DNS Privacy
Links
DNS Privacy Project homepage
DPRIVE
getdns
NLnet Labs
Sinodun
...
Section | |||||||
---|---|---|---|---|---|---|---|
|
...
|
...
Numbered Headings | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
DependanciesIn this mode, the only dependancy is OpenSSL. If this is installed in a non-standard location on your system use the --with-ssl option to configure below to specify where it is. Download the getdns source
Build the code
If you want to see detailed debug information as messages are processed then add the --enable-debug-stub option to the configure line above Run the daemonThe command below will run the daemon listening on port 53 of the loopback address and sending queries to the NLnet Labs test DNS Privacy server (at 185.49.141.38 and 2a04:b900:0:100::38) over TLS. It also specifies an idle timeout on the TLS connection of 10s with the '-e 10000' option. This test server does not support EDNS0 TCP Keepalive yet, so this timeout will always be used. IPv4 only
IPv4 and IPv6
Exit the daemon at any time by hitting CTRL-C. Strict vs Opportunistic The above command will run the daemon without trying to authenticate the TLS connection (a form of Opportunistic Privacy). If you have authentication information for the DNS Privacy server and you want to use Strict Privacy then you can specify this when starting the daemon in the following ways:
Test the daemonA quick test can be done by using dig to the loopback address
Modify your upstream resolversFor getdns to re-send outgoing DNS queries over TLS the recursive resolvers configured on your machine must be changed to send all the queries over the loopback interface. This depends on the operating system being run Linux/Unix systems
OS X
|
|
Other ways to run a privacy daemon are: