DNS Over TLS On pfSense 2.4.5

Поділитися
Вставка
  • Опубліковано 19 тра 2020
  • Connecting With Us
    ---------------------------------------------------
    + Hire Us For A Project: lawrencesystems.com/hire-us/
    + Tom Twitter 🐦 / tomlawrencetech
    + Our Web Site www.lawrencesystems.com/
    + Our Forums forums.lawrencesystems.com/
    + Instagram / lawrencesystems
    + Facebook / lawrencesystems
    + GitHub github.com/lawrencesystems/
    + Discord / discord
    Lawrence Systems Shirts and Swag
    ---------------------------------------------------
    ►👕 lawrence.video/swag
    AFFILIATES & REFERRAL LINKS
    ---------------------------------------------------
    Amazon Affiliate Store
    🛒 www.amazon.com/shop/lawrences...
    UniFi Affiliate Link
    🛒 store.ui.com?a_aid=LTS
    All Of Our Affiliates that help us out and can get you discounts!
    🛒 lawrencesystems.com/partners-...
    Gear we use on Kit
    🛒 kit.co/lawrencesystems
    Use OfferCode LTSERVICES to get 5% off your order at
    🛒 lawrence.video/techsupplydirect
    Digital Ocean Offer Code
    🛒 m.do.co/c/85de8d181725
    HostiFi UniFi Cloud Hosting Service
    🛒 hostifi.net/?via=lawrencesystems
    Protect you privacy with a VPN from Private Internet Access
    🛒 www.privateinternetaccess.com...
    Patreon
    💰 / lawrencesystems
    forum.netgate.com/topic/13977...
    #pfsense #Firewalls
  • Наука та технологія

КОМЕНТАРІ • 94

  • @billslim9267
    @billslim9267 4 роки тому

    Dan from Tyler, TX here, Thanks Tom! Just what I needed.

  • @towesc
    @towesc 4 роки тому

    Thanks Tom, as always very informative. Had DOT setup for a while now and had the Cloudflare DNS servers added to the custom options + I'm also using pfBlockerNG, changed it now to the way you're showing in the video (:

  • @DarkNightSonata
    @DarkNightSonata 4 роки тому +16

    Hey, please make a video on Redirecting DNS & Blocking external DNS servers for pfSense. Thanks a lot

  • @JosephChiocchi
    @JosephChiocchi 4 роки тому +9

    I was procrastinating on researching this, thanks for distilling it in another succinct video! No excuse for me not to use it now ;)

  • @BrewedIt
    @BrewedIt 4 роки тому

    Nice video. Love your content. I use pihole and a Unifi network. Pihole with dns over https works fine if using the cloudflared method via loop back.

  • @user-hs6sh9qe5s
    @user-hs6sh9qe5s 9 місяців тому +1

    Thanks Lawrence, you´r the best!! Regards from Colombia!!

  • @fritzchristoph8670
    @fritzchristoph8670 2 роки тому

    Nice one. This was what i im looking for...

  • @robbymoeyaert7482
    @robbymoeyaert7482 4 роки тому +1

    Should note that if you're running a dual stack IPv6 / IPv4 network with pfSense and running unbound, pfSense will advertise itself as DNS server through router advertisements. This means that in case you want to point your clients to a Windows DNS first, they'll still "know" about pfSense being a DNS server through the RA. This can cause issues since Windows prefers IPv6 over IPv4 in its IP stack (as it should) and thus is likely to send queries to pfSense over IPv6 in this scenario.
    So if you're running dual stack with pfSense, I would actually recommend using it as primary DNS and for AD use appropriate domain forwards in unbound. Yes it's a "workaround" as Tom notes, but it's currently the only way I have found to make it work correctly and consistently.

  • @rogerosb2u
    @rogerosb2u 4 роки тому

    1st post! :) Great job, Tom, as always! I love your channel and all the content you make around pfSense and UniFi equipment.

  • @jeliuterio
    @jeliuterio 3 роки тому

    Great info @Lawrence Systems Question how does this affect captive portal???

  • @steveanderson1779
    @steveanderson1779 2 роки тому

    Thanks

  • @davidnickel3949
    @davidnickel3949 4 роки тому +2

    I think a new setup guide from you would help as things have changed

  • @manthing1467
    @manthing1467 4 роки тому

    I took care of that in AD right before you started talking about it.

