Commit Graph

870 Commits

Author SHA1 Message Date
Frank Denis 5c86191e43 Use critibitgo 2018-04-07 16:59:10 +02:00
Frank Denis 58c7ff3d2f We may not have a schedule for every rule 2018-04-06 20:18:15 +02:00
Frank Denis 105cb2c525 Make the pattern-matching code reusable 2018-04-06 20:14:19 +02:00
Frank Denis 8217170a7b Revert "Do not consider SERVFAIL responses as server failures"
This reverts commit 0e65c50989.
2018-04-06 13:43:09 +02:00
Frank Denis 2d27eabf95 Revert "Add a -v flag"
This reverts commit d8c95aaca8.
2018-04-06 03:03:27 +02:00
Frank Denis d8c95aaca8 Add a -v flag
Fixes #317

But makes me grumpy, because -v usually means `verbose` to me.
2018-04-06 03:01:42 +02:00
Frank Denis 0e65c50989 Do not consider SERVFAIL responses as server failures 2018-04-06 02:47:58 +02:00
Frank Denis a938eeff7b Mainly revert 869d44c30e
Fixing #304 doesn't look trivial

The service module needs to know the arguments right away.

The arguments haven't been parsed yet. And if we do, we will prevent
further arguments to be added to the set. Including the ones added
by the service module itself.

So, we have quite of a circular dependency here.

If someone with some Go knowledge can fix that, that would be amazing.
But it's probably never going to happen.

Meanwhile, we can try to save the current directory and document
that we have to be in that directory when running the install command.

Which is not going to work on Windows, so this is a big fucking mess
2018-04-03 20:15:33 +02:00
Frank Denis c88e480a15 Include the -config option in the installed service
Untested on Linux and Windows. Fear.

Fixes #304
2018-04-03 19:42:27 +02:00
Frank Denis 869d44c30e Reorder 2018-04-03 17:59:15 +02:00
Frank Denis f0a690701d Print "additional certificate" when a server has multiple valid certs
This doesn't mean anything but looks less confusing than having the
same message twice

Fixes #303
2018-04-02 20:55:42 +02:00
Frank Denis d4367393c4 Add some links 2018-04-02 01:55:22 +02:00
Frank Denis 308ffff739 Make the keepalive configurable
Fixes #300
2018-04-02 01:49:09 +02:00
Frank Denis b71e04c64e Update miekg/dns to v1.0.5 2018-04-02 00:10:55 +02:00
Frank Denis e210fc537e Ignore the Cache-Control: max-age header
What's in the DNS packet is a better source of truth.

There was also an inconsistency between the TTL from the
max-age header (as returned in a response that wasn't cached) and
a response from the cache (using TTLs from the DNS packet).

So, just use what's in the packet.

Reported by @vavrusam, thanks!
2018-04-01 21:41:36 +02:00
Frank Denis 2dedd3a314 em dash 2018-04-01 17:19:39 +02:00
Frank Denis 2147a3a95f Make this less confusing 2018-04-01 17:19:03 +02:00
Frank Denis f3e3ff01c8 Nits 2018-04-01 17:14:44 +02:00
Frank Denis 22da6ca8da Add some links 2018-04-01 17:13:53 +02:00
Frank Denis adb0c94a61 April 1st is already over in some time zones :)
This reverts commit dac52ab42a.
2018-04-01 16:35:32 +02:00
Frank Denis dac52ab42a Completely remove support for the DNSCrypt protocol 2018-04-01 04:04:12 +02:00
Frank Denis 2dcf5fe01a Skip the signature in the example Google stamp
Example configuration files are updated less often than sources
2018-04-01 03:50:10 +02:00
Frank Denis d812a9bdc3 Revert to 9.9.9.9 as the example fallback resolver
Just in case some networks do stupid things with 1.1.1.1 already.
2018-03-30 22:24:19 +02:00
Frank Denis a2160189af Welcome to 1.1.1.1 2018-03-30 21:30:06 +02:00
Frank Denis be84399ffc Do not assume that the kernel supports IPv6 2018-03-29 16:30:35 +02:00
Frank Denis 5cc4663081 Bump 2018-03-29 11:22:20 +02:00
Frank Denis c3280a030c Update ChangeLog 2018-03-28 14:46:20 +02:00
Frank Denis ede564ccf7 Support multiple URLs for a given source
Fixes #265
2018-03-28 13:36:19 +02:00
Frank Denis 7ed4ce17d7 Move things down for clarity 2018-03-28 13:00:06 +02:00
Frank Denis 1ca7597c7f string(<int>) doesn't do what you may expect :) 2018-03-28 12:38:17 +02:00
Frank Denis e09f0875c1 Add the list of addresses to the -list -json output 2018-03-28 12:22:37 +02:00
Frank Denis 8bedb4b01e Add some helpers 2018-03-28 12:08:05 +02:00
Frank Denis 7f221afeff Don't assume that DoH servers use port 443 2018-03-28 11:52:04 +02:00
Frank Denis 0983a86b40 Mention that log_files_max_backups = 0 means "keep all backups"
Fixes #268
2018-03-28 00:14:07 +02:00
Frank Denis 84593c1341 Add liveinternet.ru to the whitelist 2018-03-27 00:22:13 +02:00
David Runge fa2c95084e Adding DynamicUser to systemd service file, enhancing socket and service (#261)
* Adding nss-lookup.target to the socket Before and Wants directive. Adding current upstream wiki as documentation to service and socket file.
Adding DynamicUser=yes to the service file, alongside various hardening settings (Protect{ControlGroups,KernelModules}. Allowing the service to bind to ports below 1024 by setting CAP_NET_BIND_SERVICE. Adding {Cache,Logs,Runtime}Directory for dnscrypt-proxy. Removing (default) Type=simple. Adding a more default ExecStart location and usage of configuration.

* systemd/dnscrypt-proxy.socket: Adding back ipv6 functionality.

* systemd/dnscrypt-proxy.service: Updating Description to match project name.
Explicitely setting ProtectHome=yes. Adding information on the DynamicUser settings.

* systemd/dnscrypt-proxy.socket: Updating description to match project name.

* systemd/dnscrypt-proxy.service: Adding Requires= and Also= for dnscrypt-proxy.socket in favor of CAP_NET_BIND_SERVICE capabilities.

* dnscrypt-proxy/example-dnscrypt-proxy.toml: Clarifying how to set listen_addresses, when using systemd socket activation.
2018-03-26 20:48:22 +02:00
Frank Denis 3e4b7671d1 Patch service_upstart 2018-03-26 20:46:51 +02:00
Frank Denis 10f0503d50 Update deps; especially for chacha20 2018-03-26 20:46:25 +02:00
Frank Denis 9224e79c59 Add NoTracking's list to the example blacklist configuration
Implement dnsmasq-style filters by the way
2018-03-26 20:43:42 +02:00
Frank Denis 6bca9eb795 malwaredomainslist seems to be hard to reach over HTTPS 2018-03-26 20:37:22 +02:00
Frank Denis 9643a311c8 Just build freebsd-arm to be consistent with other builds 2018-03-25 11:29:49 +02:00
Frank Denis 6283dfc0db + freebsd-armv7 2018-03-25 11:26:25 +02:00
Benjamin Dos Santos 37b4234b18 chore: build freebsd armv7 binary (#252) 2018-03-25 11:25:58 +02:00
FedericoYundt bdc32cee90 Add optional hardening to systemd service (#259) 2018-03-24 19:06:40 +01:00
FedericoYundt f2ab65aab7 dnscrypt-proxy.socket: update [Unit] dependencies to match those from service (#260) 2018-03-24 19:05:01 +01:00
Dhoulmagus a95c7b729b Let default systemd socket listen on both IPv4 and IPv6 (#257)
* Let default systemd socket listen on both IPv4 and IPv6

Setting listen_addresses = [] in config will listen on systemd socket, but by previous systemd socket config it would only listen on IPv4 127.0.0.1:53 without IPv6. This change fixes it.

* Update dnscrypt-proxy.socket
2018-03-24 15:01:27 +01:00
Frank Denis 0026a20e08 Mention that people in China may need to use Quad114 2018-03-22 07:44:06 +01:00
Frank Denis 2568ea0b0c Revert "Switch to Quad114 as the default resolver"
This reverts commit 91f97833a3.

The Internet has become a sad place.

People in China need to use resolvers in China.
People in the US would not trust resolvers in China.
People in the EU would not trust resolvers in the US.

Revert to Quad9 for now, and add some documentation about why
that might be changed (especially in China) later.
2018-03-22 02:43:03 +01:00
Frank Denis 2eac8d52d5 Revert the cache clear
Implementing this is going to be more complicated
2018-03-21 10:17:13 +01:00
Frank Denis 3c05b38edd Move local resolution to a dedicated function 2018-03-21 10:03:05 +01:00