Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox

    DHCP and DNS
    19
    85
    38.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NollipfSenseN
      NollipfSense
      last edited by

      I have been reading this thread and have added the list found in the link that BBcan177 provided above to DNSBL. However, where is the about:config mentioned by Jim so I can set network.trr.mode to 5? This is what I saw in Firefox preference:
      Screen Shot 2019-10-06 at 1.05.22 PM.png

      pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
      pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        in the about:config section

        aboutconfig.png

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        NollipfSenseN 1 Reply Last reply Reply Quote 1
        • NollipfSenseN
          NollipfSense @johnpoz
          last edited by

          @johnpoz Thanks John for responding...it seems that Macs don't have that options...I am using Firefox 69.0.2...

          Screen Shot 2019-10-06 at 2.33.59 PM.png

          pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
          pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by johnpoz

            I don't have a mac to test with.. But your at about:preferences not about:config?

            No you wouldn't find it there - see I went there in my windows firefox

            firefoxpref.png

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            NollipfSenseN 1 Reply Last reply Reply Quote 0
            • NollipfSenseN
              NollipfSense @johnpoz
              last edited by

              @johnpoz Found it John...one has to type about:config in the URL bar and accept the risk...thank you!

              Screen Shot 2019-10-06 at 3.01.32 PM.png

              pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
              pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

              1 Reply Last reply Reply Quote 0
              • H
                HuskerDu
                last edited by HuskerDu

                I've just tried the unbound custom option... it seems Firefox keeps asking for its DoH stuff, Suricata seeing some associated traffic.

                1	TCP	A Network Trojan was Detected	10.X.X.X 51133	104.16.249.249 443	1:2027695 ET POLICY Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)
                
                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Did you set TRR in firefox to 5? Without some details of what you actually did there is little anyone can do to help you find out what you did wrong.

                  You need to make sure unbound return NX..

                  nx.jpg

                  I watch this like a hawk and have rules in place to log any sort of doh to any of the know ns doing doh, and block tos - and have not seen any hits on the rules at all.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  1 Reply Last reply Reply Quote 0
                  • H
                    HuskerDu
                    last edited by

                    The purpose was to test the usage that Firefox makes of its canary domain and if it obey their published rules.

                    First of all, the status is NOERROR not NXDOMAIN

                    ; <<>> DiG 9.10.6 <<>> use-application-dns.net
                    ;; global options: +cmd
                    ;; Got answer:
                    ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27411
                    ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
                    
                    ;; OPT PSEUDOSECTION:
                    ; EDNS: version: 0, flags:; udp: 4096
                    ;; QUESTION SECTION:
                    ;use-application-dns.net.	IN	A
                    
                    ;; ANSWER SECTION:
                    use-application-dns.net. 60	IN	A	10.10.10.1
                    
                    ;; Query time: 45 msec
                    ;; SERVER: 10.0.0.1#53(10.0.0.1)
                    ;; WHEN: Tue Nov 26 21:31:02 CET 2019
                    ;; MSG SIZE  rcvd: 68
                    

                    TRR was 2 as it was the intend of that quick test.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by johnpoz

                      Well that is not how canary is meant to work - so yeah it would fail... It needs to return NX..

                      https://support.mozilla.org/en-US/kb/canary-domain-use-application-dnsnet

                      You returned no error and A record... So yeah its going to be able to use doh.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 0
                      • H
                        HuskerDu
                        last edited by HuskerDu

                        I've changed

                        local-zone: "use-application-dns.net" static
                        

                        to

                        local-zone: "use-application-dns.net" always_nxdomain
                        

                        And it now works

                        ; <<>> DiG 9.10.6 <<>> use-application-dns.net
                        ;; global options: +cmd
                        ;; Got answer:
                        ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58414
                        ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
                        
                        ;; OPT PSEUDOSECTION:
                        ; EDNS: version: 0, flags:; udp: 4096
                        ;; QUESTION SECTION:
                        ;use-application-dns.net.	IN	A
                        
                        ;; Query time: 37 msec
                        ;; SERVER: 10.0.0.1#53(10.0.0.1)
                        ;; WHEN: Wed Dec 04 20:16:56 CET 2019
                        ;; MSG SIZE  rcvd: 52
                        
                        

                        Well kind of, Suricata keeps logging the same alert (ET POLICY Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI))

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          @HuskerDu said in HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox:

                          cloudflare-dns .com in TLS SNI)

                          Who says that is firefox? That could be some malware/trojan you have on your network.

                          I see zero hits to 1.1.1.1 or 1.0.0.1, so firefox wouldn't doing it.. Unless your client not using pfsense for dns, and not seeing the nx for the canary..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          1 Reply Last reply Reply Quote 0
                          • H
                            HuskerDu
                            last edited by HuskerDu

                            This only happens when I launch Firefox from the machine which generates an alert in Suricata. No worms/trojans and co, it only happens when :

                            • Firefox is set to use DNS over HTTPS
                            • Firefox is launched

                            My firewall rules only allow DNS to pFsense (including NATing 8.8.8.8:53 towards the firewall for Android devices.... whatever you are telling them, they keep checking "Internet connectivity" on that).

                            Interestingly, it is not hitting 1.1.1.1 but 104.16.249.249. Maybe the anycast IP is used for marketing purposes but not always used in real life traffic ?

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by

                              @HuskerDu said in HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox:

                              104.16.249.249

                              https://community.cloudflare.com/t/dns-over-https-using-https-104-16-249-249-dns-query

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                              1 Reply Last reply Reply Quote 0
                              • M
                                motific
                                last edited by motific

                                I skimmed the comments and didn’t see any mention of this...

                                I’m now seeing IOS devices trying to connect out to google DoH servers.

                                For now I’ve just blocked Google’s DoH infrastructure but it looks like we’re on the cusp of a technological arms-race.

                                1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator
                                  last edited by johnpoz

                                  @motific said in HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox:

                                  looks like we’re on the cusp of a technological arms-race.

                                  Yup!! Its going to be interesting to be sure.. I think this is is an understatement to be sure. But I really do not think its the place of applications to try and circumvent local dns no matter if their intentions are good or not..

                                  Unless the user of said application be it a browser or any other application specifically sets this application to use some dns be it direct or doh or dot, the application should use the OS set dns..

                                  I am not a fan of the browser using anything other than what my OS is set to use for dns, without my explicit validation to do so.. It for sure its an arms race to have users dns point to a specific location.. I have no problem with the browser offering the ability to do doh or dot.. But its not something the application should just assume - it should have to be called out to do such things by the person running the application.. If they want to default the application to do such a thing it should be a clear op in sort of thing.. There is no scenario where opt out makes any sense - and opt out is a bad thing for sure..

                                  This goes for any sort of device or application - you should use the dns handed you via dhcp, or set by the user in the os or device. Circumvention of this in anyway is violation of user choice! If the user wanted to use xyz for dns - then they should set that be it on the device/application specifically or what they hand out via dhcp..

                                  Using the excuse that the user is too stupid to set this, and we are going what is best for the user is just nonsense!! And just looking to grab information from the users too stupid to know what is going on. Even IF!!! this was being done with the best of intentions - which it is not.. Its the wrong way to go about it.. Education of the user is the correct way!! Let the user chose and set what they want to use..

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                  1 Reply Last reply Reply Quote 2
                                  • C
                                    coreybrett
                                    last edited by

                                    When I put

                                    local-zone: "use-application-dns.net" static
                                    

                                    in my Custom options box, I get

                                    The following input errors were detected:
                                    
                                    The generated config file cannot be parsed by unbound. Please correct the following errors:
                                    /var/unbound/test/unbound.conf:102: error: syntax error
                                    read /var/unbound/test/unbound.conf failed: 1 errors in configuration file
                                    

                                    Line 102 in that file is the local-zone line from above.

                                    I'm running 2.4.4-RELEASE-p3 (amd64)

                                    1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator
                                      last edited by johnpoz

                                      You need the

                                      server:

                                      Statement in the box before you can add any other custom commands

                                      here
                                      localzone.jpg

                                      You can also add the always_nxdomain for good measure.

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                      1 Reply Last reply Reply Quote 1
                                      • kiokomanK
                                        kiokoman LAYER 8
                                        last edited by

                                        hurricane electric joined the doh and dot party
                                        The public recursors at 74.82.42.42 / 2001:470:20::2 / ordns.he.net now also support DNS over TLS (DoT) and DNS over HTTPS (DoH) for those who wish to use those interfaces. or for those who want to block it ...

                                        ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                                        Please do not use chat/PM to ask for help
                                        we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                                        Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                                        1 Reply Last reply Reply Quote 0
                                        • jimpJ
                                          jimp Rebel Alliance Developer Netgate
                                          last edited by

                                          Just in time for Firefox to crank up the DoH setting

                                          https://arstechnica.com/information-technology/2020/02/firefox-turns-encrypted-dns-on-by-default-to-thwart-snooping-isps/

                                          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                          Need help fast? Netgate Global Support!

                                          Do not Chat/PM for help!

                                          1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator
                                            last edited by

                                            Offering it on their NS that have open to the public is not at all the same thing as turning it on by default in the browser..

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.