help to unblock chia
-
@gwaitsi said in help to unblock chia:
how can i make a DNS exception a specific machine/s to 1.1.1.1
Hmmmm, Okay
you complicate it well,.... instead of using pfBlockerNG-devel + well thought out lists
1.1.1.3 / 1.0.0.3 also performs malware and adult content filtering
I for one like to tell myself what I want to access/view and have the control in my hands and not CloudFlare's
this would be my first approach, but there may be a faster, better way...
set the upstream server 1.1.1.1 also, (general tab)
create a VLAN interface for 1.1.1.1 DNS client(s) only
(if you are thinking about in VLAN - good, so the network is separated)Unbound (custom):
access - control (allow - deny for subnet(s))
- forward-zone: / forward-addr
this will not work from GUI (I think...?..!), you have to edit unbound.conf
these may help:
https://calomel.org/unbound_dns.html
https://wiki.archlinux.org/title/Unbound -
Just a couple of pointers. Mixing filtered and non-filtered dns is going to be problematic.. As you have already run into it seems.
If your going to point a client to more than 1 NS for dns - you need to be sure that these NS used provide the same info. Be it filtered or non filtered.. Since you never know which NS a client might query for dns.
Bad idea to point a client to local dns and external dns - be it filtering involved or not, since external is never going to resolve your internal resources.
Be it you resolve, or forward or use doh or dot when you forward. You need to make sure that any possible dns a client can query can and does return what your interested in. Filtered or not filtered, local or external. That being a pc on your network, or pfsense doing dns for your clients. If you list multiple ns that pfsense can forward to - you need to make sure where you forward will be able to resolve the same stuff filtered or not, etc.
Also if your going to forward, dnssec should not be enabled.. dnssec is a feature of a resolver. if you want dnssec to be used - then forward to dns that support this and it will use dnssec when it resolves. Forwarding somewhere is either going to do dnssec already, or not - you asking for it doesn't provide anything other than wasted dns queries.
-
@johnpoz i think you misunderstood.
- DNS is NAT forwarded to my pfsense box.
- unbound is forwarded to 1.1.1.3
My question is, can I tell unbound to use a different dns server, for queries from a specific VLAN.
In other words,
DNS 1.1.1.3 -> VLAN (LAN, IOT, MEDIA) - default
DNS 1.1.1.1 -> VLAN (ADMIN)i.e. using forward zone, view filters, or something
p.s. i don't have DNSSEC on pfsense enabled. i was referring to the setting within firefox, which i turned off once i validated it was the cloudfare DNS that was filtering the site.
-
@daddygo i don't use pfblocker for the dns filtering because would take too much time. especially when cloudflare will do all the work. which is could for the family environment i have. p.s. thanks for the help in getting to the root cause. i will look up these resources
-
@gwaitsi said in help to unblock chia:
i don't use pfblocker for the dns filtering because would take too much time.
perhaps, I saw you write that you use
it's the best solution(! in my reading) , setting up the new version takes 5 minutes with lots of predefined listsI understand that children......hmmmm
but, the CF (1.1.1.3) may let you pass on content that you regret afterwardsit's safe if you're in control
BTW:
@johnpoz "Mixing filtered and non-filtered dns is going to be problematic."
nope, John did not misunderstand you and is right in what he wrote
+++edit: (for pfBlockerNG)
https://www.vikash.nl/setup-pfblockerng-python-mode-with-pfsense/ -
@daddygo I looked at the article, made some tweaks to match and set the default dns to 1.1.1.1
On my J1900 it is a challenge.
With only shallalist and a 512mb temp in memory, I am at 64% of 8Gb.I probably need to optimize the lists. Interestingly,
xxx - brings me the banner like you first posted
xhamster - brings me SSL_ERROR_INTERNAL_ERROR_ALERTis there a recommendation on feeds to use for good family protection
thanks again for the support guys.
-
@gwaitsi said in help to unblock chia:
On my J1900 it is a challenge.
this "iron" is more than enough for your target... (home privacy and security)...
we have several endpoint pfSense installations (https://www.pcengines.ch/apu4d4.htm) that can handle large DNSBL lists with 4G RAM, just don't overload your "box" with unnecessary heavy apps (Squid for home, IPS for home, thousands of OpenVPN tunnels)
my answer to the question of the list, it all depends on what you want to achieve, there can be very different goals
(f.e.: I have at least 10 variations for lists, the first is always to keep the bad guys out, the second is to keep the individual goals)for XXX, I would suggest the following, just off the top of my head, which was in my collection:
(but there are many other good lists for this purpose)https://raw.githubusercontent.com/Clefspeare13/pornhosts/master/0.0.0.0/hosts
https://raw.githubusercontent.com/chadmayfield/my-pihole-blocklists/master/lists/pi_blocklist_porn_all.list@gwaitsi "xhamster - brings me SSL_ERROR_INTERNAL_ERROR_ALERT"
(I see everyone is into the good stuff)just do the right things: - Diagnostics / States / Reset States
-
Where is chia.net being filtered by 1.1.1.3??
