Skip to content
Geek is the Way!
Menu
  • Forums
  • Sobre o blog
  • Contato
  • English
    • Português
Menu

Blocking… or trying to… DNS over HTTPS (aka DoH)

Posted on June 23, 2020December 30, 2024 by Thiago Crepaldi

Last Updated on December 30, 2024 by Thiago Crepaldi

This post is complementary to a previous POST protecting your network from malicious DNS. Here we are going to leverage a recent addition to pfBlockerNG: a brand new DoH feed!

What is the big deal in allowing DNS over HTTPS (aka DoH) on your network?! Well, users can bypass the DNS over TLS of your pfSense and use a (malicious) one. Some browsers such as Chrome and Firefox implement DoH and there is no way to turn it off in an easy way.

This blocking will use pfBlockerNG to block URLs from a known list of DoH providers. Up until recently, the challenge was that there was no standard and up to date list of DoH providers, so this approach can be flaky. However, we finally have a free and updated feed we can use, besides the static ones I have scavenged online.

To get started, go to Firewall >> pfBlockerNG >> Feeds and scroll down until you find DoH Alias/category. Not DoH_IP nor DoH_IP6, but DoH. Click on the blue + button to add all feeds as a new block list. A page with a new DNSBL group will open and should add rows to “DNSBL Source Definitions” so it looks like this:

  • Info
    • Name: DoH
    • Description: DNS over HTTPS servers
  • DNSBL Source Definitions
    • First row
      • Format: Auto
      • State: ON
      • Source: https://raw.githubusercontent.com/thiagocrepaldi/doh_servers/master/dohservers.txt
      • Header/Label: Bambenek_DoH
    • Second row
      • Format: Auto
      • State: ON
      • Source: https://raw.githubusercontent.com/thiagocrepaldi/doh_servers/master/dohservers2.txt
      • Header/Label: Oneoffdallas_DoH
    • Third row
      • Format: Auto
      • State: ON
      • Source: https://heuristicsecurity.com/dohservers.txt
      • Header/Label: TheGreatWall_DoH
  • Settings
    • Action: Unbound
    • Update Frequency: Once a day
    • Weekly (Day of Week): Monday
    • Auto-Sort Header field: Enable auto sort
    • Group Order: Default
    • Logging / Blocking Mode: DNSBL WebServer/VIP
    • TOP1M Whitelist: unchecked

After checking all URLs are ON and the Settings are configured as above, click Save DNSBL Settings button at the bottom of the page. Once a day pfSense will update its block list and block the offending DoH servers.

To verify your setting is working, click on Reports within DNSBL page and looks for DNSBL_DoH at the DENY table.

Share this:

  • Tweet

Related

2 thoughts on “Blocking… or trying to… DNS over HTTPS (aka DoH)”

  1. TC says:
    September 13, 2021 at 5:17 PM

    Your tutorials are Super Helpful!!! Thank You So Much!!!

    Reply
  2. edwin says:
    May 28, 2024 at 12:31 AM

    Thanks very much
    for your help

    Reply

Leave a ReplyCancel reply

LIKED? SUPPORT IT :)

Buy Me a Coffee


Search


Categories

  • Cooking (1)
  • Homelab (79)
    • APC UPS (6)
    • pfSense (40)
    • Proxmox (20)
    • Shopping (1)
    • Supermicro (2)
    • Synology NAS (8)
    • Ubiquiti (6)
    • UDM-Pro (4)
  • Random (3)
  • Wordpress (1)

Tags

Agentless monitoring (3) AP9631 (3) Apache2 (3) APC UPS (6) Bind9 (3) certificates (5) DDNS (5) debian (3) DNS (7) DNSBL (2) DSM (6) Dynamic DNS (4) Firewall (9) gmail (3) Let's Encrypt Certificates (7) monitoring (18) networking (21) NMC (2) PBS (3) pfsense (43) port forwarding (3) privacy (2) proxmox (17) proxmox backup server (3) proxmox virtual environment (16) pve (5) rev202207eng (76) security (28) SNMP (4) SNMPv1 (3) ssh (4) SSL (6) Supermicro (2) Synology (7) udm-pro (5) unifi (6) unifi controller (3) unifi switch (2) UPS (5) VLAN (4) vpn (9) vpn server (2) wifi (4) Zabbix (18) Zabbix Agent2 (11)

See also

Privacy policy

Sitemap

©2025 Geek is the Way! | Design by Superb