Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Request] Add in DNS encryption. #14

Open
cpu opened this issue Jul 23, 2017 · 6 comments
Open

[Request] Add in DNS encryption. #14

cpu opened this issue Jul 23, 2017 · 6 comments

Comments

@cpu
Copy link
Collaborator

cpu commented Jul 23, 2017

Suggested by @Rich700000000000 in StreisandEffect/streisand#272

First of all, this is an excellent project: We need more automatic tools like this. However, you're still missing one critical tool: DNS encryption.

Even if you're using TOR or a VPN, your DNS queries are still sent to the server in cleartext. And worse, it's usually google's dns server at 8:8:8:8. If we added in DNScrypt, using the server version they have available, that would go a long way towards eliminating a possible weak link.

@cpu
Copy link
Collaborator Author

cpu commented Jul 23, 2017

There's considerable follow-up discussion in StreisandEffect/streisand#272 that I don't want to copy/paste here but should be referred to by anyone interested in restarting this discussion.

@nickolasclarke
Copy link
Collaborator

#29 also seems to be related.

@jamesspi
Copy link

jamesspi commented Apr 2, 2018

Hey All,

Following up on this, we can probably put this together really easily using cloudflare's implementation of DNS over https using their "cloudflared" package and newly launched 1.1.1.1/1.0.0.1 DNS resolvers. I think we should replace DNSmasq with this as the default. This will also remove the need for the upstream DNS host variable. I've done some tests with a few servers of mine and it works flawlessly. No client changes necessary either.

Let me know you thoughts, I can work on the role replacement and submit a pull request.

James

@nickolasclarke
Copy link
Collaborator

I worry that the 1.1.1.1 DNS domains may get blocked by china, so I am not confident that this may be the best idea as the default implementation. many external DNS are blocked or highly intermittent here.

@jamesspi
Copy link

jamesspi commented Apr 3, 2018

The request will be https to cloudflare, not DNS. It’s a DNS proxy, so all DNS requests are made to localhost, and in turn sent to cloudflare over https. Cloudflare then make the dns request to their locally cached roots. This is why we would need to replace dnsmasq.

@nickolasclarke
Copy link
Collaborator

nickolasclarke commented Apr 3, 2018 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants