Update 'README.md'

This commit is contained in:
quindecim 2019-10-01 16:57:13 -04:00
parent 8ae39013be
commit f2ad7ffb31
1 changed files with 26 additions and 19 deletions

View File

@ -1,4 +1,4 @@
# DNSCrypt Proxy 2 for Android
# DNSCrypt Proxy 2 for Android | privacy oriented
A flexible DNS proxy, with support for modern encrypted DNS protocols such as [DNSCrypt v2](https://github.com/DNSCrypt/dnscrypt-protocol/blob/master/DNSCRYPT-V2-PROTOCOL.txt) and [DNS-over-HTTP/2](https://tools.ietf.org/html/draft-ietf-doh-dns-over-https-03).
@ -7,42 +7,49 @@ A flexible DNS proxy, with support for modern encrypted DNS protocols such as [D
- ipv4 and ipv6 are supported.
- All binary files are downloaded from [https://github.com/jedisct1/dnscrypt-proxy/releases](https://github.com/jedisct1/dnscrypt-proxy/releases)
## Differences between default DNSCrypt Proxy project
### dnscrypt-proxy.toml
- ⛔️ Disable DoH
- ⛔️ Disable IPv6
- ⛔️ `refused` response for blocked queries
- ✅ Require DNSSEC
- ✅ Ephemeral keys (create a new, unique key for every single DNS query)
- Set DNS query max. response time from `2500` to `1500`, in ms.
- Use [UncensoredDNS](https://blog.uncensoreddns.org/dns-servers/) as fallback resolver *(address used to initializing connection to the other resolvers)*
- Use `dnscrypt.uk` (UK), `dnscrypt.eu` (DK/NL), `dnswarden` (DE), `charis` (IT) and `suami` (IT)
## Installation
1. Download and latest `.zip` module from here or from [MY TELEGRAM CHANNEL](https://t.me/dnscrypt_proxy) and then flash it in Magisk Manager App or in Recovery.
1. Download latest `.zip` file from here or from [MY TELEGRAM CHANNEL](https://t.me/dnscrypt_proxy) and then flash it in Magisk Manager App or in Recovery.
2. Reboot.
3. Edit `dnscrypt-proxy.toml` as you wish located on `/sdcard/dnscrypt-proxy/dnscrypt-proxy.toml` [or /data/media/0/dnscrypt-proxy/dnscrypt-proxy.toml]
4. Reboot.
5. Open AFWall+ and set custom script:
*(remember to modify the fallback resolver with the one you chose previously in the .toml file)*
3. Open AFWall+ and set custom script:
**ENTER SCRIPT:**
```
iptables -t nat -A OUTPUT -p tcp ! -d 9.9.9.9 --dport 53 -j DNAT --to-destination 127.0.0.1:5354
iptables -t nat -A OUTPUT -p udp ! -d 9.9.9.9 --dport 53 -j DNAT --to-destination 127.0.0.1:5354
ip6tables -t nat -A OUTPUT -p tcp ! -d 9.9.9.9 --dport 53 -j DNAT --to-destination [::1]:5354
ip6tables -t nat -A OUTPUT -p udp ! -d 9.9.9.9 --dport 53 -j DNAT --to-destination [::1]:5354
iptables -t nat -A OUTPUT -p tcp ! -d 91.239.100.100 --dport 53 -j DNAT --to-destination 127.0.0.1:53
iptables -t nat -A OUTPUT -p udp ! -d 91.239.100.100 --dport 53 -j DNAT --to-destination 127.0.0.1:53
```
**SHUTDOWN SCRIPT:**
```
iptables -t nat -D OUTPUT -p tcp ! -d 9.9.9.9 --dport 53 -j DNAT --to-destination 127.0.0.1:5354
iptables -t nat -D OUTPUT -p udp ! -d 9.9.9.9 --dport 53 -j DNAT --to-destination 127.0.0.1:5354
ip6tables -t nat -D OUTPUT -p tcp ! -d 9.9.9.9 --dport 53 -j DNAT --to-destination [::1]:5354
ip6tables -t nat -D OUTPUT -p udp ! -d 9.9.9.9 --dport 53 -j DNAT --to-destination [::1]:5354
iptables -t nat -D OUTPUT -p tcp ! -d 91.239.100.100 --dport 53 -j DNAT --to-destination 127.0.0.1:53
iptables -t nat -D OUTPUT -p udp ! -d 91.239.100.100 --dport 53 -j DNAT --to-destination 127.0.0.1:53
```
## Configuration (post-installing)
### Configuration (post-installing)
- You can edit `dnscrypt-proxy.toml` as you wish located on `/sdcard/dnscrypt-proxy/dnscrypt-proxy.toml` [or /data/media/0/dnscrypt-proxy/dnscrypt-proxy.toml]
- For more detailed configuration please refer to [official documentation](https://github.com/jedisct1/dnscrypt-proxy/wiki/Configuration)
- FOR MORE SUPPORT ON A GOOD PRIVACY-ORIENTED SETUP, JOIN [MY TELEGRAM CHAT](https://t.me/qd_invitation)
## Changelog
#### v2.0.27 - quindecim
#### v2.0.27
* new maintainer
* updated binary & configuration files to 2.0.27
* updated binary & configuration files to 2.0.27 | jedisct1
* uploaded privacy config to 2.0.27 | quindecim
[Full changelog](changelog.md)