@rkoftanIts definitely a IoT device. I have seen this on my network as well. A lot of devices even if their DNS was set for my PiHole wanted to chat and preferred google. Additional to that some IoT devices tried to communicate with wierd destinations.
Quote from: Seimus on October 30, 2023, 02:09:27 pm@rkoftanIts definitely a IoT device. I have seen this on my network as well. A lot of devices even if their DNS was set for my PiHole wanted to chat and preferred google. Additional to that some IoT devices tried to communicate with wierd destinations.By hard coding DNS servers into their config, IoT devices still work when people have misconfigured networks. One less issue for the manufacturer to support.Most of the backends are in some cloud provider or another which leads to a bunch of random IPs being connected. Since OPNsense lets you create ASIN aliases you could use that to lock down the device to those specific cloud providers.
Another method is using a NAT port forward rule to redirect any DNS request to the server on OPNsense regardless of the real destination address.Years ago at CeBit fair one of our established suppliers presented an - at the time - incredibly hot piece of WiFi hot spot gateway. It worked directly on layer 2 and no matter what the IP configuration of some misconfigured client (e.g. laptop) - that means static IP address, static gateway, static DNS, none of that matching the local setup ...That box simply intercepted every packet on layer 2, analysed what the client system thought its gateway and DNS server were and then served the requests and routed and NATed with the proper reply source addresses.Really clever ...
Which works until chinese cloud device manifacturers start using DoH or DoT. Intercepting that traffic would render DNS for such devices invalid.Many devices actually need to phone home in order to enable their functionality.In order of descending preferability, I usually:1. Try to use devices that do not phone home at all, preferably with open source firmware like Tasmota.2. Try to find devices that do not phone home if so instructed (Unifi being an example).3. Confine IoT and other devices I cannot fully control to an IoT network that has internet access, because I know that any of them actually pierces my firewall and thus cannot be trusted.It is especially interesting to see which networks these devices contact. A while ago, I saw contacts to the Alibaba cloud from a friend's network. Upon investigation, we found that the devices in question were "upCams". It is a german manufacturer whose website says these are "security cameras" and suggests that they are developed by the company itself. They also say that the cases of their cameras are being used by other manufacturers as well so they might look like others.Yeah, I am completely convinced that they do not use chinese manufacturer's devices that also provide a brandable cloud solution... ;-) To be fair, at least that part of the cloud was hosted in the EU, so it is not outright a GDPR violation.
Indeed there is a certain logic why for example DNS is hardcoded on IoT device, but on the other hand it takes from you the possibility of control. The problem I have with this is that their hardcoded DNS will be always preferred...I did find a solution for this. If IoT device has a DHCP assigned DNS as in the DHCPOFFER, it will be used only in case of a fallback e.g. if those hardcoded DNS servers can not be reached it uses your DNS server. Basicaly what I did is to block communication with external DNS servers and allowed only queries to be made towards my self hosted DNS (I did this for every VLAN I have). Only my recurcive DNS server can talk outside. Effectively this will keep any device that wants to bypass your DNS to use your DNS.
Another method is using a NAT port forward rule to redirect any DNS request to the server on OPNsense regardless of the real destination address.
Years ago at CeBit fair one of our established suppliers presented an - at the time - incredibly hot piece of WiFi hot spot gateway. It worked directly on layer 2 and no matter what the IP configuration of some misconfigured client (e.g. laptop) - that means static IP address, static gateway, static DNS, none of that matching the local setup ...That box simply intercepted every packet on layer 2, analysed what the client system thought its gateway and DNS server were and then served the requests and routed and NATed with the proper reply source addresses.Really clever ...
Interesting. I hope it at least provided some way for you to know about misconfigured equipment.