1
0
mirror of https://github.com/DNSCrypt/dnscrypt-proxy.git synced 2024-12-11 22:35:40 +01:00
Commit Graph

917 Commits

Author SHA1 Message Date
Frank Denis
8217170a7b Revert "Do not consider SERVFAIL responses as server failures"
This reverts commit 0e65c50989.
2018-04-06 13:43:09 +02:00
Frank Denis
2d27eabf95 Revert "Add a -v flag"
This reverts commit d8c95aaca8.
2018-04-06 03:03:27 +02:00
Frank Denis
d8c95aaca8 Add a -v flag
Fixes #317

But makes me grumpy, because -v usually means `verbose` to me.
2018-04-06 03:01:42 +02:00
Frank Denis
0e65c50989 Do not consider SERVFAIL responses as server failures 2018-04-06 02:47:58 +02:00
Frank Denis
a938eeff7b Mainly revert 869d44c30e
Fixing #304 doesn't look trivial

The service module needs to know the arguments right away.

The arguments haven't been parsed yet. And if we do, we will prevent
further arguments to be added to the set. Including the ones added
by the service module itself.

So, we have quite of a circular dependency here.

If someone with some Go knowledge can fix that, that would be amazing.
But it's probably never going to happen.

Meanwhile, we can try to save the current directory and document
that we have to be in that directory when running the install command.

Which is not going to work on Windows, so this is a big fucking mess
2018-04-03 20:15:33 +02:00
Frank Denis
c88e480a15 Include the -config option in the installed service
Untested on Linux and Windows. Fear.

Fixes #304
2018-04-03 19:42:27 +02:00
Frank Denis
869d44c30e Reorder 2018-04-03 17:59:15 +02:00
Frank Denis
f0a690701d Print "additional certificate" when a server has multiple valid certs
This doesn't mean anything but looks less confusing than having the
same message twice

Fixes #303
2018-04-02 20:55:42 +02:00
Frank Denis
d4367393c4 Add some links 2018-04-02 01:55:22 +02:00
Frank Denis
308ffff739 Make the keepalive configurable
Fixes #300
2018-04-02 01:49:09 +02:00
Frank Denis
b71e04c64e Update miekg/dns to v1.0.5 2018-04-02 00:10:55 +02:00
Frank Denis
e210fc537e Ignore the Cache-Control: max-age header
What's in the DNS packet is a better source of truth.

There was also an inconsistency between the TTL from the
max-age header (as returned in a response that wasn't cached) and
a response from the cache (using TTLs from the DNS packet).

So, just use what's in the packet.

Reported by @vavrusam, thanks!
2018-04-01 21:41:36 +02:00
Frank Denis
2dedd3a314 em dash 2018-04-01 17:19:39 +02:00
Frank Denis
2147a3a95f Make this less confusing 2018-04-01 17:19:03 +02:00
Frank Denis
f3e3ff01c8 Nits 2018-04-01 17:14:44 +02:00
Frank Denis
22da6ca8da Add some links 2018-04-01 17:13:53 +02:00
Frank Denis
adb0c94a61 April 1st is already over in some time zones :)
This reverts commit dac52ab42a.
2018-04-01 16:35:32 +02:00
Frank Denis
dac52ab42a Completely remove support for the DNSCrypt protocol 2018-04-01 04:04:12 +02:00
Frank Denis
2dcf5fe01a Skip the signature in the example Google stamp
Example configuration files are updated less often than sources
2018-04-01 03:50:10 +02:00
Frank Denis
d812a9bdc3 Revert to 9.9.9.9 as the example fallback resolver
Just in case some networks do stupid things with 1.1.1.1 already.
2018-03-30 22:24:19 +02:00
Frank Denis
a2160189af Welcome to 1.1.1.1 2018-03-30 21:30:06 +02:00
Frank Denis
be84399ffc Do not assume that the kernel supports IPv6 2018-03-29 16:30:35 +02:00
Frank Denis
5cc4663081 Bump 2018-03-29 11:22:20 +02:00
Frank Denis
c3280a030c Update ChangeLog 2018-03-28 14:46:20 +02:00
Frank Denis
ede564ccf7 Support multiple URLs for a given source
Fixes #265
2018-03-28 13:36:19 +02:00
Frank Denis
7ed4ce17d7 Move things down for clarity 2018-03-28 13:00:06 +02:00
Frank Denis
1ca7597c7f string(<int>) doesn't do what you may expect :) 2018-03-28 12:38:17 +02:00
Frank Denis
e09f0875c1 Add the list of addresses to the -list -json output 2018-03-28 12:22:37 +02:00
Frank Denis
8bedb4b01e Add some helpers 2018-03-28 12:08:05 +02:00
Frank Denis
7f221afeff Don't assume that DoH servers use port 443 2018-03-28 11:52:04 +02:00
Frank Denis
0983a86b40 Mention that log_files_max_backups = 0 means "keep all backups"
Fixes #268
2018-03-28 00:14:07 +02:00
Frank Denis
84593c1341 Add liveinternet.ru to the whitelist 2018-03-27 00:22:13 +02:00
David Runge
fa2c95084e Adding DynamicUser to systemd service file, enhancing socket and service (#261)
* Adding nss-lookup.target to the socket Before and Wants directive. Adding current upstream wiki as documentation to service and socket file.
Adding DynamicUser=yes to the service file, alongside various hardening settings (Protect{ControlGroups,KernelModules}. Allowing the service to bind to ports below 1024 by setting CAP_NET_BIND_SERVICE. Adding {Cache,Logs,Runtime}Directory for dnscrypt-proxy. Removing (default) Type=simple. Adding a more default ExecStart location and usage of configuration.

