mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2024-12-30 01:46:29 -05:00
Fix DNS table, it did contain text under it (#1236)
This commit is contained in:
parent
eb040508e6
commit
09e1d85933
@ -403,18 +403,19 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
</div>
|
||||
|
||||
<h4>Terms</h4>
|
||||
<h4>Terms</h4>
|
||||
|
||||
<ul>
|
||||
<ul>
|
||||
<li>DNS-over-TLS (DoT) - A security protocol for encrypted DNS on a dedicated port 853. Some providers support port 443 which generally works everywhere while port 853 is often blocked by restrictive firewalls.</li>
|
||||
<li>DNS-over-HTTPS (DoH) - Similar to DoT, but uses HTTPS instead, being indistinguishable from "normal" HTTPS traffic on port 443. <span class="badge badge-warning" data-toggle="tooltip" data-original-title="DoH contains metadata such as user-agent (which may include system information) that is sent to the DNS server."><a href="https://tools.ietf.org/html/rfc8484#section-8.2"><i class="fas fa-exclamation-triangle"></i></a></span></li>
|
||||
<li>DNSCrypt - An older yet robust method of encrypting DNS.</li>
|
||||
</ul>
|
||||
</ul>
|
||||
|
||||
<h4>How to verify DNS is encrypted</h4>
|
||||
<h4>How to verify DNS is encrypted</h4>
|
||||
|
||||
<ul>
|
||||
<ul>
|
||||
<li>DoH / DoT
|
||||
<ul>
|
||||
<li>Check <a href="https://www.dnsleaktest.com/">DNSLeakTest.com</a>. <span class="badge badge-warning" data-toggle="tooltip" data-placement="bottom" data-original-title="Your DNS provider may not appear with their own name, so compare the responses to what you know or can find about your DNS provider. Just ensure you don't see your ISP or old unencrypted DNS provider."><i class="fas fa-exclamation-triangle"></i></span></li>
|
||||
@ -426,11 +427,11 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
|
||||
</li>
|
||||
<li>DNSSEC - Check <a href="https://dnssec.vs.uni-due.de/">DNSSEC Resolver Test by Matthäus Wander</a>.</li>
|
||||
<li>QNAME Minimization - Run <code><a href="https://en.wikipedia.org/wiki/Dig_(command)">dig</a> +short txt qnamemintest.internet.nl</code> from the command-line (taken from <a href="https://nlnetlabs.nl/downloads/presentations/unbound_qnamemin_oarc24.pdf">this NLnet Labs presentation</a>). You should see this display: <code>"HOORAY - QNAME minimisation is enabled on your resolver :)!"</code></li>
|
||||
</ul>
|
||||
</ul>
|
||||
|
||||
<h3>Worth Mentioning and Additional Information</h3>
|
||||
<h3>Worth Mentioning and Additional Information</h3>
|
||||
|
||||
<ul>
|
||||
<ul>
|
||||
<li><strong>Encrypted DNS clients for desktop:</strong>
|
||||
<ul>
|
||||
<li><em>Firefox</em> comes with built-in DoH support with Cloudflare set as the default resolver, but can be configured to use any DoH resolver. <span class="badge badge-warning" data-toggle="tooltip" data-placement="bottom" data-original-title='"Cloudflare has agreed to collect only a limited amount of data about the DNS requests that are sent to the Cloudflare Resolver for Firefox via the Firefox browser."'><a href="https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/firefox/"><i class="fas fa-exclamation-triangle"></i></a></span> Currently Mozilla is <a href="https://blog.mozilla.org/futurereleases/2019/07/31/dns-over-https-doh-update-detecting-managed-networks-and-user-choice/">conducting studies</a> before enabling DoH by default for all US-based Firefox users.</li>
|
||||
@ -472,5 +473,4 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
|
||||
<li><a href="https://www.isc.org/dnssec/">DNSSEC and BIND 9</a> by the ISC</li>
|
||||
</ul>
|
||||
</li>
|
||||
</ul>
|
||||
</div>
|
||||
</ul>
|
||||
|
Loading…
Reference in New Issue
Block a user