Neu auf dem B1 Blog: Verschlüsseltes DNS selber machen - Teil 2️⃣
Jens Meißner zeigt heute, wie der knot-resolver als DoH- und DoT-Server eingerichtet werden kann: https://blog.b1-systems.de/verschlusseltes-dns-selber-machen-teil-2
#DoT #DoH #knotresolver #Debian #Bullseye
#dot #DoH #knotresolver #debian #bullseye
Opened a bug report against #knotresolver #kresd because it fails to resolve planet.gnome.org when forwarding because of #DNSSEC #DNS #GNOME
#knotresolver #kresd #dnssec #dns #gnome
@yojimbo That's what's configured.
There's also a specific request to not cache results for the domains in question.
-- Forward archive.is/archive.fo queries as Cloudflare breaks these.
-- Sun Jun 2 00:43:35 CDT 2019
extraTrees = policy.todnames({'archive.is', 'archive.ph', 'archive.vn', 'archive.fo', 'archive.li', 'archive.md', 'archive.today' })
policy.add(policy.suffix(policy.FLAGS({'NO_CACHE'}), extraTrees))
policy.add(
policy.suffix(
policy.STUB('192.168.0.1'), {
-- policy.STUB('8.8.8.8'), {
todname('archive.is'),
todname('archive.ph'),
todname('archive.vn'),
todname('archive.fo'),
todname('archive.li'),
todname('archive.md'),
todname('archive.today')
}
)
)
I'm restarting kresd to test (should clear caches), as well as the upstream. And restarting Android networking (clears Android's own DNS cache).
Still naada.
#kresd #knotresolver #dns #networking
#DearMastomind I am trying to grok kresd, the Knot Resolver (used on the Turris Omnia) ... and ... am encoutering impenetrable documentation.
If there's anyone famiar with it, my current goals:
https://knot-resolver.readthedocs.io/en/stable/config-overview.html
My other option is to redo my DNS configuration using DNSMasq. Which quite frankly is probably preferable as its documentation and configuration are much more sane.
#kresd #KnotResolver #Turris #Omnia #TurrisOmnia #OpenWRT #DNS #dnsmasq
#dearMastomind #kresd #knotresolver #turris #omnia #turrisomnia #openwrt #dns #dnsmasq