<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Архивы Self-hosted cloud alternatives - Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</title>
	<atom:link href="https://boxvirt.com/tag/self-hosted-cloud-alternatives/feed/" rel="self" type="application/rss+xml" />
	<link>https://boxvirt.com/tag/self-hosted-cloud-alternatives/</link>
	<description>Practical self-hosted infrastructure guides for Proxmox, OPNsense, and Docker.</description>
	<lastBuildDate>Sat, 19 Jul 2025 22:09:18 +0000</lastBuildDate>
	<language>ru-RU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://boxvirt.com/wp-content/uploads/2025/07/cropped-ChatGPT-Image-12-июл.-2025-г.-19_41_55-32x32.png</url>
	<title>Архивы Self-hosted cloud alternatives - Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</title>
	<link>https://boxvirt.com/tag/self-hosted-cloud-alternatives/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Secure DNS with DNS-over-TLS in OPNsense Using Unbound</title>
		<link>https://boxvirt.com/how-to-secure-dns-with-dns-over-tls-in-opnsense-using-unbound/</link>
					<comments>https://boxvirt.com/how-to-secure-dns-with-dns-over-tls-in-opnsense-using-unbound/#respond</comments>
		
		<dc:creator><![CDATA[eXtre]]></dc:creator>
		<pubDate>Sat, 12 Jul 2025 17:12:31 +0000</pubDate>
				<category><![CDATA[OPNsense]]></category>
		<category><![CDATA[OPNsense firewall configuration]]></category>
		<category><![CDATA[Private cloud with Linux]]></category>
		<category><![CDATA[Self-hosted cloud alternatives]]></category>
		<guid isPermaLink="false">https://boxvirt.com/?p=7</guid>

					<description><![CDATA[<p>Introduction DNS-over-TLS (DoT) encrypts DNS traffic, preventing third-party monitoring or tampering. OPNsense, a popular open-source firewall, supports DoT out of the box through the integrated Unbound DNS resolver. [&#8230;]</p>
<p>Сообщение <a href="https://boxvirt.com/how-to-secure-dns-with-dns-over-tls-in-opnsense-using-unbound/">How to Secure DNS with DNS-over-TLS in OPNsense Using Unbound</a> появились сначала на <a href="https://boxvirt.com">Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p></p>



<p></p>



<h3 class="wp-block-heading">Introduction</h3>



<p>DNS-over-TLS (DoT) encrypts DNS traffic, preventing third-party monitoring or tampering. OPNsense, a popular open-source firewall, supports DoT out of the box through the integrated Unbound DNS resolver. This guide walks you through setting up encrypted DNS using Unbound for improved security and privacy.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">What is Unbound DNS?</h3>



<p>Unbound is a modern, high-performance recursive DNS resolver developed by NLnet Labs. Within OPNsense, Unbound acts as the system’s default DNS engine. Instead of relying on third-party resolvers like Google or Cloudflare, Unbound performs full DNS resolution by querying root servers directly.</p>



<h4 class="wp-block-heading">Core Capabilities of Unbound:</h4>



<ul class="wp-block-list">
<li>Full support for DNSSEC to validate DNS integrity</li>



<li>Local DNS overrides for internal hosts</li>



<li>Native DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) support</li>



<li>Per-client access controls</li>



<li>Fast, efficient DNS caching</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Why Use Unbound in OPNsense?</h3>



<h4 class="wp-block-heading">1. <strong>Enhanced Security</strong></h4>



<ul class="wp-block-list">
<li>Encrypted DNS queries using DoT help prevent eavesdropping and manipulation.</li>



<li>DNSSEC ensures responses are verified at every step of resolution.</li>



<li>Recursive resolution eliminates dependency on upstream DNS providers.</li>
</ul>



<h4 class="wp-block-heading">2. <strong>High Performance</strong></h4>



<ul class="wp-block-list">
<li>Lightweight and resource-efficient — ideal even for embedded systems.</li>



<li>Local caching drastically reduces latency for repeated queries.</li>



<li>Optimized for real-time performance, even under high load.</li>
</ul>



<h4 class="wp-block-heading">3. <strong>Advanced Control</strong></h4>



<ul class="wp-block-list">
<li>Full customization of DNS zones, blacklists, and redirects.</li>



<li>Restrict access by IP, interface, or query type.</li>



<li>Easily integrates with VLANs, aliases, and firewall policies.</li>
</ul>



<h4 class="wp-block-heading">4. <strong>Privacy Focused</strong></h4>



<ul class="wp-block-list">
<li>No DNS logs by default — ideal for privacy-conscious setups.</li>



<li>Completely avoids third-party DNS services unless explicitly configured.</li>
</ul>



<h4 class="wp-block-heading">5. <strong>Seamless Integration with OPNsense</strong></h4>



<ul class="wp-block-list">
<li>Managed through a simple web UI</li>



<li>Ties into DHCP static mappings</li>



<li>Works harmoniously with other OPNsense services</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Limitations to Consider</h3>



<h4 class="wp-block-heading">1. <strong>Cold Start Latency</strong></h4>



<p>Initial queries can be slower than cloud DNS providers, especially after reboots or cache clears, since Unbound must resolve each domain from scratch.</p>



<h4 class="wp-block-heading">2. <strong>Manual Configuration Needed</strong></h4>



<p>Features like DoT, DNS blocklists, or custom rules often require deeper configuration. This can be challenging for beginners.</p>



<h4 class="wp-block-heading">3. <strong>No Built-In Ad Blocking</strong></h4>



<p>Unbound doesn&#8217;t block ads out of the box. Users must manually configure and maintain DNS blocklists.</p>



<h4 class="wp-block-heading">4. <strong>Minimal Logging &amp; GUI</strong></h4>



<p>Unlike Pi-hole or AdGuard Home, Unbound lacks a rich dashboard or per-client query log. Power users may need additional tools to monitor DNS traffic.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Step-by-Step: Enabling DNS-over-TLS in OPNsense</h3>



<h4 class="wp-block-heading">Part 1: Configure DoT in Unbound</h4>



<p></p>



<ol class="wp-block-list">
<li>Go to <strong>Services → Unbound DNS → DNS over TLS</strong> in the OPNsense web GUI.</li>



<li>Click <strong>Add (+)</strong> to create a new DoT entry.</li>



<li>Enable the entry by ticking the <strong>Enabled</strong> checkbox.</li>



<li>Leave the <strong>Domain</strong> field blank to apply forwarding globally.</li>



<li>Specify the DNS server’s IP (e.g., <code>1.1.1.1</code>).</li>



<li>Set the <strong>Port</strong> to <code>853</code> — the standard for DoT.</li>



<li>Enter the DNS server&#8217;s hostname (e.g., <code>cloudflare-dns.com</code>) under <strong>Verify CN</strong> to validate the TLS certificate.</li>



<li>Save the settings. Optionally, add a second (IPv6) DoT server.</li>



<li>Click <strong>Apply</strong> to activate changes.</li>
</ol>



<h4 class="wp-block-heading">Part 2: Update General and DHCP Settings</h4>



<ol class="wp-block-list">
<li>Go to <strong>System → Settings → General</strong>.</li>



<li>Remove any predefined DNS servers to ensure Unbound handles all DNS.</li>



<li>Uncheck the option to allow DNS overrides from DHCP/PPP.</li>



<li>Save changes.</li>



<li>Navigate to <strong>Services → DHCPv4 → LAN</strong>.</li>



<li>Clear the DNS server fields to inherit the default Unbound configuration.</li>



<li>Save and restart DHCP if prompted.</li>
</ol>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Conclusion</h3>



<p>Unbound DNS with DNS-over-TLS in OPNsense delivers strong privacy and control without reliance on third-party DNS services. While setup requires a bit more effort than using external resolvers, the result is a secure, self-reliant DNS infrastructure — ideal for privacy-focused users and advanced network environments.</p>
<p>Сообщение <a href="https://boxvirt.com/how-to-secure-dns-with-dns-over-tls-in-opnsense-using-unbound/">How to Secure DNS with DNS-over-TLS in OPNsense Using Unbound</a> появились сначала на <a href="https://boxvirt.com">Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://boxvirt.com/how-to-secure-dns-with-dns-over-tls-in-opnsense-using-unbound/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
