doh-cf-workers
nextdns
Our great sponsors
doh-cf-workers | nextdns | |
---|---|---|
31 | 974 | |
351 | 2,917 | |
- | 3.4% | |
5.3 | 7.3 | |
2 months ago | 17 days ago | |
JavaScript | Go | |
BSD Zero Clause License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
doh-cf-workers
-
Cloudflare DNS stopped working totally!
For desktop browser, just change the Secure DNS/DNS over HTTPS settings to one of the servers in https://github.com/curl/curl/wiki/DNS-over-HTTPS, if they're all blocked, create your own with https://github.com/tina-hello/doh-cf-workers. On Android use Intra to load custom DoH, and on iOS use https://dns.notjakob.com/ to create the DoH profile.
-
Public DNS resolver is blocked, way to bypass?
If Cloudflare Workers aren't blocked, you can use https://github.com/tina-hello/doh-cf-workers to forward to it, though it only work with DNS over HTTPS client (most desktop browsers, Windows 11, iOS, macOS, Intra on Android and YogaDNS on older Windows)
-
Ditching Normal DNS for Enhanced Safety: Zero Trust with DNS over HTTPS/TLS
DoH is another game entirely, even if you import the known DoH domains manually, anyone including dedicated kids, can create their own DoH proxy in minutes.
-
Encrypted DNS, what's the point?
Even those who weren't interested in self-hosting might spend a couple of minutes hosting their own DNS proxy since it's much more flexible and don't require root or dedicated port (at least with DoH).
-
Stop devices from using other DNS to bypass AdGuardHome?
While you can in turn block those DoH servers (and probably block port 853 too to stop the default DoT & DoQ traffic), there are ridiculous amount of public DoH servers available, partly because of how easy it is to self-host AGH and expose the DoH endpoint to the public. Anyone can even create their own in minutes.
-
Can't change DNS settings, can ISP block it?
Check if your router support DNS over TLS (DoT) or DNS over HTTPS (DoH), that would ignore the ISP filtering, assuming the ISP doesn't just block port 853 for DoT, or filtering well-known DoH server, in which case just setup your own.
-
Android phones can't connect if I block port 853 on router to stop others bypassing NextDNS
If you don't want to set up AGH at home or at a VPS, accept that the phones need to use the NextDNS/Nebulo/Intra/AdGuard app set to your NextDNS DoH endpoint while you block other providers, though this doesn't actually stop others from using their own/generic NextDNS, or even any provider if their DoH client support bootstrapping. Also, unless it's a seriously fancy router that analyzes traffic statistics, blocking DoH is merely using public list of DoH domains, anyone can create their DoH proxy which won't be blocked. Some routers have SNI filtering which can block websites regardless of the DNS used, but then you need to provide your own blocklist.
-
Subliminal Through Tor?
That's probably SNI filtering, but try other servers from https://adguard-dns.io/kb/general/dns-providers/ and https://github.com/curl/curl/wiki/DNS-over-HTTPS/ just in case, or make your own proxy on https://github.com/tina-hello/doh-cf-workers
-
Zero Trust:Block other DNS over HTTPS/TLS
If you want to go that route, keep in mind the entire Cloudflare Workers and Cloudflare Pages subdomains (workers.dev and pages.dev) can be used as free DoH proxy. Sure you can put the nuclear option, but it would break sites that do use them.
-
Filtering bypass.. I surrender? FEATURE REQUEST INSIDE
A purely DNS-based solution is bound to be easily bypassed, it's really simple to bootstrap the IP so there's no need to even use the network/OS DNS to resolve the custom DoH domain, with hundreds of publicly known DoH and trivial deployment of DoH forwarder you're fighting a losing game.
nextdns
- NextDNS
- Usando NextDNS CLI en tu red.
-
All Fritz Box modems have been hijacked
Block 45.76.93.104 and 2001:19f0:6c00:1b0e:5400:4ff:fecd:7828 at the firewall if possible.
Ensure that DNS-over-HTTP (DoH) is enabled where it can be.
Set upstream DNS servers that block malware, such as 1.1.1.2 or NextDNS
Delete "fritz.box" from the domain search list in DNS settings.
Educate your parents to be cautious about directly typing domain names or searching from the OmniBox.
https://nextdns.io/
https://blog.cloudflare.com/introducing-1-1-1-1-for-families...
- ISPs can charge extra for fast gaming under FCC's Internet rules, critics say
-
Ask HN: Which tools are the best for internet safety for kids?
I've tried hosted Pi-Hole and AdGuard Home. They are good as long as I'm around to fix stuffs. Then I tested something which can be global (home) and also for individual devices -- Control-D, NextDNS, and Adguard DNS. All of them works pretty well. If I really have to choose, then it would be in the order of NextDNS > Control-D > AdGuard DNS. Affiliated with none, and have decided to subscribe to all three to further test them for this year.
https://controld.com
https://nextdns.io
https://adguard-dns.io
-
Runs on your OpenWrt box: AdGuard Home is network-wide blocking ads and tracking
Okay but NextDNS' own homepage says it "blocks ads and trackers on websites and in apps" - https://nextdns.io
-
Ask HN: Unblockable Google Search Ads?
I first used Safari on Windows around 2006. Put me off forever.
You just need Firefox and the extensions that mean ads are never seen.
That said, take a look at https://nextdns.io
- Great Forgotten Sci-Fi Movies of the 1980s
-
What are must have packages for security and privacy?
just run snort and get nextdns.io account and use those DNS servers to control your DNS.
-
AdGuard Home + Tailscale = Erase Ads on the Go
I'm using NextDNS which can be integrated into TailScale MagicDNS. It works seamlessly. You may need to pay if you have a high usage rate. I pay for the Pro version but that's less than $30 CAD a year. I did have in house Raspberry PI and Pi-Hole DNS but it was a lot of work.
What are some alternatives?
dnsproxy - Simple DNS proxy with DoH, DoT, DoQ and DNSCrypt support
AdGuardHome - Network-wide ads & trackers blocking DNS server
dns-server-setup - Ansible playbook to easily deploy new, fully configured, DNS servers.
Pi-hole - A black hole for Internet advertisements
serverless-dns - The RethinkDNS resolver that deploys to Cloudflare Workers, Deno Deploy, Fastly, and Fly.io
blokada - The official repo for Blokada apps.
DoH
dnscrypt-proxy - dnscrypt-proxy 2 - A flexible DNS proxy, with support for encrypted DNS protocols.
libcurl - A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP, SCP, SFTP, SMB, SMBS, SMTP, SMTPS, TELNET, TFTP, WS and WSS. libcurl offers a myriad of powerful features
blahdns - A small hobby ads block dns project with doh, dot, dnscrypt support.
Unbound - Unbound is a validating, recursive, and caching DNS resolver.