hello! i just installed nobara linux and today is my first time using fedora. i have been using debian based distros for a while now and due to random restrictions from govt. and/or isp, i have always had a better experience when i change my dns to cloudflare’s with quad9 as fallback. i am used to of using the resolvconf package, but in fedora that doesnt seem to exist and refers me to an already installed openresolv package.
so then i gave up on that and decided to follow the manpage’s instructions and also found this answer here referencing the same, and created /etc/systemd/resolved.conf.d/override1.conf with the content:
this however doesnt get used as even after relogging in and restarting, dig shows my isp’s dns servers are being used. what am i doing wrong? any help is appreciated.
i followed the instructions, but still no good. according to dig www.google.com:
;; SERVER: 127.0.0.53#53(127.0.0.53) (UDP)
and dig -6:
;; communications error to ::1#53: connection refused
Output of resolvectl --no-pager status:
cd@laptop:~$ resolvectl --no-pager status
Global
Protocols: LLMNR=resolve -mDNS -DNSOverTLS DNSSEC=no/unsupported
resolv.conf mode: stub
Current DNS Server: 1.1.1.1
DNS Servers: 1.1.1.1 9.9.9.9 2606:4700:4700::1111 2620:fe::fe
Fallback DNS Servers: 1.0.0.1 149.112.112.112 2606:4700:4700::1001 2620:fe::9
Link 2 (wlo1)
Current Scopes: LLMNR/IPv4 LLMNR/IPv6
Protocols: -DefaultRoute LLMNR=resolve -mDNS -DNSOverTLS DNSSEC=no/unsupported
Outpur of resolvectl --no-pager query example.org:
– Information acquired via protocol DNS in 51.0ms.
– Data is authenticated: no; Data was acquired via local or encrypted transport: no
– Data from: network
although i am observing something curious. on chromium, dns provider is selected to 'OS default (when available) and i cleared cache at chrome://net-internals/#dns.
but i am still able to visit sites that i know for a fact my isp’s dns doesnt resolve. i dont know if this is relevant, just thought i’d mention it if it helps.
You are missing SNI suffixes necessary for hostname verification.
Also note that DNSSEC is disabled by default due to compatibility problems, and if your DNS provider validates DNSSEC on their side like Google does, then enabling local validation is essentially overkill, just increasing latency.
Interaction with NetworkManager is redundant in this case, so disabling it prevents any possibility of DNS leaks and helps clarify otherwise ambiguous status output.