No directions VPN-encrypted tunnel over SSH, DNSCrypt-proxy #2742
Replies: 3 comments 1 reply
-
It is the best practice: keeping DNS queries at the same exit node as the proxy which directly connects to the target website.
Don't! That leads to DNS leak! |
Beta Was this translation helpful? Give feedback.
-
The problem with https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Oblivious-DoH A no to using ODoH (Oblivious DNS-over-HTTPS). Anonymized DNS https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS is the only solution - do or don't? |
Beta Was this translation helpful? Give feedback.
-
The first thing here is you are using a proxy/VPN to visit websites. In this process:
So, what's important is who this DNS resolver is. Keeping DNS queries at the same exit node as the proxy which directly connects to the target website, will make it most likely that you are the exit node. It is critical when you are using a proxy/VPN! https://en.wikipedia.org/wiki/DNS_leak |
Beta Was this translation helpful? Give feedback.
-
Distribution: Linux Mint 22
Browser: Librewolf
Verified: DNSCrypt-proxy using dnscheck.tools
VPS Service: Digital Ocean
I reviewed the below links:
https://github.com/DNSCrypt/dnscrypt-proxy/wiki/DNSCrypt-server-with-vultr.com
https://github.com/DNSCrypt/dnscrypt-proxy/wiki/How-to-setup-your-own-DNSCrypt-server-in-less-than-10-minutes
There are no directions to push the DNS traffic through the tunnel at the browser level.
There are do directions to configure the VPN tunnel using the VM server to access the internet.
dnscheck.tools shows the below:
Hello! Your public IP addresses are:
ISP Name Country
IP address City, Country
Using the VM IP address and then the below CLI to log into the SSH Server and configuring the settings for Librewolf as below:
CLI: ssh -4 -TND 8888 [email protected] <---------- nnn.nnn.nnn.nnn VM IP address
Librewolf configuration settings:
a. General -> Network Settings ->Settings
b. Connection Settings -> Manual proxy configuration -> SOCK Host = 127.0.0.1 -> Port = 8888
c. No proxy for = localhost, 127.0.0.1
d. Proxy DNS when using SOCK v5 = checkmarked
DNSCrypt-proxy was started and ready.
Using dnscheck.tools it shows the ISP IP address coming from Digital Ocean and the DNS resolvers are from Digital Ocean. The DNSSEC failed to verify.
So the purpose is to see the ISP IP address as the VM from Digital Ocean, and not from my own ISP, and also see the the DNSCrypt-Proxy servers as configured accordingly, in this case Cloudflare and Google, and as well to see DNSSEC passes the check.
What are the directions to configure the settings for Librewolf to push traffic through the VPN tunnel, VM IP address, and still as well using the DNSCrypt-proxy resolvers?
Generally, what are the directions for configuring the settings on any browser to push the DNS traffic through the encrypted tunnel and at the same time using the DNSCrypt-proxy resolvers?
Beta Was this translation helpful? Give feedback.
All reactions