Quad9 test
Author: m | 2025-04-24
Quad9 Test. OpenDNS Test. Cloudflare Browser Check. DNS Leak Test and DNSSEC Test: DNS Leak Test 1. DNS Leak Test 2. DNSSEC Test 1. DNSSEC Test 2. Alternative test via CLI: check connection to Quad9 DNS (it require to use Quad9 DNS servers): dig short txt proto.on.quad9.net. should print: doh. or dot. Quad9 Protocol Test Now Available - proto.on.quad9.net You can now test on which protocol Quad9 received a DNS query. This is especially relevant after configuring
Check / Test Page of Quad9 : r/Quad9 - Reddit
That users in various regions can experience better performance than traditional DNS services.We have tested with quad9 on benchmarking tools, and here are the results:Analysis conducted using DNS Benchmark software by Steve GibsonThe result shows that Quad9 is the winner in terms of quick response time and lowest latency. Cloudflare’s 1.1.1.1 and Open DNS provide good performance, too, but Quad9 remains unbeatable here. Google’s DNS came last in this test, surprisingly.According to dnsspeedtest.online:DNS Performance of Quad9 (miliseconds)MinMedianAverage13.5013.8514.70Quad9 DNS delivered a response time of 14.70 milliseconds, which is good.We hit the following websites with Quad9 to get the raw performance:As you can see from the above results, Quad9 provides decent performance.CloudflareCloudflare’s 1.1.1.1 is a robust DNS server known for its speed, security, and reliability.According to our test, it delivers a 13.93-millisecond ping on average, which is good for online gaming and streaming. Additionally, it comes with built-in DDoS protection and supports DNSSEC to prevent attacks such as DNS spoofing and cache poisoning.Have a look at the below table:DNS Performance of Cloudflare (milliseconds)MinMedianAverage15.9017.8513.93We hit the following websites with Cloudflare to get the raw performance:According to the test, Cloudflare’s 1.1.1.1 provides decent performance.Google DNSGoogle Public DNS is the most common DNS server widely used by businesses and individuals. It’s also known for its faster response times, leveraging a vast network of global data centers to provide quick responses from anywhere in the world.Although Google DNS is a good and easy DNS solution, it is not the best. Refer to the below table for its ping response in milliseconds.DNS Performance of Google DNS (milliseconds)MinMedianAverage44.0047.9547.54We hit the following websites with Google Public DNS to get the raw performance:Based on the test, Google DNS provides quite good performance overall.NextDNSNextDNS is a versatile and privacy-focused DNS service that enhances online security and browsing experience through customization options. It’s a cloud-based DNS resolver that manages DNS queries securely and efficiently. NextDNS uses a global network of servers to reduce response times and ensure DNS queries are answered quickly. This helps gamers connect to game servers faster, giving them a competitive advantage when playing FPS games.On average, it delivers 49.64 milliseconds of ping time, which is quite good for gaming.DNS Performance of FlashStart DNS (milliseconds)MinMedianAverage45.0049.8049.64We hit the following websites with NextDNS to get the raw performance:It delivered stable results throughout the test, and we could customize the DNS according to our requirements. It’s quite easy to set up and has a user-friendly web panel for better accessibility and control over DNS usage. OpenDNSOpenDNS, developed by Cisco, is a well-known DNS service provider known primarily for its security, reliability, and speed. It delivers a stable internet connection and faster load times for an optimal gaming experience without lag spikes.Additionally, it’s well known for its security measures and privacy protection against cyber threats. It is ideal for gamers who want to protect their online streams from DDoS attacks and other potential attacks while gaming. Refer to the below table:DNS Performance of OpenDNS (milliseconds)MinMedianAverage60.3062.7062.54We hit the following websites with OpenDNS to get
