![]() ![]() You should see the IP address 127.0.0.1 as SERVER. Let’s find out if this is working, first, you can use dig to see if requests are made from DNSCrypt, do that by executing: Once that’s completed, restart your system by executing: Now let’s lock the nf file to connect through DNSCrypt permanently, even after reboots, do that by executing:ĭue a system protection, the next command line is available here: ![]() Sed -i "s|127.0.2.1|0.0.0.0|g" /lib/systemd/system/dnscrypt-proxy.socket cat /lib/systemd/system/dnscrypt-proxy.socket Let’s force DNSCrypt to be available on all network interfaces by executing: Thanks Web Horizon for providing reliable VPS instances, get yours here.Īfter upgrading your OS installation, install DNSCrypt and some additional utilities by executing this command line:Īpt install dnscrypt-proxy dnsutils jq wget nano -yīy default, DNSCrypt use the local IP address: 127.0.2.1 to pass-through all the web traffic from the ethernet network interface. I’ll be using a KVM-based instance that runs an up-to-date Debian Bullseye (11) installation. The following post will quickly explain how to setup your own DNSCrypt server and take advantages from Adguard to block ads at a DNS level. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |