I know this is a matter that has many threads written and posts all over the internet about DoH bypassing local DNS requests..
Some people from what I have seen use a blocking firewall rule that drops DoH servers list (which breaks internet in some users..)
(like this list from PiHole: https://github.com/jpgpi250/piholemanual/blob/master/DOHipv4.txt )
I would like some help with half a solution I have in mind (and I am sorry I do not even know if this is possible)
Can we redirect all requests to 443 port from the DoH list to our internal DNS 53 and masquerade(?) a reply back?
What I have already working for simple DNS 53 requests
I drop whatever I can on DNS-over-HTTPS , DNS-over-TLS, DNS-over-QUIC , DNS-Crypt etc,etc but blocking does not “break” anything as far as I know.
I’m not aware of any client/endpoint that does not work with traditional DNS.
I also redirect “classic” DNS requests to PiHole for further processing.
I can’t say I have any issues, but most depends on how the Pi-hole is configured etc,
From time to time I need to whitelist certain things or stuff is not working well etc.
wow.. some people have strong feelings against DoH.. didn’t expect that when I asked..
anyway thank you all for clarifying that what I wished can’t be done.
If anyone has a solution just post a link if possible
the problem I have to face is a small budget hotel with limited bandwidth to share (50Mbps) to 40-50 mobile clients.. so one requirement was to cut porn (don’t judge, use a vpn). That was the fuss with dns.
FYI about the “drop DoH” rules that some use in ROS: I had mobile clients in i.e. Android with the Blokada app (a local VPN that cuts ads) that their mobile browsers couldn’t connect anywhere..
in summary, trying to redirect any of this is very like trying to redirect and https web site or app, ther is certificates involved to avoid supplantation, that makes redirect inviable
Some good QoS is not an option ? Eg. give all mobile clients 1Mbps if it gets busy, if there is bandwith unused let them use it.
There are some fancy QoS/queuing postings here on the forum.
“Spying on [our] users” ? Well I trust my users, I don’t trust browsers, apps using DoH under the hood, and companies running DoH services, devices, or any of them using 8.8.8.8 “because it is convenient/fast”. Do I trust my ISP? More than I trust Cloudflare, NextDNS or Google. Do I trust my government ? more than I trust other ones.
For these reasons I prefer to provide a local DNS server and use unbound… My users are aware of it, none complains, none thinks that I want to “profile” them… Once explained all consider this as a “cool service” and are surprised of the numbers when I show them how many requests (they were not aware of, originating from a media player, a smartphone, their windows computer ) are blocked.