Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DoT or DoH unbound

    Scheduled Pinned Locked Moved Plus 24.03 Development Snapshots (Retired)
    9 Posts 3 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JonathanLeeJ
      JonathanLee
      last edited by

      Has anyone played with unbounds new DoH support that would be a cool GUI addition…

      Make sure to upvote

      DefenderLLCD 1 Reply Last reply Reply Quote 0
      • DefenderLLCD
        DefenderLLC @JonathanLee
        last edited by

        @JonathanLee said in DoT or DoH unbound:

        Has anyone played with unbounds new DoH support that would be a cool GUI addition…

        DNS over TLS works great already. Why switch to DoH?

        JonathanLeeJ 1 Reply Last reply Reply Quote 0
        • JonathanLeeJ
          JonathanLee @DefenderLLC
          last edited by JonathanLee

          @DefenderLLC your right, DoT is now supported in unbound code 🧑‍💻why test it? For something epic to work on :)

          Make sure to upvote

          DefenderLLCD 1 Reply Last reply Reply Quote 0
          • DefenderLLCD
            DefenderLLC @JonathanLee
            last edited by DefenderLLC

            @JonathanLee said in DoT or DoH unbound:

            @DefenderLLC your right, DoT is now supported in unbound code 🧑‍💻

            DoT support is not new within pfSense by any means. I've been running DoT to Cloudlare within pfSense for several years.

            DNS Resolver custom options:

            server:
            forward-zone:
            name: "."
            forward-ssl-upstream: yes
            forward-addr: 1.1.1.1@853
            forward-addr: 1.0.0.1@853
            
            JonathanLeeJ 1 Reply Last reply Reply Quote 0
            • JonathanLeeJ
              JonathanLee @DefenderLLC
              last edited by

              @DefenderLLC I am running DoT with 853 sorry DoH is what I mean

              Make sure to upvote

              johnpozJ 1 Reply Last reply Reply Quote 1
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @JonathanLee
                last edited by johnpoz

                @JonathanLee have not played with doh outbound from unbound, dot is clicky clicky to setup. But I did get both dot and doh for inbound setup internally... So clients can query unbound via dot or doh.. I have zero use for it, but figured would see what it takes to setup.. Not much other than creating your certs for use that your clients can trust, etc.

                Simple as copy the cert over, and tell unbound to use it via options box. And tell it to listen on 443 for doh.. Once you set the cert in the options box it will be used for both dot and doh, and override what you have set in the gui for dot listening.

                doh.jpg

                simple test to validate its working

                dotdoh.jpg

                And here is when the cert CN/SAN doesn't validate

                certfails.jpg

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                JonathanLeeJ 1 Reply Last reply Reply Quote 3
                • JonathanLeeJ
                  JonathanLee @johnpoz
                  last edited by

                  @johnpoz can it be used to intercept one.one.one.one doh address or token.apple.com or some other ones act as the middle man for DoH much like DNS on port 53 or 853.

                  The thought process I have is that it could act as the middleman itself to see what requests are sent to any DoH server. I am fearful that DoH will be used making dns url guards less effective. Right now I pretty much block all DoH again it’s only because I have a list of what DoH servers are being attempted, take that list away it’s no longer efficient enough for detecting requests.

                  I guess long story short can DoH on unbound do all the requests for the upstream servers like Amazon’s DoH or Apple etc. I am not worrying about the major ones, it’s the random ones that sideline security.

                  Does that make sense. I mean right now we use unbound for request it handles them at the firewall, again if something is resolving with DoH the url blockers don’t really see it only IP addresses then much like the issue with Squid.

                  Amazing it’s set up

                  Make sure to upvote

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @JonathanLee
                    last edited by

                    @JonathanLee If you had a client wanting to talk to doh.whatever.tld and you created a cert he would trust that says it doh.whatever.tld then sure you should be able to do a mitm..

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    JonathanLeeJ 1 Reply Last reply Reply Quote 1
                    • JonathanLeeJ
                      JonathanLee @johnpoz
                      last edited by

                      @johnpoz epic I bet squid 6 supports it too

                      Make sure to upvote

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.