Run your own caching, non-censoring, non-logging, DNSSEC-capable, DNSCrypt-enabled DNS resolver virtually anywhere!
If you are already familiar with Docker, it shouldn't take more than 5 minutes to get your resolver up and running.
Table of contents:
Think about a name. This is going to be part of your DNSCrypt provider name.
If you are planning to make your resolver publicly accessible, this name will
be public.
By convention, it has to look like a domain name (example.com), but it doesn't
have to be an actual, registered domain.
Let's pick example.com here.
You probably need to perform the following steps as root.
Download, create and initialize the container:
docker run --name=dnscrypt-server -p 443:443/udp -p 443:443/tcp \ --restart=unless-stopped \ -v /etc/dnscrypt-server/keys:/opt/encrypted-dns/etc/keys \ jedisct1/dnscrypt-server init -N example.com -E '192.168.1.1:443'
This will only accept connections via DNSCrypt on the standard port (443). Replace
192.168.1.1 with the actual external IP address (not the internal Docker one)
clients will connect to.
IPv6 addresses should be enclosed in brackets; for example: [2001:0db8::412f]:443.
Multiple comma-separated IPs and ports can be specified, as in -E '192.168.1.1:443,[2001:0db8::412f]:443'.
If you want to use a different port, replace all occurrences of 443 with the alternative port in the
command above (including -p ...). But if you have an existing website that should be accessible on
port 443, the server can transparently relay non-DNS traffic to it (see below).
-v /etc/dnscrypt-server:/opt/encrypted-dns/etc/keys means that the path /opt/encrypted-dns/etc/keys, internal to the container, is mapped to /etc/dnscrypt-server/keys, the directory we just created before. Do not change /opt/encrypted-dns/etc/keys. But if you created a directory in a different location, replace /etc/dnscrypt-server/keys accordingly in the command above.
Note: on MacOS, don't use -v ...:.... Remove that part from the command-line, as current versions of MacOS and Docker don't seem to work well with shared directories.
The init command will print the DNS stamp of your server.
Done.
You can verify that the server is running with:
docker ps
Note: if you previously created a container with the same name, and Docker complains that the name is already in use, remove it and try again:
docker rm --force dnscrypt-server
In order to install the latest version of the image, or change parameters, use the following steps:
docker pull jedisct1/dnscrypt-server
state directory):ls -l /etc/dnscrypt-server/keys
If you have some content here, skip to step 3.
Nothing here? Maybe you didn't use the -v option to map container files to a local directory when creating the container.
In that case, copy the data directly from the container:
docker cp dnscrypt-server:/opt/encrypted-dns/etc/keys ~/keys
docker stop dnscrypt-server docker ps # Check that it's not running
docker rename dnscrypt-server dnscrypt-server-old
init command again and start the new container:docker run --name=dnscrypt-server -p 443:443/udp -p 443:443/tcp \ --restart=unless-stopped \ -v /etc/dnscrypt-server/keys:/opt/encrypted-dns/etc/keys \ jedisct1/dnscrypt-server init -N example.com -E '192.168.1.1:443' # (adjust accordingly) docker ps # Check that it's running
docker rm dnscrypt-server-old
Parameters differ from the ones used in the previous container.
For example, if you originally didn't activate relaying
but want to enable it, append -A to the command. Or if you want to enable
metrics, append -M 0.0.0.0:9100 to the end, and -p 9100:9100/tcp after
-p 443:443/tcp (see below).
The server can be configured as a relay for the Anonymized DNSCrypt protocol by adding the -A switch to the init command.
The relay DNS stamp will be printed right after the regular stamp.
Metrics are accessible inside the container as http://127.0.0.1:9100/metrics.
They can be made accessible outside of the container by adding the -M option followed by the listening IP and port (for example: -M 0.0.0.0:9100).
These metrics can be indexed with Prometheus and dashboards can be created with Grafana.
If the DNS server is listening to port 443, but you still want to have a web (or DoH) service accessible on that port, add the -T switch followed by the backend server IP and port to the init command (for example: -T 10.0.0.1:4443).
The backend server must support the HTTP/2 protocol.
The server can be used block domains. For example, the sfw.scaleway-fr server uses that feature to provide a service that blocks websites possibly not suitable for children.
In order to do so, create a directory that will contain the blacklists:
mkdir -p /etc/dnscrypt-server/lists
And put the list of domains to block in a file named /etc/dnscrypt-server/lists/blacklist.txt, one domain per line.
Then, follow the upgrade procedure, adding the following option to the docker run command: -v /etc/dnscrypt-server/lists:/opt/encrypted-dns/etc/lists.
If you want to help against DNS centralization and surveillance, announce your server and/or relay on the list of public DNS DoH and DNSCrypt servers.
The best way to do so is to send a pull request to the dnscrypt-resolvers repository.
Kubernetes configurations are located in the kube directory. Currently these assume
a persistent disk named dnscrypt-keys on GCE. You will need to adjust the volumes
definition on other platforms. Once that is setup, you can have a dnscrypt server up
in minutes.
kube/dnscrypt-init-job.yml. Change example.com to your desired hostname
and 127.0.0.1 to your static IP.kube/dnscrypt-srv.yml and change loadBalancerIP to your static IP in both locations.kubectl create -f kube/dnscrypt-init-job.yml to setup your keys.kubectl create -f kube/dnscrypt-deployment.yml to deploy the dnscrypt server.kubectl create -f kube/dnscrypt-srv.yml to expose your server to the world.To get your public key just view the logs for the dnscrypt-init job. The public
IP for your server is merely the dnscrypt service address.
You can setup a server very quickly with Docker Compose.
docker-compose updocker-compose.yml to use the start command.docker-compose upNow you will have a local server running on port 5443.
To add new configuration to Unbound, add files to the /opt/unbound/etc/unbound/zones
directory. All files ending in .conf will be processed. In this manner, you
can add any directives to the server: section of the Unbound configuration.
While Unbound is not a full authoritative name server, it supports resolving
custom entries in a way that is serviceable on a small, private LAN. You can use
unbound to resolve private hostnames such as my-computer.example.com within
your LAN.
To support such custom entries using this image, first map a volume to the zones
directory. Add this to your docker run line:
-v /etc/dnscrypt-server/zones:/opt/unbound/etc/unbound/zones
The whole command to create and initialize a container would look something like this:
docker run --name=dnscrypt-server \ -v /etc/dnscrypt-server/zones:/opt/unbound/etc/unbound/zones \ -p 443:443/udp -p 443:443/tcp --net=host \ jedisct1/dnscrypt-server init -N example.com -E '192.168.1.1:443'
Create a new .conf file:
touch /etc/dnscrypt-server/zones/example.conf
Now, add one or more unbound directives to the file, such as:
local-zone: "example.com." static local-data: "my-computer.example.com. IN A 10.0.0.1" local-data: "other-computer.example.com. IN A 10.0.0.2"
If Unbound doesn't like one of the newly added directives, it will probably not respond over the network. In that case, here are some commands to work out what is wrong:
docker logs dnscrypt-server docker exec dnscrypt-server /opt/unbound/sbin/unbound-checkconf
In order to delete everything (containers and images), type:
docker rm --force dnscrypt-server ||: docker rmi --force jedisct1/dnscrypt-server ||:
Keys and certificates are automatically rotated every 8 hour.


