Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Any way to TRULY block DNS over https (doh)?

    Scheduled Pinned Locked Moved General pfSense Questions
    7 Posts 4 Posters 3.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rtkluttz
      last edited by

      I've seen many posts regarding doh and am aware of the ways to configure your network to ASK clients not to use doh. I am looking for a way to confirm and enforce that it is not being used.

      There really needs to be a change in the stated support for MITM in pfsense to become a big boy and there has to be a supported way in the future to crack open this traffic on your own network.

      Whole platforms of IOT and devices are being weaponized by the device and app creators against the owners of the devices and now web browsers and other applications are going down the same road and doing IP lookups that we have no way of seeing and filtering as the owners of the devices and networks in our homes and businesses. If anyone thinks doh is about privacy, they have their head in the sand. It's ultimately about them taking control back and being able to bypass adblocking and do more subversive user tracking without us being able to see the even the site lookups.

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        This is very good question... Currently the only way to block it would be via blocking the known doh servers, and or the dns to said doh servers.. I have started doing this - but this list is going to grow very quickly and get very difficult to handle.. And doesn't stop the ability to just use doh to an unknown server, etc. This is more an attempt to detect known software doing something they have not actually stated they are doing then trying to stop bad stuff. Have yet to see any hits - so that is a good thing.

        What is nice about the dot protocol is it runs on a specific port, which you can just block... That being said they could just run dot on any other common port and you really wouldn't be able to know..

        The big problem here to be honest, is once you open anything outbound - a bad actor can tunnel really anything they want out out, no matter what port you have open. So stopping a truely bad actor is not possible in the overall picture of what is possible.

        And I agree this is not about user privacy at all - it is about control... I read something the other day which could make sense to why some ISPs are against this... Not so much that they are tracking you or whatever... But many users just default to using the ISP dns, so when user goes to somewhere with typo or whatever - the isp can send you to a parking domain, etc. Which is a income stream, that could be taken away from them if browser is forwarding all dns to not them..

        This is just another part of the bigger picture... They can say its about user privacy all they want - its clear that is not the case... Application should not be doing dns, that should be left to the OS to do if you ask me!!! if I want to use doh or dot, then will set it up on the OS.. Applications should be worried about doing their application shit, and not looking up dns stuff..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        JKnottJ 1 Reply Last reply Reply Quote 3
        • R
          rtkluttz
          last edited by

          I've been thinking about ways to potentially handle it... maybe with snort or suricata rules that check for any communications to sites that have not had a dns lookup on them. Someone else mentioned that Opnsense has a plugin called bro that can do some magic with tcp headers to get part of the way toward identifying the doh traffic.

          On a soapbox rant, but there really needs to be some government regulation regarding closed ecosystems and encrypted traffic. I understand that encrypted traffic should be hidden from prying eyes, but that encryption should never be hidden from the owner of a device. There should be regulation in place that enforces that all IoT devices or services on PC's be able to accept proxy certs from the owner of a device and network so that they can see traffic on their own networks and devices. It would frighten the hell out of most device makers today if that happened and we got shine a light on the data they are sending out of our networks about us.

          johnpozJ 1 Reply Last reply Reply Quote 0
          • JKnottJ
            JKnott @johnpoz
            last edited by

            @johnpoz

            Here's one position on this:

            DNS-over-HTTPS causes more problems than it solves, experts say

            PfSense running on Qotom mini PC
            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
            UniFi AC-Lite access point

            I haven't lost my mind. It's around here...somewhere...

            JonathanLeeJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              I concur with pretty much everything be said there ;) doh is not a good thing to be sure..

              Dot is a better option... I can set it up if a I want to use it... Shouldn't be done at the application level.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @rtkluttz
                last edited by johnpoz

                @rtkluttz said in Any way to TRULY block DNS over https (doh)?:

                encryption should never be hidden from the owner of a device. There should be regulation in place that enforces that all IoT devices or services on PC's be able to accept proxy certs from the owner of a device and network so that they can see traffic on their own networks and devices. It would frighten the hell out of most device makers today if that happened and we got shine a light on the data they are sending out of our networks about us.

                I like this idea to be honest.. Just don't know how you would get that passed... But yeah that would keep them all honest on what exactly info they are gathering ;)

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                1 Reply Last reply Reply Quote 0
                • JonathanLeeJ
                  JonathanLee @JKnott
                  last edited by JonathanLee

                  @jknott I agree, this opens a can of worms for cyber security, just one website and one wrong web cookie could direct DoH DNS requests to a another server, I just noticed you can disable it in Chrome and on the OS side. I use Squidguard and block a list of DoH domains, many servers are in different countries. I just started looking into this with one.one.one.one and other cloudflare DoH servers.

                  https://forum.netgate.com/topic/176693/dns-over-443?_=1672162126374

                  Another post with lists of DoH servers.
                  Combined DoH servers list if you want to create a block list.

                  Positive when it is turned off in the OS I do not see any requests on the proxy anymore. So you can block it that way.

                  1672081401354-combineddohlist.txt

                  Make sure to upvote

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.