AC3100 responds with - armv7lAnyone has a 88U, 86U or AC3100, please run this command on ssh and tell me the result:
TIACode:uname -m
AC3100 responds with - armv7lAnyone has a 88U, 86U or AC3100, please run this command on ssh and tell me the result:
TIACode:uname -m
Haha my mistake actually don't need that model, already supported.AC3100 responds with - armv7l
Don't have one but AB-Solution uses this case statement:Anyone has a 86U, please run this command on ssh and tell me the result:
TIACode:uname -m
case "$(uname -m)" in
armv7l) (all ARM routers);;
mips) (all MIPSEL routers);;
aarch64) (86U);;
esac
Anyone has a 86U, please run this command on ssh and tell me the result:
TIACode:uname -m
Yeah... milestone version from dnscrypt-proxy beta 11
DOH for Google activated.
Note that you need to pre-resolve dns.google.com in dnsmasq.
Add the following in /jffs/configs/dnsmasq.conf.add
server=/dns.google.com/8.8.8.8
Then type, service restart_dnsmasq
Good luck and have fun!
For reading interest what is DOH
https://www.theregister.co.uk/2017/12/14/protecting_dns_privacy/
https://tools.ietf.org/html/draft-ietf-doh-dns-over-https-02#section-7.1
** I know Google do logging.. but even so, they have the fastest server and I think most redundancy and in term of security... one of the best? So for now I will use it till more public resolver supporting DOH
how do you set it up accurately?
a for dnscrypt installation?
I mean exactly this DOH modeI did mine manually without using the installer here.
In any case, the current installer here is already beta 11 ready as mentioned in the post above. So just use the installer i assumed in post 1.
https://www.snbforums.com/threads/release-dnscrypt-installer-for-asuswrt.36071/
beta11 and Google DOH added
Jan 28 07:24:16 dnscrypt-proxy[3499]: [scaleway-fr] OK (crypto v2) - rtt: 115ms
Jan 28 07:24:16 dnscrypt-proxy[3499]: [securedns] OK (crypto v1) - rtt: 139ms
Jan 28 07:24:16 dnscrypt-proxy[3499]: [google] OK (DoH) - rtt: 550ms
Jan 28 07:24:16 dnscrypt-proxy[3499]: Server with the lowest initial latency: scaleway-fr (rtt: 115ms)
/jffs/dnscrypt# killall: dnscrypt-proxy: no process killed
If I am not wrong, that require no log is meant for time where you didn’t specific any preferred dns server u using, the app will based on the criteria u defined like dnssec true, no log true, etc and search through the entire list of resolvers and choose for u.I mean exactly this DOH mode
this is so configured : require_nolog = true
Hi and thanks for the latest release. I installed beta 10 yesterday and 11 today, and have noticed that the dnscrypt process times out every 30mins or so. The only way to restore it is to restart the dnscrypt process by running ./manager dnscrypt-start - the output from the logs / shell:
Code:Jan 28 07:24:16 dnscrypt-proxy[3499]: [scaleway-fr] OK (crypto v2) - rtt: 115ms Jan 28 07:24:16 dnscrypt-proxy[3499]: [securedns] OK (crypto v1) - rtt: 139ms Jan 28 07:24:16 dnscrypt-proxy[3499]: [google] OK (DoH) - rtt: 550ms Jan 28 07:24:16 dnscrypt-proxy[3499]: Server with the lowest initial latency: scaleway-fr (rtt: 115ms)
Code:/jffs/dnscrypt# killall: dnscrypt-proxy: no process killed
68u running RMerlin's alpha2
@bigeyes0x0 please look into this.
I would suggest using daemonize mode. If I am not in daemonize mode, the process will terminate itself. The frequency of termination is random.
I suspect it is due to memory management as the dnscrypt-proxy have cache and taking up memory. Linux kernel memory management is doing its work to maintain stability and terminate Low priority application.
I installed beta 10 yesterday and 11 today, and have noticed that the dnscrypt process times out every 30mins or so. The only way to restore it is to restart the dnscrypt process by running ./manager dnscrypt-start
@bigeyes0x0 please look into this.
I would suggest using daemonize mode. If I am not in daemonize mode, the process will terminate itself. The frequency of termination is random.
I don’t want to start a new thread for this..
Just asking here if anybody see this..
How to see if dns queries is indeed being query via Port 443 and encrypted and NOT via port 53.
In Windows, we have wireshark to see this. But I know that from client to router the query is still via 53, unencrypted. I want to know from router to resolver.
Use tcpdump from entware? How? What is the command?
Or what other program from entware? How?
@M@rco: You're running my stable version with dnscrypt-proxy v1
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!