mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2026-03-04 00:01:12 -05:00
DNS over HTTPS doesn't listen on dns->bind_hosts interfaces #3095
Labels
No labels
P1: Critical
P2: High
P3: Medium
P4: Low
UI
bug
cannot reproduce
compatibility
dependencies
docker
documentation
duplicate
enhancement
enhancement
external libs
feature request
good first issue
help wanted
infrastructure
invalid
localization
needs investigation
performance
potential-duplicate
question
recurrent
research
snap
waiting for data
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/AdGuardHome#3095
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Habetdin on GitHub (Oct 1, 2021).
Prerequisites
Issue Details
Expected Behavior
DNS over HTTPS to listen the same IPs as the regular DNS, DNS over TLS and DNS over QUIC, etc
Actual Behavior
DNS over HTTPS listens only on the Web interface IP address
Additional Information
AdGuardHome.yamlcontains next configuration (I've replaced the real IPs with<stubs>:The
ssshows the next network interfaces state:As seen in this output, regular DNS, DNS over TLS and DNS over QUIC all do listen on
dns->bind_hostsIPs, while DNS over HTTPS is only available on the IP of Web interface.I expect DNS over HTTPS to follow other DNS services' behavior and listen on
<second.ip.address>and<third.ip.address>, but it does not. As a bonus, there's no way to separate DNS over HTTPS and Web interface except using reverse proxy.May be there should be unified
bind_hostsconfiguration, but for now there is genericbind_hostalong to thedns->bind_hosts.@timkgh commented on GitHub (Oct 2, 2021):
See #741. In general there should be individual options which protocols to enable, what interfaces/ports to listen on, certificates (because different host names may be used depending on interface). The admin interface should have its own settings. This will require a re-design at some point.
@Habetdin commented on GitHub (Oct 2, 2021):
Yeah, I agree, this issue is related to #741. Sadly, nothing changed in last 2 years.
As a workaround I have set up reverse proxy from
<second.ip.address>and<third.ip.address>to<first.ip.address>to make the DoH available on the same IPs as other DNS implementations.@timkgh commented on GitHub (Oct 2, 2021):
You may also be able to play some games with iptables on Linux to achieve the same, either to do forwarding between IP addresses or have the admin interface listen on all interfaces and block it on some with iptables.
@EugeneOne1 commented on GitHub (Oct 4, 2021):
Merging into https://github.com/AdguardTeam/AdGuardHome/issues/741#issuecomment-759330329 since it looks like a duplicate.
Please upvote that task to increase its priority.