I've been testing to make sure someone can't get past my specified dns forwarder (opendns). I see that if I create a rule to block internet net, dns, any then all dns activity is blocked and the network dies. FYI I also have the rule automatically created by the installation wizard (internal net, dns, any) disabled. So I guess having that disabled is enough to make sure nobody is getting out on port 53 without an explicit drop rule.
Here's what's interesting. If I manually configure my connection to use some other dns server (other than opendns) I still get routed to opendns. So obviously the internal dns forwarder is grabbing any request on port 53 and redirecting it to where I want it to go. Do I understand that correctly? It's a cool feature.
Greg