Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Quad9 and DNS Resolver

    Scheduled Pinned Locked Moved DHCP and DNS
    28 Posts 2 Posters 7.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      cburbs @DaddyGo
      last edited by

      @DaddyGo

      So DNS should be pointing to my pfsense box?

      When I go to dnsleaktest I Get the following -
      207.162.219.52 None Lightpoint Colocation & Hosting LLC Beaverton, United States
      66.96.115.176 res100.pdx.rrdns.pch.net. WoodyNet United States
      66.96.115.177 res200.pdx.rrdns.pch.net. WoodyNet United States
      66.96.115.178 res300.pdx.rrdns.pch.net. WoodyNet United States

      The last 3 I believe show quad9 is working correctly just not sure why I am getting the top IP which is a Colocation/Hosting place in my area? Why would this one show up?

      1 Reply Last reply Reply Quote 0
      • DaddyGoD
        DaddyGo
        last edited by

        @cburbs said in Quad9 and DNS Resolver:

        @DaddyGo
        So DNS should be pointing to my pfsense box?
        When I go to dnsleaktest I Get the following -
        207.162.219.52 None Lightpoint Colocation & Hosting LLC Beaverton, United States
        66.96.115.176 res100.pdx.rrdns.pch.net. WoodyNet United States
        66.96.115.177 res200.pdx.rrdns.pch.net. WoodyNet United States
        66.96.115.178 res300.pdx.rrdns.pch.net. WoodyNet United States
        The last 3 I believe show quad9 is working correctly just not sure why I am getting the top IP which is a Colocation/Hosting place in my area? Why would this one show up?

        You will never see pure 9.9.9.9 DNS resolution, quad9 doesn't have its own network, therefore using CDN, as you can see WoodyNet, so I don't use it for 9.9.9.9 never, hmmmmm (https://www.snbforums.com/threads/cloud9-dns.56918/)

        Cats bury it so they can't see it!
        (You know what I mean if you have a cat)

        1 Reply Last reply Reply Quote 0
        • C
          cburbs
          last edited by

          So it does seem to be working on that part then.

          Do you also use this in your setup?

          https://docs.netgate.com/pfsense/en/latest/dns/blocking-dns-queries-to-external-resolvers.html

          1 Reply Last reply Reply Quote 0
          • DaddyGoD
            DaddyGo
            last edited by

            @cburbs said in Quad9 and DNS Resolver:

            So it does seem to be working on that part then.
            Do you also use this in your setup?

            There can be many approaches to this theme:

            Use what I have already described above for 853 DNSoverTLS + DNSSEC (https://dnssec.vs.uni-due.de/) and then you can also block port 53 on the firewall as a rule.
            Don't forget the firewall is blocking all unsolicited traffic by default, this is the rule on pfSense.
            Another solution is to use Suricata and/or Snort with ET DNS rules, for example

            Cats bury it so they can't see it!
            (You know what I mean if you have a cat)

            1 Reply Last reply Reply Quote 0
            • DaddyGoD
              DaddyGo
              last edited by

              Addition: the pfSense is blocked from the WAN side, so if you think about the LAN side you can disable the external DNS query for the clients or as I mentioned ET DNS rules set will be the solution (IPS on LAN)

              Cats bury it so they can't see it!
              (You know what I mean if you have a cat)

              1 Reply Last reply Reply Quote 0
              • DaddyGoD
                DaddyGo
                last edited by

                @cburbs said in Quad9 and DNS Resolver:

                207.162.219.52

                Your first DNS point is suspicious: https://www.reddit.com/r/pihole/comments/efi7u8/google_cloud_openvpnpihole_instance_leads_to_an/

                Cats bury it so they can't see it!
                (You know what I mean if you have a cat)

                1 Reply Last reply Reply Quote 0
                • C
                  cburbs
                  last edited by

                  Yep but I can't figure out why it is showing up.

                  1 Reply Last reply Reply Quote 0
                  • DaddyGoD
                    DaddyGo
                    last edited by

                    @cburbs said in Quad9 and DNS Resolver:

                    Yep but I can't figure out why it is showing up.

                    This is a typical DNA leak from your OS, I think.
                    Even if the NIC settings only point to the router in terms of DNS.

                    I had a similar experience with a module of Avast antivirus software that was "trusted sites", if it is enabled then Avast will also connect to its own DNS server to check the sites you visit and of course log your browsings :-).
                    Do you have similar software on your system?

                    Cats bury it so they can't see it!
                    (You know what I mean if you have a cat)

                    1 Reply Last reply Reply Quote 0
                    • C
                      cburbs
                      last edited by cburbs

                      No and i get the same results off of my phone.

                      Also if I switch to cloudfare and run dnsleaktest

                      IP Hostname ISP Country
                      172.68.173.29 None Cloudflare Portland, United States

                      Also Do you have any rules under firewal/rules/wan?

