Yet another EM7455 question

Michael Shell list1 at michaelshell.org
Fri Jun 24 19:55:20 UTC 2016


On Fri, 24 Jun 2016 12:57:35 +0200
Bjørn Mork <bjorn at mork.no> wrote:

> This means that some operators filter the Google DNS servers.  


In addition to using a VPN, one option to overcome such increasingly
commonb and vile ISP behavior is DNSCrypt:

https://dnscrypt.org/

The list of known encrypted DNS servers is stored in 
/usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv 

The DNS crypt daemon is started like:

 /usr/sbin/dnscrypt-proxy --daemonize -u dnscrypt --resolvers-list=/usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv --resolver-name=open
dns

To bypass ISP UDP traffic filters, you can add the --tcp-only option.
There also is --resolver-address=<ip>[:port]

See

man dnscrypt-proxy

for details. 

Just set your /etc/resolv.conf to contain:

# the local DNSCrypt proxy
nameserver 127.0.0.1

and the system will use the DNSCrypt proxy connection for
DNS lookups.

BTW, many mobile ISPs, at least T-Mobile, are now using a web
proxy to snoop on all open http (non-https) traffic.

The days of any unencrypted web traffic are coming to an
end and with good reason it seems.


  Cheers,

  Mike Shell


More information about the ModemManager-devel mailing list