Joined: 04 Aug 2018
Location: Appalachian mountains, USA
|Posted: Sun Jan 06, 2019 17:18 Post subject:
|DaveI wrote: |
|I would greatly appreciate if you describe the steps necessary to add Quad9 as a DNSCrypt DNS resolver. I've been using Quad9 since last fall but was uncertain how to do the DNSCrypt since they're not in DD's list.
Hello DaveI! I always look for your post in a new-build thread. If you find the new build safe for the router model that we have in common, I am reassured that it may be worth a go. Good to meet you.
So, how to use Quad9 via DNSCrypt. Please excuse me if I get a bit pedantic here, but I'd like to also make this available for those less experienced than you are.
First, in GUI>Services>Services>ServicesManagement>DNSMasq, enable Cache DNSSEC data and Validate DNS Replies (DNSSEC), since Quad9 supports DNSSEC, but do NOT enable Encrypt DNS, as doing so would start up a dnscrypt-proxy process tied to a resolver from the drop-down menu, which does not contain Quad9. Then in Additional DNSMasq Options below those buttons, enter this.
I'm not an expert, but I believe no-resolv prevents DNSMasq from falling back to ISP-provided resolvers if getting through to Quad9 takes too long. The important line is the server= line, which tells DNSMasq to use loopback IP 127.0.0.1, port 30, as its DNS resolver. Note that where others use a colon to specify a port, DNSMasq uses the pound sign. Save the changes but do not apply, as at this point there is nothing on that server for DNSMasq to find.
Now go to GUI>Administration>Commands>Diagnostics>CommandShell. If you already have Startup Commands, hit its Edit button to move it to the Commands window. Otherwise proceed directly to the Commands window and add this:
|dnscrypt-proxy -d -S -a 127.0.0.1:30 \
-r 184.108.40.206:8443 -N 2.dnscrypt-cert.quad9.net -k \
Click Save Startup to save to Startup Commands. The next time you boot, DNSMasq should be using DNSCrypt, which should in turn be using Quad9 as its DNS resolver.
The quick test, per Quad9's suggestion, is to visit dnsleaktest.com and use the extended test. It should show servers with ISP WoodyNet. You can also visit ipleak.net and notice the DNS Addresses section, which should show a few (2 to 14 or so in my experience so far) servers in a common location. I'm US-based and so far have seen servers in Illinois, Georgia, Virginia, and California in different experiments. Also, in the CLI you can do ps | grep dns and should see a dnsmasq process and a dnscrypt-proxy process, with the latter mirroring the above dnscrypt-proxy command (if your terminal is wide enough).
If you use the OpenVPN client with PBR to restrict it to subnet X, you have the option of going to GUI>Setup>Networking and finding that subnet's Optional DNS Target field and replacing your VPN provider's DNS server's IP with your subnet's gateway IP 192.168.X.1 in order to use (to "leak" to) Quad9's DNS servers when on subnet X. I do this to get Quad9's malware filtering, which my VPN provider's DNS server does not provide. If the subnet is for an unbridged wifi interface or virtual interface, you can instead set this in GUI>Wireless>BasicSettings in the section for that interface after checking Advanced Settings there and looking down near the end for Optional DNS Target. (I used the latter approach, so I'm only assuming you can change it under Networking.)
If you want a backup DNSCrypt server from our built-in list to cover you in the unlikely case that Quad9 is ever unavailable (which I gather is extremely unlikely), add a server=127.0.0.2#30 just before server=127.0.0.1#30 in the Additional DNSMasq Options above, and in Startup Commands add, say to use adguard-dns (malware filtering plus ad filtering),
| dnscrypt-proxy -d -S -a 127.0.0.2:30 \
-R adguard-dns -L /etc/dnscrypt/dnscrypt-resolvers.csv
either before or after the earlier call to dnscrypt-proxy. Order matters only for the server= lines, because DNSMasq apparently uses the last one first.
Background and References
The /etc/dnscrypt/dnscrypt-resolvers.csv file just above appears to match the one at https://svn.dd-wrt.com/browser/src/router/dnscrypt/dnscrypt-resolvers.csv, with each line specifying a resolver. This format appears to have been superceded in the dnscrypt community with a new master dnscrypt server list, with resolver parameters encoded into a new "stamp" format, at https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/public-resolvers.md which is pointed to by https://github.com/DNSCrypt/dnscrypt-resolvers/blob/master/v2/public-resolvers.md. The postings at https://dnscrypt.info are noteworthy, especially the checklists of features of DNSCrypt, DoH, DoTLS, etc. along with https://dnscrypt.info/stamps, a tool that you can use to decode stamps to get the three key parameters used in our Quad9 call to dnscrypt-proxy following -r, -N, and -k. You can add the colons to the public key by hand or run it through sed -e 's/..../&:/g' -e 's/:$//' to do it if you are like me and are linux based and either don't trust your fingers near a keyboard or want to do it for lots of stamps. The master dnscrypt server list above seems to contain many DNS resolvers not in our list, so we may have other options to experiment with as well.
Quad9 in particular announced their new DNSCrypt support at https://www.quad9.net/privacy-dnscrypt-testing/. There they link to file quad9-resolvers.md, which contains the DNS-resolver stamp for dnscrypt-ip4-filter-pri, the option I configured above. That stamp is also in the master dnscrypt server list above. I verified that they are identical as of a few days ago.
Edit Aug 2019: At https://quad9.net/dnscryptlive/ Quad9 says their public key can be obtained with command dig @220.127.116.11 2.dnscrypt-cert.quad9.net txt, which I just tested in linux and verified that the public key is as above in the dnscrypt-proxy call.
Six of the Linksys WRT1900ACSv2 on r38159 (solid), r39144 (very solid), r40009 (solid), and r40784 (trying out). On various:
VLANs, client-mode travel router, two DNSCrypt servers (incl Quad9), multiple VAPs, USB/NAS, QoS, OpenVPN client/PBR (random NordVPN server).
Last edited by SurprisedItWorks on Sat Aug 24, 2019 22:07; edited 1 time in total