WAN, so I have more floating rules

                              Cats bury it so they can't see it!
                              (You know what I mean if you have a cat)

                              C 1 Reply Last reply Reply Quote 0
                              • C
                                cburbs @DaddyGo
                                last edited by

                                @DaddyGo

                                I have a WAN rule called - Easy Rule: Passed from Firewall log view - says it was created by Easy Rule .

                                Trying to figure out what it is -
                                Protocol: IPv4 TCP
                                Source: ISP IP addres
                                Destination: 104.25.242.31
                                Port: 80(HTTP)

                                Destination IP is Carrier: cloudflare

                                Confused?

                                1 Reply Last reply Reply Quote 0
                                • DaddyGoD
                                  DaddyGo
                                  last edited by

                                  @cburbs said in Quad9 and DNS Resolver:

                                  Easy Rule

                                  Yes it is, :-).
                                  did you add it this? with this? (https://docs.netgate.com/pfsense/en/latest/firewall/adding-rules-with-easyrule.html)

                                  Cats bury it so they can't see it!
                                  (You know what I mean if you have a cat)

                                  1 Reply Last reply Reply Quote 0
                                  • C
                                    cburbs
                                    last edited by cburbs

                                    It has a date from almost a year ago. Could have as I think that is when I was looking at snort but was having all sorts of issues so I disabled it all.

                                    So I probably don't need that rule - I won't do anything with it now but remove it later today.

                                    1 Reply Last reply Reply Quote 0
                                    • C
                                      cburbs
                                      last edited by

                                      Do you use squidguard on your system? That was the next thing I was going to implement.

                                      1 Reply Last reply Reply Quote 0
                                      • DaddyGoD
                                        DaddyGo
                                        last edited by

                                        @cburbs said in Quad9 and DNS Resolver:

                                        squidguard

                                        I use HA proxy I think for my purposes more appropriate, Squid is problematic among MITM, so SquidGuard doesn't work for me either
                                        But I strongly recommend installing Suricata/Snort and pfblockerNG-devel

                                        Cats bury it so they can't see it!
                                        (You know what I mean if you have a cat)

                                        1 Reply Last reply Reply Quote 0
                                        • DaddyGoD
                                          DaddyGo
                                          last edited by

                                          Delete the rule for said http 80 port because it is unnecessary!
                                          I didn’t investigate all the way through, but it points to a Cloudflare CDN

                                          Cats bury it so they can't see it!
                                          (You know what I mean if you have a cat)

                                          1 Reply Last reply Reply Quote 0
                                          • C
                                            cburbs
                                            last edited by

                                            Yeah snort and pfblocker are on my list. I played with these a while back but it broke many things and haven't got back to them.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.