doh-cf-workers
wgcf
Our great sponsors
doh-cf-workers | wgcf | |
---|---|---|
31 | 59 | |
351 | 5,467 | |
- | - | |
5.3 | 7.7 | |
2 months ago | 21 days ago | |
JavaScript | Go | |
BSD Zero Clause License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
doh-cf-workers
-
Cloudflare DNS stopped working totally!
For desktop browser, just change the Secure DNS/DNS over HTTPS settings to one of the servers in https://github.com/curl/curl/wiki/DNS-over-HTTPS, if they're all blocked, create your own with https://github.com/tina-hello/doh-cf-workers. On Android use Intra to load custom DoH, and on iOS use https://dns.notjakob.com/ to create the DoH profile.
-
Public DNS resolver is blocked, way to bypass?
If Cloudflare Workers aren't blocked, you can use https://github.com/tina-hello/doh-cf-workers to forward to it, though it only work with DNS over HTTPS client (most desktop browsers, Windows 11, iOS, macOS, Intra on Android and YogaDNS on older Windows)
-
Ditching Normal DNS for Enhanced Safety: Zero Trust with DNS over HTTPS/TLS
DoH is another game entirely, even if you import the known DoH domains manually, anyone including dedicated kids, can create their own DoH proxy in minutes.
-
Encrypted DNS, what's the point?
Even those who weren't interested in self-hosting might spend a couple of minutes hosting their own DNS proxy since it's much more flexible and don't require root or dedicated port (at least with DoH).
-
Stop devices from using other DNS to bypass AdGuardHome?
While you can in turn block those DoH servers (and probably block port 853 too to stop the default DoT & DoQ traffic), there are ridiculous amount of public DoH servers available, partly because of how easy it is to self-host AGH and expose the DoH endpoint to the public. Anyone can even create their own in minutes.
-
Can't change DNS settings, can ISP block it?
Check if your router support DNS over TLS (DoT) or DNS over HTTPS (DoH), that would ignore the ISP filtering, assuming the ISP doesn't just block port 853 for DoT, or filtering well-known DoH server, in which case just setup your own.
-
Android phones can't connect if I block port 853 on router to stop others bypassing NextDNS
If you don't want to set up AGH at home or at a VPS, accept that the phones need to use the NextDNS/Nebulo/Intra/AdGuard app set to your NextDNS DoH endpoint while you block other providers, though this doesn't actually stop others from using their own/generic NextDNS, or even any provider if their DoH client support bootstrapping. Also, unless it's a seriously fancy router that analyzes traffic statistics, blocking DoH is merely using public list of DoH domains, anyone can create their DoH proxy which won't be blocked. Some routers have SNI filtering which can block websites regardless of the DNS used, but then you need to provide your own blocklist.
-
Subliminal Through Tor?
That's probably SNI filtering, but try other servers from https://adguard-dns.io/kb/general/dns-providers/ and https://github.com/curl/curl/wiki/DNS-over-HTTPS/ just in case, or make your own proxy on https://github.com/tina-hello/doh-cf-workers
-
Zero Trust:Block other DNS over HTTPS/TLS
If you want to go that route, keep in mind the entire Cloudflare Workers and Cloudflare Pages subdomains (workers.dev and pages.dev) can be used as free DoH proxy. Sure you can put the nuclear option, but it would break sites that do use them.
-
Filtering bypass.. I surrender? FEATURE REQUEST INSIDE
A purely DNS-based solution is bound to be easily bypassed, it's really simple to bootstrap the IP so there's no need to even use the network/OS DNS to resolve the custom DoH domain, with hundreds of publicly known DoH and trivial deployment of DoH forwarder you're fighting a losing game.
wgcf
-
Wireguard blocked but Cloudflare warp works
I can successfully create wg profiles using wgcf and connect to Cloudflare servers.
- Microsoft Edge users now have 5GB of free built-in VPN
-
Install Cloudflare Warp on Linux Mint 21.1 Vera
I normally don't install Cloudflare Warp client. I just generate WireGuard profile of Cloudflare Warp using wgcf and connect using WireGuard.
-
Vpn gratuita para P2P
Divirta-se: https://github.com/ViRb3/wgcf.
-
Cloudflare warp client in Fedora 37
I'm using https://github.com/ViRb3/wgcf and it works fine. I had to change the "Endpoint" line in the config file tho: Endpoint = 162.159.193.5:2408
-
Need Help with WireGuard HomeKit Access
I'm using Cloudflare's Zero Trust Tunnel with a WireGuard configuration obtained from "https://github.com/ViRb3/wgcf". This configuration includes my private key and DNS settings.
- How to set warp plus on modem/router?
-
Question about Cloudflare Tunnels and Sever Automation
All of my test and deploy scripts have to be encapsulated within docker containers or they’re not compatible. The thing is WARP seems to require some system resources that aren’t allowed from inside a containerwhen it sets up its network. I’ve also tried WCGF, which can run in containers but doesn’t have support for cloudflare Teams.
-
1.1.1.1 Refusing to connect.
If nothing works, generate a WireGuard config file with WGCF: https://github.com/ViRb3/wgcf
-
How to use 1.1.1.1 with truenas scale
Generate a wireguard profile for 1.1.1.1 WARP, then load that profile into your scale WireGuard UI
What are some alternatives?
dnsproxy - Simple DNS proxy with DoH, DoT, DoQ and DNSCrypt support
warp-plus-cloudflare - Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ ) [GET https://api.github.com/repos/ALIILAPRO/warp-plus-cloudflare: 403 - Repository access blocked]
dns-server-setup - Ansible playbook to easily deploy new, fully configured, DNS servers.
wg-portal - WireGuard Configuration Portal with LDAP connection
serverless-dns - The RethinkDNS resolver that deploys to Cloudflare Workers, Deno Deploy, Fastly, and Fly.io
tunnel-wireguard-udp2tcp - Tunnel WireGuard UDP traffic over TCP using socat
DoH
WARP-UNLIMITED-ADVANCED - Get unlimited amount of data in Cloudflare's WARP VPN🔥
libcurl - A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP, SCP, SFTP, SMB, SMBS, SMTP, SMTPS, TELNET, TFTP, WS and WSS. libcurl offers a myriad of powerful features
wireguard-windows - Download WireGuard for Windows at https://www.wireguard.com/install . This repo is a mirror only. Official repository is at https://git.zx2c4.com/wireguard-windows
Unbound - Unbound is a validating, recursive, and caching DNS resolver.
go-cloudflare - Cloudflare utilities in Go