1
1
mirror of https://github.com/dnscrypt/dnscrypt-server-docker synced 2024-11-22 23:51:59 +01:00
dnscrypt-server-docker/README.md

84 lines
3.1 KiB
Markdown
Raw Normal View History

2015-07-06 01:39:54 +02:00
DNSCrypt server Docker image
============================
Run your own caching, non-censoring, non-logging, DNSSEC-capable,
[DNSCrypt](http://dnscrypt.org)-enabled DNS resolver virtually anywhere!
If you are already familiar with Docker, it shouldn't take more than 5 minutes
to get your resolver up and running.
Installation
============
Think about a name. This is going to be part of your DNSCrypt provider name.
If you are planning to make your resolver publicly accessible, this name will
be public.
It has to look like a domain name (`example.com`), but it doesn't have to be
2015-07-06 01:56:35 +02:00
a registered domain.
2015-07-06 01:39:54 +02:00
Let's pick `example.com` here.
2015-07-12 17:54:03 +02:00
Download, create and initialize the container, once and for all:
2015-07-06 01:39:54 +02:00
2015-07-06 01:51:16 +02:00
$ docker run --name=dnscrypt-server -p 443:443/udp -p 443:443/tcp \
2015-07-12 17:54:03 +02:00
jedisct1/unbound-dnscrypt-server init -N example.com
2015-07-06 01:39:54 +02:00
This will only accept connections via DNSCrypt. Containers on the same virtual
network can directly access the DNS cache on the standard DNS port (53), but
2015-07-06 01:57:42 +02:00
to create a regular, non-authenticated public DNS resolver, this extra port
has to be explicitly exposed (`-p 53:53/udp -p 53:53/tcp`).
2015-07-06 01:39:54 +02:00
Now, to start the whole stack:
$ docker start dnscrypt-server
Done.
To check that your DNSCrypt-enabled DNS resolver is accessible, run the
DNSCrypt client proxy on another host:
# dnscrypt-proxy \
--provider-key=<provider key, as displayed when the container was initialized> \
--resolver-address=<your resolver's public IP address> \
--provider-name=2.dnscrypt-cert.example.com
And try using `127.0.0.1` as a DNS resolver.
Note that the actual provider name for DNSCrypt is `2.dnscrypt-cert.example.com`,
not just `example.com` as initially entered. The full name has to start with
`2.dnscrypt-cert.` for the client and the server to use the same version of the
protocol.
Let the world know about your server
====================================
Is your brand new DNS resolver publicly accessible?
Fork the [dnscrypt-proxy repository](https://github.com/jedisct1/dnscrypt-proxy),
edit the [dnscrypt.csv](https://github.com/jedisct1/dnscrypt-proxy/blob/master/dnscrypt-resolvers.csv)
file to add your resolver's informations, and submit a pull request to have it
included in the list of public DNSCrypt resolvers!
Details
=======
- Caching resolver: [Unbound](https://www.unbound.net/), with DNSSEC, prefetching,
and no logs. The number of threads and memory usage are automatically adjusted.
Latest stable version, compiled from source.
- [LibreSSL](http://www.libressl.org/) - Latest stable version, compiled from source.
- [libsodium](https://download.libsodium.org/doc/) - Latest stable version,
minimal build compiled from source.
- [dnscrypt-wrapper](https://github.com/Cofyc/dnscrypt-wrapper) - Latest stable version,
compiled from source.
2015-07-06 01:47:58 +02:00
- [dnscrypt-proxy](https://github.com/jedisct1/dnscrypt-proxy) - Latest stable version,
2015-07-06 01:39:54 +02:00
compiled from source.
2015-07-06 01:47:58 +02:00
Keys and certificate are automatically rotated every 12 hour.
Coming up next
==============
- Namecoin support, by linking a distinct image with namecore and ncdns.
- Metrics
2015-07-06 01:49:37 +02:00
- Better isolation of the certificate signing process, in a dedicated container.