I am looking to setup a public DNS server and I found this DNS server

https://technitium.com/dns/

Does anyone know what the risks are of exposing the DNS port to the internet? How likely am I to get compromised? Is this a really bad idea?

    • ikidd@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      edit-2
      11 months ago

      From outside? Set up a Cloudflare account and point the NS from your registrar to it.

      From inside? Set up unbound on a docker host and don’t open it to the internet. Use that one when you’re local and the normal public DNS when you’re outside. But everything I’m seeing in here makes me sure you shouldn’t even consider opening ports in your firewall to expose inside host services. Use a VPN when you’re roaming, and only use your DNS for local servers/hosts via that VPN. The only use for your outside domain name should be to point a single hostname to your outside IP address so you can use it for your VPN endpoint.

      Use DNS challenges for LetsEncrypt cert requests and remove host entries from your Cloudflare after you get your cert.

    • 𝕽𝖔𝖔𝖙𝖎𝖊𝖘𝖙@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      11 months ago

      I use a DNS server on my local network, and then I also use Tailscale.

      I have my private DNS server configured in tailscale so whether on or off my local network everything uses my DNS server.

      This way I don’t have to change any DNS settings no matter where I am and all my domains work properly.

      And my phone always has DNS adblocking even on cell data or public Wi-Fi

      The other advantage is you can configure the reverse proxy of some services to only accept connections originating from your tailscale network to effectively make them only privately accessible or behave differently when accessed from specific devices