Skip to content

Instantly share code, notes, and snippets.

@M0r13n
Last active May 5, 2025 20:39
Show Gist options
  • Save M0r13n/4142018edb10f927cf4f19c6de31614c to your computer and use it in GitHub Desktop.
Save M0r13n/4142018edb10f927cf4f19c6de31614c to your computer and use it in GitHub Desktop.
Setup Cloudflare as a DoH (DNS over HTTPS) resolver on Mikrotik devices (RouterOS v7.0.2+)
# Temporarily add a normal upstream DNS resolver
/ip dns set servers=1.1.1.1,1.0.0.1
# CA certificates extracted from Mozilla
/tool fetch url=https://curl.se/ca/cacert.pem
# Import the downloaded ca-store (127 certificates)
/certificate import file-name=cacert.pem passphrase=""
# Set the DoH resolver to cloudflare
/ip dns set use-doh-server=https://1.1.1.1/dns-query verify-doh-cert=yes
# Remove the old upstream DNS resolvers
/ip dns set servers=""
# Delete the certificate file
/file remove cacert.pem
# OPTIONAL - Disable DDNS
/ip dhcp-client set use-peer-dns=no # Enter 0 as a number if it asks you
# If you are connection over LTE (for exmaple with a chateau)
/interface lte apn set use-peer-dns=no # Enter 0 as a number if it asks you
# Verify, that DynDNS is disabled
/ip dns print
@PablexXXXX
Copy link

Thanks, any idea how frequently the certs must be reinstalled?

@M0r13n
Copy link
Author

M0r13n commented May 3, 2025

@PablexXXXX The CA cert is most likely never going to change as it is the trust anchor for verifying other certificates. Therefore, the CA certificate is expected to remain the same for a long time. Many embedded devices can't even be easily updated. So I wouldn't worry

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment