./net/dnscrypt-proxy2, DNS proxy with support for encrypted protocols

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 2.0.31, Package name: dnscrypt-proxy2-2.0.31, Maintainer: nia

A flexible DNS proxy, with support for modern encrypted DNS protocols
such as DNSCrypt v2 and DNS-over-HTTP/2.


Required to build:
[pkgtools/cwrappers] [lang/go112]

Master sites:

SHA1: 6261995e130bde8bcc6bc4f88efc08a82f93929c
RMD160: 86841fac815394672945462865e1ad16e7ebc2bf
Filesize: 2578.636 KB

Version history: (Expand)


CVS history: (Expand)


   2019-11-01 18:41:53 by Nia Alarie | Files touched by this commit (2) | Package updated
Log message:
dnscrypt-proxy2: Update to 2.0.31

* Version 2.0.31
 - This version fixes two regressions introduced in version 2.0.29:
DoH server couldn't be reached over IPv6 any more, and the proxy
couldn't be interrupted while servers were being benchmarked.

* Version 2.0.30
 - This version fixes a startup issue introduced in version 2.0.29,
on systems for which the service cannot be automatically installed
(such as OpenBSD and FreeBSD). Reported by @5ch17 and Vinícius Zavam,
and fixed by Will Elwood, thanks!

* Version 2.0.29
 - Support for Anonymized DNS has been added!
 - Wait before stopping, fixing an issue with Unbound (thanks to
Vladimir Bauer)
 - DNS stamps are now included in the -list-all -json ouptut
 - The netprobe_timeout setting from the configuration file or
command-line was ignored. This has been fixed.
 - The TTL or cloaked entries can now be adjusted (thanks to Markus
Linnala)
 - Cached IP address from DoH servers now expire (thanks to Markus
Linnala)
 - DNSCrypt certificates can be fetched over Tor and SOCKS proxies
 - Retries over TCP are faster
 - Improved logging (thanks to Alison Winters)
 - Ignore non-TXT records in certificate responses (thanks to Vladimir
Bauer)
 - A lot of internal cleanups, thanks to Markus Linnala.
   2019-10-18 16:59:01 by Benny Siegert | Files touched by this commit (155) | Package updated
Log message:
Revbump all Go packages after lang/go112 update
   2019-10-16 14:02:46 by Nia Alarie | Files touched by this commit (2) | Package updated
Log message:
dnscrypt-proxy2: Update to 2.0.28

* Version 2.0.28
 - Invalid server entries are now skipped instead of preventing a
source from being used. Thanks to Alison Winters for the contribution!
 - Truncated responses are immediately retried over TCP instead of
waiting for the client to retry. This reduces the latency for large
responses.
 - Responses sent to the local network are assumed to support at least
1252 bytes packets, and use optional information from EDNS up to 4096
bytes. This also reduces latency.
 - Logging improvements: servers are not logged for cached, synthetic
and cloaked responses. And the forwarder is logged instead of the
regular server for forwarded responses.
   2019-09-26 22:10:57 by Benny Siegert | Files touched by this commit (155) | Package updated
Log message:
Revbump all Go packages after 1.12.10 update.

ok wiz@ for PMC
   2019-09-10 11:30:45 by Nia Alarie | Files touched by this commit (2) | Package updated
Log message:
dnscrypt-proxy2: Update to 2.0.27

* Version 2.0.27
 - The X25519 implementation was changed from using the Go standard
implementation to using Cloudflare's CIRCL library. Unfortunately,
CIRCL appears to be broken on big-endian systems. That change has been
reverted.
 - All the dependencies have been updated.

* Version 2.0.26
 - A new plugin was added to prevent Firefox from bypassing the system
DNS settings.
 - New configuration parameter to set how to respond to blocked
queries: `blocked_query_response`. Responses can now be empty record
sets, REFUSED response codes, or predefined IPv4 and/or IPv6 addresses.
 - The `refused_code_in_responses` and `blocked_query_response` options
have been folded into a new `blocked_query_response` option.
 - The fallback resolver is now accessed using TCP if `force_tcp` has
been set to `true`.
 - CPU usage when enabling DNSCrypt ephemeral keys has been reduced.
 - New command-line option: `-show-certs` to print DoH certificate
hashes.
 - Solaris packages are now provided.
 - DoH servers on a non-standard port, with stamps that don't include
IP addresses, and without working system resolvers can now be properly
bootstrapped.
 - A new option, `query_meta`, is now available to add optional records
to client queries.
   2019-08-14 17:45:52 by Benny Siegert | Files touched by this commit (152) | Package updated
Log message:
Recursive bump of all packages using Go after Go 1.12.8 update.
   2019-06-08 01:47:00 by Nia Alarie | Files touched by this commit (2) | Package updated
Log message:
dnscrypt-proxy2: Update to 2.0.25

* Version 2.0.25
 - The example IP address for network probes didn't work on Windows.
The example configuration file has been updated and the fallback
resolver IP is now used when no netprobe address has been configured.

* Version 2.0.24
 - The query log now includes the time it took to complete the
transaction, the name of the resolver that sent the response and if
the response was served from the cache. Thanks to Ferdinand Holzer for
his help!
 - The list of resolvers, sorted by latency, is now printed after all
the resolvers have been probed.
 - The "fastest" load-balancing strategy has been renamed to \ 
"first".
 - On Windows, a nul byte is sent to the netprobe address. This is
required to check for connectivity on this platform. Thanks to Mathias
Berchtold.
 - The Malwaredomainlist URL was updated to directly parse the host
list. Thanks to Encrypted.Town.
 - The Python script to generate lists of blacklisted domains is now
compatible both with Python 2 and Python 3. Thanks to Simon R.
 - A warning is now displayed for DoH is requested but the server
doesn't speak HTTP/2.
 - A crash with loaded-balanced sets of cloaked names was fixed.
Thanks to @inkblotadmirer for the report.
 - Resolvers are now tried in random order to avoid favoring the first
ones at startup.
   2019-05-27 17:18:35 by Benny Siegert | Files touched by this commit (151) | Package updated
Log message:
Revbump all Go packages after go112 update.