Stuur hierbij een (engelse) beschrijving hoe je DNScrypt & DNSSEC kunt gebruiken:
DNSCrypt on PiHole
Follow these steps to install and enable DNSCrypt on your Pihole installation. Read more about DNSCrypt here: DNSCrypt.
Please note that your Pihole will stop working during the installation so keep that in mind if there are other users on your network using the Pihole.
At the time of writing the latest version dnscrypt-proxy is 1.9.4 but that may change, please edit the commands according to version.
Please note, I take no responsibility for any breakage or corruption of your Pihole installation when following this guide.
Install necessary system packages and reboot
sudo apt-get update
sudo apt-get -y install build-essential tcpdump dnsutils libsodium-dev
sudo apt-get -y install locate bash-completion
sudo reboot
Build DNSCrypt from the sources
mkdir -p dnsproxy
cd dnsproxy
wget
http://download.dnscrypt....scrypt-proxy-1.9.4.tar.gz
tar -xf dnscrypt-proxy-1.9.4.tar.gz
cd dnscrypt-proxy-1.9.4
sudo ldconfig
./configure
make
sudo make install
Configure the system
Starts DNSProxy in daemon mode automatically
sudo nano /etc/systemd/system/multi-user.target.wants/dnscrypt-proxy.service
sudo nano /etc/systemd/system/multi-user.target.wants/dnscrypt-proxy-backup.service (if adding a second resolver)
And paste this content:
[Unit]
Description=Secure connection between your computer and DNS resolver
After=network.target network-online.target
[Service]
Type=forking
Restart=always
RestartSec=5
PIDFile=/var/run/dnscrypt-proxy.pid
ExecStart=/usr/local/sbin/dnscrypt-proxy --daemonize \
-a 127.0.0.2:40 \
-R dnscrypt.eu-nl \
-E \
--edns-payload-size=4096 \
-p /var/run/dnscrypt-proxy.pid
[Install]
WantedBy=multi-user.target
Change the -a flag to 127.0.0.3:40 and use a different resolver on the backup.
Content backup:
[Unit]
Description=Secure connection between your computer and DNS resolver
After=network.target network-online.target
[Service]
Type=forking
Restart=always
RestartSec=5
PIDFile=/var/run/dnscrypt-proxy.pid
ExecStart=/usr/local/sbin/dnscrypt-proxy --daemonize \
-a 127.0.0.3:40 \
-R d0wn-nl-ns1 \
-E \
--edns-payload-size=4096 \
-p /var/run/dnscrypt-proxy.pid
[Install]
WantedBy=multi-user.target
Note: The reason why we're assigning the IPs 127.0.0.2 and 127.0.0.3 is so that we can have a better overview in the Forward Destinations chart inside the dashboard.
Then reboot the RPI:
sudo reboot
Change your DNSMasq config
Change DNS resolver in DNSMasq config
sudo nano /etc/dnsmasq.d/01-pihole.conf
Edit this section and point to dnscrypt-proxy
# Add other name servers here, with domain specs if they are for
# non-public domains.
server=127.0.0.2#40
server=127.0.0.3#40 (if adding a second resolver)
Reboot your Pihole
sudo reboot
Nadeel van bovenstaande methode is dat je na elke upgrade van pi-hole de gegevens in DNSMasq worden gewijzigd! Na elke Pi-hole upgrade het volgende commando uitvoeren:
sudo nano /etc/dnsmasq.d/01-pihole.conf
Wijzig de volgende sectie naar (zoals eerder aangegeven):
# Add other name servers here, with domain specs if they are for
# non-public domains.
Server=127.0.0.2#40
Server=127.0.0.3#40
Test DNSCrypt:
https://www.dnsleaktest.com/
Test DNSSec:
http://dnssec.vs.uni-due.de/
Hierbij een overzicht van de DNSCrypt-proxy resolvers:
https://github.com/jedisc...er/dnscrypt-resolvers.csv
De gekozen DNSCrypt-resolvers hebben optie DNSSec validation en No logs!
Hierbij een link naar de laaste release notes van DNSCrypt-proxy:
https://github.com/jedisct1/dnscrypt-proxy/releases