[UPSTREAM] - Quad9 doesn't seem to block fragments on all networks

c4287c799f
This commit is contained in:
quindecim 2020-03-25 03:42:50 -04:00
parent 08f07cae9c
commit 89111acf48
1 changed files with 6 additions and 3 deletions

View File

@ -623,10 +623,10 @@ cache_neg_max_ttl = 600
# truncate reponses larger than questions as expected by the DNSCrypt protocol. # truncate reponses larger than questions as expected by the DNSCrypt protocol.
# This prevents large responses from being received, and breaks relaying. # This prevents large responses from being received, and breaks relaying.
# A workaround for the first issue will be applied to servers in list below. # A workaround for the first issue will be applied to servers in list below.
# Quad9 (actually dnsdist) appears to currently have a similar issue. # Quad9 appears to be dropping fragmented UDP queries, but only for some networks.
# Do not change that list until the bugs are fixed server-side. # Do not change that list until the bugs are fixed server-side.
broken_query_padding = ['cisco', 'cisco-ipv6', 'cisco-familyshield', 'quad9-dnscrypt-ip4-filter-alt', 'quad9-dnscrypt-ip4-filter-pri', 'quad9-dnscrypt-ip4-nofilter-alt', 'quad9-dnscrypt-ip4-nofilter-pri', 'quad9-dnscrypt-ip6-filter-alt', 'quad9-dnscrypt-ip6-filter-pri', 'quad9-dnscrypt-ip6-nofilter-alt', 'quad9-dnscrypt-ip6-nofilter-pri'] broken_query_padding = ['cisco', 'cisco-ipv6', 'cisco-familyshield']
@ -634,10 +634,13 @@ broken_query_padding = ['cisco', 'cisco-ipv6', 'cisco-familyshield', 'quad9-dnsc
# TLS Client Authentication # # TLS Client Authentication #
################################ ################################
# This is only useful if you are operating your own, private DoH server(s).
# (for DNSCrypt, see the `query_meta` feature instead)
[tls_client_auth] [tls_client_auth]
# creds = [ # creds = [
# { server_name='myserver', client_cert='client.crt', client_key='client.key' }, # { server_name='myserver', client_cert='client.crt', client_key='client.key' }
# ] # ]