Site Tools


advanced-dhcpdns

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
advanced-dhcpdns [2024/11/27 00:27] – [DHCP / DNS Server (LAN)] -Formatting, condense hogwildadvanced-dhcpdns [2025/08/13 03:53] (current) – [DHCP Client (WAN)] hogwild
Line 1: Line 1:
 ====== DHCP/DNS/TFTP ====== ====== DHCP/DNS/TFTP ======
  
-This menu let you configure advanced settings for the DHCP, DNS and TFTP services for both the LAN and WAN. Most of this functionality is provided by [[https://thekelleys.org.uk/|dnsmasq]].+Here, you can configure advanced settings for the DHCP, DNS and TFTP services for both LAN and WAN. Most of this functionality is provided by [[https://thekelleys.org.uk/|dnsmasq]].
  
  
Line 30: Line 30:
   * Ephemeral Keys - if checked, a new key pair is generated for each  \\ DNS query. Use this with care, as it's very cpu-intensive, and may\\ slow DNS resolution.   * Ephemeral Keys - if checked, a new key pair is generated for each  \\ DNS query. Use this with care, as it's very cpu-intensive, and may\\ slow DNS resolution.
  
-  * Manual Entry - if enabled, 3 more fields are displayed:  +  * Manual Entry - if enabled, 3 more fields appear:  
-    * Resolver Address - the IP address of the dnscrypt-enabled DNS server. +    * Resolver Address - the IP of the dnscrypt-enabled DNS server. 
-    * Provider Name - the name of the DNS provider, for instance FreshTomato. +    * Provider Name - the DNS provider name(e.g. "FreshTomato")
-    * Provider Public Key - the public key given by the DNSCRYPT-enabled \\ DNS provider \\ (to generate a key pair)+    * Provider Public Key - the public key from the DNSCRYPT-enabled \\ DNS provider (to generate a key pair)
  
-  * Resolver - a dropdown list currently containung about 200 DNS servers.+  * Resolver - a dropdown list of about 200 DNS servers.
     * Some support DNSSEC.      * Some support DNSSEC. 
     * Some don't log queries.      * Some don't log queries. 
     * Some are filtered.     * Some are filtered.
  
-  * Priority - should be left at //no-resolv// to prevent DNS leaks. This should  \\ neve be selected if using DNSCRYPT. Also, to prevent leaks, enable \\ //Intercept DNS port//.+  * Priority - should be left at //no-resolv// to prevent DNS leaks. \\ This should never be selected if DNSCRYPT is enabled\\ To prevent leaks, enable //Intercept DNS port//.
  
-  * Local Port - the port on which dnscrypt-proxy communicates with \\ FreshTomato DNS. \\ Leave at 40 unless you're an advanced user. Don't set it to 53, it could create a loop.+  * Local Port - the port on which dnscrypt-proxy speaks with \\ FreshTomato DNS. Leave this at 40 unless you're advanced. \\ Don't set it to 53, it could create a loop.
  
  \\   \\ To help choose a DNSCrypt DNS provider, import the file /etc/dnscrypt-resolvers.csv in a spreadsheet. Once chosen, \\ the server's IP address, provider name, and public key can be taken from that file.  \\   \\ To help choose a DNSCrypt DNS provider, import the file /etc/dnscrypt-resolvers.csv in a spreadsheet. Once chosen, \\ the server's IP address, provider name, and public key can be taken from that file.
Line 48: Line 48:
  \\  \\
  
-**Use Stubby (DNS-over-TLS):** enables the Stubby DNS Stub resolver, to enhance DNS privacy.+**Use Stubby** (DNS-over-TLS)**:** enables the Stubby DNS Stub resolver, to enhance DNS privacy.
  
 DNS over TLS ("DoT") sends DNS queries via a secure (TLS-encrypted) connection. TLS is the same technology \\ that encrypts secure Web traffic. This prevents third parties from seeing your DNS queries. DNS over TLS ("DoT") sends DNS queries via a secure (TLS-encrypted) connection. TLS is the same technology \\ that encrypts secure Web traffic. This prevents third parties from seeing your DNS queries.
  
- \\+  * **Show/Hide Servers**: checking this displays a table of possible Stubby servers to be used. \\ Unchecking this hides the table.
  
-When Stubby is enabled, further options appear:+ \\  \\
  
 {{:pasted:20220420-181042.png}} {{:pasted:20220420-181042.png}}
Line 60: Line 60:
  \\  \\
  
-**Upstream resolvers:** selects the upstream servers responsible for performing name resolution.+**Upstream resolvers:** The actual list/table of possible upstream servers to use for performing name resolution. 
 + 
 +Mousing over the name of any upstream resolver displays the following about about that server: 
 + 
 + \\ 
 + 
 +{{::advanced-dhcp_dns_tftp-stubby_mouseover.png?317}}\\ 
 + 
 +  - The IP versions supported 
 +  - The server's status 
 +  - Authorized domain - (the domain name used for \\ authentication between your Stubby client and \\ an upstream DNS server that \\ supports encrypted queries. 
 +  - The port used 
 + 
 +\\
  
  \\  \\
Line 100: Line 113:
 //udhcpc// (the DHCP client FreshTomato uses to obtain a WAN IP address) has a problem. It has a DHCP discovery packet size 590 bytes long. However, DHCP relay servers can handle only DHCP discovery packets up to 576 bytes. If there are DHCP relay servers between FreshTomato and your ISP's DHCP server, FreshTomato might fail to acquire a DHCP lease on the WAN interface. //udhcpc// (the DHCP client FreshTomato uses to obtain a WAN IP address) has a problem. It has a DHCP discovery packet size 590 bytes long. However, DHCP relay servers can handle only DHCP discovery packets up to 576 bytes. If there are DHCP relay servers between FreshTomato and your ISP's DHCP server, FreshTomato might fail to acquire a DHCP lease on the WAN interface.
  
-The extra bytes were all padding, and thus unnecessary.  Developers eliminated the padding, reducing udhcpc DHCP discovery packet size to 331 bytes. This size became the default setting. Now, udhcpc can successfully obtain a DHCP lease from an ISP with DHCP relays.+The extra bytes were padding, and thus unnecessary.  Developers deleted the padding, reducing udhcpc DHCP discovery packet size to 331 bytes. This size became the default setting. Now, udhcpc can successfully obtain a DHCP lease from an ISP with DHCP relays.
  
 Some users may not be able to obtain a WAN IP address unless they disable this setting. (Default: Enabled). Some users may not be able to obtain a WAN IP address unless they disable this setting. (Default: Enabled).
Line 269: Line 282:
 ===== DHCP/DNS/TFTP Notes ===== ===== DHCP/DNS/TFTP Notes =====
  
-  * Do not use results from Cloudflare's site: [[https://1.1.1.1/help|https://1.1.1.1/help]]. That webpage is likely to provide invalid results. Instead, use: [[https://rootcanary.org/test.html|https://rootcanary.org/test.html]] \\  \\  +Do not use results from Cloudflare's site: [[https://1.1.1.1/help|https://1.1.1.1/help]]. That webpage is likely to provide invalid results.  \\ Instead, use: [[https://rootcanary.org/test.html|https://rootcanary.org/test.html]] \\  \\ DNSSEC and DNSCrypt / Stubby complement each other. 
-  * DNSSEC and DNSCrypt / Stubby complement each other.  + 
-    * DNSSEC provides authentication. +  * DNSSEC provides authentication. 
-    * DNSCrypt provides encryption.+  * DNSCrypt provides encryption.
  
  
advanced-dhcpdns.1732667250.txt.gz · Last modified: by hogwild