www.dnscrypt.org
Open in
urlscan Pro
94.46.118.223
Public Scan
Submitted URL: http://www.dnscrypt.org/
Effective URL: https://www.dnscrypt.org/
Submission: On May 18 via api from US — Scanned from SE
Effective URL: https://www.dnscrypt.org/
Submission: On May 18 via api from US — Scanned from SE
Form analysis
0 forms found in the DOMText Content
About Install DNSCrypt Control your DNS traffic Run your own server A PROTOCOL TO IMPROVE DNS SECURITY DNSCrypt clients for Windows DNSCrypt clients for macOS DNSCrypt clients for Unix DNSCrypt for Android DNSCrypt for iOS DNSCrypt for routers DNSCrypt server source code Support Current stable DNSCrypt client version: 1.9.5 Current stable DNSCrypt server version: 0.3 [Nov 1, 2017] Simple DNSCrypt 0.4.3 released! DNSCRYPT DNSCrypt is a protocol that authenticates communications between a DNS client and a DNS resolver. It prevents DNS spoofing. It uses cryptographic signatures to verify that responses originate from the chosen DNS resolver and haven't been tampered with. It is an open specification, with free and open source reference implementations, and it is not affiliated with any company nor organization. FREE, DNSCRYPT-ENABLED RESOLVERS ARE AVAILABLE ALL OVER THE WORLD A couple companies, organizations and individuals are operating public recursive DNS servers supporting the DNSCrypt protocol, so that all you need to run is a client. A constantly updated list of open DNSCrypt resolvers can be downloaded to replace the default CSV file shipped with the dnscrypt-proxy client. If you are running your own public DNS resolver in order to help make the Internet a more secure place, please submit a pull request to have your resolver added to the list of public DNS resolvers. INSTALLING A DNSCRYPT CLIENT DNSCrypt itself is not a product, but a protocol that anyone can implement. Portable implementations are also available, on top on which graphical user interfaces and convenient tools have been built. Choose your platform to discover some of the available options: Windows - macOS - Linux / BSD - Android - iOS or run the software on a router. Firewall setup: although some resolvers may prefer a different port, the default port used by the DNSCrypt protocol is 443. Outgoing queries to this port on both TCP and UDP should be allowed by your firewall. TESTIMONIALS "DNScrypt is a very secure protocol that is helping build a safer web" ( James Awland - BestCasino.co.uk) "We highly recommend DNScrypt to those looking to access the best new casino sites" (Aidan Howe - BestCasinoSites.net) "In testing, we have found DNSCrypt to be incredibly stable and we encourage its use" (Cisco) DNSCRYPT FOR WINDOWS * Simple DNSCrypt is an an all-in-one, easy-to-use, standalone client. * DNSCrypt WinClient is the original DNSCrypt user interface for Windows. * dnscrypt-proxy is the reference client implementation and works natively on Windows, from Windows XP to Windows 10. It runs as a service, and does not provide a graphical user interface; its installation and its configuration require typing commands. This remains an excellent option for advanced users. Important: We are aware of fake packages pretending to be DNSCrypt Windows clients, that actually contain Malware/Potentially Unwanted Program (PUP). Do not download anything that pretends to be a DNSCrypt client from torrents, links in YouTube videos or unofficial download locations. DNSCRYPT FOR MACOS * DNSCrypt-OSXClient is an easy-to-use, full-featured, self-contained graphical user interface for macOS. * dnscrypt-proxy is the reference client implementation and works natively on recent macOS versions. Users familiar with the command-line can use Homebrew to install the software. DNSCRYPT IN THE YANDEX WEB BROWSER The Yandex web browser is a free, fast and secure web browser. It scans files and website for viruses, blocks fraudulent webpages, protects your passwords and bank card details, and keeps your online payments safe from theft. The Yandex web browser also features built-in support for the DNSCrypt protocol. DNSCRYPT FOR ANDROID Running DNSCrypt on Android currently requires a rooted device. If you don't know how to root an Android device, the xda-developers forum is a good place to start. * If you want to change the DNSCrypt resolver, unzip the downloaded archive, edit the RESOLVER_NAME variable in system/etc/init.d/99dnscrypt. Keep the content as a ZIP file, with the original structure. * Upload the ZIP file to the device, into /sdcard or any location you can write to. * Make sure that you have a custom recovery such as TWRP or CWM. The easiest way is to download and install TWRP Manager from the the official twrp.me website. Reboot now in 'recovery mode' and install the ZIP file. * Reboot. * Download and install Universal Init.d from the Google Play Store, if you're on a custom Kernel or aftermark firmware this isn't necessary since e.g. LineageOS comes with integrated support for it. In case you don't know if you have init.d support, open the app and follow the instructions until you see Your Kernel Has init.d Support. * The DNSCrypt proxy should be running at this point, but your device still use the previous DNS settings. There currently four (paid) apps which can change this behaviour, AdGuard (VPN tunnel) NetGuard (VPN tunnel), DNS Manager Pro (VPN tunnel) and Override DNS (a DNS changer). Choose one of them and download it from Google Play Store. In order to actually use DNSCrypt, enter 127.0.0.1 as the primary DNS resolver. AdGuard and NetGuard requiring you to change some additional settings (see screenshots). In order to stop DNSCrypt, just disable the apps or leave the DNS resolver field empty. * DNS changes may not be visible immediately. Android has its integrated DNS cache and web browsers such as Chrome have another layer of DNS caching. In order to clear Chrome's DNS cache, enter chrome://net-internals/#dns in the URL bar, and press Clear host cache. Relevant discussions: * Starting the daemon on Android * How to install DNSCrypt on Android The dnscrypt-proxy source code can be cross-compiled for Android using the provided dist-build/android*.sh scripts. It might also soon be part of the Cyanogen Mod. DNSCRYPT FOR IOS For jailbroken iOS device, GuizmoDNS is an app to change DNS settings (for 3G/4G and Wifi), with support for DNSCrypt. It is available on Cydia. The command-line dnscrypt-proxy client is also available on Cydia. However, the version on Cydia might not be the latest one. Official pre-compiled binaries of the latest version are available on the page. The DNSCrypt source code can also be compiled out of the box for iOS devices, using the provided dist-build/ios.sh script. With the introduction of the Network Extension Framework in iOS 9, it may be possible to write a DNSCrypt client app that would run everywhere, without requiring a jailbroken device. DNSCRYPT FOR ROUTERS Modern open router firmwares such as Tomato Shibby and other Tomato variants include a DNSCrypt client out-of-the box. The dnscrypt-proxy client is also available on OpenWRT which has a wiki page on using DNSCrypt on OpenWRT. dnscrypt-proxy can also be found in Entware. It can also be compiled for any Linux-based target, running an Intel, Mips or ARM CPU. DNSCRYPT-PROXY The most popular client DNSCrypt implementation is dnscrypt-proxy. It can be used on its own, or through one of the graphical user interfaces listed above. dnscrypt-proxy implements the latest revision of the protocol and works on many platforms, including Windows, macOS, Linux, OpenBSD, FreeBSD, NetBSD, Android and iOS. It can be extended with plugins. For more information on dnscrypt-proxy, please refer to the dedicated wiki. ALTERNATIVE CLIENTS, INSTALLATION SCRIPTS AND GUIS FOR UNIX * DNSCrypt-Loader is a console-based tool to manage the DNSCrypt proxy client on Linux. It requires a minimal amount of dependencies, has an always up-to-date list of resolvers, and can automatically change the DNS settings to use DNSCrypt. * Pcap_DNSProxy is a very fast DNS proxy. It includes a DNSCrypt client implementation. TAKE CONTROL OF YOUR DNS TRAFFIC Aside from implementing the protocol, common DNSCrypt clients give a lot of control on the DNS traffic. Use dnscrypt-proxy, Simple DNSCrypt, and OSXClient to: * Review the DNS traffic originating from your network in real time, and detect compromised hosts and applications phoning home * Locally block ads, trackers, malware, spam, and any website whose domain names or IP addresses match a set of rules you define. * Prevent queries for local zones from being leaked. * Reduce latency by caching responses and avoiding requesting IPv6 addresses on IPv4-only networks. * Force traffic to use TCP, to route it through TCP-only tunnels or Tor. SIGNATURE VERIFICATION Files (source code tarballs, precompiled binaries, list of resolvers) can be verified with the Minisign tool and the following command: $ minisign -VP RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3 -m <file name> RUNNING YOUR OWN DNSCRYPT SERVER If you are running your own private or public recursive DNS server, adding support for the DNSCrypt protocol can be done by installing DNSCrypt-Wrapper, the reference server-side DNSCrypt proxy. DNSCrypt-Wrapper can be compiled from the source code. OSX users can also use Homebrew to install it: brew install dnscrypt-wrapper. The proxy is compatible with any DNS resolver software, including Unbound, PowerDNS Recursor and BIND. A Docker image for dnscrypt server is also available, and is the easiest and fastest way to deploy a DNSSEC-validating, DNSCrypt-enabled caching DNS server. It includes a pre-configured Unbound server, dnscrypt-wrapper, and all the scripts required to perform key rotation and supervision. Another option is dnsdist, a highly DNS-, DoS- and abuse-aware loadbalancer. Its goal in life is to route traffic to the best server, delivering top performance to legitimate users while shunting or blocking abusive traffic. dnsdist can act as a DNSCrypt server when compiled with --enable-dnscrypt. unbound, a validating, recursive, and caching DNS resolver, can also act as a DNSCrypt server when compiled with --enable-dnscrypt. Refer to DNSCrypt Options section in unbound.conf(5) for configuration options. DEPLOYMENT DNSCrypt is typically deployed using a pair of DNS proxies: a client proxy and a server proxy. The client side of DNSCrypt is a proxy to which regular DNS clients can connect to. Instead of using your ISP's DNS settings, you can just configure your network settings to use 127.0.0.1 or whatever IP address and port you configured the DNSCrypt client to listen to. The client proxy translates regular DNS queries into authenticated DNS queries, forwards them to a server running the server DNSCrypt proxy, verifies the responses, and forwards them to the client if they appear to be genuine. The server side of DNSCrypt receives DNS queries sent by the client proxy, forwards them to a trusted DNS resolver, and signs the responses it receives before forwarding them to the client proxy. The DNSCrypt protocol uses UDP and TCP ports 443, which are less likely to be filtered by routers and ISPs than the standard DNS port. The local network is usually the most vulnerable network segment against active attacks such as DNS spoofing. The DNSCrypt server can run on the router, along with a modern DNS resolver. Clients can then run the client code of DNSCrypt, leveraging the router DNS resolver. |----- Most vulnerable to attacks ------| |-- Most vulnerable to modification --| dnscrypt client dnscrypt server Laptop/workstation/phone/tablet --------> home router --------> ISP --------> the Internet |--------- Secured by DNSCrypt ---------| |------------- Secured by DNSSEC --------------| Alternatively, companies, organizations and individuals are running public DNS resolvers supporting the DNSCrypt protocol. These can be used as an alternative to running a DNSCrypt server and a DNS resolver on the router. For maximum protection, DNSCrypt client can run on every client device: |----- Most vulnerable to attacks ------| |-- Most vulnerable to modification --| dnscrypt client dnscrypt server Laptop/workstation/phone/tablet --------> home router --------> ISP ----------> the Internet --------> public DNS resolver |----------------------------------- Secured by DNSCrypt -------------------------------------------| |--- Secured by DNSSEC ---| |--- Most vulnerable to logging ---| Or if you totally trust the local network, the DNSCrypt client can run on the router instead: |----- Most vulnerable to attacks ------| |-- Most vulnerable to modification --| dnscrypt client dnscrypt server Laptop/workstation/phone/tablet --------> home router --------> ISP ----------> the Internet --------> public DNS resolver |------------------ Secured by DNSCrypt --------------------| |--- Secured by DNSSEC ---| |--- Most vulnerable to logging ---| Finally, you can run your own DNSCrypt server on a remote, trusted network, to get full control over what the resolver is doing and logging: |----- Most vulnerable to attacks ------| |-- Most vulnerable to modification --| dnscrypt client dnscrypt server Laptop/workstation/phone/tablet --------> home router --------> ISP ----------> the Internet --------> private DNS resolver |----------------------------------- Secured by DNSCrypt -------------------------------------------| |--- Secured by DNSSEC ---| Please note that DNSCrypt is not a replacement for a VPN, as it only authenticates DNS traffic, and doesn't prevent third-party DNS resolvers from logging your activity. By design, the TLS protocol, as used in HTTPS and HTTP/2, leaks websites host names in plain text, so DNSCrypt is not enough to hide this information. USING DNSCRYPT IN COMBINATION WITH A DNS CACHE For optimal performance, the recommended way of running DNSCrypt is to run it as a forwarder for a local DNS cache, such as Unbound or PowerDNS-Recursor. A caching resolver can provide high availability, by forwarding queries to multiple upstream DNSCrypt client proxies, configured with different providers. dnscrypt-proxy instances and the caching resolver can safely run on the same machine as long as they are listening to different IP addresses or different ports. If your DNS cache is Unbound, all you need is to edit the unbound.conf file and add the following lines at the end of the server section: do-not-query-localhost: no forward-zone: name: "." forward-addr: 127.0.0.1@40 forward-addr: 127.0.0.1@41 The first line is not required if you are using different IP addresses instead of different ports. The forward-addr lines indicate addresses and ports of dnscrypt clients to use as upstream resolvers. Then, start the two client proxies, listening to different local ports (40 and 41 in this example). Pay attention to the fact that some resolvers do not support the DNS security extensions (DNSSEC). If Unbound is configured to perform DNSSEC validation in combination with an upstream server that does not support DNSSEC, queries will fail. Either use only DNSCrypt resolvers with support for DNSSEC, or disable DNSSEC support in Unbound by commenting out the auto-trust-anchor-file line in its configuration. A local caching resolver can also be extremely useful to forward queries for CDNs or internal domains to a specific resolver. DNSCRYPT FOR DEVELOPERS The protocol specification is available and can be implemented free of charge in any product. Individuals and organizations running DNSCrypt-enabled resolvers may also have a donation link. Please check it out on their own website. If you use them regularly, your contribution would also help them to keep providing a great service for free.