anarres - ANti Authoritarian Recursive RESolver
This commit is contained in:
parent
ff480248a6
commit
aaa63c6b8b
5 changed files with 73 additions and 0 deletions
|
@ -5,3 +5,45 @@
|
|||
## [TCP investigation](https://git.lattuga.net/netico/code-library/src/master/Network/Investigation)
|
||||
|
||||
In the [Investigation](https://git.lattuga.net/netico/code-library/src/master/Network/Investigation) folder you can find a **bash** script to analyze **active TCP connections** on a **GNU/Linux** system.
|
||||
|
||||
## [anarres](anarres): **AN**ti **A**uthoritarian **R**ecursive **RES**olver
|
||||
|
||||
### How to avoid censorship at the DNS level?
|
||||
|
||||
[**Tor**](https://www.torproject.org/) provides a built-in **DNS forwarder**.
|
||||
|
||||
This is a minimal **Docker** container that uses a local caching DNS server ([**dnsmasq**](https://dnsmasq.org)) which will compensate for **TorDNS** being a little slower than traditional DNS servers.
|
||||
|
||||
### Usage
|
||||
|
||||
Build it using:
|
||||
|
||||
docker build --pull --rm -f Dockerfile -t anarres:latest .
|
||||
|
||||
Run it using:
|
||||
|
||||
docker run --rm -d -p 53:53/udp anarres:latest
|
||||
|
||||
Test it using:
|
||||
|
||||
dig @127.0.0.1 cr.yp.to
|
||||
|
||||
Expected output:
|
||||
|
||||
; <<>> DiG 9.11.5-P4-5.1+deb10u6-Debian <<>> @127.0.0.1 cr.yp.to
|
||||
; (1 server found)
|
||||
;; global options: +cmd
|
||||
;; Got answer:
|
||||
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35649
|
||||
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
|
||||
|
||||
;; QUESTION SECTION:
|
||||
;cr.yp.to. IN A
|
||||
|
||||
;; ANSWER SECTION:
|
||||
cr.yp.to. 3600 IN A 131.193.32.109
|
||||
|
||||
;; Query time: 278 msec
|
||||
;; SERVER: 127.0.0.1#53(127.0.0.1)
|
||||
;; WHEN: Fri Mar 18 17:13:00 CET 2022
|
||||
;; MSG SIZE rcvd: 42
|
||||
|
|
11
Network/anarres/Dockerfile
Normal file
11
Network/anarres/Dockerfile
Normal file
|
@ -0,0 +1,11 @@
|
|||
FROM alpine:3.15
|
||||
RUN apk -U upgrade && \
|
||||
apk add --no-cache bash && \
|
||||
apk add --no-cache sudo && \
|
||||
apk add --no-cache tor && \
|
||||
apk add --no-cache dnsmasq
|
||||
COPY ./torrc.config /anarres/
|
||||
COPY ./dnsmasq.config /anarres/
|
||||
COPY ./start.sh /anarres/
|
||||
ENTRYPOINT [ "/anarres/start.sh" ]
|
||||
EXPOSE 53/udp
|
5
Network/anarres/dnsmasq.config
Normal file
5
Network/anarres/dnsmasq.config
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Configuration file for dnsmasq.
|
||||
|
||||
port=53
|
||||
no-resolv
|
||||
server=127.0.0.1#5353
|
9
Network/anarres/start.sh
Executable file
9
Network/anarres/start.sh
Executable file
|
@ -0,0 +1,9 @@
|
|||
#!/bin/bash
|
||||
|
||||
# On Docker for Linux, the IP address of the gateway between
|
||||
# the Docker host and the bridge network is 172.17.0.1
|
||||
# if you are using default networking
|
||||
IPADDRESS=$(ip -4 -o address | grep eth0 | cut -d/ -f1 | awk {'print $4'})
|
||||
|
||||
sudo -u tor tor -f /anarres/torrc.config &
|
||||
dnsmasq --conf-file=/anarres/dnsmasq.config --listen-address=$IPADDRESS --no-daemon
|
6
Network/anarres/torrc.config
Normal file
6
Network/anarres/torrc.config
Normal file
|
@ -0,0 +1,6 @@
|
|||
# Tor
|
||||
|
||||
SOCKSPort 0
|
||||
DataDirectory /var/lib/tor
|
||||
DNSPort 5353
|
||||
AutomapHostsOnResolve 1
|
Loading…
Reference in a new issue