Commit Graph

1320 Commits

Author SHA1 Message Date
Frank Denis d8f8d561c8 Synthesize a truncated response if the response wouldn't fit the local MSS 2018-01-10 02:52:09 +01:00
Frank Denis ab9006e74c Be more tolerant with invalid/unsupported certificates 2018-01-10 00:38:37 +01:00
Frank Denis 3049f43bc7 Nits 2018-01-10 00:32:16 +01:00
Frank Denis 72a6963f2e Cleanups 2018-01-10 00:31:12 +01:00
Frank Denis 35ec5bd044 We can now receive queries on UDP and forward them on TCP
Something that had never been possible with the old implementation
2018-01-09 20:10:06 +01:00
Frank Denis 1a59d93192 Support TCP connection to the backend 2018-01-09 19:47:24 +01:00
Frank Denis 888db6a8fb The preferred protocol will be a global (for Tor users) 2018-01-09 18:42:24 +01:00
Frank Denis ce5e0c8031 Try to retrieve the certificates using UDP before TCP 2018-01-09 18:37:37 +01:00
Frank Denis 841bf65d61 Reorganize 2018-01-09 18:32:14 +01:00
Frank Denis 00a6b64575 Stamps are not expected to include a name 2018-01-09 18:27:04 +01:00
Frank Denis 4dc3fee9a0 Refresh certificates
We may later want to register a stamp even if no certificate was found
2018-01-09 17:34:19 +01:00
Frank Denis 7279699210 Pick random upstream servers; we'll do better later 2018-01-09 17:19:03 +01:00
Frank Denis 805c8a822f Store upstream names, prepare for dnscrypt v3 stamps 2018-01-09 17:15:07 +01:00
Frank Denis 721313a603 We want to support multiple servers simultaneously
Prepare for that
2018-01-09 16:59:06 +01:00
Frank Denis 553f6afb00 Handle TCP, padding, etc. 2018-01-09 16:40:37 +01:00
Frank Denis 6a39b0afdb Move a few things around 2018-01-09 13:35:10 +01:00
Frank Denis 60a58067c1 Desuglify a bit 2018-01-09 13:27:28 +01:00
Frank Denis 9ffa61c9e3 megacheck 2018-01-09 08:15:58 +01:00
Frank Denis b076e01f7a Let's start with a 15 minutes ugly PoC hack before going to bed
Who said the DNSCrypt protocol was "complex"?
2018-01-09 00:46:13 +01:00
Frank Denis 9653ab395c
Initial commit 2018-01-09 00:21:21 +01:00