$ dig @1.1.1.1 chia.net +short 104.22.7.173 172.67.44.5 104.22.6.173 $ dig @1.1.1.3 chia.net +short 104.22.7.173 104.22.6.173 172.67.44.5 Now other stuff is filtered.. $ dig @1.1.1.3 www.youporn.com +short 0.0.0.0
-
@johnpoz said in help to unblock chia:
chia.net being filtered by 1.1.1.3
Yup, that's right, it wasn't checked...
(just looked it up I also, 1.1.1.2 does not filter this site
would be strange as it uses CF cert. - they don't shoot at "house rabbits"this also shows there are other problems there
+++edit:
originally the discussion was about 1.1.1.2@gwaitsi "My unbound is fowarding to 1.1.1.2. could it be;
1.1.1.2 blocks chia.net" -
@johnpoz I rechecked it.
1.1.1.1 / 1.1.1.2 / 1.1.1.3 all resolve and can traceroute for chia.net
1.1.1.2 / 1.1.1.3 https doesn't work to chia.net (but does if it use firefox dns over ssl settings to 1.1.1.1)I have a good config. I am using 1.1.1.1 and pfblocker for the lists).
Three observations;
-
the dnsbl lists don't load on boot. Waiting to see if they load on the next scheduled cron job. * it updates on the first cron run. wouldn't it make sense to run all cron jobs on boot?
-
some results e.g. xhamster get return ssl errors rather than a pfblocker banner but the net effect is the same, the site is blocked.
-
the results are not filtered from search (I use duckduckgo). ** this was the reason from memory I went for the 1.1.1.3 to begin with
So, looks like I have come the full circle.
If I want the results to be removed from the search, I need to use cloudflare family.But then, I am stuck with not being able to access https://www.chia.net
** interestingly, with pfsense set top 1.1.1.1 i set firefox to dns over ssl with 1.1.1.3 and it works.
so, something on my pfsense is causing https://www.chia.net to break when I use either 1.1.1.2 / 1.1.1.3 as the dns. but doesn't seem to happen to anything else. -
-
@DaddyGo this gives a better result for me, because xhamster, porn etc from any browser simply returns no results and I don't have to worry about maintenance. I wonder if there is still any point to also use dnsbl as it only uses additional resources.
-
Well for one www.chia.net and chia.net are not the same thing.
$ dig @1.1.1.3 chia.net +short 172.67.44.5 104.22.6.173 104.22.7.173 $ dig @1.1.1.3 www.chia.net +short 0.0.0.0
1.1.1.3 filters on www.chia.net but not on just chia.net
.2 is also filtering it
$ dig @1.1.1.2 www.chia.net +short 0.0.0.0
-
@johnpoz i noticed that, but am getting exactly the same as you with dig.
If you go to www.chia.net or chia.net in a browser, they both auto goto https://chia.net
with the general settings as 1.1.1.1
https://chia.net workswith the general settings as 1.1.1.2 or 1.1.1.3
https://chia.net does not workwith firefox set to dns over ssl using 1.1.1.3
https://chia.net worksi am really stuck on getting to the bottom of this
-
You sure filtering even works over dot? There was a whole thread about it..
I have not tested it because to me dot or doh is a complete abomination, and without something to encrypt the sni, be it esni or ech trying to hide your dns queries from you isp via dot or doh isn't really doing that. All you end up doing is sending your queries to the 3rd party as well as your isp knowing the fqdn your going to, with always knowing which IP your going to anyway no matter what.
Now in that above thread they said there was some mention of it being enabled - but I have not actually tested it.
Keep in mind that be it you go to chia.net or www.chia.net in your browser at some point your going to get a 301 to redirect you.
Connecting to chia.net (chia.net)|104.22.6.173|:80... connected. HTTP request sent, awaiting response... 301 Moved Permanently Location: http://www.chia.net/ [following]
So your going to have to resolve www.chia.net - which isn't resolving 1.1.1.2 or .3
If your goal is leveraging clouldflare dns for there filtering - then do that. And take doh or dot out of the equation. Browsers don't do dot, they do doh, while pfsense does dot and can not do doh..
