I just now released 0.2.0 of the dns-tor-proxy tool. The main feature of this release is DNS over HTTPS support. At first I started writing it from scratch, and then decided to use modified code from the amazing dns-over-https project instead.
Demo
✦ ❯ ./dns-tor-proxy -h
Usage of ./dns-tor-proxy:
--doh Use DoH servers as upstream.
--dohaddress string The DoH server address. (default "https://mozilla.cloudflare-dns.com/dns-query")
-h, --help Prints the help message and exists.
--port int Port on which the tool will listen. (default 53)
--proxy string The Tor SOCKS5 proxy to connect locally, IP:PORT format. (default "127.0.0.1:9050")
--server string The DNS server to connect IP:PORT format. (default "1.1.1.1:53")
-v, --version Prints the version and exists.
Make sure that your Tor process is running and has a SOCKS proxy enabled.
Now you can pass --doh flag to enable DoH server usage, by default it will use https://mozilla.cloudflare-dns.com/dns-query. But you can pass any server using --dohaddress flag. I found the following servers are working well over Tor.
- https://ift.tt/31JqAVw
- https://ift.tt/2Sb6o7I
- https://ift.tt/2Awa9kh
- https://ift.tt/2BDYQXT
The release also has a binary executable for Linux x86_64
. You can verify the executable using the signature file available in the release page.
from Planet Python
via read more
No comments:
Post a Comment