MS activated DoH at the operating system level, in this "great" 20H2 release...?!
-
I see the latest pfBlockerNG-devel includes several feeds to block DoH servers.
-
@provels said in MS activated DoH at the operating system level, in this "great" 20H2 release...?!:
I see the latest pfBlockerNG-devel includes several feeds to block DoH servers.
Yes, :) as I wrote above we have been using it for thousands of years..
but this is a special problem now, look at the Wireshark PRTSC (above) and / or the o.ss2.us domain to be blocked by pfBlockerNG -devel, but on this build it doesn't... (20H2 clean from MS VLSC account, especially for Hungarians... it's a joke only :))
I personaly hate the DoH, (what the fu.....k is this, because it is not privacy protection, -that's for sure)
I think the right one: DHCP for client(s) with pfSense DNS (ONLY) + Unbound + CloudFlare DNS DoT + DNSSEC and of course pfBlockerNG -devel
-
Thanks for the link - sure wont get to today.. Nor tmrw - but saturday might have some time.
Nice link - peaked out at just over 50MBps.. Not too shabby..
-
@johnpoz said in MS activated DoH at the operating system level, in this "great" 20H2 release...?!:
Nice link - peaked out at just over 50MBps.. Not too shabby..
I think that, Dropbox EU cloud storage server + Transatlantic optic cables, and the Google is now investing in an even larger capacity cable.
Life is spinning up between the continents.I would add to the test, (these are not influencing factors, but I describe them):
The install was pure 20H2 UEFI + GPT on 120GB SSD with Rufus.
After that I just did that:-with MiniTool Partition Wizard 80 + 40 GB,
- after, I transferred the connecttest in the registry to our own server. (IPv4 only + but we don't use IPv6 anywhere, not even in pfSense - so I didn't touch it)
-Firefox installation and then I turned off DoH in Firefox (forced mode)
about:config
network.trr.mode 5-Then the network icon indicated no internet, hmmm :), even though I pointed to our own server...
-I looked for the issue and watched for the traffic to our connecttest server, I watched for 1 hour, there was no traffic, Win10 didn't even try to connect.I read somewhere that, when there is no "connecttest" connection the Win tries to browser based to decide, whether have an internet connection or not..
It does this through its own browsers.....
-So I "fired up" the Chromium based Edge stuff (which is already mandatory in this build) and letβs see the miracle, after 2 - 3 minutes there was internet according to the icon
By then, I had already seen the connection to this server (original MS connecttest) what we discussed above in Wireshark PRTSC, which would not have been possible, because pfBlockerNG is blocking this domain...
I selected another blocked domain from one of the DNSBL feeds and tried it, this domain has also been bypassed the pfBlockerNG (o.ss2.us)
Briefly about the test so much, I will continue the test over the weekend and thanks for taking the time to do it yourself too. :)
BTW:
It is important to note that, there was never any traffic to our own connecttest server which was configured in the registry...
then now, which thing sets the Win parameters, if not the registry(?), ergo this is something hidden from us..(?!)
The network icon has been merrily showing internet access ever since :), and still no connection to our own server...suspicious:
-Oddly enough, Firefox and Chromium Edge also bypass pfBlockerNGContrary to promises, Chromium Edge (which is already built into this build - not downloaded version) does not include a DoH enable or disable parameter (specific option to Chromium-based browsers).
I couldn't find it anywhere!!!it should appear somewhere in a similar way, but nowhere....
-
@provels said in MS activated DoH at the operating system level, in this "great" 20H2 release...?!:
At any rate, I read Unbound 1.12.0 now supports DoH.
We are on a mailing list here (Unbound), we are already ahead of this .....actually 1.13.0rc2 pre-release...
unlike us others love DoH, itβs crazyjust watch:
-
If you are using a firewall rule to allow only specific outbound rules, is DNS configured to allow TCP or just UDP or port 53?
Chrome specifically and possibly now Edge Chromium will try to use DNS over TCP or DoH if TCP is allowed out, blocking TCP 53 outbound might help if it's open as it will fall back to UDP 53.
Not sure if this will help or not, if not i at least hope it was insightful.
-
Doh does not use tcp on 53.. that is just normal dns for large stuff.. doh is over port 443.. Just like every other https site on the planet - which is why its a pita to try and block. dot on the other hand is easy because it uses 853..
-
But I'm still curious if DNS is using TCP to get a resolve.