How to test Quad9 DoH? : r/Quad9 - Reddit
There a service that Quad9 offers that does not have the blocklist or other security?The primary IP address for Quad9 is 9.9.9.9, which includes the blocklist, DNSSEC validation, and other security features. However, there are alternate IP addresses that the service operates which do not have these security features. These might be useful for testing validation, or to determine if there are false positives in the Quad9 system.Secure IP: 9.9.9.9 Provides: Security blocklist, DNSSEC, No EDNS Client-Subnet sent. If your DNS software requires a Secondary IP address, please use the secure secondary address of 149.112.112.112Unsecure IP: 9.9.9.10 Provides: No security blocklist, DNSSEC, sends EDNS Client-Subnet. If your DNS software requires a Secondary IP address, please use the unsecure secondary address of 149.112.112.10Note: Use only one of these sets of addresses – secure or unsecure. Mixing secure and unsecure IP addresses in your configuration may lead to your system being exposed without the security enhancements, or your privacy data may not be fully protected--------------------------IPV6: there IPv6 support for Quad9?Yes. Quad9 operates identical services on a set of IPv6 addresses, which are on the same infrastructure as the 9.9.9.9 systems.Secure IPv6: 2620:fe::fe Blocklist, DNSSEC, No EDNS Client-SubnetUnsecure IPv6: 2620:fe::10 No blocklist, DNSSEC, send EDNS Client-SubnetDNSCrypt Now in Testing - Quad9
Quick Links Encrypted DNS Is More Private and Secure First, Choose a Supported Free DNS Service Next, Enable DNS over HTTPS in Windows 11 Summary Windows 11 allows you to encrypt your DNS requests through DNS over HTTPS (DoH), providing enhanced online privacy and security. To enable DoH on Windows 11, go to Settings > Network & Internet > Wi-Fi Properties > Hardware Properties and click the "Edit" button next to DNS Server. Enter a DNS server of your choice for IPv4 and IPv6, then make sure that "DNS Over HTTPs" is set to "On." For improved online privacy and security, Windows 11 lets you use DNS over HTTPS (DoH) to encrypt the DNS requests your computer makes while you browse or do anything else online. Here's how to set it up. Encrypted DNS Is More Private and Secure Every time you visit a website using a domain name (such as "google.com," for example), your computer sends a request to a Domain Name System (DNS) server. The DNS server takes the domain name and looks up the matching IP address from a list. It sends the IP address back to your computer, which your computer then uses to connect to the site. This domain name fetching process traditionally happened unencrypted on the network. Any point in between could intercept the domain names of the sites you are visiting. With DNS over HTTPS, also known as DoH, the communications between your computer and a DoH-enabled DNS server are encrypted. No one can intercept your DNS requests to snoop on the addresses you're visiting or tamper with the responses from the DNS server. First, Choose a Supported Free DNS Service As of Windows 11's release, DNS over HTTPS in Windows 11 only works with a certain hard-coded list of free DNS services (you can see the list yourself by running netsh dns show encryption in a Terminal window). Here's the current list of supported IPv4 DNS service addresses as of November 2023: Google DNS Primary: 8.8.8.8 Google DNS Secondary: 8.8.4.4 Cloudflare DNS Primary: 1.1.1.1 Cloudflare DNS Secondary: 1.0.0.1 Quad9 DNS Primary: 9.9.9.9 Quad9 DNS Secondary: 149.112.112.112 For IPv6, here is the list of supported DNS service addresses: Google DNS Primary: 2001:4860:4860::8888 Google DNS Secondary: 2001:4860:4860::8844 Cloudflare DNS Primary: 2606:4700:4700::1111 Cloudflare DNS Secondary: 2606:4700:4700::1001 Quad9 DNS Primary: 2620:fe::fe Quad9 DNS Secondary: 2620:fe::fe:9 When it comes time to enable DoH in the section below,. Quad9 Test. OpenDNS Test. Cloudflare Browser Check. DNS Leak Test and DNSSEC Test: DNS Leak Test 1. DNS Leak Test 2. DNSSEC Test 1. DNSSEC Test 2. Alternative test via CLI: check connection to Quad9 DNS (it require to use Quad9 DNS servers): dig short txt proto.on.quad9.net. should print: doh. or dot.How to test if my Quad9 DoH is working? : r/Quad9
