pfsense:dns:force_dns_over_tls
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pfsense:dns:force_dns_over_tls [2021/01/06 10:18] – peter | pfsense:dns:force_dns_over_tls [2022/10/08 09:13] (current) – [Another Example] peter | ||
---|---|---|---|
Line 3: | Line 3: | ||
DNS requests are normally not encrypted, and therefore visible to your ISP to record, use for research / marketing purposes, or even (in the case of some nefarious actors) manipulate or change. | DNS requests are normally not encrypted, and therefore visible to your ISP to record, use for research / marketing purposes, or even (in the case of some nefarious actors) manipulate or change. | ||
- | Running DNS over TLS prevents that, by encrypting your DNS traffic so that it can’t | + | Running DNS over TLS prevents that, by encrypting your DNS traffic so that it cannot |
+ | |||
+ | <WRAP important> | ||
+ | **WARNING: | ||
+ | |||
+ | However this is only for the first query. | ||
+ | |||
+ | Reason for this is that TLS takes longer. | ||
+ | |||
+ | To prevent this increase in latency, switch to standard port 53. | ||
+ | </ | ||
---- | ---- | ||
Line 42: | Line 52: | ||
* to specify **tls-cert-bundle** option that points to the local system' | * to specify **tls-cert-bundle** option that points to the local system' | ||
- | * allow unbound to forward TLS requests | + | * allow unbound to forward TLS requests; **forward-tls-upstream: |
- | * specify any number of servers that allow DNS of TLS. | + | * specify any number of servers that allow DNS over TLS. |
For each server you will need to specify that the connection port using **@**, and you will also need to indicate which is its domain name with **#**. | For each server you will need to specify that the connection port using **@**, and you will also need to indicate which is its domain name with **#**. | ||
Line 80: | Line 90: | ||
</ | </ | ||
- | See https:// | + | <WRAP info> |
+ | **NOTE: | ||
- | It’s OK to set the resolver to listen on all interfaces, since the firewall rules on the WAN will prevent Internet hosts from using your resolver anyway. | + | It is OK to set the resolver to listen on all interfaces, since the firewall rules on the WAN will prevent Internet hosts from using your resolver anyway. |
+ | |||
+ | </ | ||
<WRAP important> | <WRAP important> | ||
Line 89: | Line 102: | ||
However this is only for the first query. | However this is only for the first query. | ||
- | Reason for this is that CloudFlare' | + | Reason for this is that CloudFlare' |
To prevent this increase in latency, switch to standard port 53, or to an alternative DNS provider that does not use TLS for example: | To prevent this increase in latency, switch to standard port 53, or to an alternative DNS provider that does not use TLS for example: |
pfsense/dns/force_dns_over_tls.1609928317.txt.gz · Last modified: 2021/01/06 10:18 by peter