← Home ← Back to /g/

Thread 106885101

53 posts 12 images /g/
Anonymous No.106885101 [Report] >>106885122 >>106885252 >>106885308 >>106885930 >>106886344 >>106889244 >>106889793 >>106893923 >>106893927
Which dns resolver is /g/ and chud-approved? I was using quad9 until I found out it's owned by some troons.
Anonymous No.106885122 [Report] >>106885214 >>106885215
>>106885101 (OP)
>chud-approved
Are you asking for indian dns resolvers?
Anonymous No.106885214 [Report] >>106885988
>>106885122
>whatever is not troon owned is indian
we now know whos going around calling everyone- jeet
Anonymous No.106885215 [Report]
>>106885122
DO NOT RESOLVE
Anonymous No.106885252 [Report] >>106886053 >>106886484 >>106889061 >>106889110 >>106889211
>>106885101 (OP)
>if speed matters
cloudflare
>anything else
mullvad
Anonymous No.106885308 [Report]
>>106885101 (OP)
>Which dns resolver is /g/ and chud-approved?
dnscrypt
> I was using quad9 until I found out it's owned by some troons.
oh no it's much worse than that. it was created by a bunch of people involved with law enforcement. that service is just a data mine for glowniggers.
Anonymous No.106885930 [Report]
>>106885101 (OP)
obsessed
Anonymous No.106885988 [Report] >>106886044
>>106885214
It's the chinks. 80% of the time
Anonymous No.106885995 [Report] >>106892627
https://pi-hole.net/
Anonymous No.106886034 [Report]
I'm not sharing anything nice I find because you morons fuck it up
Anonymous No.106886044 [Report]
>>106885988
nah
in my experience its the tranis
jeets live rent free in their heads bc theyre legit competition to them.
theyre webshitters, community managers, this kind of easily replaceable trash
Anonymous No.106886053 [Report]
>>106885252
Which company is worse, Cloudflare or Google? I see both getting hate
Anonymous No.106886099 [Report] >>106891285
i use the one of my ISP, which is more trustworthy than either Cloudflare or Google.
Anonymous No.106886311 [Report]
i use the nextdns option in firefox. i like running the ip it uses through mtr and seeing how many dhs (yes that one) it goes through regardless of where i am in the world.
Anonymous No.106886341 [Report] >>106892749
>troon this?
>no, jeet that
>maybe chink?
this board is hopeless
Anonymous No.106886344 [Report]
>>106885101 (OP)
unbound
Anonymous No.106886442 [Report] >>106889110
Mullvad DNS or Adguard DNS
Anonymous No.106886484 [Report] >>106889211
>>106885252
>>if speed matters
Does speed really matter for a dns resolver? Like, at most it will be a few milliseconds only for the first visit right?
Anonymous No.106888994 [Report]
quad and cloudflare through dnsproxy. use 1.1.1.2 for home wifi for some basic malware filtering.
Anonymous No.106889051 [Report]
Quad9 and dns0
Anonymous No.106889061 [Report] >>106889211
>>106885252
>>if speed matters
>cloudflare
if speed matters you wouldn't use cloudflare. cloudflare strips edns information, making it impossible for non-cloudflare cdns to give you the nearest cdn based on edns. this makes non-cloudflare sites slower.
Anonymous No.106889110 [Report] >>106889236 >>106892536
>>106885252
>>106886442
mullvad dns is not a serious service.
github.com/mullvad/dns-blocklists/issues/105
Anonymous No.106889130 [Report]
For me it's adguard.
Anonymous No.106889211 [Report]
>>106885252
>>106886484
>>106889061
What makes you think speed is a metric?
Anonymous No.106889236 [Report]
>>106889110
lol'd
Anonymous No.106889244 [Report]
>>106885101 (OP)
>Which dns resolver is /g/ and chud-approved
just run unbound
Anonymous No.106889793 [Report] >>106889799 >>106891285
>>106885101 (OP)
Can someone explain the point of one of these things if the ISP is going to see you connect to whatever website after the DNS lookup anyway? Also, what happens if you're using a VPN but your ISP's DNS? Can they see the DNS lookups even though the VPN is encrypting the rest of your traffic?
Anonymous No.106889799 [Report]
>>106889793
W2C?
Anonymous No.106889838 [Report]
troons are just fallen chuds
Anonymous No.106890280 [Report]
I use the ones google chrome has under the secure dns setting. so cloudflare and google.

it's a fitting thread to ask this, does anyone know why firefox dns over https doesn't work properly? I tried using cloudflare but for some reason firefox doesn't properly use the dns you choose.
Anonymous No.106891285 [Report] >>106891390 >>106892599 >>106894724
>>106886099
>i give all my dns queries to the glowies, willingly

