On Fri, 24 Jun 2016 12:57:35 +0200 Bjørn Mork <bj...@mork.no> wrote:
> This means that some operators filter the Google DNS servers. In addition to using a VPN, one option to overcome such increasingly commonb and vile ISP behavior is DNSCrypt: https://dnscrypt.org/ The list of known encrypted DNS servers is stored in /usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv The DNS crypt daemon is started like: /usr/sbin/dnscrypt-proxy --daemonize -u dnscrypt --resolvers-list=/usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv --resolver-name=open dns To bypass ISP UDP traffic filters, you can add the --tcp-only option. There also is --resolver-address=<ip>[:port] See man dnscrypt-proxy for details. Just set your /etc/resolv.conf to contain: # the local DNSCrypt proxy nameserver 127.0.0.1 and the system will use the DNSCrypt proxy connection for DNS lookups. BTW, many mobile ISPs, at least T-Mobile, are now using a web proxy to snoop on all open http (non-https) traffic. The days of any unencrypted web traffic are coming to an end and with good reason it seems. Cheers, Mike Shell _______________________________________________ ModemManager-devel mailing list ModemManager-devel@lists.freedesktop.org https://lists.freedesktop.org/mailman/listinfo/modemmanager-devel