-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replace Google DNS with Quad9 for example #8
Comments
It's not so simple, telegram uses the deprecated implementation of DNS over HTTPS that quad9 doesn't support anymore. You can easily test that:
quad9 supports the deprecated implementation only on port 5053
but using port 5353 is bad since dns over https is ONLY used to bypass some firewalls when the usual DNS doesn't work. I'll accept any PR that implements the current RFC8484 with quad9 |
DOH is completely disabled in 10.6.1.1, so we can close this. |
USE_DELEGATE_HOST_RESOLVE enables resolving proxy hosts by using Google DNS (HTTPS) servers. Since this leaks privacy and it's absolutely not needed (Android 9+ supports DNS-over-TLS that should be used instead), just disable it.
USE_DELEGATE_HOST_RESOLVE enables resolving proxy hosts by using Google DNS (HTTPS) servers. Since this leaks privacy and it's absolutely not needed (Android 9+ supports DNS-over-TLS that should be used instead), just disable it.
USE_DELEGATE_HOST_RESOLVE enables resolving proxy hosts by using Google DNS (HTTPS) servers. Since this leaks privacy and it's absolutely not needed (Android 9+ supports DNS-over-TLS that should be used instead), just disable it.
USE_DELEGATE_HOST_RESOLVE enables resolving proxy hosts by using Google DNS (HTTPS) servers. Since this leaks privacy and it's absolutely not needed (Android 9+ supports DNS-over-TLS that should be used instead), just disable it.
USE_DELEGATE_HOST_RESOLVE enables resolving proxy hosts by using Google DNS (HTTPS) servers. Since this leaks privacy and it's absolutely not needed (Android 9+ supports DNS-over-TLS that should be used instead), just disable it.
USE_DELEGATE_HOST_RESOLVE enables resolving proxy hosts by using Google DNS (HTTPS) servers. Since this leaks privacy and it's absolutely not needed (Android 9+ supports DNS-over-TLS that should be used instead), just disable it.
USE_DELEGATE_HOST_RESOLVE enables resolving proxy hosts by using Google DNS (HTTPS) servers. Since this leaks privacy and it's absolutely not needed (Android 9+ supports DNS-over-TLS that should be used instead), just disable it.
USE_DELEGATE_HOST_RESOLVE enables resolving proxy hosts by using Google DNS (HTTPS) servers. Since this leaks privacy and it's absolutely not needed (Android 9+ supports DNS-over-TLS that should be used instead), just disable it.
Hi!
Would it perhaps be possible to swap the Google DNS via HTTPS server for Quad9, for example?
Quad9 is a bit better in terms of data protection and Google doesn't always have to know everything.
If I have found this correctly, the entry in
TMessagesProj\src\main\java\org\telegrams\tgnet\ConnectionsManager.java
only needs to be changed fromdns.google.com
(line 947 + 1061 + 1178) todns.quad9.net
+https://dns.quad9.net/dns-query
orhttps://dns11.quad9.net/dns-query
.An entry in the settings to freely determine the DNS server would of course be extremely great! :)
The text was updated successfully, but these errors were encountered: