Skip to content

Docker DNS server on steroids to access DNS-over-TLS from Cloudflare, Google, Quad9, Quadrant or CleanBrowsing

License

Notifications You must be signed in to change notification settings

andydukes/cloudflare-dns-server

 
 

Repository files navigation

Cloudflare DNS over TLS Docker container

DNS caching server connected to DNS over TLS (IPv4) servers with DNSSEC, DNS rebinding protection, built-in Docker healthcheck and malicious IPs + hostnames blocking

Cloudflare DNS over TLS Docker

Docker Build Status

GitHub last commit GitHub commit activity GitHub issues

Docker Pulls Docker Stars Docker Automated

Image size Image version

Donate PayPal

Image size RAM usage CPU usage
26.9MB 13.2MB to 70MB Low

It can be connected to one of all the DNS-over-TLS providers:

  • Google
  • Quad9
  • Quadrant
  • CleanBrowsing
Click to show base components

It also uses DNS rebinding protection and DNSSEC Validation:

DNSSEC Validation

You can also block additional domains of your choice, amongst other things, see the Extra section

Diagrams are shown for router and client-by-client configurations in the Connect clients to it section.

Testing it

  1. CLICK IF YOU HAVE AN ARM DEVICE

    • If you have a ARM 32 bit v6 architecture

      docker build -t qmcgaw/cloudflare-dns-server \
      --build-arg BASE_IMAGE=arm32v6/alpine \
      https://github.com/qdm12/cloudflare-dns-server.git
    • If you have a ARM 32 bit v7 architecture

      docker build -t qmcgaw/cloudflare-dns-server \
      --build-arg BASE_IMAGE=arm32v7/alpine \
      https://github.com/qdm12/cloudflare-dns-server.git
    • If you have a ARM 64 bit v8 architecture

      docker build -t qmcgaw/cloudflare-dns-server \
      --build-arg BASE_IMAGE=arm64v8/alpine \
      https://github.com/qdm12/cloudflare-dns-server.git

  2. Run the container

    docker run -it --rm -p 53:53/udp -e VERBOSITY=3 -e VERBOSITY_DETAILS=3 qmcgaw/cloudflare-dns-server

    More environment variables are described in the environment variables section.

  3. Check the log output

    docker logs cloudflare-dns-server
  4. See the Connect clients to it section to finish testing, and you can refer to the Verify DNS connection section if you want.

Run it as a daemon

docker run -d -p 53:53/udp qmcgaw/cloudflare-dns-server

or use docker-compose.yml with:

docker-compose up -d

More environment variables are described in the environment variables section.

Environment variables

Environment variable Default Description
VERBOSITY 1 From 0 (no log) to 5 (full debug log)
VERBOSITY_DETAILS 0 From 0 to 4 and defaults to 0 (higher means more details)
BLOCK_MALICIOUS on on or off. It blocks malicious IP addresses and malicious hostnames from being resolved. Note that it consumes about 50MB of additional RAM.
BLOCK_NSA off on or off. It blocks NSA hostnames from being resolved.
UNBLOCK comma separated list of hostnames to leave unblocked
LISTENINGPORT 53 UDP port on which the Unbound DNS server should listen to (internally)
PROVIDER cloudflare DNS-over-TLS provider. It can be: google, quad9, quadrant, cleanbrowsing

Connect clients to it

Option 1: Router (recommended)

Block the UDP 53 outgoing port on your router firewall so that all DNS traffic must go through this container.

All machines connected to your router will use the 1.1.1.1 encrypted DNS by default

Configure your router to use the LAN IP address of your Docker host as its primary DNS address.

  • Access your router page, usually at http://192.168.1.1 and login with your credentials
  • Change the DNS settings, which are usually located in Connection settings / Advanced / DNS server
  • If a secondary fallback DNS address is required, use a dull ip address such as the router's IP 192.168.1.1 to force traffic to only go through this container

Option 2: Client, one by one

You have to configure each machine connected to your router to use the Docker host as their DNS server.

Docker containers

Connect other Docker containers by specifying the DNS to be the host IP address 127.0.0.1:

docker run -it --rm --dns=127.0.0.1 alpine

For docker-compose.yml:

version: '3'
services:
  test:
    image: alpine:3.10
    network_mode: bridge
    dns:
      - 127.0.0.1

If the containers are in the same virtual network, you can simply set the dns to the LAN IP address of the DNS container (i.e. 10.0.0.5)

Windows

  1. Open the control panel and follow the instructions shown on the screenshots below.

Enter the IP Address of your Docker host as the Preferred DNS server (192.168.1.210 in my case) You can set the Cloudflare DNS server address 1.1.1.1 as an alternate DNS server although you might want to leave this blank so that no domain name request is in plaintext.

When closing, Windows should try to identify any potential problems. If everything is fine, you should see the following message:

Mac OS

Follow the instructions at https://support.apple.com/kb/PH25577

Linux

You probably know how to do that. Otherwise you can usually modify the first line of /etc/resolv.conf by changing the IP address of your DNS server.

Android

See this

iOS

See this

Extra

Block domains of your choice

  1. Create a file on your host include.conf

  2. Write the following to the file to block youtube.com for example:

    local-zone: "youtube.com" static
  3. Change the ownership and permissions of include.conf:

    chown 1000:1000 include.conf
    chmod 400 include.conf
  4. Launch the Docker container with:

    docker run -it --rm -p 53:53/udp -v $(pwd)/include.conf:/etc/unbound/include.conf  qmcgaw/cloudflare-dns-server

Build the image yourself

docker build -t qmcgaw/cloudflare-dns-server https://github.com/qdm12/cloudflare-dns-server.git

Firewall considerations

This container requires the following connections:

  • UDP 53 Inbound (only if used externally)
  • TCP 853 Outbound to 1.1.1.1 and 1.0.0.1

Verify DNS connection

  1. Verify that you use Cloudflare DNS servers: https://www.dnsleaktest.com with the Standard or Extended test
  2. Verify that DNS SEC is enabled: https://en.internet.nl/connection

Note that https://1.1.1.1/help does not work as the container is not a client to Cloudflare servers but a forwarder intermediary. Hence https://1.1.1.1/help does not detect a direct connection to them.

TO DOs

  • Build Unbound binary at image build stage

About

Docker DNS server on steroids to access DNS-over-TLS from Cloudflare, Google, Quad9, Quadrant or CleanBrowsing

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 59.6%
  • Dockerfile 40.4%