I dont know the in-depths of PfBlockerNG or the way in which unbound works, if it used UDP only then this might help, if not and it relies on the returned results, not the lookup directly then fine.
I was just noting the TCP on port 53 for DNS in case it was not known. I am aware of DoH and 443 though.
As a final paragraph, i am not a network guy, but trying to help and in return learning a lot, so even if i am not helpful in my replies at present, i learn a lot from you guys and hope to be able to give back in the future with more meaningful and helpful posts
-
@rod-it Yes for DNS using TCP.
Reply packets that are to big for UDP will be re send using the more adequate TCP.
This can happens when DNSSEC traffic is used.I's a known pitfall : letting port 53 UDP traffic going in and out, and forgetting about TCP.
And complaining 'DNS' doesn't work well ...... -
you can try use squid proxy in ssl bump mode to block
application/dns-message
media typesee https://tools.ietf.org/html/rfc8484#section-6
and https://medium.com/nlnetlabs/dns-over-https-in-unbound-c7a407e8480 -
@rod-it said in MS activated DoH at the operating system level, in this "great" 20H2 release...?!:
But I'm still curious if DNS is using TCP to get a resolve.
It could. Blocking a client from talking to dns over 53 tcp could cause issues..
Now the 512 limit before switching to tcp has really been removed with support for edns.. But you never know what a query might return.. And what features of dns are supported by either the client or the dns server your talking to..
Its not a good idea to block dns over 53 on tcp.. While you may never run into a problem - when you do.. It could be problematic finding the issue.
But since doh or dot does not use dns over tcp 53.. Blocking it wouldn't get you anything.. Off the top I can not think of any reason why you would want or need to block dns over tcp 53.. But there are reasons why that could cause you issues..
I would not suggest not allowing dns over tcp 53.
-
@rod-it said in MS activated DoH at the operating system level, in this "great" 20H2 release...?!:
If you are using a firewall rule to allow only specific outbound rules, is DNS configured to allow TCP or just UDP or port 53?
Hi,
thank you for the comment
we won't let anything out of the firewall (box) at 53
the internal network communicates only with pfSense on port 53, outward DoT 853https://docs.netgate.com/pfsense/en/latest/recipes/dns-redirect.html
or not beautiful but effective
https://docs.netgate.com/pfsense/en/latest/recipes/dns-block-external.html
++edit:
https://developers.cloudflare.com/1.1.1.1/nitty-gritty-details -
@daddygo said in MS activated DoH at the operating system level, in this "great" 20H2 release...?!:
DoT
DoT : WTF ?!
-
@gertjan said in MS activated DoH at the operating system level, in this "great" 20H2 release...?!:
WTF
I haven't even seen this, hahaha...
Former and twitter guru president, he would love this very much pmurTRather RFC7858
+++edit:
and / Yes EDNS vs. CloudFlare = I share this view
-
@gertjan said in MS activated DoH at the operating system level, in this "great" 20H2 release...?!:
DoT : WTF ?!
ROFL ;)
-
@johnpoz said in MS activated DoH at the operating system level, in this "great" 20H2 release...?!:
ROFL ;)
This will be the future with DoH:
-
@provels said in MS activated DoH at the operating system level, in this "great" 20H2 release...?!:
What would happen to those of us using the resolver and talking to the roots?
Hello everyone...
Okay (hmmm, how should I start, OK I already know), Iβll post a new and great evidence on this theme (Win10 _20H2 vs. DoH) in 2021, so I am not doing it now, ...because I want to (sorry,....I would like to)..... and I would like to wish a beautiful Christmas and a pleasant New Year holiday to everyone, but then comes the dread in 2021....HOHOHO..HAHAHA, like bird flu H1N1 - Winflu 20H2 - HIHIHI
-it wasn't a good joke, though it looks a bit similar..... (so, "give me five")
(I am using roaring emoticons , not like others :)- of course only for those who like to control their own DNS stuff -
I look forward to seeing everyone, if you are interested in the future... and theDNS theme
BTW (preliminary):
the encouraging test environments: (4 colleagues, 4 separate locations (in EU), 4 external pfSense installations - same Win image - 20H2)+++edit:
MY new year "vow" WILL BE that I wont be createing less colorful posts and+++edit2:
anyway, I use windows everyday (to my stuff)
well, that's a joke (so I got upset)