I have a question about ip addresses when resolving dns
queries locally. If you resolve DNS queries locally using
pi-hole and unbound and query a dns leak test domain, it shows the public ip address of the ISP. Does this leak the ip address to the website you are making the query to? Or would it leak to your ISP or the website's ISP or an caching server like Cloudflare? Also, if you use unbound to resolve queries locally, what gets used as a root nameserver or authoritative nameserver? Just want to make sure the ip address is not unintentionally leaking. Would it be different if it were being resolved from a public resolver like cloudflare or quad9?
So by "stock" do you mean not redirecting to unbound locally or using something like cloudflare or quad9. What's the best way to resolve without showing ip address
Doesn't really matter if you show IP addresses when your IP address will be attached to every single packet that leaves your computer on the way to the website you visit. (Every single router hop in between knows your IP and the IP you are trying to visit.)
Im referring to the DNS query. The DNS query is a UDP packet but if you use unbound as a recursive resolver, it shows the ip address of the ISP which is not great for privacy. If you set it up in forward mode, it will forward the request to another recursive resolver, which will handle the query and it's ip address is displayed as the dns provider. There is a difference there because unbound acting recursively shows the ip of your ISP to the webserver. In forwarding mode it's the ip of the upstream recursive resolver.
Both. However you obtain an IP (whether by unencrypted DNS, encrypted DNS, or having it in a hosts file), you ask the ISP in clear text to connect you to that IP. The IP is not encrypted even if you are connecting to a website via https.
For a DNS query to an upstream resolver, they know the IP to return the answer to.