Replies: 3 comments
-
Everything works, check accessibility of your server first.
Maybe you haven't enabled forwarding rules in configuration? |
Beta Was this translation helpful? Give feedback.
-
Yes, it's already supported. |
Beta Was this translation helpful? Give feedback.
-
Yep, it actually working. Kind of. I want to setup dns resolving for my local '*.lan' zone. it should not be internet accessible. Why not use unbound to resolve 'lan' zone and as a cache server and forward everything else to dnscrypt-proxy? Because dnscrypt-proxy works well as adblock + secure dns combo. Also nice to have this answer
for debugging. And if/when i misconfigure unbound "internet" will continue to work. ####### Imagine this config:
In this configuration dnscrypt-proxy will send packets to unbound from source address 10.x.x.x And in unbound: Maybe choose source address depending on destination address? And if i change
then everything working. Finally. I'm almost happy. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Output of the following commands:
./dnscrypt-proxy -version
2.1.1
What is affected by this bug?
Cannot forward query to dns resolver which is listening on non-standard port
Expected behavior (i.e. solution)
dnscrypt-proxy should accept something like this in 'forewarding_rules' file:
lan 192.168.1.1:7753
internal 192.168.2:5300
Other Comments
This is useful when you need to forward queries to authoritative server on the same machine be it dns server installed from os repository (but listening on different port) or rootless container with dns server (which by design cannot listen on ports <1024)
Beta Was this translation helpful? Give feedback.
All reactions