  • @DrivenDynamicsTV
    @DrivenDynamicsTV 4 роки тому

    Ugh I just did this today! I should have waited 2 hours! 😂

  • @allaboutcomputernetworks
    @allaboutcomputernetworks 2 роки тому

    Always best 👍

  • @ionamygdalon2263
    @ionamygdalon2263 3 роки тому

    Have you made a video comparing
    DNS over HTPPS vs DNS over TLS ??
    Thanks 😊

  • @1981SPL
    @1981SPL 4 роки тому +4

    great video as usual. I have DNSSEC already configured...would there be any conflict by enabling/using DNS over TLS in addition?

    • @fedemtz6
      @fedemtz6 4 роки тому

      I think that there might only be a conflict if you are using a dns server that is blocking certain domains like Cloudflare's 1.1.1.2 and 1.1.1.3 but it depends how it gets blocked

    • @danielrippen
      @danielrippen 4 роки тому +2

      No, DNS over TLS only offers transport encryption and has nothing to do with the actual payload, so it’s 100% compatible :)

    • @killer2600
      @killer2600 4 роки тому +1

      You don't want DNSSEC enabled because when cloudflare sink holes a lookup it's not able to validly sign the record it sends because cloudflare isn't the authorized name server for all the domains it sink holes/blocks.

    • @mloiterman
      @mloiterman 4 роки тому

      Killer2600 that’s a really insightful answer that a lot of people with problems getting Cloudflare to “validate” via the 1.1.1./help link could benefit from hearing.

  • @metsakoyomakao4073
    @metsakoyomakao4073 3 роки тому

    To ensure that even dns queries generated by your computers don't leave the computer non TLS encrypted you can use a tool called Simple DNSCrypt. Run Wireshark and filter DNS traffic and you'll see the magic yourself.

  • @PrestonKutzner
    @PrestonKutzner 4 роки тому +2

    FYI, heads-up that the family filtering servers, .2 and .3 do not actually filter when DoT is used. See community.cloudflare.com/t/1-1-1-3-does-not-filter-content-if-queries-are-made-via-dot-dns-over-tls/167730
    They do resolve over TLS, but no DNS filtering takes place.
    Unfortunately, if you want to use the filtering, for now, you have to use non-TLS. I have confirmed this behavior.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  4 роки тому

      I just tested this on my vlog Thursday live stream #174 and the issues has been resolved.

    • @PrestonKutzner
      @PrestonKutzner 4 роки тому

      @@LAWRENCESYSTEMS That's great news! Gonna try it out today. BTW, thanks for all your great content! I've been in the industry since tha late 90s, and it's folks like you that keep the spirit of the earlier days of knowledge sharing for its own sake alive. Just wanted to say thanks.

  • @Spacemanwho1
    @Spacemanwho1 4 роки тому

    Hey Tom can you get hold of the new unify viewport and give it a good run in and review. Have always respected your point of view and your insights are highly valuable 👍

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  4 роки тому +1

      that is what is running behind me..lol

    • @Spacemanwho1
      @Spacemanwho1 4 роки тому

      Lawrence Systems / PC Pickup just made me grin ear to ear 😁
      Thanks dude.

  • @atephoto
    @atephoto 3 роки тому

    Finally, this solved my problems. I was using that custom thing with all the stuff I found on forums. This worked a lot better. It even show how to secure with floating rules which I appreciate a lot. Please read whole comment below.
    I do have plans for egress filtering, can you please make videos about that? I have a particular network setup with ISP modem (192.168.1.1 lan IP), pfSense base network (wan 192.168.1.5, lan 10.0.0.0/24. And then I use a shared (switched) LAN1 from pfsense base net down to my office where I have yet another pfsense with stricter rules (wan 10.0.0.5, lan 10.0.5.0/24). I'm trying to do egress filtering on my base network to make all of the networks a bit safer, but it seems like I'm breaking the router at my office. I wonder if there are some IPs/ports that I need to allow on 10.0.0.0/24 to not break router at my office.

    • @atephoto
      @atephoto 3 роки тому

      Is it enough to set up this on my base network then use dnsmasq forwarder to push subnet in to SSL/TLS DNS?

  • @GurkoKurdo
    @GurkoKurdo 4 роки тому +4

    You’re not hiding anything at all on ISP level: since SNI was introduced the host(name of the website) is added in plaintext on the transport layer of a TLS packet. See RFC 3546 section 3.1. Just wireshark any client hello TLS Packet and you’ll see the hostname

    • @jackalope9001
      @jackalope9001 4 роки тому

      What are your opinions about this regarding unbound vs encrypting DNS?
      ""jfb
      Moderator
      Apr '19
      This depends on your definition of “secure”.
      With encrypted DNS, the DNS requests to and from the upstream provider are not visible to your ISP or others, and the reply you get is the answer that was sent, as it travels an encrypted path. However, you have to trust the upstream provider with your DNS history, and to not filter or alter any of the DNS replies it sends you. Additionally, even though your ISP cannot see the DNS requests, you will immediately follow the DNS reply with an unencrypted request for that IP address, and your ISP can quickly determine where you are browsing.
      With unbound, you avoid upstream providers completely and your local resolver (unbound) deals directly with the authoritative name servers (the same ones the upstream providers use). The DNS traffic is not encrypted, but it is authenticated with DNSSEC, so the reply you receive is validated as being the answer that was sent. Unbound uses a few techniques to send as little data to the nameservers as possible and to maximize your privacy - qname minimisation is one method. Since you communicate directly with the authoritative name servers, the replies are not filtered in any way. Unbound also has a very efficient cache, so after it’s been in use for a while it does not have to communicate with the name servers as often. Most users find that unbound is typically faster overall than using an upstream provider, once the cache is populated.
      For these reasons, I prefer unbound to encrypted DNS:
      No upstream DNS provider has your DNS history.
      The results are unfiltered.
      You have equal assurance that the DNS traffic has not been altered in transit.
      There is no less privacy from the ISP.
      Generally faster.
      I have complete control over my DNS resolver.""

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  4 роки тому +1

      True, I should have mention that you should also be using Encrypted SNI
      blog.cloudflare.com/encrypt-that-sni-firefox-edition/

  • @B1663R
    @B1663R 2 роки тому +1

    Tom is the shit!

  • @Chaosslord1
    @Chaosslord1 3 роки тому +2

    you're using 1.1.1.2 in this demo, but Cloudflare only specifies 1.1.1.1 to be compatible with the use of TLS in their own documentation. Can someone confirm that if you're setting up 1.1.1.2 over TLS that you're actually using the 1.1.1.1 service without the malware filtering?

  • @smiakus
    @smiakus 4 роки тому

    I have enabled this on pfsense and in pftop I see wan ip address is sending dns queries via port 853. But all LAN clients are still using 53 port.
    I'd like to test with forcing lan clients to use only DNS over TLS.
    Here it is mentioned that I can use firewall rules for that, but how? When I do telnet pfsensehost 853 the port is not open!

  • @G0nz0uk
    @G0nz0uk 3 роки тому

    I wish you would do some OPNsense videos.

  • @winkingbutthole812
    @winkingbutthole812 8 місяців тому

    Love you Tom

  • @DenzaDJNLD
    @DenzaDJNLD 4 роки тому

    👍

  • @bobcarpenter1551
    @bobcarpenter1551 4 роки тому +1

    Does the "DNS Server Override" setting at 3:47, that's enabled, do any bypassing of DoT?

    • @AinzOoalG0wn
      @AinzOoalG0wn 4 роки тому

      forum.netgate.com/topic/139771/setup-dns-over-tls-on-pfsense-2-4-4-p2-guide

  • @hoterychannel
    @hoterychannel 4 роки тому

    What's better for Windows Domain - Clients -> Windows DNS ->PFSense DNS or Clients -> PFSense and forward local domain requests to Windows DNS?

  • @frozeneye100
    @frozeneye100 Рік тому

    See this is sort of where I really do not understand. If the traffic after dns still goes over isp or vpn or whatever… they can still track the ip, only time where I really agree with this of thing is when we have peer to peer communication between company branches and some settings of vpn May cause dns leaks which a hacker may track. Then sure but for the average joe… since isp has ip you connect to, they will still see exactly what site you visit regardless of your dns. Simple put on who is query for all incoming connections and they get the domain names anyway.

  • @saywhat9158
    @saywhat9158 4 роки тому

    Any idea how to setup a laptop to exclusively use the pfsense DoH DNS for filtering at home and also use DoH in the browser/computer when on a remote network? I’m guessing the only way is to set pfsense as the DoH custom provider and VPN into it since you can’t set primary and fallback DoH providers in your browser when it can’t be reached. The only other option is to turn off all computer level DoH and let pfsense provide it when you are at home but it is then off when roaming and potentially unreliable when an update could reset to non-pfsense default.
    In short, using pfBlocker & pfsense DoH with DoH settings in both the browser and soon to be additional DoH settings in Windows also is going to be a pain to configure and maintain especially mobile devices. If any of those DoH setting to pfsense gets switched to an outside non-filtering DNS provider by an update, you won’t likely know or have any warning and Microsoft will likely do that [oops] to get around blocking attempts of their integrated spyware. Privacy for the user is also privacy from the user for app makers when using third party DoH.

