Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Enable DNS over TLS via DHCP

    Scheduled Pinned Locked Moved General pfSense Questions
    12 Posts 5 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      Seems like it's not ready yet:

      option-code:  TODO (two octets)
      

      Unbound can accept DoT requests if clients are sending them as long as you have enabled it and added a cert.

      Steve

      1 Reply Last reply Reply Quote 0
      • K
        kislwini Banned
        last edited by

        I followed this and it worked great, until I restarted my router. Now, unbound doesn't seem to be handling any DNS requests and my router is defaulting to my ISP's DNS servers. The Cloudflare DNS servers are in the config, as well as in /etc/resolv.conf and in the Luci interface config for WAN & WAN6. If I try to use nslookup, I get "Illegal Instruction". Any ideas as to what is going on? I've checked my configs, tried restarting unbound several times, redid all of the configs, and still nothing from unbound.

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Luci is an OpenWRT component, did you mean to use that term?

          1 Reply Last reply Reply Quote 0
          • K
            kislwini Banned
            last edited by

            I followed this and it worked great, until I restarted my router. Now, unbound doesn't seem to be handling any DNS requests and my router is defaulting to my ISP's DNS servers. The Cloudflare DNS servers are in the config, as well as in /etc/resolv.conf and in the Luci interface config for WAN & WAN6. If I try to use nslookup, I get "Illegal Instruction". Any ideas as to what is going on? I've checked my configs, tried restarting unbound several times, redid all of the configs, and still nothing from unbound.

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              You followed what? You just reposted the exact same thing.....

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by stephenw10

                Oh I see you just copied it from here: https://blog.cloudflare.com/dns-over-tls-for-openwrt/#comment-3858797960 ๐Ÿ™„

                Your spam game is weak, try harder.

                1 Reply Last reply Reply Quote 0
                • Raffi_R
                  Raffi_
                  last edited by

                  DoT is working for me with this option in DNS Resolver and I'm using Cloudflare as the forwarding server.
                  e0b7f030-3b63-4f9f-b048-60afeb521117-image.png

                  However, I'm not using the option below, so my clients are talking to pfSense over standard 53 and pfSense goes out to the web over TLS 853 only when it's not already cached by unbound locally.
                  d989ccb4-27a8-42d3-89df-951046bdff9d-image.png

                  I personally don't care if my DNS query is encrypted between pfSense and my local clients, I'm mostly concerned with what goes out to the world.

                  DaddyGoD 1 Reply Last reply Reply Quote 1
                  • DaddyGoD
                    DaddyGo @Raffi_
                    last edited by

                    @Raffi_ said in Enable DNS over TLS via DHCP:

                    I personally don't care if my DNS query is encrypted between pfSense and my local clients, I'm mostly concerned with what goes out to the world.

                    That is exactly what I do and I think, it works well...๐Ÿ˜‰

                    Cats bury it so they can't see it!
                    (You know what I mean if you have a cat)

                    1 Reply Last reply Reply Quote 1
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Yup, as do I. In fact I'd rather internal clients were not using DoT so I can troubleshoot it.

                      It's interesting to note as an option though.

                      Steve

                      Raffi_R 1 Reply Last reply Reply Quote 1
                      • Raffi_R
                        Raffi_ @stephenw10
                        last edited by

                        @stephenw10 said in Enable DNS over TLS via DHCP:

                        In fact I'd rather internal clients were not using DoT so I can troubleshoot it.

                        Good point, yea could be more difficult to figure out what's going on with DNS if everything was encrypted end-to-end.

                        DaddyGoD 1 Reply Last reply Reply Quote 0
                        • DaddyGoD
                          DaddyGo @Raffi_
                          last edited by

                          @Raffi_ said in Enable DNS over TLS via DHCP:

                          Good point, yea could be more difficult to figure out what's going on with DNS

                          The point is, don't release the 53 port out of the inner world...๐Ÿ˜‰

                          Cats bury it so they can't see it!
                          (You know what I mean if you have a cat)

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.