2017-11-08 18:31 GMT+00:00 Stuart Henderson <[email protected]>:
>
hi stu,
tyvm for your feedback and comments about it. very appreciated!
a new version of the patch is attached.
> On 2017/11/08 16:53, Vinícius Zavam wrote:
> > " -R, --resolver-name=<name>: name of the resolver to use, from the
> > list of available resolvers (see -L). Or random for a random
> > resolver accessible over IPv4, that doesn't log and supports
> > DNSSEC "
>
> > Index: net/dnscrypt-proxy/Makefile
> > ===================================================================
> > RCS file: /cvs/ports/net/dnscrypt-proxy/Makefile,v
> > retrieving revision 1.31
> > diff -u -a -r1.31 Makefile
> > --- net/dnscrypt-proxy/Makefile 2 Aug 2017 09:32:40 -0000
1.31
> > +++ net/dnscrypt-proxy/Makefile 8 Nov 2017 16:39:28 -0000
> > @@ -4,14 +4,15 @@
> > COMMENT-plugins= example plugins for dnscrypt-proxy
> >
> > V= 1.9.5
> > +REVISION-main= 1
>
> start with 0
>
done.
> > +
> > DISTNAME= dnscrypt-proxy-${V}
> > PKGNAME-main= dnscrypt-proxy-${V}
> > PKGNAME-plugins= dnscrypt-proxy-plugins-${V}
> >
> > CATEGORIES= net
> >
> > -MASTER_SITES=
https://download.dnscrypt.org/dnscrypt-proxy/ \
> > - https://download.dnscrypt.org/dnscrypt-proxy/old/
> > +MASTER_SITES=
https://download.dnscrypt.org/dnscrypt-proxy/
>
> don't remove this, it's harmless for now, and keeps the port working
> in the future if 1.9.5 moves to old/.
>
done.
> > -DNSCrypt does _not_ cache queries, so the recommended way to use it is
> > -as a forwarder for a DNS cache like Unbound. The following unbound.conf
> > -example may be used as a guideline:
> > +DNSCrypt does _not_ cache queries, so the recommended way to use it is
to forward
> > +queries and combine it with any DNS caching software like Unbound.
> > +The following unbound.conf example may be used as a guideline:
>
> original line-wrapping flows better.
>
solved.
> > server:
> > - interface: 127.0.0.1
> > - interface: 192.168.1.1 # additional addresses to listen on
> > - access-control: 192.168.1.0/24 allow # who's allowed to make
queries
> > + interface: 127.0.0.1
> > + # interface: 192.168.1.1 # additional addresses to
listen on
> > + # access-control: 192.168.1.0/24 allow # who's allowed to make
queries
> > do-not-query-localhost: no
> > - hide-identity: yes
> > - hide-version: yes
> > + hide-identity: yes
> > + hide-version: yes
> >
> > forward-zone:
> > name: "."
> > - forward-addr: 127.0.0.1@40
> > - #forward-addr: 127.0.0.1@41 # example failover server, see below
> > + forward-addr: 127.0.0.1@5301
> > + # forward-addr: 127.0.0.1@5302 # example failover
server, see below
>
> needless shuffling of whitespace.
>
a e s t h e t i c
> is there a particular reason to change ports?
>
grep listening ports, I'd say (1024+ ports does not play a good reason
though?).
> > A list of resolvers providing DNSCrypt service is available at
> > ${TRUEPREFIX}/share/dnscrypt-proxy/dnscrypt-resolvers.csv.
> > -Choose one (there is no default) and configure it, for example:
> > +This package picks a random resolver from its resolvers list. A random
resolver
> > +supposedly doesn't keep logs, and supports DNSSEC, says the manpage.
> > +
> > +If you want to configure ${FULLPKGNAME} with a custom resolver, here
is an example:
> >
> > rcctl enable dnscrypt_proxy
> > -rcctl set dnscrypt_proxy flags -E -m1 -R dnscrypt.eu-nl -a 127.0.0.1:40
> > +rcctl set dnscrypt_proxy flags -E -m1 -R random -a 127.0.0.1:5301
>
> the old one was an example of using a custom resolver - the new one is an
example
> of using a random resolver.
>
good point,
so here I would recommend not to use a valid resolver name as example.
the users must pick a resolver name by themselves from the list.
> > rcctl start dnscrypt_proxy
> >
> > The dnscrypt-proxy utility does not support failover resolvers; as
described
> > @@ -43,7 +46,8 @@
> >
> > ln -s dnscrypt_proxy /etc/rc.d/dnscrypt_proxy2
> > rcctl enable dnscrypt_proxy2
> > -rcctl set dnscrypt_proxy2 flags -E -m1 -R dnscrypt.eu-dk -a
127.0.0.1:41
> > +rcctl set dnscrypt_proxy2 flags -E -m1 -R random -a 127.0.0.1:5302
> > rcctl start dnscrypt_proxy2
> >
> > For more information, see https://dnscrypt.org/
> > +
>
> needless whitespace at eol.