  • @PigMan9080
    @PigMan9080 4 роки тому

    Is this a global setting or can it be set so IoT on a separate vlan uses 53 while the main network uses TLS? Maybe through DHCP?

    • @jasonmicron
      @jasonmicron 2 роки тому

      Just set upstream DNS for the IoT VLAN to use non-DoT DNS servers via DHCP for that VLAN subnet in pfSense.

  • @douglasg14b
    @douglasg14b 4 роки тому

    It's not clear here if Forwarding mode has alternative side effects? How can we NOT be in forwarding mode, and still have encrypted DNS queries that do get sent to upstream providers?
    I want Unbound to be a resolver, not a forwarder, but when it does resolve request by querying an upstream provider, I want it to use DNS over TLS. Is this not possible?

  • @antaishizuku
    @antaishizuku 4 роки тому

    Can you please do the video for redirecting DNS.

  • @sicanu1981
    @sicanu1981 3 роки тому

    Hi
    I have a problem with pfsense configuration , on my server I have ubuntu 20.04 configured with nginx proxy manager , sorting out the ssl certs which works fine, on a second server I have truenas configured with Nextcloud witch works fine . The issue is that when I connect to my Nextcloud, externally via phone works fine , but when I need to connect locally via Wi-Fi with the same domain name and account it will not allow it. What is the configuration that I miss in my case . If you need more info I will try to explain it to you again!

  • @maxd7228
    @maxd7228 4 роки тому

    Tom at 3:54 "DNS Server Override" is checked, does this affect the DNS over TLS functionality?

    • @AinzOoalG0wn
      @AinzOoalG0wn 4 роки тому

      forum.netgate.com/topic/139771/setup-dns-over-tls-on-pfsense-2-4-4-p2-guide

  • @AndrewJamison79
    @AndrewJamison79 4 роки тому

    I use a VPN like that (or did) when i was at my previous job to bypass their social media filters on my lunch breaks they had free internet but blocked all social networking even UA-cam was grouped in this, using an VPN like this allowed me to bypass it which i guess was kind of not best practice but since i am no longer employed there feel safe saying that.

  • @infotechsavvy4981
    @infotechsavvy4981 3 роки тому

    Hi Lawrence, I would like to ask about the TLS 1.2 on pfsense. Is it possible to create a certificate using the TLS 1.2?

  • @mac9046
    @mac9046 4 роки тому

    Will you make a video on UNifi custom widgets for us udmp users

  • @garshct1978
    @garshct1978 3 роки тому

    Sir do i need to check the DNS server overrride?

  • @muhammadaamir566
    @muhammadaamir566 Рік тому

    I have configured OpenDNS Server on LAN with DHCP... I want to by pass an Alias from OpenDNS Server.... I wan to direct that Alias through GoogleDNS? How to do it sir

  • @237311
    @237311 4 роки тому

    I have DNS forwarder enabled on my pfsense pointing to a private DNS running on my network. Is this good or bad?

    • @killer2600
      @killer2600 4 роки тому

      Neither, it just adds delay. Devices on your network should be using the main dns server directly unless there's a reason the extra hop is necessary.

  • @aayendehrsol
    @aayendehrsol 2 роки тому

    Greetings Tom, the set up for dns over tls in pfsense 2.6 seems not to be working unless you use the old custom options settings, could you please confirm why?

  • @nbctcp3450
    @nbctcp3450 4 роки тому

    Please make pfsense video for
    1. DNS Over HTTPS
    2. port knocking

  •  2 роки тому

    Next dns and rethink dns on android is the bomb. You can see the junk that’s being sucked up.

  • @BenjaminCronce
    @BenjaminCronce 4 роки тому +1

    Why not use DNSSEC? Is it not compatible with forwarding mode?

    • @pyramid011
      @pyramid011 4 роки тому

      My understanding is it's unnecessary if you are forwarding to a resolver that's already doing DNSSEC. It just generates unnecessary traffic.

  • @artisanbusiness1314
    @artisanbusiness1314 Рік тому

    Hey, Chinaduh, just passed bill C11 to restrict content on YT, can a DNS work as an alternative to VPN?

  • @rafalkolodziej8437
    @rafalkolodziej8437 4 роки тому

    Alternatively you can hit publicly available pi-holes as opposed to G or C.