>>106889793
Assuming good faith providers:
HTTP: everyone sniffing can see page content, hostnames and ip addresses you connect to, even change the content travelling on your line.
HTTPS: everyone can see hostnames and ip addresses.
HTTPS + custom DNS: same as above.
HTTPS + encrypted DNS: everyone can see only ip addresses, the only entity that can read your DNS queries is your encrypted DNS provider.
VPN: nothing, but your VPN provider can see hostnames and ip addresses.
>funny captcha
Anonymous No.106891390 [Report] >>106891557 >>106891565
>>106891285
>HTTPS + encrypted DNS: everyone can see only ip addresses, the only entity that can read your DNS queries is your encrypted DNS provider.
Your ISP can still see which websites you are trying to reach during the handshake process and fuck it up so it fails.
Anonymous No.106891557 [Report]
>>106891390
Just enable encrypted client hello.
Anonymous No.106891565 [Report] >>106892618
>>106891390
Not necessarily. If the website you're browsing is using a CDN like Cloudflare and you're using Encrypted SNI then all they would be able to see is encrypted traffic to a cloudflare IP.
Anonymous No.106892536 [Report]
>>106889110
i think thats just a Europe thing
Anonymous No.106892599 [Report] >>106893073
>>106891285
good-faith providers do not do deep traffic inspection.
their noc will just see you connecting to some cloudflare ips. they will not know which sites you browse.
Anonymous No.106892618 [Report] >>106893373
>>106891565
an actual attacker won't let you use encrypted sni and will downgrade you. hsts cannot save you.
Anonymous No.106892627 [Report] >>106892653
>>106885995
/thread
Anonymous No.106892653 [Report]
>>106892627
pi-hole by default is just forwarding your dns requests to google
https://docs.pi-hole.net/docker/configuration/?h=8.8.8#ftlconf_dns_upstreams-default-88888844
Anonymous No.106892749 [Report]
>>106886341
Knowledge is gained by learning to distinguish expected behaviors based on visual data. The reason we don't eat green potatoes is because someone did. As we identify the sources, we learn to avoid them.
Anonymous No.106892753 [Report]
the fuck is chud?
Anonymous No.106892766 [Report]
just run your own recursive resolver locally
dnsmasq is easy and simple
Anonymous No.106893073 [Report]
>>106892599
anyone inspecting my packets isn't doing anything in "good faith"
Anonymous No.106893373 [Report]
>>106892618
>an actual attacker
The UK government is incompetent, they will probably just do DNS filtering.
Anonymous No.106893923 [Report] >>106893936 >>106894165
>>106885101 (OP)
Host your own modular DNS resolver with either of these:
https://www.dnsdist.org/index.html
https://technitium.com/dns/
First one is great if you want something for a headless server that is pure efficiency. Other one is great if you like fancy web interfaces and stat dashboards, and don't want to type out your configs. Make it public-facing so you can use it from anywhere, and you're good to go forever. Either run it out of your house or slap it on a VPS. Just make sure you spend some time configuring iptables and/or your firewall frontend of choice. Lots of DDoS botfarms targeting DNS servers these days.
Anonymous No.106893927 [Report]
>>106885101 (OP)
install unbound on a VPS.
Anonymous No.106893936 [Report]
>>106893923
*dnsdist can be used as an extremely flexible forwarding resolver, with or without the authoritative and recursive components.
Anonymous No.106894165 [Report] >>106894243
>>106893923
>Make it public-facing so you can use it from anywhere
>Lots of DDoS botfarms targeting DNS servers these days
Yeah, no, I'd rather just VPN into my network and use whatever service I want.
Anonymous No.106894243 [Report] >>106894459
>>106894165
They're fun to deal with, and after you've successfully fended off a few, you can make sure your iptables or other firewall rules are persistent, and avoid 99.999% of them in the future. Also, latency. Nothing quite like being directly connected to a well oiled resolver running on a server that was made to be its home.
Anonymous No.106894459 [Report]
>>106894243
I'm sure it's satisfying, I just don't think it's worth the hassle doing it this way, when instead I can have secure remote access to my entire home network through a single UDP port - including self-hosted DNS.
Anonymous No.106894724 [Report] >>106894766 >>106894768
>>106891285
>HTTPS + encrypted DNS: everyone can see only ip addresses, the only entity that can read your DNS queries is your encrypted DNS provider.
So your ISP is still seeing you connect to the website's IP then, right? As I said in the original question, I guess I just don't understand the point of point of a custom DNS if the IPs of the websites you visit are just going to go to your ISP immediately anyway.
Am I missing something? Is there some real difference between doing a DNS lookup into connecting to an IP and just connecting to an IP?
Anonymous No.106894766 [Report]
>>106894724
I think you did miss the part where most websites these days don't have fixed IPs that you can run a reverse DNS lookup / whois on, but get their IPs dynamically allocated by CDNs.
Either way the point of custom DNS isn't really that you don't trust your ISP to not spy on you or whatever.
Anonymous No.106894768 [Report]
>>106894724
Multiple (unrelated) domains/websites can be hosted from a single IP. If the websites you're visiting are behind a CDN like Cloudflare (and you're using ECH) then adversaries wouldn't know what domain you're visiting.