AdGuard-WireGuard-Unbound-DNScrypt
dns
AdGuard-WireGuard-Unbound-DNScrypt | dns | |
---|---|---|
15 | 4 | |
683 | 208 | |
- | - | |
5.4 | 0.0 | |
2 months ago | about 1 month ago | |
YAML | Go | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
AdGuard-WireGuard-Unbound-DNScrypt
- WireGuard + AdGuard
-
What to pair AdGuard with?
This definitely! This brought my average processing time on Adguard from 70ms down to 6ms. I would highly recommend configuring unbound as your local recursive dns resolver. Here is the tutorial: https://github.com/trinib/AdGuard-WireGuard-Unbound-DNScrypt
- Is there an option to have more than 1K user rules in Adguard DNS?
-
Network security heaven
you can check out https://github.com/trinib/AdGuard-WireGuard-Unbound-DNScrypt/discussions/17 as well
- Linux self-hosted network security guide
- Linux self-hosted network security solutions
- script setup for everything on a Pi
- Adguard Home + Unbound + DOH or DOT (Using Let's Encrypt Cert)
- dnscrypt-proxy on DietPi
-
AdGuard Home x Ras Pi 4b
try these directions. https://github.com/trinib/AdGuard-WireGuard-Unbound-DNScrypt
dns
-
Easy DNS, is it possible?
I use this on my ds920 as a backup to my router https://github.com/qdm12/dns BUT have found with mobile clients it’s faster to use a cloud dns provider, I’m also using on tailscale nextdns.io that integrates well too
-
DNSSEC with unsigned records set
I'm currently implementing a DNSSEC validator (at https://github.com/qdm12/dns). It's working so far, but most zones aren't signed (even google.com it seems). How is a DNSSEC validator meant to handle unsigned cases?
-
Just got started a week ago, self-hosting is very addicting!
If you want you can try my DoT/DoH server qmcgaw/dns:v2.0.0-beta which supports Prometheus & grafana (metrics doc)
-
A Question About How Mullvad's DOH Works
Actually I'm writing my own DoH Client/server at https://github.com/qdm12/dns (on the v2.0.0-beta branch)
What are some alternatives?
dnscrypt-proxy - dnscrypt-proxy 2 - A flexible DNS proxy, with support for encrypted DNS protocols.
gluetun - VPN client in a thin Docker container for multiple VPN providers, written in Go, and using OpenVPN or Wireguard, DNS over TLS, with a few proxy servers built-in.
ansible-adguard - Ansible playbook to setup AdGuard Home with Unbound, including DoH, DoT & Let's Encrypt, based on Docker
sdns - A high-performance, recursive DNS resolver server with DNSSEC support, focused on preserving privacy.
DNS - Emerald Onion's Encrypted DNS Resolver
dns-over-https - High performance DNS over HTTPS client & server
Knot Resolver - Knot Resolver - resolve DNS names like it's 2024
dns-over-tls-forwarder - A simple, fast DNS-over-TLS forwarding server with hybrid LRU/MFA caching written in Go.
AdGuard-WireGuard-Unbound-Cloudflare - The ultimate self-hosted network security guide ─ Protection | Privacy | Performance for your network 24/7 Accessible anywhere [Moved to: https://github.com/trinib/AdGuard-WireGuard-Unbound-DNScrypt]
zerotier-dns - A DNS server for ZeroTier virtual networks.
nextdns - NextDNS CLI client (DoH Proxy)
awesome-selfhosted - A list of Free Software network services and web applications which can be hosted on your own servers