    • @newdeathscope
      @newdeathscope 4 роки тому

      That opens you up for a bunch of malicious dns attacks

    • @mloiterman
      @mloiterman 4 роки тому

      Do not use random DNS servers from untrusted sources. That’s a really, really bad idea.

  • @RobertoAnile
    @RobertoAnile 4 роки тому

    why not using unbound without forwarding + dnssec and direct query root servers?

    • @killer2600
      @killer2600 4 роки тому +2

      Because you want the dns filtering offered by cloudflare and/or you want DNS lookups leaving your machine to be encrypted so your ISP can't tell what you're looking up.

    • @LIVETANKREN
      @LIVETANKREN 4 роки тому

      it's too slow

  • @ryanslab302
    @ryanslab302 3 роки тому

    Why not enable DNSSEC?

  • @jackalope9001
    @jackalope9001 4 роки тому

    What are your opinions about this regarding unbound vs encrypting DNS?
    ""jfb
    Moderator
    Apr '19
    This depends on your definition of “secure”.
    With encrypted DNS, the DNS requests to and from the upstream provider are not visible to your ISP or others, and the reply you get is the answer that was sent, as it travels an encrypted path. However, you have to trust the upstream provider with your DNS history, and to not filter or alter any of the DNS replies it sends you. Additionally, even though your ISP cannot see the DNS requests, you will immediately follow the DNS reply with an unencrypted request for that IP address, and your ISP can quickly determine where you are browsing.
    With unbound, you avoid upstream providers completely and your local resolver (unbound) deals directly with the authoritative name servers (the same ones the upstream providers use). The DNS traffic is not encrypted, but it is authenticated with DNSSEC, so the reply you receive is validated as being the answer that was sent. Unbound uses a few techniques to send as little data to the nameservers as possible and to maximize your privacy - qname minimisation is one method. Since you communicate directly with the authoritative name servers, the replies are not filtered in any way. Unbound also has a very efficient cache, so after it’s been in use for a while it does not have to communicate with the name servers as often. Most users find that unbound is typically faster overall than using an upstream provider, once the cache is populated.
    For these reasons, I prefer unbound to encrypted DNS:
    No upstream DNS provider has your DNS history.
    The results are unfiltered.
    You have equal assurance that the DNS traffic has not been altered in transit.
    There is no less privacy from the ISP.
    Generally faster.
    I have complete control over my DNS resolver.""

    • @killer2600
      @killer2600 4 роки тому

      You have to explain "There is no less privacy from the ISP"...if DNS lookups are encrypted between the home network and cloudflare, it's easily arguable that this offers more privacy than clear text lookups traversing the ISP's network.

    • @samharry7474
      @samharry7474 4 роки тому

      @@killer2600 "Additionally, even though your ISP cannot see the DNS requests, you will immediately follow the DNS reply with an unencrypted request for that IP address, and your ISP can quickly determine where you are browsing."
      Unless, I suppose, there are multiple domain names with the same IP address.

  • @berndeckenfels
    @berndeckenfels 4 роки тому

    Can you make pfsende serve a DOH resolver?

  • @augurseer
    @augurseer 4 роки тому +1

    Dnssec or DNS over TLS?

    • @clausdk6299
      @clausdk6299 4 роки тому

      He deleted his old video cause he though it had something to do with DNSSEC...😁 so he made a new video

    • @mloiterman
      @mloiterman 4 роки тому +1

      They’re two different things. One authenticates domains (DNSEC) and they other encrypts DNS lookups (DNS over TLS)

  • @corstian_
    @corstian_ 4 роки тому

    Reupload?

    • @jisagi
      @jisagi 4 роки тому

      Looks like it

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  4 роки тому +5

      sort of, I had conflated words and made some mistakes. Accuracy matters, re-did the video.

    • @corstian_
      @corstian_ 4 роки тому

      @@LAWRENCESYSTEMS thanks for carrying about the content.

  • @tomferrin1148
    @tomferrin1148 4 роки тому +2

    Tom, absolutely love your videos but please take a breath of air every now and then and slow down just a bit, especially when whipping through pfSense configuration options. Thanks!

    • @killer2600
      @killer2600 4 роки тому +1

      You can adjust playback speed in the youtube player.

  • @jeytis72
    @jeytis72 4 роки тому +2

    too fast!

  • @JuanLopez-db4cc
    @JuanLopez-db4cc 4 роки тому

    First - From Florida!

  • @TylerDerby
    @TylerDerby 5 місяців тому

    Lol