Skip to content

Latest commit

 

History

History
executable file
·
143 lines (103 loc) · 4.67 KB

FAQ.md

File metadata and controls

executable file
·
143 lines (103 loc) · 4.67 KB

DnscryptV1 (updated 2019-10-02 GMT +8)

dnscrypt-proxy --provider-key=5384:E814:4314:293E:56DD:1B14:0A1E:F172:AD47:BDBA:1799:C895:7294:953D:034E:B5C7
                 --resolver-address=108.61.201.119
                 --provider-name=2.dnscrypt-cert.blahdns.com

IP / DNS leak test

  1. bash.ws/dnsleak
  2. https://browserleaks.com/ip
  3. ipleak.org
  4. ipleak.com
curl -4 https://ifconfig.co
curl -6 https://ifconfig.co

Prevent DNS leaking from Chrome browser on Android phone

  1. Type chrome://flags
  2. search for keyword: async dns
  3. set value to DISABLED
  4. restart Chrome

Your image title

Troubleshoot

// DNS dnsentropy check
dig +short porttest.dns-oarc.net TXT
Answer: porttest.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net.
"159.69.198.101 is GREAT: 53 queries in 2.7 seconds from 53 ports with std dev 14045"

// Browser test: 
https://doh-de.blahdns.com/dns-query?name=example.net
https://doh-jp.blahdns.com/dns-query?name=example.net
https://doh2.blahdns.com/dns-query?ct=application/dns-json&name=google.de&type=A&edns_client_subnet=0.0.0.0/0
https://doh1.blahdns.com/dns-query?ct=application/dns-json&name=google.de&type=AAAA&edns_client_subnet=0.0.0.0/0

// curl with DoH 
curl -H 'content-type: application/dns-message' -vL -v 'https://doh-jp.blahdns.com/dns-query?dns=AAABAAABAAAAAAAAA3d3dwdleGFtcGxlA2NvbQAAAQAB' | hexdump -C

curl -H 'content-type: application/dns-message' -vL -v 'https://doh-de.blahdns.com/dns-query?dns=AAABAAABAAAAAAAAA3d3dwdleGFtcGxlA2NvbQAAAQAB' | hexdump -C

// Kdig on Ubuntu, Debian
apt install knot-dnsutils

// Kdig TLS with port 853, port 443 force include SNI (updated on August 1, 2019)

kdig @159.69.198.101 +tls example.com 
kdig @2a01:4f8:1c1c:6b4b::1 +tls example.com 

kdig @159.69.198.101 +tls -p 443 +tls-sni=dot-de.blahdns.com example.com 
kdig @2a01:4f8:1c1c:6b4b::1 +tls -p 443 +tls-sni=dot-de.blahdns.com example.com 

// TLS certificate validation 

kdig -d @159.69.198.101 -p 443 +tls-sni=dot-de.blahdns.com +tls-ca +tls-host=dot-de.blahdns.com example.com
kdig -d @2a0a:e5c0:2:2:0:c8ff:fe68:bf48 -p 443 +tls-sni=dot-de.blahdns.com +tls-ca +tls-host=dot-de.blahdns.com example.com

Mac OSX Mojave use Openssl TLS 1.3

brew upgrade
brew install openssl@1.1

// Put openssl tls 1.3 as first choice on zsh, paste it and restart terminal
echo 'export PATH="/usr/local/opt/openssl@1.1/bin:$PATH"' >> ~/.zshrc

// Debug DoH with TLS 1.3
openssl s_client -state -debug -msg -connect doh-jp.blahdns.com:443 -tls1_3

DNSSEC validation test

  1. https://www.dnssec.cz/
  2. https://wander.science/projects/dns/dnssec-resolver-test/

Use dig to test, this will return with header AD

dig blahdns.com +dnssec +multi

This will failed, should only return a SERVFAIL

dig www.dnssec-failed.org 

DNS alternative

Censored DNS

  1. https://doh.tiar.app/ (DoT, DoH, Dnscrypt, Singapore)
  2. https://doh.dnswarden.com/adblock (DoH, Germany)
  3. adblock-dot.dnswarden.com (DoT, Port: 443, 853, Germany)
  4. fdns1.dismail.de (DoT, Port: 853, Germany)
  5. https://dns.brahma.world/ (DoH, DoT, Plain, Port 853, India)

Uncensored DNS

  1. dns-tls.openbsd.se (DoT)
  2. dot1.appliedprivacy.net
  3. dns.neutopia.org (DoT)
  4. ns1.dnsprivacy.at, ns2.dnsprivacy.at (DoT, Dnscrypt, Port: 853)
  5. dns.cmrg.net (DoT, Canada, TCP port: 853 or 443 or 53053)
  6. unicast.censurfridns.dk (DoT, Denmark)
  7. doh.defaultroutes.de, https://doh.defaultroutes.de/dns-query (DoT, DoH, Port: 853, Germany)

Server Benchmark

  1. bench.sh
// Method 1 ** Recommend 
wget -qO- https://oooo.b-cdn.net/bench.sh | bash

// Method 2
wget -qO- https://cdn.statically.io/gh/teddysun/across/master/bench.sh | bash
  1. Unixbench
// Method 1 ** Recommend 
wget https://oooo.b-cdn.net/unixbench.sh
chmod +x unixbench.sh
./unixbench.sh

// Method 2 (If your server only has IPv6, use Method 1)
wget https://cdn.statically.io/gh/teddysun/across/master/unixbench.sh
chmod +x unixbench.sh
./unixbench.sh
  1. IPtables DNS DDOs attack: https://github.com/justvanbloom/dns-iptables-rules/blob/master/update_domain_blacklist.sh Vultr Cloudcompute vs High frequency -- gist