Browse Source

anarres doc

netico 2 years ago
parent
commit
6057722f60
2 changed files with 45 additions and 40 deletions
  1. 2 40
      Network/README.md
  2. 43 0
      Network/anarres/README.md

+ 2 - 40
Network/README.md

@@ -6,44 +6,6 @@
 
 In the [Investigation](https://git.lattuga.net/netico/code-library/src/master/Network/Investigation) folder you can find a **bash** script to analyze **active TCP connections** on a **GNU/Linux** system.
 
-## [anarres](anarres): **AN**ti **A**uthoritarian **R**ecursive **RES**olver
+## [anarres](anarres)
 
-### How to avoid censorship at the DNS level?
-
-[**Tor**](https://www.torproject.org/) provides a built-in **DNS forwarder**.
-
-This is a minimal **Docker** container that uses a local caching DNS server ([**dnsmasq**](https://dnsmasq.org)) which will compensate for **TorDNS** being a little slower than traditional DNS servers.
-
-### Usage
-
-Build it using:
-
-    docker build --pull --rm -f Dockerfile -t anarres:latest .
-
-Run it using:
-
-    docker run --rm -d -p 53:53/udp anarres:latest
-
-Test it using:
-
-    dig @127.0.0.1 cr.yp.to
-
-Expected output:
-
-    ; <<>> DiG 9.11.5-P4-5.1+deb10u6-Debian <<>> @127.0.0.1 cr.yp.to
-    ; (1 server found)
-    ;; global options: +cmd
-    ;; Got answer:
-    ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35649
-    ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
-
-    ;; QUESTION SECTION:
-    ;cr.yp.to. IN A
-
-    ;; ANSWER SECTION:
-    cr.yp.to. 3600 IN A 131.193.32.109
-
-    ;; Query time: 278 msec
-    ;; SERVER: 127.0.0.1#53(127.0.0.1)
-    ;; WHEN: Fri Mar 18 17:13:00 CET 2022
-    ;; MSG SIZE  rcvd: 42
+How to avoid censorship at the DNS level?

+ 43 - 0
Network/anarres/README.md

@@ -0,0 +1,43 @@
+# [anarres](anarres)
+
+**AN**ti **A**uthoritarian **R**ecursive **RES**olver
+
+## How to avoid censorship at the DNS level?
+
+[**Tor**](https://www.torproject.org/) provides a built-in **DNS forwarder**.
+
+This is a minimal **Docker** container that uses a local caching DNS server ([**dnsmasq**](https://dnsmasq.org)) which will compensate for **TorDNS** being a little slower than traditional DNS servers.
+
+## Usage
+
+Build it using:
+
+    docker build --pull --rm -f Dockerfile -t anarres:latest .
+
+Run it using:
+
+    docker run --rm -d -p 53:53/udp anarres:latest
+
+Test it using:
+
+    dig @127.0.0.1 cr.yp.to
+
+Expected output:
+
+    ; <<>> DiG 9.11.5-P4-5.1+deb10u6-Debian <<>> @127.0.0.1 cr.yp.to
+    ; (1 server found)
+    ;; global options: +cmd
+    ;; Got answer:
+    ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35649
+    ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
+
+    ;; QUESTION SECTION:
+    ;cr.yp.to. IN A
+
+    ;; ANSWER SECTION:
+    cr.yp.to. 3600 IN A 131.193.32.109
+
+    ;; Query time: 278 msec
+    ;; SERVER: 127.0.0.1#53(127.0.0.1)
+    ;; WHEN: Fri Mar 18 17:13:00 CET 2022
+    ;; MSG SIZE  rcvd: 42