Also bringing up your other thread about doing specific forwarding for specific client - I know of no way to do that with unbound. So you either run bind that can do that, and for sure uses different caches even for the different views. Or you run multiple instances of unbound where 1 forwards to filtering, and other forwards to non filtering - and point the clients you want to do what to the respective instance of unbound.
-
@johnpoz I can't say I understand a word you said there m8.
Can you repeat the last part in idiot's English please.Are you saying 1.1.1.2 doesn't work?
But why does it work if I use it in the browser as DNS over SSL? -
@gwaitsi said in help to unblock chia:
But why does it work if I use it in the browser as DNS over SSL?
dot and doh are different - that link was saying that dot doesn't work for filtering, some people suggested it does near the end. But maybe it only works with doh and not dot. Browsers use doh..
If I find some time this morning from real work - I will try and give it a test.
-
@johnpoz would appreciate it
-
Ok suppose to be doing some real work stuff - but this was quick test.. So doing a dot test to 1.1.1.3 filters www.chia.net
user@NewUC:~/tmp$ kdig -d @1.1.1.3 +tls-ca +tls-host=family.cloudflare-dns.com www.chia.net ;; DEBUG: Querying for owner(www.chia.net.), class(1), type(1), server(1.1.1.3), port(853), protocol(TCP) ;; DEBUG: TLS, imported 129 system certificates ;; DEBUG: TLS, received certificate hierarchy: ;; DEBUG: #1, C=US,ST=California,L=San Francisco,O=Cloudflare\, Inc.,CN=cloudflare-dns.com ;; DEBUG: SHA-256 PIN: od9obscoXQND56/DikypZrJkXGvbQV5Y61QGfcNitHo= ;; DEBUG: #2, C=US,O=DigiCert Inc,CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1 ;; DEBUG: SHA-256 PIN: e0IRz5Tio3GA1Xs4fUVWmH1xHDiH2dMbVtCBSkOIdqM= ;; DEBUG: TLS, skipping certificate PIN check ;; DEBUG: TLS, The certificate is trusted. ;; TLS session (TLS1.3)-(ECDHE-X25519)-(ECDSA-SECP256R1-SHA256)-(AES-256-GCM) ;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 11574 ;; Flags: qr rd ra; QUERY: 1; ANSWER: 1; AUTHORITY: 0; ADDITIONAL: 1 ;; EDNS PSEUDOSECTION: ;; Version: 0; flags: ; UDP size: 1232 B; ext-rcode: NOERROR ;; PADDING: 407 B ;; QUESTION SECTION: ;; www.chia.net. IN A ;; ANSWER SECTION: www.chia.net. 60 IN A 0.0.0.0 ;; Received 468 B ;; Time 2021-06-09 08:42:07 CDT ;; From 1.1.1.3@853(TCP) in 26.3 ms user@NewUC:~/tmp$
I will try and do a test with doh here in a bit.. got a freaking meeting have to join - arggh ;)
-
@johnpoz what is the meaning in English pls?
Regarding filtering, 1.1.1.3 provides the services for normal users for sure.
If you try any of the search engines and enter variants of porn, etc. no results are returned at all.
This is the ideal behaviour I am looking for, in terms of the family.from the desktop
kdig -d @1.1.1.3 +tls-ca +tls-host=family.cloudflare-dns.com www.chia.net ;; DEBUG: Querying for owner(www.chia.net.), class(1), type(1), server(1.1.1.3), port(853), protocol(TCP) ;; DEBUG: TLS, imported 130 system certificates ;; WARNING: connection timeout for 1.1.1.3@853(TCP) ;; ERROR: failed to query server 1.1.1.3@853(TCP)
couldn't find how to install kdig on pfsense
from desktop to pfsense
kdig -d @192.168.2.1 www.chia.net ;; DEBUG: Querying for owner(www.chia.net.), class(1), type(1), server(192.168.2.1), port(53), protocol(UDP) ;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 22077 ;; Flags: qr rd ra; QUERY: 1; ANSWER: 1; AUTHORITY: 0; ADDITIONAL: 0 ;; QUESTION SECTION: ;; www.chia.net. IN A ;; ANSWER SECTION: www.chia.net. 60 IN A 0.0.0.0 ;; Received 46 B ;; Time 2021-06-09 16:06:39 CEST ;; From 192.168.2.1@53(UDP) in 104.2 ms
-
@gwaitsi said in help to unblock chia:
ERROR: failed to query server 1.1.1.3@853(TCP)
That means you could not talk to 1.1.1.3 on 853.. Your blocking it most likely.
couldn't find how to install kdig on pfsense
I wouldn't suggest that even if there was a package available somewhere for freebsd.. Unless pfsense/netgate adds that as option.. Installing unsupported 3rd party packages not good idea normally.