Update to 2.0.33
This commit is contained in:
parent
9fd80dd81c
commit
4939718c39
|
@ -198,10 +198,9 @@ dnscrypt_ephemeral_keys = true
|
|||
fallback_resolver = '91.239.100.100:53'
|
||||
|
||||
|
||||
## Never let dnscrypt-proxy try to use the system DNS settings;
|
||||
## unconditionally use the fallback resolver.
|
||||
## Always use the fallback resolver before the system DNS settings
|
||||
|
||||
ignore_system_dns = false
|
||||
ignore_system_dns = true
|
||||
|
||||
|
||||
## Maximum time (in seconds) to wait for network connectivity before
|
||||
|
@ -567,6 +566,25 @@ cache_neg_max_ttl = 600
|
|||
# minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
|
||||
|
||||
|
||||
|
||||
|
||||
#########################################
|
||||
# Servers with known bugs #
|
||||
#########################################
|
||||
|
||||
[broken_implementations]
|
||||
|
||||
# Cisco servers currently cannot handle queries larger than 1472 bytes, and don't
|
||||
# truncate reponses larger than questions as expected by the DNSCrypt protocol.
|
||||
# This prevents large responses from being received, and breaks relaying.
|
||||
# A workaround for the first issue will be applied to servers in list below.
|
||||
# Do not change that list until the bugs are fixed server-side.
|
||||
|
||||
broken_query_padding = ['cisco', 'cisco-ipv6', 'cisco-familyshield']
|
||||
|
||||
|
||||
|
||||
|
||||
################################
|
||||
# Anonymized DNS #
|
||||
################################
|
||||
|
|
Loading…
Reference in New Issue