6.2 KiB
DNSCrypt-proxy encrypts DNS queries that would otherwise go in plaintext ensuring that they won’t be seen or modified by anyone in the middle. It works as a localhost DNS server sending queries to configured DNS resolvers.
I guess I should also say why you would want dnscrypt v1 vs v2. V1 which is in most of repos currently uses broken resolver by default and only supports one resolver at a time, while v2 can use multiple of them while comparing them for the best ones.
This post is on getting v2 to Debian Stable and Ubuntu pre 18.10 which contain v1 and I (sadly) don’t know a better way to do this.
In order to check which version your distro has available, check the dnscrypt-proxy search page for your distribution:
- Debian
- 2018-11-03: the version in stretch (stable) is
1.9.4-1
which has the issues why I wrote this post.
- 2018-11-03: the version in stretch (stable) is
- Ubuntu
- 2018-11-03: I cannot find dnscrypt-proxy from Ubuntu at all, while I am sure it previously had the Debian version 1.
- Update your local apt cache
sudo apt update
and install curl that will be used for downloading the package from Debiansudo apt-get install curl
Check the version number at Debian’s dnscrypt-proxy package download page and fix it below:
2: download the
packagecurl -LO https://deb.debian.org/debian/pool/main/d/dnscrypt-proxy/dnscrypt-proxy_2.0.16-2_amd64.deb
WARNING: This part is not supported by either Debian or Ubuntu, you are taking a package from another distribution and attempting to install it on another.
WARNING: Usually when you use apt, it will verify package signatures and ensure that the package hasn’t been tampered with. I have no idea how to do that with direct downloads (if it’s even possible) so you will be trusting the Debian repository mirror or CDN blindly.
- install the package you downloaded:
sudo dpkg -i dnscrypt-proxy<TAB>
(TAB (above capslock) automatically completes rest of the filename for you).- In case there was a problem, attmept
sudo apt-get install -f
to fix broken package depedencies. Remember to check that what it suggests looks reasonable! If it asks to remove dnscrypt-proxy, you are out of luck and should do that instead of attempting to replace important system components from another distribution (creating “Frankendebian”).
- In case there was a problem, attmept
Hopefully dnscrypt-proxy is now running, check
journalctl -u dnscrypt-proxy
, there should be a line saying
[NOTICE] Wiring systemd TCP socket #0, dnscrypt-proxy.socket, 127.0.2.1:53
Edit /etc/NetworkManager/NetworkManager.conf
to avoid
overlapping resolvers breaking each other, it should say say
dns=none
e.g.:
[main]
plugins=ifupdown,keyfile
dns=none
if it doesn’t say dns=none, fix it and restart it with:
systemctl restart NetworkManager
Edit your /etc/resolv.conf, for example:
sudo su -
rm /etc/resolv.conf
nano /etc/resolv.conf && chattr +i /etc/resolv.conf
chattr +i will prevent modifying the file unless chattr -i is done first.
Example resolv.conf:
nameserver 127.0.2.1
options edns0 single-request-reopen
#search mikaela.info
Nameserver is the host where dnscrypt-proxy said to be listening on
in journalctl, options are from dnscrypt-proxy documentation and search
means domains that are automatically searched for if you don’t use fully
qualified domain names, e.g. ssh machine
in my
(uncommented) config would turn into
ssh machine.mikaela.info
. Update: I find this a privacy
leakage (whenever NXDOMAIN happens), which is why I nowadays have it
commented.
You should also tell dhclient to not touch resolv.conf or you may get
many files into /etc
beginning with names
resolv.conf.dhclient-new.
according to Debian
wiki which gives the following two commands and Debian
bug 860928:
echo 'make_resolv_conf() { :; }' > /etc/dhcp/dhclient-enter-hooks.d/leave_my_resolv_conf_alone
chmod 755 /etc/dhcp/dhclient-enter-hooks.d/leave_my_resolv_conf_alone
WARNING from 2018-10-21! It appears that the cache and log directories of dnscrypt-proxy don’t sometimes get created automatically (at least on Debian GNU/Linux 9.6 (stretch).
If this happens to you or you would like to be sure to get them:
sudo mkdir -p /var/cache/dnscrypt-proxy/ /var/log/dnscrypt-proxy/
sudo chown -R _dnscrypt-proxy:nogroup /var/cache/dnscrypt-proxy /var/log/dnscrypt-proxy
For the curious my dnscrypt-proxy config is in my shell-things repository mirror.
2019-07-22 update
I have also started performing local DNSSEC validation by running Unbound in front of DNSCrypt-proxy, so my queries go resolv.conf -> Unbound -> dnscrypt-proxy -> configured resolvers. This has the advantage that if the resolver didn’t perform DNSSEC validation or lied about performing it, the protection by DNSSEC would still be received.
The steps are simple:
sudo apt install unbound
- You should see a file
/etc/unbound/unbound.conf.d/root-auto-trust-anchor-file.conf
which simply saysserver:
and on another line after intendingauto-trust-anchor-file: "/var/lib/unbound/root.key"
(the path varies by distribution) which means it’s performing DNSSEC validation with those trust anchors.
- You should see a file
sudo nano /etc/unbound/unbound.conf.d/dnscrypt-proxy.conf
do-not-query-localhost: no
forward-zone:
name: "."
forward-addr: 127.0.2.1@53
sudo systemctl restart unbound
- Ensure
/etc/resolv.conf
points to127.0.0.1
and optionally::1
instead of127.0.2.1
where dnscrypt-proxy runs by default. For more details, CTRL + F for resolv.conf or chattr.