// Listen on port 853 for DoT tls-port 853; // Path to your certificate and key tls-cert "/var/etc/cert.pem"; tls-key "/var/etc/key.pem"; // Enable TLS listen-on port 853 { 127.0.0.1; };
listen-on port 853 tls local-tls { 127.0.0.1; };
tls local-tls { cert-file "/var/etc/cert.pem"; key-file "/var/etc/key.pem";};
What problem are you actually trying to solve here anyway? It seems like a lot of complexity for a problem that's not really clear (to me)....
dig @127.0.0.1 google.com +tls; <<>> DiG 9.20.2 <<>> @127.0.0.1 google.com +tls; (1 server found);; global options: +cmd;; Got answer:;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25158;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1;; OPT PSEUDOSECTION:; EDNS: version: 0, flags:; udp: 1232; COOKIE: 19fc68c433fb6a90010000006714f4f3deedd5f14a92df93 (good);; QUESTION SECTION:;google.com. IN A;; ANSWER SECTION:google.com. 300 IN A 142.250.179.174;; Query time: 6 msec;; SERVER: 127.0.0.1#853(127.0.0.1) (TLS);; WHEN: Sun Oct 20 14:17:55 CEST 2024;; MSG SIZE rcvd: 83
QuoteWhat problem are you actually trying to solve here anyway? It seems like a lot of complexity for a problem that's not really clear (to me)....The key idea I came up with is that dns traffic on LAN is plane dns, and was wondering if that could be changed to encrytped dns on LAN. Thisway making it impossible for the utopian case that DNS would be sniffed by something on LAN network
p.s. your config works for Bind. It starts and runs. <...snip...>Adguard home - DNS Settings - Upstream DNS Servers - tls://127.0.0.1:853 or 127.0.0.1:853 - don't work or connect.
the clients on your LAN will (presumably) still be talking to AGH over port 53 with no "security".
The AGH to Bind is less important if both are running on the FW, there's no rogue traffic there to be concerned about.
From the home screen, tap Settings. Choose Wi-Fi in the left menu (it is impossible to configure DNS for mobile networks). Tap on the name of the currently active network. In the DNS field enter your AdGuard Home server addresses.
I am running Opnsense with Adguard Home (plugin) and Bind (plugin). So that every DNS/port 53 goes to Adguard home. Adguard Home has 127.0.0.1:5354 as upstream (Bind), bind has no DNS Forwarders. This way every lookup will go to the dns root servers, if not yet unknown/cache. As I have learned in the past from this forum, this gives more privacy while no root dns "has it all" and better than trusting the 1.1.1.1 server or your ISP encrypted dns server who "has it all". This is working great.