1. Services --> Dnsmasq DNS Enable Dnsmasq = False2. Services --> Unbound DNS --> GeneralEnable Unbound = True3. System --> Settings --> GeneralDNS Servers --- Do not list any DNS servers (since you don't want to use anything except your local DNS server)DNS search domain -- EmptyDNS server options -- Allow DNS server list to be overridden by DHCP/PPP on WAN -- Unchecked
I prefer PiHole which goes deeper than just IP of unbound and allows you to add Regular expressions from the URL to block these from showing adds. I use this at home so that all the no so "Smart TVs" show no advertisements.
AdGuard Home needs an additional recursive resolver. It does filtering only.
The filter implementation in Unbound is a bit naive^H^H^H^H^Hstraightforward. Filter lists are pulled from their respective sources, translated into configuration statements, and loaded as unbound configuration.This leads to two undesirable effects:- the startup/restart time of Unbound can get really long- if there is just a single syntax error in just one of the lists, Unbound will fail to startAdGuard Home on the other hand is designed from the start as an ad filter and can easily cope with both issues.And then: have you ever TRIED AdGuard Home? I mean Just look at the UI - isn't that huge feature by itself?
As for the second question - I don't know. Not needing a separate VM, possibly? Some people might have only one firewall device? What's the disadvantage of running AGH on your OPNsense? I don't see any.
Last I tried it the Regex scripts were not supported by AGH.
When not using DOH/DOT, your ISP can (if they wanted to) see and log the websites that you request DNS for.
When using DOT under Unbound, it would still be the same thing, except instead of the ISP, your DOT provider (Google, or Cloudflare etc) would be able to see & log the websites that you request --- Is that a correct statement?So DOH/DOT is simply transferring trust from ISP to the DOT provider that you choose -- correct?
This depends on how you define "see and log".If you use your own recursive DNS, e.g. Unbound, and do not use your ISP's recursive DNS as a forwarder, then your ISP does not see your requests. Period.
Unless ... they actively sniff all of your network traffic and look for DNS requests. Which at least here in Europe would violate several laws.
So in a civilized country with e.g. GDPR in place, I argue that running your own recursive DNS is the best protection of your privacy you can get.Quote from: Inxsible on October 05, 2022, 06:54:57 pmWhen using DOT under Unbound, it would still be the same thing, except instead of the ISP, your DOT provider (Google, or Cloudflare etc) would be able to see & log the websites that you request --- Is that a correct statement?So DOH/DOT is simply transferring trust from ISP to the DOT provider that you choose -- correct?Exactly. You are freely giving all your DNS requests to a single centralized third party - which in case of 1.1.1.1 or 8.8.8.8 is a US American company probably not bound by GDPR in any way.So as a EU citizen I do not trust my ISP not to log DNS requests should I use their recursive DNS. But I do trust that the deterrent of local legislation is high enough for them not to actively sniff traffic.That's why I recommend using a local recursive DNS server.The Internet's infrastructure is supposed to be decentralized, remember? As always your mileage may vary. Specifically if you are a US citizen or if you are in a really repressive country. In the latter case using 1.1.1.1 or 8.8.8.8 might be the lesser evil.Kind regards,Patrick
For blocking google ad services if you want to have it again, try the steven black blocklist https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
For reaching your AGH from outside, is a bit more involved. I did it with nginx as reverse proxy on opnsense with a real server on the lan that was doing the required translations i.e. upd and dot (for android) but I changed my infrastructure and haven't re-done it. I needed a quick workaround for traveling and setup a wireguard vpn. Now when I'm out, I enable wg on the phone and all flows through my home network including dns queries through ADG. Just a thought.
Quote from: Inxsible on October 03, 2022, 01:59:16 am1. Services --> Dnsmasq DNS Enable Dnsmasq = False2. Services --> Unbound DNS --> GeneralEnable Unbound = True3. System --> Settings --> GeneralDNS Servers --- Do not list any DNS servers (since you don't want to use anything except your local DNS server)DNS search domain -- EmptyDNS server options -- Allow DNS server list to be overridden by DHCP/PPP on WAN -- Unchecked I believe it now works as if I do a DNS leak test I get as result my IP address and non the ISP DNS serves IP addresses, is that right?tia.