Skip to content

This issue was moved to a discussion.

You can continue the conversation there. Go to discussion →

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DNScrypt #2669

Closed
3 tasks done
blixten85 opened this issue Feb 11, 2021 · 7 comments
Closed
3 tasks done

DNScrypt #2669

blixten85 opened this issue Feb 11, 2021 · 7 comments
Labels

Comments

@blixten85
Copy link

blixten85 commented Feb 11, 2021

Prerequisites

Please answer the following questions for yourself before submitting an issue. YOU MAY DELETE THE PREREQUISITES SECTION.

  • I am running the latest version
  • I checked the documentation and found no answer
  • I checked to make sure that this issue has not already been filed

Problem Description

How do i do this behind a router? There is no WiKi for it?
Must i run the Adguard Home exposed to the internet?

I am getting a public IP from DHCP from my ISP.
I get one public IP per unit.
In this case i generated the cert directly connected to the internet. This gave me a diffrent ip than my routers.
Now i am behind my router again (this is how i want to run this Adguard Home).
Getting the DNSCrypt to work behind the router will fail since 2021/02/11 14:09:02 [fatal] failed to establish connection with the server: dial udp: address *.priv.bahnhof.se: missing port in address

No wonder, i am behind another IP now (the router's one)
If i only could take the routers IP and generate cert and point port to my Adguard Home.

Proposed Solution

Alternatives Considered

Additional Information

@ameshkov
Copy link
Member

Why would you want this behind the router?

The point of DNS encryption is to hide your traffic when it goes to a public server. If your AdGuard Home is not exposed to the Internet, there's no one who can see your traffic anyways.

@blixten85
Copy link
Author

blixten85 commented Feb 11, 2021 via email

@ameshkov
Copy link
Member

You just need to use an encrypted DNS upstream in AdGuard Home. Although, it does use encryption by default.

@BobWs
Copy link

BobWs commented Feb 16, 2021

I have some questions about DNSCrypt

  1. Will AGH work with this Docker DNSCrypt Server?
    https://github.com/dnscrypt/dnscrypt-server-docker

  2. And also if you are already using AGH in combination with a VPN for all clients in a LAN Network is DNSCrypt overkill?

@ameshkov
Copy link
Member

Well, it will, but you don't really need it, AGH is perfectly able to use DNSCrypt upstream servers OR work as a DNSCRypt server by itself.

And also if you are already using AGH in combination with a VPN for all clients in a LAN Network is DNSCrypt overkill?

Yes, for sure, this would be an overkill.

@blixten85
Copy link
Author

Well, it will, but you don't really need it, AGH is perfectly able to use DNSCrypt upstream servers OR work as a DNSCRypt server by itself.

And also if you are already using AGH in combination with a VPN for all clients in a LAN Network is DNSCrypt overkill?

Yes, for sure, this would be an overkill.

But you must make sure it is dead, right?

@blixten85
Copy link
Author

This does not work for me, i have even tried to configure a DNScrypt server of my own.
Still no success.
Is this guide all you need to get it working? Or is there something missing?
2021/02/19 20:46:41 [fatal] failed to establish connection with the server: read udp xxx.xxx.xxx.xxx:33456->xxx.xxx.xxx.xxx:5443: read: connection refused

I've managed to get the same result but with some I/O timed out error instead.

The box is infront of internet now, with a public ip.

@AdguardTeam AdguardTeam locked and limited conversation to collaborators Feb 23, 2021

This issue was moved to a discussion.

You can continue the conversation there. Go to discussion →

Labels
Projects
None yet
Development

No branches or pull requests

4 participants