From 857287ca1d2fd2e53eafe0a26a3d3231485c3768 Mon Sep 17 00:00:00 2001 From: djoate <56777051+djoate@users.noreply.github.com> Date: Sun, 24 Nov 2019 15:39:19 -0500 Subject: [PATCH] Key DNS page --- _includes/sections/dns.html | 467 +++++++++++++++----------------- pages/providers/dns.html | 1 + weblate-source-file.yml | 514 +++++++++++++++++++++++++++++++++--- 3 files changed, 703 insertions(+), 279 deletions(-) diff --git a/_includes/sections/dns.html b/_includes/sections/dns.html index 4f9327e4..bb593516 100644 --- a/_includes/sections/dns.html +++ b/_includes/sections/dns.html @@ -1,4 +1,4 @@ -
ICANN DNS Provider | -Server Locations | -Privacy Policy | -Type | -Logging | -Protocols | -DNSSEC | -QNAME Minimization | -Filtering | -Source Code | -Hosting Provider | +{% t ICANN DNS Provider %} | +{% t Server Locations %} | +{% t Privacy Policy %} | +{% t Type %} | +{% t Logging %} | +{% t Protocols %} | +{% t DNSSEC %} | +{% t QNAME Minimization %} | +{% t Filtering %} | +{% t Source Code %} | +{% t Hosting Provider %} |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
- AdGuard - | -Anycast (based in - - - Cyprus) - + | + {% t AdGuard %} | +{% t Anycast (based in Cyprus)%} |
-
+
![]() |
- Commercial | -No | -DoH, DoT, DNSCrypt | -Yes | -Yes | +{% t Commercial %} | +{% t No %} | +{% t DoH, DoT, DNSCrypt %} | +{% t Yes %} | +{% t Yes %} | - Ads, trackers, + {% t Ads, trackers, %} - malicious domains + {% t malicious domains %} |
-
+
![]() |
- Serveroid, LLC + {% t Serveroid, LLC %} | ||||
- BlahDNS + | + {% t BlahDNS %} | - Finland, + {% t Finland %}, - Germany, + {% t Germany %}, - Japan + {% t Japan %} |
-
+
![]() |
- Hobby Project | -No | +{% t Hobby Project %} | +{% t No %} | - DoH, - - DoT , + {% t DoH %}, + + {% t DoT %} , - DNSCrypt + {% t DNSCrypt %} | -Yes | -Yes | +{% t Yes %} | +{% t Yes %} | - Ads, trackers, + {% t Ads, trackers, %} - malicious domains - + {% t malicious domains %} + |
-
+
![]() |
- Choopa, LLC, + {% t Choopa, LLC %}, - Data Center Light, + {% t Data Center Light %}, - Hetzner Online GmbH + {% t Hetzner Online GmbH %} | ||||||
- Cloudflare + | + {% t Cloudflare %} | -Anycast (based in - - - US) - + | {% t Anycast (based in US)%} |
-
+
![]() |
- Commercial | -Some | -DoH, DoT, DNSCrypt | -Yes | -Yes | -No | +{% t Commercial %} | +{% t Some %} | +{% t DoH, DoT, DNSCrypt %} | +{% t Yes %} | +{% t Yes %} | +{% t No %} | ? | -Self | +{% t Self %} | ||
- CZ.NIC + | + {% t CZ.NIC %} | - Czech Republic + {% t Czech Republic %} |
-
+
![]() |
- Association | -No | -DoH, DoT | -Yes | -Yes | +{% t Association %} | +{% t No %} | +{% t DoH, DoT %} | +{% t Yes %} | +{% t Yes %} | ? | ? | -Self | +{% t Self %} | ||||
- dnswarden + | + {% t dnswarden %} | - Germany + {% t Germany %} |
-
+
![]() |
- Hobby Project | -No | +{% t Hobby Project %} | +{% t No %} | - DoH, - - DoT , + {% t DoH %}, + + {% t DoT %} , - DNSCrypt + {% t DNSCrypt %} | -Yes | -Yes | +{% t Yes %} | +{% t Yes %} | - Based on server choice + {% t Based on server choice %} | ? | - Hetzner Online GmbH + {% t Hetzner Online GmbH %} | ||||||
- Foundation for Applied Privacy + | + {% t Foundation for Applied Privacy %} | - Austria + {% t Austria %} |
-
+
![]() |
- Non-Profit | -Some | +{% t Non-Profit %} | +{% t Some %} | - DoH, - - DoT + {% t DoH %}, + + {% t DoT %} | -Yes | -Yes | -No | +{% t Yes %} | +{% t Yes %} | +{% t No %} | ? | - IPAX OG + {% t IPAX OG %} | |||||
- NextDNS - | -Anycast (based in - - - US) - + {% t NextDNS %} | +{% t Anycast (based in US)%} |
-
+
![]() |
- Commercial | +{% t Commercial %} | - Based on user choice + {% t Based on user choice %} | -DoH, DoT, DNSCrypt | -Yes | -Yes | +{% t DoH, DoT, DNSCrypt %} | +{% t Yes %} | +{% t Yes %} | - Based on server choice + {% t Based on server choice %} | ? | -Self | +{% t Self %} | |||||
- NixNet + | + {% t NixNet %} | - Anycast (based in - - US), - + {% t Anycast (based in US),%} - US, + {% t US %}, - Luxembourg + {% t Luxembourg %} |
-
+
![]() |
- - Informal collective + + {% t Informal collective %} | -No | -DoH, DoT | -Yes | -Yes | +{% t No %} | +{% t DoH, DoT %} | +{% t Yes %} | +{% t Yes %} | - Based on server choice + {% t Based on server choice %} |
-
+
![]() |
- FranTech Solutions + {% t FranTech Solutions %} | ||||||
- PowerDNS + | + {% t PowerDNS %} | - The Netherlands + {% t The Netherlands %} |
-
+
![]() |
- Hobby Project | -No | -DoH | -Yes | -No | -No | +{% t Hobby Project %} | +{% t No %} | +{% t DoH %} | +{% t Yes %} | +{% t No %} | +{% t No %} |
-
+
![]() |
- TransIP B.V. Admin + {% t TransIP B.V. Admin %} | ||||
- Quad9 - | -Anycast (based in - - - US) - + | + {% t Quad9 %} | +{% t Anycast (based in US)%} |
-
+
![]() |
- Non-Profit | -Some | -DoH, DoT, DNSCrypt | -Yes | -Yes | +{% t Non-Profit %} | +{% t Some %} | +{% t DoH, DoT, DNSCrypt %} | +{% t Yes %} | +{% t Yes %} | - Malicious domains + {% t Malicious domains %} | ? | - Self, + {% t Self %}, - Packet Clearing House + {% t Packet Clearing House %} | ||||
- SecureDNS + | + {% t SecureDNS %} | - The Netherlands + {% t The Netherlands %} |
-
+
![]() |
- Hobby Project | -No | -DoH, DoT, DNSCrypt | -Yes | -Yes | +{% t Hobby Project %} | +{% t No %} | +{% t DoH, DoT, DNSCrypt %} | +{% t Yes %} | +{% t Yes %} | - Based on server choice + {% t Based on server choice %} | ? | - DigitalOcean, Inc. + {% t DigitalOcean, Inc. %} | |||||
- Snopyta + {% t Snopyta %} | - Finland + {% t Finland %} |
-
+
![]() |
- - Informal collective + + {% t Informal collective %} | -No | -DoH, DoT | -Yes | -Yes | +{% t No %} | +{% t DoH, DoT %} | +{% t Yes %} | +{% t Yes %} | - No + {% t No %} | ? | - Hetzner Online GmbH + {% t Hetzner Online GmbH %} | |||||||
- UncensoredDNS + | + {% t UncensoredDNS %} | -Anycast (based in + | {% t Anycast (based in Denmark)%}, - Denmark), - - - - - Denmark, + {% t Denmark %}, - US + {% t US %} |
-
+
![]() |
- Hobby Project | -No | -DoT | -Yes | -No | -No | +{% t Hobby Project %} | +{% t No %} | +{% t DoT %} | +{% t Yes %} | +{% t No %} | +{% t No %} | ? | - Self, + {% t Self %}, - Telia Company AB + {% t Telia Company AB %} |
about:networking#dns
. If the TRR column says "true" for some fields, you are using DoH. about:networking#dns
. If the TRR column says "true" for some fields, you are using DoH.%} dig +short txt qnamemintest.internet.nl
from the command-line (taken from this NLnet Labs presentation). If you are on Windows 10, run Resolve-DnsName -Type TXT -Name qnamemintest.internet.nl
from the PowerShell. You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
dig +short txt qnamemintest.internet.nl
from the command-line (taken from this NLnet Labs presentation). If you are on Windows 10, run Resolve-DnsName -Type TXT -Name qnamemintest.internet.nl
from the PowerShell. You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
%}about:preferences
) -> Network Settings -> Enable DNS over HTTPS. Set "Use Provider" to "Custom", and enter your DoH provider's address.about:config
by setting network.trr.custom_uri
and network.trr.uri
as the address you find from the documentation of your DoH provider and network.trr.mode
as 2
. It may also be desirable to set network.security.esni.enabled
to True
in order to enable encrypted SNI and make sites supporting ESNI a bit more difficult to track.about:preferences
) -> Network Settings -> Enable DNS over HTTPS. Set "Use Provider" to "Custom", and enter your DoH provider's address. %}about:config
by setting network.trr.custom_uri
and network.trr.uri
as the address you find from the documentation of your DoH provider and network.trr.mode
as 2
. It may also be desirable to set network.security.esni.enabled
to True
in order to enable encrypted SNI and make sites supporting ESNI a bit more difficult to track. %}about:networking#dns
. If the TRR column says "true" for some fields, you are using DoH.
Some_fields_will_say_false_depending_on_the_the_value_of_network.trr.mode_in_aboutconfig_KEY: |
Some fields will say "false" depending on the the value of network.trr.mode in about:config
-Check_a_hrefhttpsgithub.comjedisct1dnscryptproxywikiCheckingdnscryptproxys_wiki_on_how_KEY: |
- Check dnscrypt-proxy's wiki on how to verify that your DNS is encrypted.
+dnscryptproxy__Check_a_hrefhttpsgithub.comjedisct1dnscryptproxywikiCheckingdnscryptpr_KEY: |
+ dnscrypt-proxy - Check dnscrypt-proxy's wiki on how to verify that your DNS is encrypted.
-Check_a_hrefhttpsdnssec.vs.unidue.deDNSSEC_Resolver_Test_by_Matthus_Wandera._KEY: |
- Check DNSSEC Resolver Test by Matthäus Wander.
+DNSSEC__Check_a_hrefhttpsdnssec.vs.unidue.deDNSSEC_Resolver_Test_by_Matthus_Wandera._KEY: |
+ DNSSEC - Check DNSSEC Resolver Test by Matthäus Wander.
QNAME_Minimization__Run_codedig_short_txt_qnamemintest.internet.nlcode_from_the_commandline__KEY: |
QNAME Minimization - Run dig +short txt qnamemintest.internet.nl
from the command-line (taken from this NLnet Labs presentation). If you are on Windows 10, run Resolve-DnsName -Type TXT -Name qnamemintest.internet.nl
from the PowerShell. You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
+Worth_Mentioning_and_Additional_Information_KEY: |
+ Worth Mentioning and Additional Information
+
+Encrypted_DNS_clients_for_desktop_KEY: |
+ Encrypted DNS clients for desktop:
+
emFirefoxem_comes_with_builtin_DoH_support_with_Cloudflare_set_as_the_default_resolver_but_can_KEY: |
Firefox comes with built-in DoH support with Cloudflare set as the default resolver, but can be configured to use any DoH resolver.
@@ -782,30 +1154,69 @@ Cloudflare_has_agreed_to_collect_only_a_limited_amount_of_data_about_the_DNS_req
httpsdevelopers.cloudflare.com1.1.1.1commitmenttoprivacyprivacypolicyfirefox_KEY: |
https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/firefox/
+Currently_Mozilla_is_a_hrefhttpsblog.mozilla.orgfuturereleases20190731dnsoverhttpsdohu_KEY: |
+ Currently Mozilla is conducting studies before enabling DoH by default for all US-based Firefox users.
+
DNS_over_HTTPS_can_be_enabled_in_Menu__Preferences_codeaboutpreferencescode__Network_Sett_KEY: |
DNS over HTTPS can be enabled in Menu -> Preferences (about:preferences
) -> Network Settings -> Enable DNS over HTTPS. Set "Use Provider" to "Custom", and enter your DoH provider's address.
+Advanced_users_may_enable_it_in_codeaboutconfigcode_by_setting_codenetwork.trr.custom_urico_KEY: |
+ Advanced users may enable it in about:config
by setting network.trr.custom_uri
and network.trr.uri
as the address you find from the documentation of your DoH provider and network.trr.mode
as 2
. It may also be desirable to set network.security.esni.enabled
to True
in order to enable encrypted SNI and make sites supporting ESNI a bit more difficult to track.
+
+Encrypted_DNS_clients_for_mobile_KEY: |
+ Encrypted DNS clients for mobile:
+
emAndroid_9em_comes_with_a_DoT_client_by_a_hrefhttpssupport.google.comandroidanswer9089_KEY: |
Android 9 comes with a DoT client by default.
+...but_with_some_caveats_KEY: |
+ ...but with some caveats
+
httpswww.quad9.netprivatednsquad9android9_KEY: |
https://www.quad9.net/private-dns-quad9-android9/
We_recommend_selecting_emPrivate_DNS_provider_hostnameem_and_entering_the_DoT_address_from_docum_KEY: |
We recommend selecting Private DNS provider hostname and entering the DoT address from documentation of your DoT provider to enable strict mode (see Terms above).
+If_you_are_on_a_network_blocking_access_to_port_853_Android_will_error_about_the_network_not_having__KEY: |
+ If you are on a network blocking access to port 853, Android will error about the network not having internet connectivity.
+
+httpsapps.apple.comappid1452162351_KEY: |
+ https://apps.apple.com/app/id1452162351
+
+DNSCloak_KEY: |
+ DNSCloak
+
An_a_hrefhttpsgithub.comssdnscloakopensourcea_DNSCrypt_and_DoH_client_for_iOS_by_td_KEY: |
An open-source DNSCrypt and DoH client for iOS by