<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Protect your DNS requests using pfSense	</title>
	<atom:link href="https://geekistheway.com/2020/06/21/protect-your-dns-requests-using-your-pfsense/feed/" rel="self" type="application/rss+xml" />
	<link>https://geekistheway.com/2020/06/21/protect-your-dns-requests-using-your-pfsense/</link>
	<description>Trying to learn just a bit!</description>
	<lastBuildDate>Tue, 16 Aug 2022 15:05:09 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Isolating Wi-Fi networks using VLAN subnets through pfSense + UDM-Pro and a little more... - Geek is the Way!		</title>
		<link>https://geekistheway.com/2020/06/21/protect-your-dns-requests-using-your-pfsense/#comment-232</link>

		<dc:creator><![CDATA[Isolating Wi-Fi networks using VLAN subnets through pfSense + UDM-Pro and a little more... - Geek is the Way!]]></dc:creator>
		<pubDate>Sun, 14 Aug 2022 14:27:36 +0000</pubDate>
		<guid isPermaLink="false">http://crepaldi.us/?p=210#comment-232</guid>

					<description><![CDATA[[&#8230;] you followed my previous protecting your network DNS using pfSense post, you also need to duplicate the firewall rules from the main LAN which involves port 53 and [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] you followed my previous protecting your network DNS using pfSense post, you also need to duplicate the firewall rules from the main LAN which involves port 53 and [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Jake		</title>
		<link>https://geekistheway.com/2020/06/21/protect-your-dns-requests-using-your-pfsense/#comment-89</link>

		<dc:creator><![CDATA[Jake]]></dc:creator>
		<pubDate>Fri, 19 Feb 2021 05:25:22 +0000</pubDate>
		<guid isPermaLink="false">http://crepaldi.us/?p=210#comment-89</guid>

					<description><![CDATA[In forwarding mode you loose the end to end validation, since you do not independently talk to each NS server in the chain down from roots to get to the authoritative server. Instead you are trusting the DNS forwarding server to get this information for you and provide the validated response back. In your example all someone would need to do is not send back the DNSSEC info and pfSense/unbound would interpret that as DNSSEC isn&#039;t enabled for the domain and pass the record on to the client as valid. DNSSEC enabled in pfSense/unbound wouldn&#039;t prevent this scenario from happening in forwarding mode as all DNSSEC is doing is validation that the a record in a domain has been signed by the owner of the domain, which is done from the information in the DNS reply it receives back.]]></description>
			<content:encoded><![CDATA[<p>In forwarding mode you loose the end to end validation, since you do not independently talk to each NS server in the chain down from roots to get to the authoritative server. Instead you are trusting the DNS forwarding server to get this information for you and provide the validated response back. In your example all someone would need to do is not send back the DNSSEC info and pfSense/unbound would interpret that as DNSSEC isn&#8217;t enabled for the domain and pass the record on to the client as valid. DNSSEC enabled in pfSense/unbound wouldn&#8217;t prevent this scenario from happening in forwarding mode as all DNSSEC is doing is validation that the a record in a domain has been signed by the owner of the domain, which is done from the information in the DNS reply it receives back.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Thiago Crepaldi		</title>
		<link>https://geekistheway.com/2020/06/21/protect-your-dns-requests-using-your-pfsense/#comment-84</link>

		<dc:creator><![CDATA[Thiago Crepaldi]]></dc:creator>
		<pubDate>Mon, 15 Feb 2021 21:24:00 +0000</pubDate>
		<guid isPermaLink="false">http://crepaldi.us/?p=210#comment-84</guid>

					<description><![CDATA[Hey there, thanks for the discussion. If DNSSEC is not enforced, isn’t there a chance someone could alter the content of the response and corrupt whatever content the forwarding servers returned? It is not a matter of not trusting the forwarding server, but not trusting the media in which servers communicate through]]></description>
			<content:encoded><![CDATA[<p>Hey there, thanks for the discussion. If DNSSEC is not enforced, isn’t there a chance someone could alter the content of the response and corrupt whatever content the forwarding servers returned? It is not a matter of not trusting the forwarding server, but not trusting the media in which servers communicate through</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Jake		</title>
		<link>https://geekistheway.com/2020/06/21/protect-your-dns-requests-using-your-pfsense/#comment-83</link>

		<dc:creator><![CDATA[Jake]]></dc:creator>
		<pubDate>Sun, 14 Feb 2021 07:54:44 +0000</pubDate>
		<guid isPermaLink="false">http://crepaldi.us/?p=210#comment-83</guid>

					<description><![CDATA[You mention enabling DNSSEC support under Services &#062;&#062; DNS Resolver, but that won&#039;t do much good if you are in forwarding mode. You should be relying on the forwarding server to perform the DNSSEC validation, so there is no need to do this check (again) in Unbound/PFsense. You could, but I don&#039;t see a point unless you don&#039;t trust the forwarding server (in which case, why use it?) That also means you won&#039;t need to harden DNSSEC data under Services &#062;&#062; DNS Resolver &#062;&#062; Advanced Settings.]]></description>
			<content:encoded><![CDATA[<p>You mention enabling DNSSEC support under Services &gt;&gt; DNS Resolver, but that won&#8217;t do much good if you are in forwarding mode. You should be relying on the forwarding server to perform the DNSSEC validation, so there is no need to do this check (again) in Unbound/PFsense. You could, but I don&#8217;t see a point unless you don&#8217;t trust the forwarding server (in which case, why use it?) That also means you won&#8217;t need to harden DNSSEC data under Services &gt;&gt; DNS Resolver &gt;&gt; Advanced Settings.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Object Caching 50/99 objects using Memcached
Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Minified using Disk
Database Caching using Redis

Served from: geekistheway.com @ 2026-04-09 06:39:22 by W3 Total Cache
-->