Resolver:207.162.219.52Your first DNS point is suspicious: Yep but I can't figure out why it is showing up. @cburbs said in Quad9 and DNS Resolver:Yep but I can't figure out why it is showing up.This is a typical DNA leak from your OS, I think.Even if the NIC settings only point to the router in terms of DNS.I had a similar experience with a module of Avast antivirus software that was "trusted sites", if it is enabled then Avast will also connect to its own DNS server to check the sites you visit and of course log your browsings :-).Do you have similar software on your system? No and i get the same results off of my phone.Also if I switch to cloudfare and run dnsleaktestIP Hostname ISP Country172.68.173.29 None Cloudflare Portland, United StatesAlso Do you have any rules under firewal/rules/wan? @cburbs said in Quad9 and DNS Resolver:172.68.173.29Try looking in the state table for what is associated with this IP address. (Diagnostics / States / States)I will be more and more curious....With the settings discussed, the dnsleak test should show something like this....The only difference between the DNS settings of our systems is that I perform DNS queries through a VPN tunnel. (ExpressVPN)since the datacenter is two blocks away from me and both the Cloudflare and VPN provider ping times are 2 to 4 ms (therefore, DNS over VPN also provides very good speed)BTW, Do you have a VPN? No VPN here just trying to tweak my Pfsense box as aHow to test if my Quad9 DoH is working? : r/Quad9 - Reddit
System, you use your own 9.9.9.9 setting. :-) @DaddyGoOk that fixed that part. Makes sense too after reading on it more. Also if I do an Ipconfig /all on my devices should it be using my pfsense box or the above DNS settings? @cburbs said in Quad9 and DNS Resolver:Also if I do an Ipconfig /all on my devices should it be using my pfsense box or the above DNS settings?In your place, situation with this setting, I would only give pfSense to the DNS server, so that your DNS could not leak. ( with DHCP, but still only the pfSense box should be the server.Be careful with DHCP server + pfblockerng, create static entries for DHCPit’s an old story, so you can avoid the unbond of restarting multiple times @cburbs said in Quad9 and DNS Resolver:Static DHCP: uncheckedWhat I forgot: :-)if you decide to... and use DHCP on your network, check this as well: Static DHCP: to checked (this is in view of my previous remark) @DaddyGoSo DNS should be pointing to my pfsense box?When I go to dnsleaktest I Get the following -207.162.219.52 None Lightpoint Colocation & Hosting LLC Beaverton, United States66.96.115.176 res100.pdx.rrdns.pch.net. WoodyNet United States66.96.115.177 res200.pdx.rrdns.pch.net. WoodyNet United States66.96.115.178 res300.pdx.rrdns.pch.net. WoodyNet United StatesThe last 3 I believe show quad9 is working correctly just not sure why I am getting the top IP which is a Colocation/Hosting place in my area? Why would this one show up? @cburbs said in Quad9 and DNS Resolver:@DaddyGoSo DNS should be pointingQuad9 Protocol Test Now Available - proto.on.quad9.net : r/Quad9
Starting point. Lock things down better. @cburbs said in Quad9 and DNS Resolver:Also Do you have any rules under firewal/rules/wan?Yeeeepppp is actually the box for that.to your previous question: Also Do you have any rules under firewal/rules/wan?I don't like to load the WAN side with rules, it's like drilling a hole in a sieve, pfSense block all unsolicited traffic on the WAN, so I have more floating rules @DaddyGoI have a WAN rule called - Easy Rule: Passed from Firewall log view - says it was created by Easy Rule .Trying to figure out what it is -Protocol: IPv4 TCPSource: ISP IP addresDestination: 104.25.242.31Port: 80(HTTP)Destination IP is Carrier: cloudflareConfused? @cburbs said in Quad9 and DNS Resolver:Easy RuleYes it is, :-).did you add it this? with this? ( It has a date from almost a year ago. Could have as I think that is when I was looking at snort but was having all sorts of issues so I disabled it all.So I probably don't need that rule - I won't do anything with it now but remove it later today. Do you use squidguard on your system? That was the next thing I was going to implement. @cburbs said in Quad9 and DNS Resolver:squidguardI use HA proxy I think for my purposes more appropriate, Squid is problematic among MITM, so SquidGuard doesn't work for me eitherBut I strongly recommend installing Suricata/Snort and pfblockerNG-devel Delete the rule for said http 80 port because it is unnecessary!I didn’t investigate all the wayTesting doh : r/Quad9 - Reddit
To my pfsense box?When I go to dnsleaktest I Get the following -207.162.219.52 None Lightpoint Colocation & Hosting LLC Beaverton, United States66.96.115.176 res100.pdx.rrdns.pch.net. WoodyNet United States66.96.115.177 res200.pdx.rrdns.pch.net. WoodyNet United States66.96.115.178 res300.pdx.rrdns.pch.net. WoodyNet United StatesThe last 3 I believe show quad9 is working correctly just not sure why I am getting the top IP which is a Colocation/Hosting place in my area? Why would this one show up?You will never see pure 9.9.9.9 DNS resolution, quad9 doesn't have its own network, therefore using CDN, as you can see WoodyNet, so I don't use it for 9.9.9.9 never, hmmmmm ( So it does seem to be working on that part then.Do you also use this in your setup? @cburbs said in Quad9 and DNS Resolver:So it does seem to be working on that part then.Do you also use this in your setup?There can be many approaches to this theme:Use what I have already described above for 853 DNSoverTLS + DNSSEC ( and then you can also block port 53 on the firewall as a rule.Don't forget the firewall is blocking all unsolicited traffic by default, this is the rule on pfSense.Another solution is to use Suricata and/or Snort with ET DNS rules, for example Addition: the pfSense is blocked from the WAN side, so if you think about the LAN side you can disable the external DNS query for the clients or as I mentioned ET DNS rules set will be the solution (IPS on LAN) @cburbs said in Quad9 and DNS. Quad9 Test. OpenDNS Test. Cloudflare Browser Check. DNS Leak Test and DNSSEC Test: DNS Leak Test 1. DNS Leak Test 2. DNSSEC Test 1. DNSSEC Test 2. Alternative test via CLI: check connection to Quad9 DNS (it require to use Quad9 DNS servers): dig short txt proto.on.quad9.net. should print: doh. or dot.
Cloudflared and Quad9 - Quad9 Documentation
Logiciels malveillants, les ransomwares et les domaines malveillants.La fonction de test de vitesse DNS intégrée pour les utilisateurs PRO vous aide à trouver et à vous connecter au serveur DNS le plus rapide en fonction de l'emplacement et du réseau.Liste des DNS intégrés :Cloudflare, Google Public DNS, AdGuard DNS, Quad9, CleanBrowsing, OpenDNS, Yandex.DNS, Neustar UltraDNS, UncensoredDNS, AlternateDNS, Digital Society Switzerland, dnsforge, Level3 DNS, DNS.WATCH, OpenNIC DNS, SmartViper DNS, Freenom World DNS, FreeDNS , Comodo Secure DNS, et plus encore.Caractéristiques :+ Explorez librement vos sites et applications préférés+ Profitez des meilleures performances de navigation privée+ Réduire la mise en mémoire tampon vidéo+ Restez plus sécurisé sur le WiFi public+ Améliorer les jeux en ligne+ Accéder à des sites Web restreints+ Bloquer le contenu pour adultes et porno+ Débloquer des sites Web restreints+ Aucune racine requiseCaractéristiques de l'abonnement PRO :+ PRO : contrôlez les applications individuellement+ PRO : Journalisation avancée+ PRO : fonction Smart Whois, incl. Carte+ PRO : DNS personnalisé+ PRO : fonction de test de vitesse Smart DNSCette application utilise le VPNService d'Android.Check / Test Page of Quad9 : r/Quad9 - Reddit
