Replies: 75 comments
-
@T145 this article promote issues about what can take place in most DNS companies. Do you think google, quad9 etc do not see your data in some technical way because they said so ? and cloudflare does not cause of this article ? also that article explains server side issues cause of countries which can happen on other DNS companies with fewer servers around the world.. and the other things it points out like servers downtime, blocks ban reviews, hCaptcha, poor internet connectivity from accessing the websites behind it etc, you will find one or all of these issues in some other DNS companies just no one wrote about it. These problems might affect some users I do not see to stop promoting when it works fast and stable for millions of users. This repo is not about the best DNS security providers but a good security setup. I will add to the guide other DoH providers. Because at some point down the line what ever DNS service I choose as in main setup other can find issues, so i just keep adding options .. I will remove stuff when its deprecated or it has really gone bad when i see pages of negativity on the web thanks for this btw T145/white-bear |
Beta Was this translation helpful? Give feedback.
-
@T145 honestly for a while i wanted to change title and logo so i would not look like im promoting one thing |
Beta Was this translation helpful? Give feedback.
-
You're right that it suffers from what's inherent to all DNS providers, however it's precisely why this project is meant to be "a good security setup" that Cloudflare services shouldn't be used. Cloudflare decrypts secured web traffic when it arrives, then re-encrypts it and sends it through. This functionally makes it a massive "Man-in-the-middle" attack, and is therefore an inherent security and privacy risk. If you kept reading you'd see information about "Cloudbleeds" and how Cloudflare's HTTPS can never inherently be end-to-end. The reason I'd not promote a service like Google is that they're only secure, and do not promote privacy. Quad9 is the largest I've known of that promotes both security and privacy. |
Beta Was this translation helpful? Give feedback.
-
Well I think that the self hosting proxy like DNScrypt and cloudflared tunnel should solve this issue and also for Cloudbleeds "Cloudflare customers was leaked to all other Cloudflare customers that had access to server memory"(i'm not to sure but i think a own proxy should keep you out of this problem.. But i get it, these kind of things is bad for business I will try and fix up repo to suite and have a wiki explaining the popular dns providers advantages and disadvantages, and users reviews. This can take a while .. any help would be appreciated.. links, post, forums etc @jo20201 if you have time can you help build wiki about the informations dns (google/quad9/opendns) providers from what ever you can find and put it together. |
Beta Was this translation helpful? Give feedback.
-
just share what you find or put everything in a text file and will sort out when making wiki |
Beta Was this translation helpful? Give feedback.
-
keep them coming |
Beta Was this translation helpful? Give feedback.
-
"Tor users and VPN users are also a victim of Cloudflare. Both solutions are being used by many people who cannot afford uncensored internet due to their country/corporation/network policy or who wants to add an extra layer to protect their privacy. Cloudflare is shamelessly attacking those people, forcing them to turn off their proxy solution." And no, the Cloudflared Tunnel does not solve that issue for the same reason Cloudflare Warp doesn't solve it: |
Beta Was this translation helpful? Give feedback.
-
To put it simply, if you keep using Cloudflare then the project description needs to be revised from: |
Beta Was this translation helpful? Give feedback.
-
@
test out this https://github.com/CNMan/dnscrypt-proxy-config/blob/master/quad9-resolvers.md |
Beta Was this translation helpful? Give feedback.
-
I want to add quad9 and also opendns .. |
Beta Was this translation helpful? Give feedback.
-
never mind looks like you have everything i expected ill just test out and start working on wiki |
Beta Was this translation helpful? Give feedback.
-
@jo20201 i do not think you set up dnscrypt correctly, I used for server names
with dnscrypt servers (
|
Beta Was this translation helpful? Give feedback.
-
@jo20201 i used this at first
then i realized all and more quad9 servers are already in public resolver list https://github.com/DNSCrypt/dnscrypt-resolvers/blob/master/v3/public-resolvers.md 😅 no need for that method from CNMan quad9-resolvers.md also where did you found these servers ? I see from dnscrypt wiki , add static servers that "hasn't been defined anywhere" so I think we should use the quad9 servers from public resolvers list .. here is all of them
|
Beta Was this translation helpful? Give feedback.
-
@jo20201 where you got servers |
Beta Was this translation helpful? Give feedback.
-
right i see where you got this reference from https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Configuration-Sources. just wanted to find it. I think i should not use this feature in basic setup to confuse some people lives lol but have it as a advanced feature redirecting to a discussion. |
Beta Was this translation helpful? Give feedback.
-
@jo20201 @T145 one thing i am not sure about with cloudflared tunnel when using Is |
Beta Was this translation helpful? Give feedback.
-
one thing about https://dns.quad9.net/dns-query it uses both ipv4 and ipv6 .. |
Beta Was this translation helpful? Give feedback.
-
nice i see how to add ipv6 .. i will fix later |
Beta Was this translation helpful? Give feedback.
-
hmm i forgot about this . i remember reading about it , i think default is 3 |
Beta Was this translation helpful? Give feedback.
-
this reminds me.. when I started repo. I did not set some things for resolving on local host like ipv6.. also I did not realize you can add bootstrap in Cloudflared tunnel to resolve on local host.. nice one @jo20201 |
Beta Was this translation helpful? Give feedback.
-
@jo20201 i think i now remember why i never really cared for resolving on local host .. i choose in adguard listen interface pi's ip and not all interfaces . so correct me if im wrong, all interface will listen on 127.0.0.1 on linux system in result of resolving on local host At the time i taught it would be more simple to resolve the host itself by just using it through its DNS servers externally (add system ip addess in dns servers) .. is that ethical? |
Beta Was this translation helpful? Give feedback.
-
Regarding the Cloudflared Tunnel mentioned earlier, I just wouldn't use it all. The homepage seems to necessitate Cloudflare service usage, which again defeats the purpose of this whole exercise. As for EDNS, if you value privacy as advertised I'd disable it. |
Beta Was this translation helpful? Give feedback.
-
For real, they show usage in docs on there website https://developers.cloudflare.com/1.1.1.1/encryption/dns-over-https/dns-over-https-client/. 🤷♂️ cloudflare info is so scattered lol |
Beta Was this translation helpful? Give feedback.
-
OverGuard-SecureNetworksound ? |
Beta Was this translation helpful? Give feedback.
-
Keep it simple. You guys keep having a literal word salad as your title. People remember something short and sweet. "Overwired" is unique and simple. |
Beta Was this translation helpful? Give feedback.
-
I'm not familiar w/ the project details, so I can't give a definitive answer. If you're referring to what I think you are, then I'd discourage it. |
Beta Was this translation helpful? Give feedback.
-
@jo20201 i was going to add So upstream dns queries from ipv6 servers is all that is needed if want ipv6 protection.. |
Beta Was this translation helpful? Give feedback.
-
@jo20201 in knot config you have
according to docs it looks you do not need this if using tls forwading. Its a variant method from regular Forward queries method
|
Beta Was this translation helpful? Give feedback.
-
2 things I want. 1.compare dns stats side by side with pics or video with Wireshark or what ever else software best for dns leaks |
Beta Was this translation helpful? Give feedback.
-
It's best to not ever use browser DNS tests b/c your web browser can start its own DNS journey. Use |
Beta Was this translation helpful? Give feedback.
-
Why to stop using Cloudflare: https://framagit.org/dCF/deCloudflare/-/blob/master/readme/en.md
As for DoH: https://github.com/T145/white-bear
Please prefer and use Quad9 and DoT/DNSCryptV2.
Beta Was this translation helpful? Give feedback.
All reactions