Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DNSCrypt project is closed. #33540

Closed
MrSorcus opened this issue Jan 6, 2018 · 26 comments
Closed

DNSCrypt project is closed. #33540

MrSorcus opened this issue Jan 6, 2018 · 26 comments
Assignees

Comments

@MrSorcus
Copy link

MrSorcus commented Jan 6, 2018

Issue description

https://twitter.com/jedisct1/status/928942292202860544

dnscrypt-proxy is also looking for a new maintainer (along with the website), as I dont use it any more. I will archive it next week.

url = "https://download.dnscrypt.org/dnscrypt-proxy/${name}.tar.bz2";

Will not working anymore.

@adisbladis
Copy link
Member

cc @joachifm @jgeerds

@joachifm
Copy link
Contributor

joachifm commented Jan 7, 2018

Sigh, okay I'll be removing the service & related stuff shortly.

@joachifm
Copy link
Contributor

joachifm commented Jan 7, 2018

It's feasible that we can recover some functionality via unbound (it supports dnscrypt, though I've never actually tried it) or dns-over-tls. I'll be looking into that after removal.

@vcunat
Copy link
Member

vcunat commented Jan 7, 2018

DNS-over-TLS: @Mic92 has experience with this via Unbound; Knot-resolver will also be an option, after a release expected within a week or two, and I will be able to help with such setups.

@joachifm
Copy link
Contributor

joachifm commented Jan 7, 2018

@vcunat sounds good :)

@makefu
Copy link
Contributor

makefu commented Jan 7, 2018

just as a heads-up, as of right now, unbound does not validate the dns-tls sources ( https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=658 ).

@rnhmjoj
Copy link
Contributor

rnhmjoj commented Jan 7, 2018

That's sad. dnscrypt-wrapper is not affected but without the proxy is pretty much useless.

joachifm added a commit to joachifm/nixpkgs that referenced this issue Jan 7, 2018
The upstream project ceased.

See NixOS#33540
@joachifm
Copy link
Contributor

joachifm commented Jan 7, 2018

I've opened a PR to remove the module, I've left the wrapper & related packages alone for now.

vdemeester pushed a commit to vdemeester/nixpkgs that referenced this issue Jan 7, 2018
The upstream project ceased.

See NixOS#33540
@rnhmjoj
Copy link
Contributor

rnhmjoj commented Jan 8, 2018

Dyne.org has taken over the project!

@vcunat
Copy link
Member

vcunat commented Jan 8, 2018

Yesterday? Is that a co-incidence?

@Profpatsch
Copy link
Member

Ugh, it’s a bit harsh to just remove the package before the project is even completely dead, @joachifm.

@joachifm
Copy link
Contributor

joachifm commented Jan 8, 2018

The project was gone, until dyne.org took it over yesterday, as in the github project page was 404.

@rnhmjoj
Copy link
Contributor

rnhmjoj commented Jan 8, 2018

He removed the repository and pointed the website to a competitor with no mention of what happened to dnscrypt: something doesn't look right. Anyway without the tarballs on website the package can't still be built.

@Profpatsch
Copy link
Member

There’s a Git repo.

@rnhmjoj
Copy link
Contributor

rnhmjoj commented Jan 8, 2018

@Profpatsch I added autoreconfHook and the head commit builds but the test (nixos/dnscrypt-proxy.nix) is failing with

error while loading shared libraries: libltdl.so.7:

Do you know the commit of the latest release?

@rnhmjoj rnhmjoj mentioned this issue Jan 8, 2018
8 tasks
@joachifm
Copy link
Contributor

joachifm commented Jan 8, 2018

@rnhmjoj that's most likely due to apparmor.

@rnhmjoj
Copy link
Contributor

rnhmjoj commented Jan 8, 2018

Yes, your right. I added a rule for libtool and it passes. Is it really needed though?

@joachifm
Copy link
Contributor

joachifm commented Jan 8, 2018

Not at all, I'm guessing it simply tries to use it because it is available in the build environment. A better solution is to convince it to not pick it up to begin with. (the daemon used to rely on it for plugins).

@rnhmjoj
Copy link
Contributor

rnhmjoj commented Jan 8, 2018

It must be some different configure flag that was set in the official release.

@joachifm
Copy link
Contributor

joachifm commented Jan 8, 2018

So, the repo is back up https://github.com/jedisct1/dnscrypt-proxy; it's going to be rewritten from scratch from the looks of it ...

@rnhmjoj
Copy link
Contributor

rnhmjoj commented Jan 8, 2018

I found the original release tarballs on launchpad.net. We could use these in the meanwhile.

@joachifm
Copy link
Contributor

joachifm commented Jan 9, 2018

The NixOS module has now been restored thanks to @rnhmjoj. Still not sure what to think about all this but I do think the immediate issue has been fixed.

@vcunat
Copy link
Member

vcunat commented Jan 9, 2018

My expectation would be a slow decline of DNSCrypt, as DNS-over-(D)TLS got properly standardized in IETF and will be improving its implementation and deployment...

I think this ticket can be marked as "solved", for now.

@vcunat vcunat closed this as completed Jan 9, 2018
@vcunat
Copy link
Member

vcunat commented Feb 5, 2018

To finish my advertisement, on nixpkgs master you can do e.g.:

  services.kresd = {
    enable = true;
    extraConfig = ''
      policy.add(policy.all(policy.TLS_FORWARD({
        { '2620:fe::fe', hostname = 'dns.quad9.net', ca_file = '/etc/ssl/certs/ca-bundle.crt' },
      })))
    '';
  };

More possibilities in docs (e.g. certificate pinning). Feel free to reach out to me/us: gitter, ML, GitLab, ...

@concatime
Copy link
Contributor

Also, DNSCrypt moved to version 2, and on NixOS, we are still on 1.9.5.

@Mic92
Copy link
Member

Mic92 commented Mar 31, 2018

@concatime feel free to update it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

9 participants