sudo nano /etc/systemd/resolved.conf
[Resolve]
DNS=dns.rocksdns.ovh dns2.rocksdns.ovh
DNSOverTLS=yes
Domains=~.
sudo systemctl restart systemd-resolved
sudo systemctl enable systemd-resolved
resolvectl status
sudo apt install stubby
sudo nano /etc/stubby/stubby.yml
# Añade los servidores con tls_auth_name correctos...
sudo systemctl enable --now stubby
wget … cloudflared …
sudo nano /etc/cloudflared/config.yml
proxy-dns-upstream:
- https://dns.rocksdns.ovh/dns-query
- https://dns2.rocksdns.ovh/dns-query
sudo systemctl enable --now cloudflared
sudo apt install dnscrypt-proxy
sudo nano /etc/dnscrypt-proxy/dnscrypt-proxy.toml
# client names…
sudo systemctl enable --now dnscrypt-proxy
about:config
network.trr.mode = 3
network.trr.uri = https://dns.rocksdns.ovh/dns-query
chrome --enable-features=dns-over-https \
--dns-over-https-templates="https://dns.rocksdns.ovh/dns-query"
dig @127.0.0.1 google.com
dig @dns.rocksdns.ovh +tls google.com
curl -H 'accept: application/dns-json' \
'https://dns.rocksdns.ovh/dns-query?name=google.com&type=A'
systemctl status systemd-resolved stubby cloudflared dnscrypt-proxy
ping dns.rocksdns.ovh
nslookup google.com
NetworkManager, Docker, netplan…
journalctl -u stubby -f
sudo tcpdump -i any port 853 or 443
#!/bin/bash
# check_dns.sh
dig @dns.rocksdns.ovh +tls google.com && echo "OK"
dnsmasq, caché local, etc.
sudo cp /etc/systemd/resolved.conf /backup/
sudo systemctl restart systemd-resolved
resolvectl status
systemd-resolve --flush-caches
ping dns.rocksdns.ovh
ping dns2.rocksdns.ovh
Categorías: Guías | Etiquetas: