2015-07-06 01:39:54 +02:00
|
|
|
DNSCrypt server Docker image
|
|
|
|
============================
|
|
|
|
|
|
|
|
Run your own caching, non-censoring, non-logging, DNSSEC-capable,
|
|
|
|
[DNSCrypt](http://dnscrypt.org)-enabled DNS resolver virtually anywhere!
|
|
|
|
|
|
|
|
If you are already familiar with Docker, it shouldn't take more than 5 minutes
|
|
|
|
to get your resolver up and running.
|
|
|
|
|
|
|
|
Installation
|
|
|
|
============
|
|
|
|
|
|
|
|
Think about a name. This is going to be part of your DNSCrypt provider name.
|
|
|
|
If you are planning to make your resolver publicly accessible, this name will
|
|
|
|
be public.
|
|
|
|
It has to look like a domain name (`example.com`), but it doesn't have to be
|
2015-07-06 01:56:35 +02:00
|
|
|
a registered domain.
|
2015-07-06 01:39:54 +02:00
|
|
|
|
|
|
|
Let's pick `example.com` here.
|
|
|
|
|
2015-07-12 17:54:03 +02:00
|
|
|
Download, create and initialize the container, once and for all:
|
2015-07-06 01:39:54 +02:00
|
|
|
|
2015-07-06 01:51:16 +02:00
|
|
|
$ docker run --name=dnscrypt-server -p 443:443/udp -p 443:443/tcp \
|
2015-07-12 17:54:03 +02:00
|
|
|
jedisct1/unbound-dnscrypt-server init -N example.com
|
2015-07-06 01:39:54 +02:00
|
|
|
|
|
|
|
This will only accept connections via DNSCrypt. Containers on the same virtual
|
|
|
|
network can directly access the DNS cache on the standard DNS port (53), but
|
2015-07-06 01:57:42 +02:00
|
|
|
to create a regular, non-authenticated public DNS resolver, this extra port
|
|
|
|
has to be explicitly exposed (`-p 53:53/udp -p 53:53/tcp`).
|
2015-07-06 01:39:54 +02:00
|
|
|
|
|
|
|
Now, to start the whole stack:
|
|
|
|
|
|
|
|
$ docker start dnscrypt-server
|
|
|
|
|
|
|
|
Done.
|
|
|
|
|
|
|
|
To check that your DNSCrypt-enabled DNS resolver is accessible, run the
|
|
|
|
DNSCrypt client proxy on another host:
|
|
|
|
|
|
|
|
# dnscrypt-proxy \
|
|
|
|
--provider-key=<provider key, as displayed when the container was initialized> \
|
|
|
|
--resolver-address=<your resolver's public IP address> \
|
|
|
|
--provider-name=2.dnscrypt-cert.example.com
|
|
|
|
|
|
|
|
And try using `127.0.0.1` as a DNS resolver.
|
|
|
|
|
|
|
|
Note that the actual provider name for DNSCrypt is `2.dnscrypt-cert.example.com`,
|
|
|
|
not just `example.com` as initially entered. The full name has to start with
|
|
|
|
`2.dnscrypt-cert.` for the client and the server to use the same version of the
|
|
|
|
protocol.
|
|
|
|
|
|
|
|
Let the world know about your server
|
|
|
|
====================================
|
|
|
|
|
|
|
|
Is your brand new DNS resolver publicly accessible?
|
|
|
|
|
|
|
|
Fork the [dnscrypt-proxy repository](https://github.com/jedisct1/dnscrypt-proxy),
|
|
|
|
edit the [dnscrypt.csv](https://github.com/jedisct1/dnscrypt-proxy/blob/master/dnscrypt-resolvers.csv)
|
|
|
|
file to add your resolver's informations, and submit a pull request to have it
|
|
|
|
included in the list of public DNSCrypt resolvers!
|
|
|
|
|
|
|
|
Details
|
|
|
|
=======
|
|
|
|
|
|
|
|
- Caching resolver: [Unbound](https://www.unbound.net/), with DNSSEC, prefetching,
|
|
|
|
and no logs. The number of threads and memory usage are automatically adjusted.
|
|
|
|
Latest stable version, compiled from source.
|
|
|
|
- [LibreSSL](http://www.libressl.org/) - Latest stable version, compiled from source.
|
|
|
|
- [libsodium](https://download.libsodium.org/doc/) - Latest stable version,
|
|
|
|
minimal build compiled from source.
|
|
|
|
- [dnscrypt-wrapper](https://github.com/Cofyc/dnscrypt-wrapper) - Latest stable version,
|
|
|
|
compiled from source.
|
2015-07-06 01:47:58 +02:00
|
|
|
- [dnscrypt-proxy](https://github.com/jedisct1/dnscrypt-proxy) - Latest stable version,
|
2015-07-06 01:39:54 +02:00
|
|
|
compiled from source.
|
2015-07-06 01:47:58 +02:00
|
|
|
|
|
|
|
Keys and certificate are automatically rotated every 12 hour.
|
|
|
|
|
|
|
|
Coming up next
|
|
|
|
==============
|
|
|
|
|
|
|
|
- Namecoin support, by linking a distinct image with namecore and ncdns.
|
|
|
|
- Metrics
|
2015-07-06 01:49:37 +02:00
|
|
|
- Better isolation of the certificate signing process, in a dedicated container.
|