DNS Leak

Comments

8 comments

  • Avatar
    Tyler

    This same issue caused me a lot of headaches. Firewalla should really consider handling these type 65 queries.

    2
    Comment actions Permalink
  • Avatar
    Firewalla Team

    Currently, DNS queries with type HTTPS (65) won't be inspected by customized DNS rules. What device are you using? So far, we have seen Apple devices generate that kind of query more often. 

    0
    Comment actions Permalink
  • Avatar
    Jeff

    So far I've tested and observed the behavior on these platforms and browsers:

    Windows

    • Chrome
    • Firefox
    • Edge

    Linux

    • Firefox
    • Chrome

    iOS

    • Safari
    0
    Comment actions Permalink
  • Avatar
    Firewalla

    Are you running any type of VPN? How is your device DNS configured? does it directly point to your DNS (DOH) DNS server?

    0
    Comment actions Permalink
  • Avatar
    Jeff

    All devices get their DNS settings from Firewalla via DHCP and use Firewalla's DNS over HTTPS feature to direct external DNS traffic to NextDNS.

    As for the internet itself, some of the devices use Firewalla's VPN Client feature to be connected to a 3rd-party VPN, with the setting for "Force DNS over VPN" turned off (else no connection to local servers).

    The other devices, have no special settings and simply pass through the Firewalla to the upstream ISP.

    In either case, HTTPS (65) queries were observed in the logs of NextDNS for domains which were explicitly defined as local using Custom DNS Rules.

    0
    Comment actions Permalink
  • Avatar
    Tyler

    I went back and forth with firewalla on this for a while. At the end of the day, firewalla does not support type 65 queries. This really needs to be implemented by firewalla quickly and is going to become more and more of a problem.

    This occurs regardless of whether a vpn is used and even when every dns setting in firewalla is disabled. Firewalla simply doesn’t handle type 65 and lets it be passed upstream which defeats the entire purpose of being able to set custom dns in firewalla.

    2
    Comment actions Permalink
  • Avatar
    Jeff

    @Tyler I agree. This DNS leak issue is not going away since it is a "feature" of modern browsers on all operating systems.

    And it affects everyone that is using Firewalla's Custom DNS Rules feature to redirect domains to internal IPs (which I would imagine encompasses most of their use case).

    These users believe their requests are kept local but they are not.

    If I didn't have NextDNS configured, any upstream external DNS would be able to see the names of all internal services.

    0
    Comment actions Permalink
  • Avatar
    Tyler

    Exactly. The other major issue is that internal services become completely inaccessible when the dns bypasses firewalla. In my case, the dns queries were resolving to my cloudflare dns entries because firewalla let it through and wasn't routing it. When that happens, the browsers time out and say they could not reach the server because there are no dns entries publicly for those internal services. This is expected when someone tries to access internal services externally, but not when I'm on my own lan and firewalla just lets the dns pass upstream instead of routing it correctly based on the custom rules.

    1
    Comment actions Permalink

Please sign in to leave a comment.