Route DNS without encryption via alternative DNS server

Hello,

As far as I understand, DOT or DOH is optional. Some users prefer to route all traffic via, for example, 1.1.1.1 without encrypting the connection via DOT or DOH.

In my case, I encrypt my traffic via TLS. The real question is, is the correct configuration page under Services>Domain Name System in the GUI? I’ve unchecked the box for “Use ISP-assigned DNS servers.” Does this mean that both DNS traffic is encrypted and all traffic is forwarded via these servers, or do I need to visit a different configuration page to route unencrypted traffic that should also be routed to, for example, 1.1.1.1?

It looks like you are trying to use DoT.
That is good Encrypted DNS.
What you need to do now is force users in your network to use IPFire’s DNS

1 Like

Why should I force users in my network to use IPFire’s DNS? As far as I know, DOT already protects against DNS hijacking, for example.

In the most basic sense.
When a PC connects to your network.
It asks for Network details. “Hello I’m here”
IPFire answers with. PC your IP will be 192.168.1.45 subnet 255.255.255.0
your gateway is 192.168.1.1
And your DNS is 192.168.1.1
Now things get fun.
PC says thanks. But I’m going to use DNS 8.8.8.8
IPFire will allow the PC to use that DNS. skipping any IPFire protection.
So forcing them to use IPFire DNS is a important step.
Next block them from port 853 and the real hard one is DoH.

1 Like

I just used the Example because i am new into this but for now i am satisfied with IPFire. Since I have had quite a bit of experience with Linux in the past, I find that IPFire suits me the best so far.

1 Like

And you hopefully have your firewall rule in place?
Not needed if your firewall default police is blocked.

Ideally, you would want the ipfire’s DNS be the resolver and not an external DNS so no dns queries should go outside the local network and no DNS leakage is possible.

1 Like

Basically, I just wanted to make it more difficult for my ISP to snooping. If that’s already done, the issue would be resolved.

This is true only, if all DNS traffic is encrypted. Means all name resolution must be done by IPFire, with redirection of requests.

Which steps or instructions, if available, must I follow?

See link above:

1 Like