From 2411fe29992ae86836f535aa2c7936df0b1e7053 Mon Sep 17 00:00:00 2001
From: nitrohorse <1514352+nitrohorse@users.noreply.github.com>
Date: Sat, 17 Aug 2019 18:22:19 -0700
Subject: [PATCH] Add section to validate DNS connection
---
_includes/sections/dns.html | 18 +++++++++++++++++-
1 file changed, 17 insertions(+), 1 deletion(-)
diff --git a/_includes/sections/dns.html b/_includes/sections/dns.html
index d8511966..b017b30d 100644
--- a/_includes/sections/dns.html
+++ b/_includes/sections/dns.html
@@ -37,7 +37,7 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
- | ICANN DNS Provider |
+ ICANN DNS Provider |
Server Locations |
Privacy Policy |
Type |
@@ -285,6 +285,22 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
DNSCrypt - An older yet robust method of encrypting DNS.
+ How to Validate
+
+
+ - DoH / DoT
+
+ - Check https://www.dnsleaktest.com/.
+ - Check the website of your DNS provider. They may have a page for telling "you are using X DNS." Examples include AdGuard and Cloudflare.
+ - If using Firefox's trusted recursive resolver (TRR), navigate to
about:networking#dns. If the TRR column says "true" for some fields, you are using DoH.
+
+
+ - dnscrypt-proxy - Try the above steps or attempt to stop it. If you have configured it correctly, your DNS requests will stop working (with the exception having Firefox's TRR configured).
+
+ - DNSSEC - Check https://dnssec.vs.uni-due.de/.
+ - QNAME Minimization - Run
dig +short txt qnamemintest.internet.nl from the command-line (taken from this NLnet Labs presentation). You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
+
+
Worth Mentioning and Additional Information