Had to push firewall policy today stating that mask.apple-dns.net is NOT spyware, and to exclude that domain from the threat logs and to NOT drop that traffic.
:(
Had to push firewall policy today stating that mask.apple-dns.net is NOT spyware, and to exclude that domain from the threat logs and to NOT drop that traffic.
:(
@bosh Palo Alto was right to block apple dns, and apple doesn't have a robust mechanism to deal with dns timeouts so safari and firefox fail to load pages on the first attempt.
Meanwhile chrome using DoH by default be going through.
I wasn't aware of this until now. Is this another "we don't want anyone else tracking you" scheme like most browsers defaulting to DoH to corporate DNS servers?
Just an old guy screaming at clouds:
If I'm protecting a network, all DNS goes through me. And I run a proper caching server that only believes in root servers.
I generally am against overcontrolling client devices, but they better not be trying to DoH, or hide lookups, because that's one of the easy buttons for detection of stupid breaches.
@johntimaeus @da_667 @kajer The backend dns hosts internal network names. Pi-hole is for the family DNS.
(Mainly so I can take down one or the other (maintenance, upgrades, etc) without affecting service)
Yay overly complicated home labs! 😁