Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
| docs:guide-user:services:dns:dot_unbound [2019/08/26 18:31] – tag optimization vgaetera | docs:guide-user:services:dns:dot_unbound [2024/10/21 08:10] – Add chapter how to configure unbound with dnsmasq dpawlik | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== | + | ====== |
| - | {{section> | + | {{section> |
| ===== Introduction ===== | ===== Introduction ===== | ||
| - | * This guide describes | + | * This how-to describes the method for setting up [[wp> |
| - | * It utilizes | + | * It relies on [[docs: |
| - | * DNS encryption is limited | + | * Follow [[docs: |
| ===== Goals ===== | ===== Goals ===== | ||
| - | {{section> | + | {{section> |
| - | ===== Instructions | + | ===== Command-line instructions |
| - | This method utilizes DoT via [[docs: | + | |
| - | + | ||
| - | Encrypt both LAN client and local system DNS traffic. | + | |
| [[docs: | [[docs: | ||
| - | Use Unbound to encrypt DNS traffic. | + | Install the required packages. |
| - | Override | + | Enable |
| <code bash> | <code bash> | ||
| # Install packages | # Install packages | ||
| opkg update | opkg update | ||
| - | opkg install unbound | + | opkg install unbound-daemon |
| # Enable DNS encryption | # Enable DNS encryption | ||
| - | sed -i -e "/ | + | uci set unbound.fwd_google.enabled="1" |
| - | cat << EOF >> / | + | uci set unbound.fwd_google.fallback="0" |
| - | server: | + | uci commit unbound |
| - | tls-cert-bundle: | + | |
| - | forward-zone: | + | |
| - | name: "." | + | |
| - | forward-tls-upstream: | + | |
| - | forward-addr: | + | |
| - | forward-addr: | + | |
| - | forward-addr: | + | |
| - | forward-addr: | + | |
| - | forward-zone: | + | |
| - | name: "openwrt.pool.ntp.org." | + | |
| - | | + | |
| - | forward-addr: | + | |
| - | forward-addr: | + | |
| - | forward-addr: | + | |
| - | EOF | + | |
| service unbound restart | service unbound restart | ||
| </ | </ | ||
| - | See also: [[intercept|DNS hijacking]], | + | LAN clients and local system should use Unbound as a primary resolver assuming that Dnsmasq is disabled. |
| ===== Testing ===== | ===== Testing ===== | ||
| - | {{section> | + | {{section> |
| ===== Troubleshooting ===== | ===== Troubleshooting ===== | ||
| Line 55: | Line 37: | ||
| <code bash> | <code bash> | ||
| - | # Restart | + | # Restart services |
| service log restart; service unbound restart | service log restart; service unbound restart | ||
| Line 63: | Line 45: | ||
| # Runtime configuration | # Runtime configuration | ||
| pgrep -f -a unbound | pgrep -f -a unbound | ||
| + | head -v -n -0 / | ||
| # Persistent configuration | # Persistent configuration | ||
| uci show unbound | uci show unbound | ||
| - | grep -v -e " | ||
| </ | </ | ||
| + | ===== Extras ===== | ||
| + | ==== Web interface ==== | ||
| + | If you want to manage the settings using web interface. | ||
| + | Install the necessary packages. | ||
| + | |||
| + | <code bash> | ||
| + | # Install packages | ||
| + | opkg update | ||
| + | opkg install luci-app-unbound | ||
| + | service rpcd restart | ||
| + | </ | ||
| + | |||
| + | Navigate to **LuCI -> Services -> Recursive DNS** to configure Unbound. | ||
| + | |||
| + | ==== DoT provider ==== | ||
| + | Unbound is configured with Google DNS. | ||
| + | You can change it to Cloudflare DNS or any other [[wp> | ||
| + | Use resolvers supporting DNSSEC validation if necessary. | ||
| + | Specify several resolvers to improve fault tolerance. | ||
| + | |||
| + | Change to Cloudflare DNS | ||
| + | <code bash> | ||
| + | # Configure DoT provider | ||
| + | uci set unbound.fwd_google.enabled=" | ||
| + | uci set unbound.fwd_cloudflare.enabled=" | ||
| + | uci set unbound.fwd_cloudflare.fallback=" | ||
| + | uci commit unbound | ||
| + | service unbound restart | ||
| + | </ | ||
| + | |||
| + | Change to other [[wp> | ||
| + | <code bash> | ||
| + | # Configure DoT provider (example: " | ||
| + | uci set unbound.fwd_google.enabled=" | ||
| + | uci set unbound.fwd_cloudflare.enabled=" | ||
| + | while uci -q del unbound.@zone[4]; | ||
| + | uci add unbound zone | ||
| + | uci set unbound.@zone[-1].enabled=" | ||
| + | uci set unbound.@zone[-1].fallback=" | ||
| + | uci set unbound.@zone[-1].zone_type=" | ||
| + | uci add_list unbound.@zone[-1].zone_name=" | ||
| + | uci add_list unbound.@zone[-1].server=" | ||
| + | uci add_list unbound.@zone[-1].server=" | ||
| + | uci add_list unbound.@zone[-1].server=" | ||
| + | uci add_list unbound.@zone[-1].server=" | ||
| + | uci set unbound.@zone[-1].tls_upstream=" | ||
| + | uci set unbound.@zone[-1].tls_index=" | ||
| + | uci commit unbound | ||
| + | service unbound restart | ||
| + | </ | ||
| + | |||
| + | ==== DNSSEC validation ==== | ||
| + | Enforce [[wp> | ||
| + | Beware of fault tolerance and performance issues. | ||
| + | |||
| + | <code bash> | ||
| + | # Enforce DNSSEC validation | ||
| + | uci set unbound.@unbound[0].validator=" | ||
| + | uci commit unbound | ||
| + | service unbound restart | ||
| + | </ | ||
| + | |||
| + | |||
| + | ===== Configure unbound with dnsmasq ===== | ||
| + | Unbound can also act as a resolver for dnsmasq. How to install and how to change the [[wp> | ||
| + | Here would be just described how to configure unbound with dnsmasq. | ||
| + | |||
| + | === Command-line instructions === | ||
| + | |||
| + | <code bash> | ||
| + | # Change unbound port to 5353, because dnsmasq is running already on port 53 | ||
| + | sed -i " | ||
| + | |||
| + | # configure dnsmasq to forward to localhost 5353 | ||
| + | service dnsmasq stop | ||
| + | uci set dhcp.@dnsmasq[0].noresolv=" | ||
| + | uci set dhcp.@dnsmasq[0].localuse=" | ||
| + | uci set dhcp.@dnsmasq[0].cachesize=' | ||
| + | uci -q delete dhcp.@dnsmasq[0].server | ||
| + | uci add_list dhcp.@dnsmasq[0].server=" | ||
| + | uci commit dhcp | ||
| + | service dnsmasq start | ||
| + | service unbound restart | ||
| + | |||
| + | # Optional - ensure, that the NTP server can work without DNS | ||
| + | uci del system.ntp.server | ||
| + | uci add_list system.ntp.server=' | ||
| + | uci add_list system.ntp.server=' | ||
| + | uci add_list system.ntp.server=' | ||
| + | uci add_list system.ntp.server=' | ||
| + | uci commit system | ||
| + | </ | ||