http -> https

Frank Denis 2022-12-04 16:59:36 +01:00
parent a02ac63f48
commit 4ca3b5cec4
5 changed files with 18 additions and 18 deletions

@ -107,7 +107,7 @@ If all went well, $GOPATH/$GOOS-$GOARCH/dnscrypt-proxy should contain built dnsc
### Adding entitlements
Before the binary can be ran on your iOS device, it needs to be [signed](http://www.saurik.com/id/8).
Before the binary can be ran on your iOS device, it needs to be [signed](https://www.saurik.com/codesign.html).
The following steps assume that they are being performed on the iOS device itself as root.
1. Install ldid using Cydia or `apt-get`.
@ -115,7 +115,7 @@ The following steps assume that they are being performed on the iOS device itsel
2. Save the following (in UTF-8 as the first line points out) as ent.xml:
```
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "https://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>get-task-allow</key>
@ -171,4 +171,4 @@ chmod 644 /etc/dnscrypt-proxy/*
6. Finally, configure the DNS server for your Wi-Fi connection to be 127.0.0.1 inside the iDevice's settings.
If all went well, dnscrypt-proxy should start at boot (or when your semi-tethered jailbreak is activated if that's the case).
If all went well, dnscrypt-proxy should start at boot (or when your semi-tethered jailbreak is activated if that's the case).

@ -13,7 +13,7 @@ This is the official wiki for dnscrypt-proxy. Anybody can update its content and
If you have contributed, feel free to add your details below:
- [@acejacek](https://github.com/acejacek) — Jacek
- [@afonari](https://github.com/afonari) — [Alexandr Fons](http://afonari.com/)
- [@afonari](https://github.com/afonari) — [Alexandr Fons](https://afonari.com/)
- [@AmirHosseinKarimi](https://github.com/AmirHosseinKarimi) — [Amir Hossein Karimi](https://www.vira.studio/)
- [@B00ze64](https://github.com/B00ze64) — Sylvain
- [@balupton](https://balupton) — [Benjamin Lupton](https://balupton.com)
@ -21,7 +21,7 @@ If you have contributed, feel free to add your details below:
- [@chuacw](https://github.com/chuacw) — [Chee Wee Chua](https://chuacw.ath.cx/blogs/chuacw/default.aspx?r=1221)
- [@DaCoolX](https://github.com/DaCoolX)
- [@evilvibes](https://github.com/evilvibes) — [Andrew](https://evilvibes.com/)
- [@fahadshery](https://github.com/fahadshery) — [Fahad Usman](http://fahadusman.com/computer-network-security/recon/dns-tips-and-tricks/encrypting-dns-traffic/)
- [@fahadshery](https://github.com/fahadshery) — Fahad Usman
- [@JayBrown](https://github.com/JayBrown) — [Joss Brown](https://zbd.gg/lcars)
- [@jedisct1](https://github.com/jedisct1) — [Frank Denis](https://prettysimpleimages.com/)
- [@L8X](https://github.com/L8X) — Madilyn

@ -232,7 +232,7 @@ It just informs you that the `dnscrypt-proxy.plist` file has been added to macOS
**— DNSMasq**
See chapter 'Making things go fast - IPv6 blocking' for [DNSmasq](http://www.thekelleys.org.uk/dnsmasq/doc.html).
See chapter 'Making things go fast - IPv6 blocking' for [DNSmasq](https://www.thekelleys.org.uk/dnsmasq/doc.html).
### Control dnscrypt-proxy from the menu bar
@ -253,7 +253,7 @@ It is quite annoying, because at the same time macOS doesn't allow to set a spec
Fortunately, `mDNSResponder`'s DNS proxy can be disabled in its configuration file:
`/System/Library/LaunchDaemons/com.apple.mDNSResponder.plist`
As this file is in `/System`, changing it first requires to [disable SIP](http://apple.stackexchange.com/questions/208478/how-do-i-disable-system-integrity-protection-sip-aka-rootless-on-os-x-10-11).
As this file is in `/System`, changing it first requires to [disable SIP](https://apple.stackexchange.com/questions/208478/how-do-i-disable-system-integrity-protection-sip-aka-rootless-on-os-x-10-11).
Change

@ -2,22 +2,22 @@
## Enabling the Community Repository
dnscrypt-proxy is in the 'community' repository which needs to be enabled in `/etc/apk/respositories` by removing the comment `#` on the appropriate line e.g.
dnscrypt-proxy is in the 'community' repository which needs to be enabled in `/etc/apk/respositories` by removing the comment `#` on the appropriate line e.g.
```text
# main and community enabled, testing disabled on the 'edge' branch
http://alpine.mirror.wearetriple.com/edge/main
http://alpine.mirror.wearetriple.com/edge/community
#http://alpine.mirror.wearetriple.com/edge/testing
https://alpine.mirror.wearetriple.com/edge/main
https://alpine.mirror.wearetriple.com/edge/community
#https://alpine.mirror.wearetriple.com/edge/testing
```
If you're not running on 'edge' then you might see the version numbers instead
```text
# main and community enabled, testing disabled on the 'V3.9' branch
http://alpine.mirror.wearetriple.com/V3.9/main
http://alpine.mirror.wearetriple.com/V3.9/community
#http://alpine.mirror.wearetriple.com/V3.9/testing
https://alpine.mirror.wearetriple.com/V3.9/main
https://alpine.mirror.wearetriple.com/V3.9/community
#https://alpine.mirror.wearetriple.com/V3.9/testing
```
## Installation

@ -172,6 +172,8 @@ openwrt > dnscrypt-proxy -resolve google.com
```
`Resolver IP` should not belong to your ISP. You can verify whose network an IP address is on [IPtoASN](https://iptoasn.com).
This will also detect if the server supports DNSSEC, print its real IP address, and check if it returns fake responses for nonexistent domains.
#### Check that processes on the router use `dnsmasq`:
```sh
@ -191,8 +193,6 @@ You should make sure that any reported name or IP is **NOT** associated with the
If you see the ISP presence in the test results, something is wrong with the configuration, since it's bypassing your `dnscrypt-proxy` provider.
[DNSSEC resolver test](http://dnssec.vs.uni-due.de/) determines whether your DNS resolver validates DNSSEC signatures.
The following site can check if the resolver can connect to upstream servers using IPv6 IPv6 and does DNSSEC validation: https://en.internet.nl/connection/
You can also use this site to test both your IPV4 & IPV6 & DNSSEC settings: https://en.internet.nl/connection/
Cloudflare also has a great site for checking your configuration: https://www.cloudflare.com/ssl/encrypted-sni/
Cloudflare also has a web page to check that you're using their resolvers: https://www.cloudflare.com/ssl/encrypted-sni/