On Fri, 24 Jun 2016 12:57:35 +0200
Bjørn Mork <bj...@mork.no> wrote:

> This means that some operators filter the Google DNS servers.  


In addition to using a VPN, one option to overcome such increasingly
commonb and vile ISP behavior is DNSCrypt:

https://dnscrypt.org/

The list of known encrypted DNS servers is stored in 
/usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv 

The DNS crypt daemon is started like:

 /usr/sbin/dnscrypt-proxy --daemonize -u dnscrypt 
--resolvers-list=/usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv 
--resolver-name=open
dns

To bypass ISP UDP traffic filters, you can add the --tcp-only option.
There also is --resolver-address=<ip>[:port]

See

man dnscrypt-proxy

for details. 

Just set your /etc/resolv.conf to contain:

# the local DNSCrypt proxy
nameserver 127.0.0.1

and the system will use the DNSCrypt proxy connection for
DNS lookups.

BTW, many mobile ISPs, at least T-Mobile, are now using a web
proxy to snoop on all open http (non-https) traffic.

The days of any unencrypted web traffic are coming to an
end and with good reason it seems.


  Cheers,

  Mike Shell
_______________________________________________
ModemManager-devel mailing list
ModemManager-devel@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/modemmanager-devel

Reply via email to