* systemd/dnscrypt-proxy.socket: Adding back ipv6 functionality.

* systemd/dnscrypt-proxy.service: Updating Description to match project name.
Explicitely setting ProtectHome=yes. Adding information on the DynamicUser settings.

* systemd/dnscrypt-proxy.socket: Updating description to match project name.

* systemd/dnscrypt-proxy.service: Adding Requires= and Also= for dnscrypt-proxy.socket in favor of CAP_NET_BIND_SERVICE capabilities.

* dnscrypt-proxy/example-dnscrypt-proxy.toml: Clarifying how to set listen_addresses, when using systemd socket activation.
2018-03-26 20:48:22 +02:00
Frank Denis
3e4b7671d1 Patch service_upstart 2018-03-26 20:46:51 +02:00
Frank Denis
10f0503d50 Update deps; especially for chacha20 2018-03-26 20:46:25 +02:00
Frank Denis
9224e79c59 Add NoTracking's list to the example blacklist configuration
Implement dnsmasq-style filters by the way
2018-03-26 20:43:42 +02:00
Frank Denis
6bca9eb795 malwaredomainslist seems to be hard to reach over HTTPS 2018-03-26 20:37:22 +02:00
Frank Denis
9643a311c8 Just build freebsd-arm to be consistent with other builds 2018-03-25 11:29:49 +02:00
Frank Denis
6283dfc0db + freebsd-armv7 2018-03-25 11:26:25 +02:00
Benjamin Dos Santos
37b4234b18 chore: build freebsd armv7 binary (#252) 2018-03-25 11:25:58 +02:00
FedericoYundt
bdc32cee90 Add optional hardening to systemd service (#259) 2018-03-24 19:06:40 +01:00
FedericoYundt
f2ab65aab7 dnscrypt-proxy.socket: update [Unit] dependencies to match those from service (#260) 2018-03-24 19:05:01 +01:00
Dhoulmagus
a95c7b729b Let default systemd socket listen on both IPv4 and IPv6 (#257)
* Let default systemd socket listen on both IPv4 and IPv6

Setting listen_addresses = [] in config will listen on systemd socket, but by previous systemd socket config it would only listen on IPv4 127.0.0.1:53 without IPv6. This change fixes it.

* Update dnscrypt-proxy.socket
2018-03-24 15:01:27 +01:00
Frank Denis
0026a20e08 Mention that people in China may need to use Quad114 2018-03-22 07:44:06 +01:00
Frank Denis
2568ea0b0c Revert "Switch to Quad114 as the default resolver"
This reverts commit 91f97833a3.

The Internet has become a sad place.

People in China need to use resolvers in China.
People in the US would not trust resolvers in China.
People in the EU would not trust resolvers in the US.

Revert to Quad9 for now, and add some documentation about why
that might be changed (especially in China) later.
2018-03-22 02:43:03 +01:00
Frank Denis
2eac8d52d5 Revert the cache clear
Implementing this is going to be more complicated
2018-03-21 10:17:13 +01:00
Frank Denis
3c05b38edd Move local resolution to a dedicated function 2018-03-21 10:03:05 +01:00
Frank Denis
d2805a19e4 DoH: only use the optional IP to bootstrap resolution
Fixes #100
2018-03-21 09:32:35 +01:00
Frank Denis
577ac5c91a When using a fallback resolver, favor IPv6 for DoH servers if use_ipv6 is set
Fixes #153
2018-03-21 09:05:30 +01:00
Frank Denis
22f69a475a Don't assume IPv6 or IPv4 about DoH servers 2018-03-21 08:48:57 +01:00