Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox

    Scheduled Pinned Locked Moved DHCP and DNS
    85 Posts 19 Posters 39.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jpgpi250J
      jpgpi250 @johnpoz
      last edited by

      @johnpoz
      I started this proactively, I doesn't look like I currently have any clients, trying to use DoH. I tested my rules, using this DoH client (it isn't very good, but I only needed to verify the rules worked)
      Blocking the domain names (DNS blocking) is only a partial defense to block DoH. Most clients need to resolve the domain, in order to send a DoH request. Using a DNS blocker (pihole, pfBlockerNG, Adguard Home, …) helps achieving this, however, there is a new technique, already in use by some providers that doesn't require the domain to be resolved, prior to the DoH request.
      I assume devices and apps, that try to force DoH, this to ensure that blocking their DNS name doesn't prevent tracking and data collection, will soon pick up on this. I found an example here, the resulting string doesn't contain an IP or a domain name.

      Apart from that, Some providers offer normal DNS (port 53) and DoH on the same IP address. Example:

      • resolver1.opendns.com
      • resolver2.opendns.com

      Using the IP list(s), blocking only port 443, ensures the normal DNS requests (port 53) still work.

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        @jpgpi250 said in HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox:

        Using the IP list(s), blocking only port 443, ensures the normal DNS requests (port 53) still work.

        Dude your preaching to the choir.. I specifically went over why I also have the IP based rules ;)

        If I were you, I would clear the counters on you rules.. So you can see by just a glace of your rules if anything has tried to use doh.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        1 Reply Last reply Reply Quote 0
        • T
          tman222
          last edited by

          Just a heads up - Google Chrome's Secure DNS (DoH) is arriving soon. Thankfully it looks like it will be easy to disable:

          https://blog.google/products/chrome/more-intuitive-privacy-and-security-controls-chrome/

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by johnpoz

            Why and the F do they make this the default? If they want to support it great, just don't make it something I have OPT OUT of... Such features should always be opt in as the default stance..

            Out of the box the browser should use the OS for dns.. It doing anything other that should be required to opt in!!

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            1 Reply Last reply Reply Quote 0
            • kiokomanK
              kiokoman LAYER 8
              last edited by kiokoman

              at least
              if your current service provider supports it
              from what i understant it will use doh only if the dns you have configured support it
              ?
              You can also configure a different secure DNS provider in the Advanced security section
              they didn't accept money from cloudflare or from any other dns services 😂
              if it's the case, it's not that bad and always better than firefox

              ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
              Please do not use chat/PM to ask for help
              we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
              Don't forget to Upvote with the 👍 button for any post you find to be helpful.

              1 Reply Last reply Reply Quote 0
              • kiokomanK
                kiokoman LAYER 8
                last edited by kiokoman

                interesting how this android phone is ignoring my dhcp settings (8.8.8.8 is not one of my dns) and try to use dot,
                Immagine.jpg

                the phone have chrome installed, not firefox but maybe is some other apps running on it

                ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                Please do not use chat/PM to ask for help
                we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                Bob.DigB 1 Reply Last reply Reply Quote 0
                • Bob.DigB
                  Bob.Dig LAYER 8 @kiokoman
                  last edited by Bob.Dig

                  @kiokoman Is Private DNS on or off?

                  Screenshot_20200527-204819.png

                  1 Reply Last reply Reply Quote 0
                  • H
                    HuskerDu
                    last edited by

                    Some (most ?) Android devices do natively their Internet connectivity check towards 8.8.8.8.

                    Android 9+ have "Private DNS" settings enable/disable/auto for DoT.

                    Both things together may explain your logs.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      @kiokoman said in HEADS UP: Be aware of Trusted Recursive Resolver (TRR) in Firefox:

                      from what i understant it will use doh only if the dns you have configured support it
                      ?

                      So you saying if I already point to say 1.1.1.1 and they do doh, then it will use doh vs just open?

                      I guess that is not as bad as some of the others.. But if using say 192.168.1.1 it won't?

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 0
                      • kiokomanK
                        kiokoman LAYER 8
                        last edited by

                        @Bob-Dig idk it's not my phone, if it's "Private DNS" settings than it was probably on by default, my family does not know what dot / doh is

                        @johnpoz exactly

                        ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                        Please do not use chat/PM to ask for help
                        we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                        Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                        1 Reply Last reply Reply Quote 0
                        • D darcey referenced this topic on
                        • D darcey referenced this topic on
                        • D darcey referenced this topic on
                        • GertjanG Gertjan referenced this topic on
                        • GertjanG Gertjan referenced this topic on
                        • U Uglybrian referenced this topic on
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.