Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    My FF just had a DOH brainfart (Solved - user error)

    Off-Topic & Non-Support Discussion
    2
    10
    693
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bingo600B
      bingo600
      last edited by bingo600

      I was browsing the net today , and something was fishy ...
      Either github.io was unfunctional , or something was wring w. my linux mint ...
      github.io answered fine on ping.

      But i couldn't goto this page in FireFox
      https://blog.davehylands.com/capturing-usb-serial-using-wireshark/
      I couldn't goto github.io too ....

      I decided to see if my pfSense had anything to do with that.
      Yepp it was blocking DOH, just as i have told it to do (floating rules).

      94889c3f-190d-4690-be8f-b6f353f2e4b9-image.png

      But the strange part is that i have this set in unbound:

      # Block FF DoH by defining use-application-dns.net
      local-zone: "use-application-dns.net" always_nxdomain
      #
      # Block DoH Cloudflare - https://forum.netgate.com/post/939705
      # JP comment - That is a great solution.. Since you set it static, 
      # unbound will not try to resolve any subdomains of that be it the Mozilla or the chrome one..
      local-zone: "cloudflare-dns.com" static
      

      And a "host resolve" of the FF canary returns this, just as i told unbound to do.

      $ host use-application-dns.net
      Host use-application-dns.net not found: 3(NXDOMAIN)
      

      And i have this set in FF:
      fd40dd9e-ebee-4e58-8966-74bcbcd0befb-image.png

      FF settings expl.
      https://wiki.mozilla.org/Trusted_Recursive_Resolver#network.trr.mode

      A reboot didn't solve it, github.io was still doing DOH , and therefore unreachable.
      I did a wireshark trace, right after reboot + login. Before starting FF.
      I was actually expecting it to query the canary domain, but i didn't see that.

      After poking around in FF about:config wo changing anything.
      It went back to normal as in i could browse to the above url wo. using DOH.

      But what happened ??
      I have two different ways of telling FF to NOT use DOH : Canary & browser setting (5)

      FF writes they might monitor & disable the Canary , if they detect misuse ...
      Can anyone else see FF query/reolve the canary ??

      Have anyone else, with an active DOH blocking system, experienced something like this ?

      /Bingo

      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

      pfSense+ 23.05.1 (ZFS)

      QOTOM-Q355G4 Quad Lan.
      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        @bingo600 said in My FF just had a DOH brainfart:

        Can anyone else see FF query/reolve the canary ??

        I just duplicated your test of wireshark and starting FF, flushed my local dns on the box for good measure I did not see any query for the canary.. But if TRR is set to 5, would it?

        I then set trr mode to 0.. and repeated test - still not seeing a query for canary.. I even let it run for a while and hit some other sites thinking maybe it doesn't do the query right away on start up.. Curious - I would think it should query for the canary when trr set to 0 maybe.. That is the whole point of canary right? I wonder if it only does that if you set firefox to use doh?

        Have to do some digging on when exactly FF would check the canary..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        bingo600B 1 Reply Last reply Reply Quote 0
        • bingo600B
          bingo600 @johnpoz
          last edited by bingo600

          @johnpoz

          But if TRR is set to 5, would it?

          Maybe not, but if set to 5 it shouldn't use DOH too ....

          No matter what setting of TRR i would have expected it to query the canary before doing ANY DOH.

          /Bingo

          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

          pfSense+ 23.05.1 (ZFS)

          QOTOM-Q355G4 Quad Lan.
          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @bingo600
            last edited by

            @bingo600 there is some discussion about that in different places - I too interpreted that way, but doesn't seem to actually be the case. From what I can piece together in the few minutes of looking is it will only query that if user set by default to use doh..

            My take is there has to be a specific set of circumstances for it to actually query for the canary. I tried the test while I selected to use doh in the firefox network settings while my TRR was set to 0..

            I would of thought it would of done a query then - but when it did the query for the uri it defaults to mozilla.cloudflare-dns.com I return 0.0.0.0 via blocking.. in pihole, so pretty sure that tells firefox to fallback to normal dns, and maybe it never does the query for the canary because the doh it tried to use fails..

            Would have to maybe disable my blocking of doh domains, and then test if once firefox sees that it can do doh, does it then look for the canary to see if the network admins have set it it not too..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            bingo600B 1 Reply Last reply Reply Quote 0
            • bingo600B
              bingo600 @johnpoz
              last edited by bingo600

              @johnpoz said in My FF just had a DOH brainfart:

              mozilla.cloudflare-dns.com

              Maybe i should block that too šŸ‘

              My linux doesn't use my PiHole , only Phone & MMedia Vlan does

              Ahh i had this in unbound: Should have refused to resolve the mozilla check ...

              # unbound will not try to resolve any subdomains of that be it the Mozilla or the chrome one..
              local-zone: "cloudflare-dns.com" static
              

              But how IN THE .... would it do any DOH when i have TRR set to 5 ??

              If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

              pfSense+ 23.05.1 (ZFS)

              QOTOM-Q355G4 Quad Lan.
              CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
              LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @bingo600
                last edited by

                @bingo600 there is a bunch of doh fqdn that should be block..

                As to why it attempted doh while you have trr to 5 that clearly should not happen from my understanding... I set mine to 5, I have the canary setup, and I block a ton of fdqn and IPs for doh.. I am with you - I don't want any of my shit using doh, ever!!

