DNS Privacy Project

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 16 Next »

 

Servers supporting DNS-over-TLS

The following servers are configured to support TLS on port 853 for testing purposes.

Public Test resolver

  • Hosted by the getdns API implementation project at getdnsapi.net (Unbound 1.5.6)

  • Note the server does not yet support EDNS0 TCP Keepalive (RFC7828) or  concurrent processing or TCP queries (RFC7766)
Server typeHosted byIP addressesHostname for TLS authenticationSPKI pin for TLS authentication (RFC7858)
Public Test Resolvergetdnsapi.net

185.49.141.38

2a04:b900:0:100::38

getdnsapi.netfoxZRnIh9gZpWnl+zEiKa0EJ2rdCGroMWm02gaxSc9S=

 


How to Decode TLS packets in Wireshark

If you want to decode the DNS packets in Wireshark (use 1.12.1 or later) to get support TLSv1.2

  • Obtain the server key file

  • Configure the key in wireshark in Edit->Preferences

    • open the protocol list in the right hand menu and select SSL from the list
    • Click on the RSA keys list 'Edit' box and then click on 'New' in the dialog that appears
      • Enter remote servers IP address e.g.173.255.254.151 and the port for TLS (1021), and 'http' or 'spdy' for the protocal (DNS is not yet available here).
      • Use the Key File selector to choose the key file you downloaded
    • Save this by hitting OK, OK and Apply.
    • Back in the main window use the Analyze->Decode as... option to choose to decode as SSL
    • Click on one of the packets labelled 'Application data' and you should see an additional tab appear in the Packet bytes view window of wireshark labelled "Decrypted SSL data".

 

  • No labels