Hello, Im trying to monitor & control my dns in my network. I like the idea & features of nextdns but all your traffic goes trough them right? I wanna host something simular. I currently have pi-hole installed but i feel like its not as advanced as something like nextdns. What service could i use for this? Thanks for your time!

  • Engywuck@lemm.ee
    link
    fedilink
    English
    arrow-up
    6
    ·
    1 year ago

    AdGuard Home comes with a few more goodies vs. pihole. Last but not least, access control, DoT, DoH, custom DNS for selected clients and so on (you need a domain and a certificate for the DoT, DoH, though)

  • Monkey With A Shell@lemmy.socdojo.com
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    1 year ago

    I guess first I’d ask is why are you looking for your own DNS server? You can use most any server and host it yourself, things like bind or unbound are out there and baked into a lot of the home-server / domain controller type distro.

    When you talk about all your traffic going ng through them, all your traffic won’t go through the DNS provider. The DNS is only turning the name to a number, so they would know perhaps the intent to go there but not the actual traffic. You could just be doing a nslookup for fun for all they know. Even hosting your own, whoever is the next in line from your server will get requests for anything your box doesn’t have an answer for, so it really only adds a mask to say ‘someone asked me to ask you for this address’. That being the case, what’s your goal in running one?

  • friend_of_satan@lemmy.world
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    1
    ·
    1 year ago

    all your traffic goes through them right?

    Wrong. DNS just resolves hostnames to IP addresses and a few other small things. None of your web traffic will go through your DNS provider.

    • chiisana@lemmy.chiisana.net
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      It’s not so absolute; your DNS provider could resolve domains to their own server’s IP and MITM your traffic. This is how some of those DNS based region bypass work — by re-routing your traffic through their server in a supported region.

      • friend_of_satan@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        1 year ago

        You are correct. However, you can’t mitm traffic through DNS alone. Each device would need to install a certificate for that to function. Also, OP specifically mentioned nextdns and pihole, and they do not do that.

  • MangoPenguin@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Only DNS lookups go through them, the rest of your traffic is not affected.

    Adguard Home is a good one to self host, lots of features.

  • Johnny 5@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    I have been using Adguard Home in the cloud, limited by clients and using it only for DoH/TLS. Updates are made directly in the UI, it’s really very light and practical.

  • chiisana@lemmy.chiisana.net
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    all your traffic goes through them right?

    Depending on provider and intended purpose… strictly speaking, a DNS server tells your computer that example.com resolves to 169.254.169.254 and nothing more.

    However, for example, if your DNS provider adds ad blocking, they may choose to change ads.example.com from 169.254.169.254 to 127.0.0.1 thereby preventing any advertiser JavaScripts from being requested. This is fine and all, but you’d have no way to be automatically alerted if they changed it to 123.234.123.234 and serve their own blank scripts.

    If for example your DNS provider provides region bypass for streaming providers, they could resolve streaming.example.com from 169.254.169.254 to a server in another country with address 123.234.123.234; and route your request through that in order to circumvent the region lock.

    These are all fine and well, but if the provider was compromised and/or sold to malicious actor, they could resolve your-bank.website to a phishing site, and then MITM all the traffic just like the region lock bypass example.

    So… in theory, it shouldn’t do anything more than resolving, but in practice, it may be hard to detect, and they could be doing more than just resolving.

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    1 year ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    DNS Domain Name Service/System
    IP Internet Protocol
    SSL Secure Sockets Layer, for transparent encryption
    TLS Transport Layer Security, supersedes SSL

    3 acronyms in this thread; the most compressed thread commented on today has 4 acronyms.

    [Thread #306 for this sub, first seen 28th Nov 2023, 04:35] [FAQ] [Full list] [Contact] [Source code]