Confirming DNS over TLS on Unbound 1.6.0

Hello,

I am new to Unbound and am using version 1.6.0 on a Raspberry Pi.

I want to confirm that DNS over TLS to upstream servers is set up correctly.

Looking in the logs file, I see the following entries related to SSL or port 853. Are these good indicators that DNS over TLS is working?

Thanks for your help!

Best,

ROC

Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: SSL DNS connection ip4 1.1.1.1 port 853 (len 16)
Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: Reading ssl tcp query of length 105

Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] info: reply from <.> 149.112.112.112#853

Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: ip4 1.0.0.1 port 853 (len 16)

Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: ip4 1.1.1.1 port 853 (len 16)
Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: ip4 149.112.112.112 port 853 (len 16)
Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: ip4 9.9.9.9 port 853 (len 16)
Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: servselect ip4 9.9.9.9 port 853 (len 16)

Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: servselect ip4 149.112.112.112 port 853 (len 16)

Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: servselect ip4 1.1.1.1 port 853 (len 16)

Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: servselect ip4 1.0.0.1 port 853 (len 16)

Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: sending to target: <.> 1.1.1.1#853

Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: SSL DNS connection ip4 1.1.1.1 port 853 (len 16)

Mar 10 19:05:04 raspberrypi unbound[1101]: [1552269903] unbound[1101:0] debug: Reading ssl tcp query of length 1404

Hello rollingonchrome,

I am new to Unbound and am using version 1.6.0 on a Raspberry Pi.

1.6.0 is > two years old. sure you can't use newer stuff?

I want to confirm that DNS over TLS to upstream servers is set up correctly.

if you like to get your configuration reviewed, why do you post you /logs/ !?

Andreas

Another way of looking at this is that it might indeed be helpful for unbound to log something to confirm how forwarded queries are being encrypted (or not) if unbound is configured to forward queries.

If I was processing logs and intended for my forwarded DNS traffic to be encrypted, I'd certainly appreciate a log message triggering an alert if some configuration got changed incorrectly and forwarded queries were suddenly happening in the clear.

Joe

Hi,

I am new to Unbound and am using version 1.6.0 on a Raspberry Pi.

1.6.0 is > two years old. sure you can't use newer stuff?

I want to confirm that DNS over TLS to upstream servers is set up correctly.

if you like to get your configuration reviewed, why do you post you /logs/ !?

Another way of looking at this is that it might indeed be helpful for unbound to log something to confirm how forwarded queries are being encrypted (or not) if unbound is configured to forward queries.

If I was processing logs and intended for my forwarded DNS traffic to be encrypted, I'd certainly appreciate a log message triggering an alert if some configuration got changed incorrectly and forwarded queries were suddenly happening in the clear.

This is actually a good idea, and I added a log message. If encrypted
it looks like this:
debug: the query is using TLS encryption, for dns.quad9.net
This is at verbosity level 4.

If no hostname is set, it prints a message that there is no hostname
authentication, or prints a message that libssl does not have the
support for that.

There is already debug, at level 4, it appeared in 1.7.0, that prints
the peer certificate for the reply. That should be pretty obvious, an
X509 certificate with all the credentials. That feature is newer than
1.6.0 where it printed "SSL DNS connection <for address>" for such replies.

Best regards, Wouter