You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello, this issue seems relatively minor relative to the list of things the OPNSense team is working on but my dns has been attacked so I have gotten to know these settings intimately! Ha!
So I thought it would be good to share a small bug I found (I think) for those who use OPNSense for intense DNS security (like myself).
Description:
When configuring DNS over TLS (DoT) in OPNsense (Services > Unbound DNS > DNS over TLS), Unbound correctly sends queries over port 853 (verified via tcpdump).
However:
unbound-control get_option tls-upstream incorrectly returns no.
The main unbound.conf does not include forward-zone entries, making it seem like DoT is not active.
DoT settings are instead stored in a separate file (/var/unbound/etc/dot.conf), which is not immediately obvious.
This discrepancy can lead to confusion when doublechecking and troubleshooting DoT functionality.
Expected Behavior:
unbound-control should correctly reflect DoT settings (tls-upstream: yes).
Either Unbound’s main config should include forward-zone entries or documentation should clarify how DoT settings are applied.
Steps to Reproduce:
Configure Unbound DoT in OPNsense GUI (Services > Unbound DNS > DNS over TLS).
Run unbound-control get_option tls-upstream → Outputs no.
Run tcpdump -i port 853 → Shows active DoT traffic.
Check /var/unbound/unbound.conf → No forward-zone entries.
Check /var/unbound/etc/dot.conf → Contains DoT settings.
System Information:
Workarounds:
Use tcpdump to verify encrypted queries.
Manually inspect /var/unbound/etc/dot.conf for DoT settings.
Additional Context:
The issue is not just cosmetic—users relying on unbound-control for validation and DNS statistical anomaly detection may mistakenly think DoT is disabled.
The text was updated successfully, but these errors were encountered:
Hello, this issue seems relatively minor relative to the list of things the OPNSense team is working on but my dns has been attacked so I have gotten to know these settings intimately! Ha!
So I thought it would be good to share a small bug I found (I think) for those who use OPNSense for intense DNS security (like myself).
Description:
When configuring DNS over TLS (DoT) in OPNsense (Services > Unbound DNS > DNS over TLS), Unbound correctly sends queries over port 853 (verified via tcpdump).
However:
unbound-control get_option tls-upstream incorrectly returns no.
The main unbound.conf does not include forward-zone entries, making it seem like DoT is not active.
DoT settings are instead stored in a separate file (/var/unbound/etc/dot.conf), which is not immediately obvious.
This discrepancy can lead to confusion when doublechecking and troubleshooting DoT functionality.
Expected Behavior:
unbound-control should correctly reflect DoT settings (tls-upstream: yes).
Either Unbound’s main config should include forward-zone entries or documentation should clarify how DoT settings are applied.
Steps to Reproduce:
Configure Unbound DoT in OPNsense GUI (Services > Unbound DNS > DNS over TLS).
Run unbound-control get_option tls-upstream → Outputs no.
Run tcpdump -i port 853 → Shows active DoT traffic.
Check /var/unbound/unbound.conf → No forward-zone entries.
Check /var/unbound/etc/dot.conf → Contains DoT settings.
System Information:
OPNsense Version: 25.1.2
Unbound Version: 1.22.0_1
Workarounds:
Use tcpdump to verify encrypted queries.
Manually inspect /var/unbound/etc/dot.conf for DoT settings.
Additional Context:
The issue is not just cosmetic—users relying on unbound-control for validation and DNS statistical anomaly detection may mistakenly think DoT is disabled.
The text was updated successfully, but these errors were encountered: