Yet another EM7455 question
Michael Shell
list1 at michaelshell.org
Fri Jun 24 19:55:20 UTC 2016
On Fri, 24 Jun 2016 12:57:35 +0200
Bjørn Mork <bjorn at mork.no> wrote:
> This means that some operators filter the Google DNS servers.
In addition to using a VPN, one option to overcome such increasingly
commonb and vile ISP behavior is DNSCrypt:
https://dnscrypt.org/
The list of known encrypted DNS servers is stored in
/usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv
The DNS crypt daemon is started like:
/usr/sbin/dnscrypt-proxy --daemonize -u dnscrypt --resolvers-list=/usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv --resolver-name=open
dns
To bypass ISP UDP traffic filters, you can add the --tcp-only option.
There also is --resolver-address=<ip>[:port]
See
man dnscrypt-proxy
for details.
Just set your /etc/resolv.conf to contain:
# the local DNSCrypt proxy
nameserver 127.0.0.1
and the system will use the DNSCrypt proxy connection for
DNS lookups.
BTW, many mobile ISPs, at least T-Mobile, are now using a web
proxy to snoop on all open http (non-https) traffic.
The days of any unencrypted web traffic are coming to an
end and with good reason it seems.
Cheers,
Mike Shell
More information about the ModemManager-devel
mailing list