AI赋能电商视觉革命,一站式智能商拍平台
潮际好麦深耕服装行业,是国内AI试衣效果最好的软件。使用先进AIGC能力为电商卖家批量提供优质的、低成本的商拍图。合作品牌有Shein、Lazada、安踏、百丽等65个国内外头部品牌,以及国内10万+淘宝、天猫、京东等主流平台的品牌商家,为卖家节省将近85%的出图成本,提升约3倍出图效率,让品牌能够快速上架。


企业专属的AI法律顾问
iTerms是法大大集团旗下法律子品牌,基于最先进的大语言模型(LLM)、专业的法律知识库和强大的智能体架构,帮助企业扫清合规障碍,筑牢风控防线,成为您企业专属的AI法律顾问。


稳定高效的流量提升解决方案,助力品牌曝光
稳定高效的流量提升解决方案,助力品牌曝光


最新版Sora2模型免费使用,一键生成无水印视频
最新版Sora2模型免费使用,一键生成无水印视频


实时语音翻译/同声传译工具
Transly是一个多场景的AI大语言模型驱动的同声传译、专业翻译助手,它拥有超精准的音频识别翻译能力,几乎零延迟的使用体验和支持多国语言可以让你带它走遍全球,无论你是留学生、商务人士、韩剧美剧爱好者,还是出国游玩、多国会议、跨国追星等等,都可以满足你所有需要同传的场景需求,线上线下通用,扫除语言障碍,让全世界的语言交流不再有国界。


选题、配图、成文,一站式创作,让内容运营更高效
讯飞绘文,一个AI集成平台,支持写作、选题、配图、排版和发布。高效生成适用于各类媒体的定制内容,加速品牌传播,提升内容营销效果。


AI辅助编程,代码自动修复
Trae是一种自适应的集成开发环境(IDE),通过自动化和多元协作改变开发流程。利用Trae,团队能够更快速、精确地编写和部署代码,从而提高编程效率和项目交付速度。Trae具备上下文感知和代码自动完成功能,是提升开发效率的理想工具。


最强AI数据分析助手
小浣熊家族Raccoon,您的AI智能助手,致力于通过先进的人工智能技术,为用户提供高效、便捷的智能服务。无论是日常咨询还是专业问题解答,小浣熊都能以快速、准确的响应满足您的需求,让您的生活更加智能便捷。


像人一样思考的AI智能体
imini 是一款超级AI智能体,能根据人类指令,自主思考、自主完成、并且交付结果的AI智能体。


AI数字人视频创作平台
Keevx 一款开箱即用的AI数字人视频创作平台,广泛适用于电商广告、企业培训与社媒宣传,让全球企业与个人创作者无需拍摄剪辑,就能快速生成多语言、高质量的专业视频。
最新AI工具、AI资讯
独家AI资源、AI项目落地

微信扫一扫关注公众号