-
-
Notifications
You must be signed in to change notification settings - Fork 501
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DietPi-Software | Unbound: Fixes and enhancements #2409
Comments
@wtfmaster There is another tool that does that thing, if I get it right: https://dnscrypt.info/
Maybe someone can explain what those tools do, what I get is:
In cloudflared you can configure the upstream DNS: https://docs.pi-hole.net/guides/dns-over-https/ Further reading: https://community.cloudflare.com/t/dnscrypt-great-proxy-alternative-to-cloudflared/14650 So generally I am opened to implement both of them. It doesn't seem too much work, and from system side, only the DNS server needs to be changed, really no big deal. |
I've used |
Just to mention, there are several ideas/ways to mask your DNS requests:
A list of public free DNS providers and which supports which encryption protocol is available here: https://en.wikipedia.org/wiki/Public_recursive_name_server It would be wonderful if we could implement all of them, however a client is always required since since Linux/Debian itself does not support this natively. DNSCrypt-proxy is known of course, cloudflared AFAIK uses DoH, for DoT I'm not sure currently. |
Unbound supports upstream DoT and downstream DoT and DoH, so covers most reasonable cases. AFAIK there is not really an upstream DoH "resolver", meaning a node that can be connected to via any method to resolve hostnames and itself resolves them via DoH at public upstream DoH DNS provider like 9.9.9.9. DoH is mostly something that is done by the individual clients, e.g. the web browser itself, but it does not make much sense to use it for upstream resolving from unbound since all its benefits don't apply (mix DNS requests with existing HTTPS connections and traffic) and only the overhead (HTTP) stays. So the only missing DNS feature, after unbound implementation, is DNSCrypt-Proxy, either as an alternative to unbound, or even in combination with unbound where DNSCrypt is used to encrypt upstream DNS requests and unbound mostly for DNS caching. |
I recently switched to the dev branch and tried Unbound, but if I install it, I get an error while it tries to restart the service
Retrying the command installs it just fine. This happened on 3/3 installations. After installation, Unbound doesn't work. I'm running Pi-Hole, and while my local IP and port is written under custom DNS servers, if I disable all other DNS servers, nothing resolves. Unbound is running, the log has no errors, and Unbound is running in htop.
If I keep the IPv6-DNS active (as it is default after installing Unbound), I'll get the following result (commands taken from here, I just changed the port to 5353 ). It should not result in a SERVFAIL.
Minor nitpick here: the custom DNS is not removed from Pi-Hole if Unbound is uninstalled. Other things I'm running: Pi-Hole, OwnCloud, fail2ban |
Strange, since everything works for me (even automatically removing the Unbound DNS from Pi-hole on uninstall). Reading a Reddit post, it seems that some ISPs/Routers can intercept DNS requests, even when they're not supposed to, stopping Unbound from opening a secure connection. What happens if you remove Unbound from Pi-hole and run |
Well, I'm using the Easybox 804 too. I guess that's the problem, then - at least it's not a problem with the implementation! |
I'll also run another test, just to be sure. |
I also ran into the problem when installing unbound and pihole on a fresh dietpi.
But for me retrying the command did not fix it and I had to cancel the installation. |
Strange, I faced it as well now, however a retry fixed it here as well. Here the reason:
The override config is created before the restart is done: https://github.com/MichaIng/DietPi/blob/master/dietpi/dietpi-software#L8795-L8806 However, I also tried to add it like:
(the server: block definition) but that does not have any effect. Bad that v6.34 has just been released. It seems like overriding settings does not work as expected, hence we need to change port and listening IP in our main config when installing Pi-hole. |
@faxesystem |
Will try this tonight. So this is something that will have to be fixed in a future DietPi release? |
Yes, at least a beautiful long-term solution, as it requires likely some research and tests. But I'm sure we can hack an ugly but reliable solution meanwhile via MOTD script 😉. |
Hmmmm does not work for me. I choose the open a sub shell when the error occurred and changed port and interface in dietpi.conf from 0.0.0.0 and 53 to 127.0.0.1 and 5353. After that I re-ran the command which still resulted in the same error.
|
Yes I recognised this as well, not sure if forgotten or intended @ravenclaw900? However, it is not required to connect via IPv6 in order to resolve hostnames to IPv6 addresses, AFAIK. And since every local network will have IPv4 addresses (at least additionally to IPv6), it should work fine. Otherwise, consequently we'd need to derive the local IPv6 network range as well for |
I recall an old post from PiHole GitHub that it was not possible to have both IPv4 as well as IPv6 on custom entries. pi-hole/web#1499 (comment) |
guys, I know a total n00b question. But which upstream DNS is used on |
It uses the DNS root servers in https://www.internic.net/domain/named.root. |
Strange, the queries should just be resolved by |
that's why I'm asking. Custom DNS is set to ok I got it working now. It changed the moment I hit save button again on |
Mine had 1 request answered by Cloudflare, before the configuration changed it. |
Btw, we apply Unbound as (only) DNS via |
We'd probably need to do the same when uninstalling Unbound and replacing it with Quad9, then. Possibly the reason for the 'minor nitpick' in #2409 (comment). |
good find @MichaIng |
Issues are addressed with this PR: #4022 One question: identity: "Server" |
To be honest, I'm not even sure if it's needed. Right before it is hide-identity: yes, which refuses all the queries ( |
Okay, I think it's fine to keep both to assure max privacy. Probably we can sort and explain (via comments) the config file a bid to make it clearer why we set what. |
Guys, there is a user on our forum looking into config file creating as well. |
Hi There,
I would appreachiate the cloudflare deamon in dietpi. Right now, I have to set it up manually:
https://docs.pi-hole.net/guides/dns-over-https/
Could you incorporate the cloudflare deamon into the software catalouge of Dietpi?
The text was updated successfully, but these errors were encountered: