We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Linux, DNS, GFW, Dnsmasq, OpenDNS
https://cubar.co/2016/03/avoid-dns-hijacking-with-non-standard-port-dns/
The text was updated successfully, but these errors were encountered:
Original author: Zhang Junda @dqawveird Original date: 2016-03-24T13:16:21Z
可以可以,用了以后一些小网站dns污染问题都没有了,但是用53端口的话默认是不行的,换其他端口就好了。。。
Sorry, something went wrong.
Original author: Cubarco @cubarco Original date: 2016-03-25T00:54:01Z
“但是用53端口的话默认是不行的”这是什么意思?
Original author: Zhang Junda @dqawveird Original date: 2016-03-25T13:32:30Z
默认是显示53端口已经占用了,我的dnsmasq换的其他的端口。。。
Original author: Cubarco @cubarco Original date: 2016-03-26T02:23:23Z
咦,你在53跑了啥?
非标端口真的没有污染吗?但是怎么有时用dot的也不行的?
@JunShine 这是16年的博文了哈,早已事过境迁。
No branches or pull requests
利用非标准端口 DNS 服务器避免 DNS 劫持 - /home/cubl
Linux, DNS, GFW, Dnsmasq, OpenDNS
https://cubar.co/2016/03/avoid-dns-hijacking-with-non-standard-port-dns/
The text was updated successfully, but these errors were encountered: