Is it possible
?
It is possible but useless. If you redirect any DNS queries towards port 53 on any IP address to the PiHole, the clients can still use DoH (DNS over HTTPS) to do their queries.
@sindy
Yeah, but not all of them know how to set it up.
I use these set of rules to block them but I know it won't work for DoH (I use it mostly to block cellphones DNS Failover).
add action=drop chain=forward comment=\
"BLOCK OTHER DNS SERVERS with bypass option" dst-address=!192.168.1.111 \
dst-address-list="!Bypass DNS blocking" port=53 protocol=tcp \
src-address-list="!Bypass DNS blocking"
add action=drop chain=forward dst-address=!192.168.1.111 dst-address-list=\
"!Bypass DNS blocking" port=53 protocol=udp src-address-list=\
"!Bypass DNS blocking"
add action=accept chain=forward comment="BLOCK OTHER DNS SERVERS with bypass opt\
ion (To make sure the above rules are tight and filtering (blocking) all the\
\_packets)" dst-address=1.1.1.1 port=53 protocol=udp src-address-list=\
"Bypass DNS blocking"
add action=accept chain=forward dst-address=1.0.0.1 port=53 protocol=udp \
src-address-list="Bypass DNS blocking"
add action=accept chain=forward dst-address-list="Bypass DNS blocking" port=53 \
protocol=udp src-address=1.1.1.1
add action=accept chain=forward dst-address-list="Bypass DNS blocking" port=53 \
protocol=udp src-address=1.0.0.1
add action=drop chain=forward dst-address-list="!Bypass DNS blocking" port=53 \
protocol=tcp src-address=!192.168.11.111
add action=drop chain=forward dst-address=!192.168.1.111 port=53 protocol=tcp \
src-address-list="!Bypass DNS blocking"
add action=drop chain=forward dst-address-list="!Bypass DNS blocking" port=53 \
protocol=udp src-address=!192.168.11.111
add action=drop chain=forward dst-address=!192.168.1.111 port=53 protocol=udp \
src-address-list="!Bypass DNS blocking"