This topic has been deleted. Only users with topic management privileges can see it. Ok so I have been using Pfsense for a bit now and am adding things one by one. So right now I am trying to get quad9 setup with DNS resolver. I came across this article but not sure how accurate it is because I have come across similiar articles with somewhat different settings.So current settings:System --> General SetupDNS Servers: 9.9.9.9 and 149.112.112.112DNS Server Override: uncheckedDisable DNS Forwarder: uncheckedServices --> DNS Resolver --> General SettingsEnable DNS Resolver: CheckedNext few items defaultDNSSEC: CheckedPyhton Module: UncheckedDNS Query Forwarding: CheckedUse SSL/TLS: CheckedDHCP Registration: UncheckedStatic DHCP: uncheckedOpenVPN Clients: uncheckedIf I look at System information:DNS server(s)127.0.0.19.9.9.9149.112.112.112Why is 127.0.0.1 in that list?If I run this per that article - nslookup isitblocked.orgResults:Server: Name of boxAddress: IP address of my pfsense box*** Name of box can't find isitblocked.org: Server failedAlso if I go to Diagnostics -> DNS LookupI get the followingName server Query time127.0.0.1 30 msec9.9.9.9 7 msec149.112.112.112 2 msecAgain why 127.0.0.1 ?Any help would be great on if the above settings are correct?Then I can move onto some more testing to verify it is working correctly. Again why 127.0.0.1Do not use the forwarder.I hope this helps, br Krisz You even wrote this: Use SSL/TLS: CheckedDoes Quad9 support DNS over TLS? YESWe do support DNS over TLS on port 853 (the standard) using an auth name of dns.quad9.net.therefore, it is necessary to specify this field: dns.quad9.netLike: Of course, this is an example from my. Quad9 Test. OpenDNS Test. Cloudflare Browser Check. DNS Leak Test and DNSSEC Test: DNS Leak Test 1. DNS Leak Test 2. DNSSEC Test 1. DNSSEC Test 2. Alternative test via CLI: check connection to Quad9 DNS (it require to use Quad9 DNS servers): dig short txt proto.on.quad9.net. should print: doh. or dot.How to test Quad9 DoH? : r/Quad9 - Reddit
DNS Changer: Fast & Secure DNS on PCDNS Changer: Fast & Secure DNS, coming from the developer Star Internet Services, is running on Android systerm in the past.Now, You can play DNS Changer: Fast & Secure DNS on PC with GameLoop smoothly.Download it in the GameLoop library or search results. No more eyeing the battery or frustrating calls at the wrong time any more.Just enjoy DNS Changer: Fast & Secure DNS PC on the large screen for free!DNS Changer: Fast & Secure DNS IntroductionSecure DNS improves internet speeds by modifying the default ISP DNS to your choice of Public DNS resolvers or DNSFLEX Secure DNS. Use DNS Changer to select from a list of top rated public DNS providers including Google, Cloudflare, Quad9, Verisign and more.Add an additional layer of online security with DOH (DNS over HTTPS). DOH works by encrypting DNS queries between your UE device and the DNS server, protecting your data from third party networks such as public WiFi hotspots or ISPs. Our servers are geo-located and distributed globally delivering low latency performance for sensitive gaming applications. Use our Speed Test utility to choose the closest public DNS server based on RTT latency.Get exclusive access to DNSFLEX Secure DNS services by downloading our DNS Changer App. Choose from two levels of additional security for free: Parental Control or Malware and Virus protection.Parental Control:* Blocks categories such as Adult, Guns/Violence, Ad-trackers and more * Enables safe search feature for search engines - Google, Bing, Yahoo and DuckDuckGo* Safe and supervised internet access for children Malware and Virus Protection:* Protects against malware and phishing attacks* Blocks DNS rebinding and ransomware attacks* Up to date threat intelligence feeds Main Features:* Supports Mobile Data (2G/3G/4G/5G) and WiFi networks * No root required* Low resource utilization (CPU/RAM)* Speed test tool to select the fastest DNS server* Supports Encrypted DOH (DNS over HTTPS) and UDP DNS* Add your own custom DNS server (UDP or DOH)* Select from a list of pre-configured public DNS servers* Select from a list of pre-configured public DOH servers* Access Geo blocked websites* Improves online gaming latency* Increases internetComments
That users in various regions can experience better performance than traditional DNS services.We have tested with quad9 on benchmarking tools, and here are the results:Analysis conducted using DNS Benchmark software by Steve GibsonThe result shows that Quad9 is the winner in terms of quick response time and lowest latency. Cloudflare’s 1.1.1.1 and Open DNS provide good performance, too, but Quad9 remains unbeatable here. Google’s DNS came last in this test, surprisingly.According to dnsspeedtest.online:DNS Performance of Quad9 (miliseconds)MinMedianAverage13.5013.8514.70Quad9 DNS delivered a response time of 14.70 milliseconds, which is good.We hit the following websites with Quad9 to get the raw performance:As you can see from the above results, Quad9 provides decent performance.CloudflareCloudflare’s 1.1.1.1 is a robust DNS server known for its speed, security, and reliability.According to our test, it delivers a 13.93-millisecond ping on average, which is good for online gaming and streaming. Additionally, it comes with built-in DDoS protection and supports DNSSEC to prevent attacks such as DNS spoofing and cache poisoning.Have a look at the below table:DNS Performance of Cloudflare (milliseconds)MinMedianAverage15.9017.8513.93We hit the following websites with Cloudflare to get the raw performance:According to the test, Cloudflare’s 1.1.1.1 provides decent performance.Google DNSGoogle Public DNS is the most common DNS server widely used by businesses and individuals. It’s also known for its faster response times, leveraging a vast network of global data centers to provide quick responses from anywhere in the world.Although Google DNS is a good and easy DNS solution, it is not the best. Refer to the below table for its ping response in milliseconds.DNS Performance of Google DNS (milliseconds)MinMedianAverage44.0047.9547.54We hit the following websites with Google Public DNS to get the raw performance:Based on the test, Google DNS provides quite good performance overall.NextDNSNextDNS is a versatile and privacy-focused DNS service that enhances online security and browsing experience through customization options. It’s a cloud-based DNS resolver that manages DNS queries securely and efficiently. NextDNS uses a global network of servers to reduce response times and ensure DNS queries are answered quickly. This helps gamers connect to game servers faster, giving them a competitive advantage when playing FPS games.On average, it delivers 49.64 milliseconds of ping time, which is quite good for gaming.DNS Performance of FlashStart DNS (milliseconds)MinMedianAverage45.0049.8049.64We hit the following websites with NextDNS to get the raw performance:It delivered stable results throughout the test, and we could customize the DNS according to our requirements. It’s quite easy to set up and has a user-friendly web panel for better accessibility and control over DNS usage. OpenDNSOpenDNS, developed by Cisco, is a well-known DNS service provider known primarily for its security, reliability, and speed. It delivers a stable internet connection and faster load times for an optimal gaming experience without lag spikes.Additionally, it’s well known for its security measures and privacy protection against cyber threats. It is ideal for gamers who want to protect their online streams from DDoS attacks and other potential attacks while gaming. Refer to the below table:DNS Performance of OpenDNS (milliseconds)MinMedianAverage60.3062.7062.54We hit the following websites with OpenDNS to get
2025-04-15There a service that Quad9 offers that does not have the blocklist or other security?The primary IP address for Quad9 is 9.9.9.9, which includes the blocklist, DNSSEC validation, and other security features. However, there are alternate IP addresses that the service operates which do not have these security features. These might be useful for testing validation, or to determine if there are false positives in the Quad9 system.Secure IP: 9.9.9.9 Provides: Security blocklist, DNSSEC, No EDNS Client-Subnet sent. If your DNS software requires a Secondary IP address, please use the secure secondary address of 149.112.112.112Unsecure IP: 9.9.9.10 Provides: No security blocklist, DNSSEC, sends EDNS Client-Subnet. If your DNS software requires a Secondary IP address, please use the unsecure secondary address of 149.112.112.10Note: Use only one of these sets of addresses – secure or unsecure. Mixing secure and unsecure IP addresses in your configuration may lead to your system being exposed without the security enhancements, or your privacy data may not be fully protected--------------------------IPV6: there IPv6 support for Quad9?Yes. Quad9 operates identical services on a set of IPv6 addresses, which are on the same infrastructure as the 9.9.9.9 systems.Secure IPv6: 2620:fe::fe Blocklist, DNSSEC, No EDNS Client-SubnetUnsecure IPv6: 2620:fe::10 No blocklist, DNSSEC, send EDNS Client-Subnet
2025-04-22Resolver:207.162.219.52Your first DNS point is suspicious: Yep but I can't figure out why it is showing up. @cburbs said in Quad9 and DNS Resolver:Yep but I can't figure out why it is showing up.This is a typical DNA leak from your OS, I think.Even if the NIC settings only point to the router in terms of DNS.I had a similar experience with a module of Avast antivirus software that was "trusted sites", if it is enabled then Avast will also connect to its own DNS server to check the sites you visit and of course log your browsings :-).Do you have similar software on your system? No and i get the same results off of my phone.Also if I switch to cloudfare and run dnsleaktestIP Hostname ISP Country172.68.173.29 None Cloudflare Portland, United StatesAlso Do you have any rules under firewal/rules/wan? @cburbs said in Quad9 and DNS Resolver:172.68.173.29Try looking in the state table for what is associated with this IP address. (Diagnostics / States / States)I will be more and more curious....With the settings discussed, the dnsleak test should show something like this....The only difference between the DNS settings of our systems is that I perform DNS queries through a VPN tunnel. (ExpressVPN)since the datacenter is two blocks away from me and both the Cloudflare and VPN provider ping times are 2 to 4 ms (therefore, DNS over VPN also provides very good speed)BTW, Do you have a VPN? No VPN here just trying to tweak my Pfsense box as a
2025-04-24System, you use your own 9.9.9.9 setting. :-) @DaddyGoOk that fixed that part. Makes sense too after reading on it more. Also if I do an Ipconfig /all on my devices should it be using my pfsense box or the above DNS settings? @cburbs said in Quad9 and DNS Resolver:Also if I do an Ipconfig /all on my devices should it be using my pfsense box or the above DNS settings?In your place, situation with this setting, I would only give pfSense to the DNS server, so that your DNS could not leak. ( with DHCP, but still only the pfSense box should be the server.Be careful with DHCP server + pfblockerng, create static entries for DHCPit’s an old story, so you can avoid the unbond of restarting multiple times @cburbs said in Quad9 and DNS Resolver:Static DHCP: uncheckedWhat I forgot: :-)if you decide to... and use DHCP on your network, check this as well: Static DHCP: to checked (this is in view of my previous remark) @DaddyGoSo DNS should be pointing to my pfsense box?When I go to dnsleaktest I Get the following -207.162.219.52 None Lightpoint Colocation & Hosting LLC Beaverton, United States66.96.115.176 res100.pdx.rrdns.pch.net. WoodyNet United States66.96.115.177 res200.pdx.rrdns.pch.net. WoodyNet United States66.96.115.178 res300.pdx.rrdns.pch.net. WoodyNet United StatesThe last 3 I believe show quad9 is working correctly just not sure why I am getting the top IP which is a Colocation/Hosting place in my area? Why would this one show up? @cburbs said in Quad9 and DNS Resolver:@DaddyGoSo DNS should be pointing
2025-04-09