Nextdns CLI bypassed by DNS53 queries + Android DoT problem
Hi,
I have an Asus router with Merlin on it. I installed nextdns cli, which works beautifully. On the other hand, I noticed that explicit queries to a DNS53 dns, bypass nextdns CLI. For instance:
[xxx@xxxxx ~]$ nslookup google.com 8.8.8.8
Server: 8.8.8.8
Address: 8.8.8.8#53
Non-authoritative answer:
Name: google.com
Address: 216.58.215.174
Name: google.com
Address: 2a00:1450:4003:803::200e
Indeed, these queries don't appear in nextdns logs.
To solve this problem, I tried to activate DNS Director in Merlin, but doing so nextdns DoT on my android phone doesn't work anymore when I'm at home (obviously, as DNS Director blocks port 853).
Is there a way to avoid plain dns queries to bypass nextdns CLI without relying on DNS Director (or using it)?
Thanks a lot in advance.
13 replies
-
You need a firewall rule to block outbound traffic to port 53.
OTOH, users can always use DOH which uses port 443 (https)
-
That’s a fairly difficult thing to do give that its a command line tool and it has to interface with dozens of different router types. Plus, the version of router I use has a web interface, so if NextDNS even could feasibly make a DNAT rule for my router, it wouldn’t be updated in the gui and I wouldn’t know about it, somewhat breaking functionality on my reasonably expensive setup.
-
I set up a DNS masquerade on my router. So any traffic sent over 53/853 is rerouted to my router. Helps with IoT devices hardcoded with 8.8.8.8 etc.
Content aside
- 2 mths agoLast active
- 13Replies
- 124Views
-
4
Following