From 2411fe29992ae86836f535aa2c7936df0b1e7053 Mon Sep 17 00:00:00 2001
From: nitrohorse <1514352+nitrohorse@users.noreply.github.com>
Date: Sat, 17 Aug 2019 18:22:19 -0700
Subject: [PATCH 1/7] Add section to validate DNS connection
---
_includes/sections/dns.html | 18 +++++++++++++++++-
1 file changed, 17 insertions(+), 1 deletion(-)
diff --git a/_includes/sections/dns.html b/_includes/sections/dns.html
index d8511966..b017b30d 100644
--- a/_includes/sections/dns.html
+++ b/_includes/sections/dns.html
@@ -37,7 +37,7 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
- ICANN DNS Provider |
+ ICANN DNS Provider |
Server Locations |
Privacy Policy |
Type |
@@ -285,6 +285,22 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
DNSCrypt - An older yet robust method of encrypting DNS.
+ How to Validate
+
+
+ - DoH / DoT
+
+ - Check https://www.dnsleaktest.com/.
+ - Check the website of your DNS provider. They may have a page for telling "you are using X DNS." Examples include AdGuard and Cloudflare.
+ - If using Firefox's trusted recursive resolver (TRR), navigate to
about:networking#dns
. If the TRR column says "true" for some fields, you are using DoH.
+
+
+ - dnscrypt-proxy - Try the above steps or attempt to stop it. If you have configured it correctly, your DNS requests will stop working (with the exception having Firefox's TRR configured).
+
+ - DNSSEC - Check https://dnssec.vs.uni-due.de/.
+ - QNAME Minimization - Run
dig +short txt qnamemintest.internet.nl
from the command-line (taken from this NLnet Labs presentation). You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
+
+
Worth Mentioning and Additional Information
--
2.49.0
From 6c1e22ba3cde1fd72735f7fccbb93fdfe1175c1e Mon Sep 17 00:00:00 2001
From: nitrohorse <1514352+nitrohorse@users.noreply.github.com>
Date: Mon, 19 Aug 2019 21:23:26 -0700
Subject: [PATCH 2/7] Iterate on feedback
---
_includes/sections/dns.html | 10 +++++-----
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/_includes/sections/dns.html b/_includes/sections/dns.html
index b017b30d..d5df343c 100644
--- a/_includes/sections/dns.html
+++ b/_includes/sections/dns.html
@@ -290,15 +290,15 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
- DoH / DoT
- - Check https://www.dnsleaktest.com/.
+ - Check DNSLeakTest.com.
- Check the website of your DNS provider. They may have a page for telling "you are using X DNS." Examples include AdGuard and Cloudflare.
- - If using Firefox's trusted recursive resolver (TRR), navigate to
about:networking#dns
. If the TRR column says "true" for some fields, you are using DoH.
+ - If using Firefox's trusted recursive resolver (TRR), navigate to
about:networking#dns
. If the TRR column says "true" for some fields, you are using DoH.
- - dnscrypt-proxy - Try the above steps or attempt to stop it. If you have configured it correctly, your DNS requests will stop working (with the exception having Firefox's TRR configured).
+
- dnscrypt-proxy - Check dnscrypt-proxy's wiki on how to verify that your DNS is encrypted.
- - DNSSEC - Check https://dnssec.vs.uni-due.de/.
- - QNAME Minimization - Run
dig +short txt qnamemintest.internet.nl
from the command-line (taken from this NLnet Labs presentation). You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
+ - DNSSEC - Check DNSSEC Resolver Test by Matthäus Wander.
+ - QNAME Minimization - Run
dig +short txt qnamemintest.internet.nl
from the command-line (taken from this NLnet Labs presentation). You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
Worth Mentioning and Additional Information
--
2.49.0
From 96554d612a046721a9716acfe68c0343e9375725 Mon Sep 17 00:00:00 2001
From: nitrohorse <1514352+nitrohorse@users.noreply.github.com>
Date: Tue, 20 Aug 2019 18:21:34 -0700
Subject: [PATCH 3/7] Update verification section title
---
_includes/sections/dns.html | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/_includes/sections/dns.html b/_includes/sections/dns.html
index d5df343c..04318e10 100644
--- a/_includes/sections/dns.html
+++ b/_includes/sections/dns.html
@@ -285,7 +285,7 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
- DNSCrypt - An older yet robust method of encrypting DNS.
- How to Validate
+ How to verify DNS is encrypted
- DoH / DoT
--
2.49.0
From a9d2d1f506133bc5d3e65035f2f8da1580a5cfde Mon Sep 17 00:00:00 2001
From: nitrohorse <1514352+nitrohorse@users.noreply.github.com>
Date: Tue, 20 Aug 2019 18:24:22 -0700
Subject: [PATCH 4/7] Update DNSLeakTest badge wording
---
_includes/sections/dns.html | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/_includes/sections/dns.html b/_includes/sections/dns.html
index 04318e10..a06bf2bd 100644
--- a/_includes/sections/dns.html
+++ b/_includes/sections/dns.html
@@ -290,7 +290,7 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
- DoH / DoT
- - Check DNSLeakTest.com.
+ - Check DNSLeakTest.com.
- Check the website of your DNS provider. They may have a page for telling "you are using X DNS." Examples include AdGuard and Cloudflare.
- If using Firefox's trusted recursive resolver (TRR), navigate to
about:networking#dns
. If the TRR column says "true" for some fields, you are using DoH.
--
2.49.0
From 60d1c757f6db2ab121116870f6fb56ce45aa28d1 Mon Sep 17 00:00:00 2001
From: nitrohorse <1514352+nitrohorse@users.noreply.github.com>
Date: Thu, 22 Aug 2019 21:23:10 -0700
Subject: [PATCH 5/7] Add CZ.NIC DNSSEC test site
---
_includes/sections/dns.html | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/_includes/sections/dns.html b/_includes/sections/dns.html
index a06bf2bd..12e84a56 100644
--- a/_includes/sections/dns.html
+++ b/_includes/sections/dns.html
@@ -297,7 +297,7 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
- dnscrypt-proxy - Check dnscrypt-proxy's wiki on how to verify that your DNS is encrypted.
- - DNSSEC - Check DNSSEC Resolver Test by Matthäus Wander.
+ - DNSSEC - Check DNSSEC Resolver Test by Matthäus Wander or DNSSEC Test by CZ.NIC.
- QNAME Minimization - Run
dig +short txt qnamemintest.internet.nl
from the command-line (taken from this NLnet Labs presentation). You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
--
2.49.0
From aee8f3bd2ec0b03a73c22a6ea3d1ca98b9a0afef Mon Sep 17 00:00:00 2001
From: nitrohorse <1514352+nitrohorse@users.noreply.github.com>
Date: Thu, 22 Aug 2019 21:27:31 -0700
Subject: [PATCH 6/7] Clarify DNS test page expectation
---
_includes/sections/dns.html | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/_includes/sections/dns.html b/_includes/sections/dns.html
index 12e84a56..9600d2a6 100644
--- a/_includes/sections/dns.html
+++ b/_includes/sections/dns.html
@@ -291,7 +291,7 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
- DoH / DoT
- Check DNSLeakTest.com.
- - Check the website of your DNS provider. They may have a page for telling "you are using X DNS." Examples include AdGuard and Cloudflare.
+ - Check the website of your DNS provider. They may have a page for telling "you are using our DNS." Examples include AdGuard and Cloudflare.
- If using Firefox's trusted recursive resolver (TRR), navigate to
about:networking#dns
. If the TRR column says "true" for some fields, you are using DoH.
--
2.49.0
From f59c63c0c941995806df60f7283b1fc9f0636a2e Mon Sep 17 00:00:00 2001
From: nitrohorse <1514352+nitrohorse@users.noreply.github.com>
Date: Sat, 24 Aug 2019 07:53:44 -0700
Subject: [PATCH 7/7] Remove CZ.NIC link
---
_includes/sections/dns.html | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/_includes/sections/dns.html b/_includes/sections/dns.html
index 9600d2a6..00428417 100644
--- a/_includes/sections/dns.html
+++ b/_includes/sections/dns.html
@@ -297,7 +297,7 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
- dnscrypt-proxy - Check dnscrypt-proxy's wiki on how to verify that your DNS is encrypted.
- - DNSSEC - Check DNSSEC Resolver Test by Matthäus Wander or DNSSEC Test by CZ.NIC.
+ - DNSSEC - Check DNSSEC Resolver Test by Matthäus Wander.
- QNAME Minimization - Run
dig +short txt qnamemintest.internet.nl
from the command-line (taken from this NLnet Labs presentation). You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
--
2.49.0