DNS over TLS router.
-
@jaredbusch said in DNS over TLS router.:
@scottalanmiller said in DNS over TLS router.:
@jaredbusch said in DNS over TLS router.:
The linked article paints a horrible picture of IoT devices not using DHCP assigned DNS information.
Which is a totally different problem that can't be fixed by DNS over TLS.
Also, I wonder how many of these devices actually do this. There was a link to an article for specific items that the author obviously says do this. But how many really do?
I have few IoT class devices at home yet.
I would guess very few, as they would break and be the vendor's fault very often.
-
@scottalanmiller - Yeah... I don't want my browser overriding the DNS server settings that are on my network for a reason.
-
@wrx7m said in DNS over TLS router.:
@scottalanmiller - Yeah... I don't want my browser overriding the DNS server settings that are on my network for a reason.
Not by the browsers choice instead of mine, definitely not.
-
@scottalanmiller said in DNS over TLS router.:
@jaredbusch said in DNS over TLS router.:
@scottalanmiller said in DNS over TLS router.:
@jaredbusch said in DNS over TLS router.:
The linked article paints a horrible picture of IoT devices not using DHCP assigned DNS information.
Which is a totally different problem that can't be fixed by DNS over TLS.
Also, I wonder how many of these devices actually do this. There was a link to an article for specific items that the author obviously says do this. But how many really do?
I have few IoT class devices at home yet.
I would guess very few, as they would break and be the vendor's fault very often.
Added rule to my ERL. let's find out.. THe only allwoed IP right now is my internal PiHole.
My DHCP is set to give out the PiHole and then the rotuer in case I shut down the VM.
-
Well, there is a hit already.
Jul 16 16:29:35 jared kernel: [LAN_IN-4-D]IN=eth1 OUT=eth0 MAC=24:a4:3c:b3:53:85:a4:da:22:2d:b5:0d:08:00 SRC=10.254.103.67 DST=8.8.8.8 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=36373 DF PROTO=UDP SPT=60926 DPT=53 LEN=45 Jul 16 16:29:35 jared kernel: [LAN_IN-4-D]IN=eth1 OUT=eth0 MAC=24:a4:3c:b3:53:85:a4:da:22:2d:b5:0d:08:00 SRC=10.254.103.67 DST=8.8.8.8 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=36373 DF PROTO=UDP SPT=35969 DPT=53 LEN=45 Jul 16 16:29:40 jared kernel: [LAN_IN-4-D]IN=eth1 OUT=eth0 MAC=24:a4:3c:b3:53:85:a4:da:22:2d:b5:0d:08:00 SRC=10.254.103.67 DST=8.8.4.4 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=36874 DF PROTO=UDP SPT=53557 DPT=53 LEN=45 Jul 16 16:29:40 jared kernel: [LAN_IN-4-D]IN=eth1 OUT=eth0 MAC=24:a4:3c:b3:53:85:a4:da:22:2d:b5:0d:08:00 SRC=10.254.103.67 DST=8.8.4.4 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=36874 DF PROTO=UDP SPT=40114 DPT=53 LEN=45
That IP
10.254.103.67
is one of the WyzeCams I have. It is trying to hit Google DNS. -
But that IP is consistently using my PiHole also.
-
@jaredbusch Built in fail over?
-
In Firefox, is
network.dns.disablePrefetch
controls what DNS Firefox will use? -
@black3dynamite said in DNS over TLS router.:
In Firefox, is
network.dns.disablePrefetch
controls what DNS Firefox will use?I don't think that is what overrides DNS to their own configured servers. I recently saw the Cloudflare announcement after upgrading to the latest version of FF.
Here is an article about it:
https://blog.nightly.mozilla.org/2018/06/01/improving-dns-privacy-in-firefox/ -
The settings are
network.trr, network.trr.mode and network.trr.uri