                      1 Reply Last reply Reply Quote 0
                      • DaddyGoD
                        DaddyGo
                        last edited by

                        @cburbs said in Quad9 and DNS Resolver:

                        172.68.173.29

                        Try looking in the state table for what is associated with this IP address. (Diagnostics / States / States)
                        I will be more and more curious....

                        With the settings discussed, the dnsleak test should show something like this....

                        ac2c7655-4bd1-4961-85a8-cce32b9a4edd-image.png

                        The only difference between the DNS settings of our systems is that I perform DNS queries through a VPN tunnel. (ExpressVPN)
                        since the datacenter is two blocks away from me and both the Cloudflare and VPN provider ping times are 2 to 4 ms (therefore, DNS over VPN also provides very good speed)

                        BTW, Do you have a VPN?

                        Cats bury it so they can't see it!
                        (You know what I mean if you have a cat)

                        1 Reply Last reply Reply Quote 0
                        • C
                          cburbs
                          last edited by

                          No VPN here just trying to tweak my Pfsense box as a starting point. Lock things down better.

                          1 Reply Last reply Reply Quote 0
                          • DaddyGoD
                            DaddyGo
                            last edited by

                            @cburbs said in Quad9 and DNS Resolver:

                            Also Do you have any rules under firewal/rules/wan?

                            Yeeeepppp is actually the box for that.

                            to your previous question: Also Do you have any rules under firewal/rules/wan?

                            • I don't like to load the WAN side with rules, it's like drilling a hole in a sieve, pfSense block all unsolicited traffic on the WAN, so I have more floating rules

                            Cats bury it so they can't see it!
                            (You know what I mean if you have a cat)

                            C 1 Reply Last reply Reply Quote 0
                            • C
                              cburbs @DaddyGo
                              last edited by

                              @DaddyGo

                              I have a WAN rule called - Easy Rule: Passed from Firewall log view - says it was created by Easy Rule .

                              Trying to figure out what it is -
                              Protocol: IPv4 TCP
                              Source: ISP IP addres
                              Destination: 104.25.242.31
                              Port: 80(HTTP)

                              Destination IP is Carrier: cloudflare

                              Confused?

                              1 Reply Last reply Reply Quote 0
                              • DaddyGoD
                                DaddyGo
                                last edited by

                                @cburbs said in Quad9 and DNS Resolver:

                                Easy Rule

                                Yes it is, :-).
                                did you add it this? with this? (https://docs.netgate.com/pfsense/en/latest/firewall/adding-rules-with-easyrule.html)

                                Cats bury it so they can't see it!
                                (You know what I mean if you have a cat)

                                1 Reply Last reply Reply Quote 0
                                • C
                                  cburbs
                                  last edited by cburbs

                                  It has a date from almost a year ago. Could have as I think that is when I was looking at snort but was having all sorts of issues so I disabled it all.

                                  So I probably don't need that rule - I won't do anything with it now but remove it later today.

                                  1 Reply Last reply Reply Quote 0
                                  • C
                                    cburbs
                                    last edited by

                                    Do you use squidguard on your system? That was the next thing I was going to implement.

                                    1 Reply Last reply Reply Quote 0
                                    • DaddyGoD
                                      DaddyGo
                                      last edited by

                                      @cburbs said in Quad9 and DNS Resolver:

                                      squidguard

                                      I use HA proxy I think for my purposes more appropriate, Squid is problematic among MITM, so SquidGuard doesn't work for me either
                                      But I strongly recommend installing Suricata/Snort and pfblockerNG-devel

                                      Cats bury it so they can't see it!
                                      (You know what I mean if you have a cat)

                                      1 Reply Last reply Reply Quote 0
                                      • DaddyGoD
                                        DaddyGo
                                        last edited by

                                        Delete the rule for said http 80 port because it is unnecessary!
                                        I didn’t investigate all the way through, but it points to a Cloudflare CDN

                                        Cats bury it so they can't see it!
                                        (You know what I mean if you have a cat)

                                        1 Reply Last reply Reply Quote 0
                                        • C
                                          cburbs
                                          last edited by

                                          Yeah snort and pfblocker are on my list. I played with these a while back but it broke many things and haven't got back to them.

                                          1 Reply Last reply Reply Quote 0
                                          • DaddyGoD
                                            DaddyGo
                                            last edited by

                                            @cburbs said in Quad9 and DNS Resolver:

                                            Yeah snort and pfblocker are on my list. I played with these a while back but it broke many things and haven't got back to them.

                                            Before you jumping into these IPS / IDS, DNSBL, etc. things, I highly recommend Bill Meeks (alias: bmeeks) posts Snort / ÍSuricata and BBcan177 on the topic of pfblockerng

                                            Cats bury it so they can't see it!
                                            (You know what I mean if you have a cat)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.