                Maybe some addon in FF says don't care what your firefox settings are - I am going to do doh be it you want to or not ;) I sure wouldn't put it past some of these addon makers or even browsers themselves.. Its like they think they are doing you a favor to bypass your local dns.. It is some nonsense that is for sure..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                bingo600B 1 Reply Last reply Reply Quote 1
                • bingo600B
                  bingo600 @johnpoz
                  last edited by

                  @johnpoz said in My FF just had a DOH brainfart:

                  @bingo600 there is a bunch of doh fqdn that should be block..

                  That's why i did my "remote list" DOH blocking & hope they'll keep updating.

                  As to why it attempted doh while you have trr to 5 that clearly should not happen from my understanding... I set mine to 5, I have the canary setup, and I block a ton of fdqn and IPs for doh.. I am with you - I don't want any of my shit using doh, ever!!

                  Totaly agree

                  Maybe some addon in FF says don't care what your firefox settings are - I am going to do doh be it you want to or not ;) I sure wouldn't put it past some of these addon makers or even browsers themselves.. Its like they think they are doing you a favor to bypass your local dns.. It is some nonsense that is for sure..

                  While looking into FF DOH , i saw that there is another way of stopping DOH.
                  They mention enterprises can set a policy.
                  That they might honour , else they will be kicked out 😠

                  The additional checks that will be performed for private ā€œenterpriseā€ networks are:
                  
                      Is the Firefox security.enterprise_roots.enabled preference set to true?
                      Is any enterprise policy configured? 
                  
                  
                  policies.json
                  
                  
                  https://github.com/mozilla/policy-templates#dnsoverhttps
                  

                  If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                  pfSense+ 23.05.1 (ZFS)

                  QOTOM-Q355G4 Quad Lan.
                  CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                  LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                  bingo600B 1 Reply Last reply Reply Quote 0
                  • bingo600B
                    bingo600 @bingo600
                    last edited by bingo600

                    @bingo600

                    Hmmm .... I Might owe mozilla/FF an excuse.

                    $ host github.io
                    github.io has address 185.199.111.153
                    github.io has address 185.199.110.153
                    github.io has address 185.199.108.153
                    github.io has address 185.199.109.153
                    
                    
                    $ host blog.davehylands.com
                    blog.davehylands.com is an alias for dhylands.github.io.
                    dhylands.github.io has address 185.199.108.153
                    dhylands.github.io has address 185.199.110.153
                    dhylands.github.io has address 185.199.111.153
                    dhylands.github.io has address 185.199.109.153
                    dhylands.github.io has IPv6 address 2606:50c0:8001::153
                    dhylands.github.io has IPv6 address 2606:50c0:8002::153
                    dhylands.github.io has IPv6 address 2606:50c0:8003::153
                    dhylands.github.io has IPv6 address 2606:50c0:8000::153
                    

                    Rethinking that i use an "external list" and that i told it to do https
                    https://blog.davehylands.com/capturing-usb-serial-using-wireshark/

                    I might think the "List maintainer" has entered all of github.io's wervers to the DOH blocklist , not knowing they also serve HTTPS webpages.

                    And this is why it's working right now:
                    $ netstat -pant | grep 185
                    (Not all processes could be identified, non-owned process info
                    will not be shown, you would have to be root to see it all.)
                    tcp 0 0 10.xx.xx.xx:45948 185.199.111.153:80 ESTABLISHED 2016/firefox

                    I have fallen back to http ...

                    Sorry Mozilla/FF & JP šŸ¤• 😧

                    The servers might do DOH also , but i think i was just doing a https to them

                    /Bingo

                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                    pfSense+ 23.05.1 (ZFS)

                    QOTOM-Q355G4 Quad Lan.
                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @bingo600
                      last edited by

                      @bingo600 yeah that can be problematic if your running services on the same ip as your trying to do doh, people are going to block you that is for sure.

                      But it does bring to question understanding exactly when FF would check the canary.. So all good in the end..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      bingo600B 1 Reply Last reply Reply Quote 0
                      • bingo600B
                        bingo600 @johnpoz
                        last edited by bingo600

                        @johnpoz

                        The github ip's seems to have been removed from the list , the pfSense would only have logged those if they were in there.
                        dhylands.github.io has address 185.199.108.153
                        dhylands.github.io has address 185.199.110.153
                        dhylands.github.io has address 185.199.111.153
                        dhylands.github.io has address 185.199.109.153

                        https://raw.githubusercontent.com/jpgpi250/piholemanual/master/DOHipv4.txt
                        https://raw.githubusercontent.com/jpgpi250/piholemanual/master/DOHexceptionsIPv4.txt

                        Here i suppose

                        Mar 23 12:30:55 	php-cgi 	6601 	rc.update_urltables: /etc/rc.update_urltables: Updated UA_DOH_IPV4_JGPI content from https://raw.githubusercontent.com/jpgpi250/piholemanual/master/DOHipv4.txt: 80 addresses added. 
                        

                        But as mentioned above .. It got us to dig a bit deeper in FF and DOH (prevention).

                        And i have learned a lesson in "blindly trust" external lists.

                        But it's only the 2'nd time in like a year, that i have had issues w. that list.
                        So it seems OK'ish

                        /Bingo

                        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                        pfSense+ 23.05.1 (ZFS)

                        QOTOM-Q355G4 Quad Lan.
                        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                        1 Reply Last reply Reply Quote 1
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.