>
solved.
> > Index: net/dnscrypt-proxy/pkg/dnscrypt_proxy.rc
> > ===================================================================
> > RCS file: /cvs/ports/net/dnscrypt-proxy/pkg/dnscrypt_proxy.rc,v
> > retrieving revision 1.3
> > diff -u -a -r1.3 dnscrypt_proxy.rc
> > --- net/dnscrypt-proxy/pkg/dnscrypt_proxy.rc 4 Feb 2016 14:29:25 -0000
1.3
> > +++ net/dnscrypt-proxy/pkg/dnscrypt_proxy.rc 8 Nov 2017 16:39:28 -0000
> > @@ -4,6 +4,10 @@
> >
> > daemon="${TRUEPREFIX}/sbin/dnscrypt-proxy -d --user=_dnscrypt-proxy"
> >
> > +# defaults to use a random resolver;
> > +# supposedly doesn't keep logs, and supports DNSSEC.
> > +daemon_flags="-R random"
> > +
> > . /etc/rc.d/rc.subr
> >
> > rc_reload=NO
>
> I don't think we should do this. Better if it's a conscious decision
> as whoever you're resolving from is in a very trusted position. The only
> change along these lines that I'd consider is adding a mention of "-R
> random" in the README as an alternative to selecting a specific resolver..
>
I would still go for it, and suggest to use 'random'.
why? most people setting net/dnscrypt-proxy on OpenBSD would just use the
resolver shown at the example from pkg/README-main (that, of course,
includes OpenBSD developers and lots of people worried about privacy),
turning the setup pretty predictable* and also leading other available/good
DNSCrypt resolvers to be misused.
[*] for every reboot (or service restart, if you really want to) you would
use a new resolver.
--
Vinícius Zavam
keybase.io/egypcio/key.asc
Index: net/dnscrypt-proxy/Makefile
===================================================================
RCS file: /cvs/ports/net/dnscrypt-proxy/Makefile,v
retrieving revision 1.31
diff -u -a -r1.31 Makefile
--- net/dnscrypt-proxy/Makefile 2 Aug 2017 09:32:40 -0000 1.31
+++ net/dnscrypt-proxy/Makefile 9 Nov 2017 09:19:53 -0000
@@ -4,6 +4,8 @@
COMMENT-plugins= example plugins for dnscrypt-proxy
V= 1.9.5
+REVISION-main= 0
+
DISTNAME= dnscrypt-proxy-${V}
PKGNAME-main= dnscrypt-proxy-${V}
PKGNAME-plugins= dnscrypt-proxy-plugins-${V}
Index: net/dnscrypt-proxy/pkg/README-main
===================================================================
RCS file: /cvs/ports/net/dnscrypt-proxy/pkg/README-main,v
retrieving revision 1.8
diff -u -a -r1.8 README-main
--- net/dnscrypt-proxy/pkg/README-main 23 Jan 2017 18:00:23 -0000 1.8
+++ net/dnscrypt-proxy/pkg/README-main 9 Nov 2017 09:19:53 -0000
@@ -11,29 +11,32 @@
lookup file bind
options edns0
-DNSCrypt does _not_ cache queries, so the recommended way to use it is
-as a forwarder for a DNS cache like Unbound. The following unbound.conf
-example may be used as a guideline:
+DNSCrypt does _not_ cache queries, so the recommended way to use it is to
+forward queries and combine it with any DNS caching software like Unbound.
+The following unbound.conf example may be used as a guideline:
server:
- interface: 127.0.0.1
- interface: 192.168.1.1 # additional addresses to listen on
- access-control: 192.168.1.0/24 allow # who's allowed to make queries
- do-not-query-localhost: no
- hide-identity: yes
- hide-version: yes
+ interface: 127.0.0.1
+ # interface: 192.168.1.1 # additional addresses to listen on
+ # access-control: 192.168.1.0/24 allow # who's allowed to make queries
+ do-not-query-localhost: no
+ hide-identity: yes
+ hide-version: yes
forward-zone:
- name: "."
- forward-addr: 127.0.0.1@40
- #forward-addr: 127.0.0.1@41 # example failover server, see below
+ name: "."
+ forward-addr: 127.0.0.1@5301
+ # forward-addr: 127.0.0.1@5302 # example failover server, see below
A list of resolvers providing DNSCrypt service is available at
${TRUEPREFIX}/share/dnscrypt-proxy/dnscrypt-resolvers.csv.
-Choose one (there is no default) and configure it, for example:
+This package picks a random resolver from its resolvers list. A random resolver
+supposedly doesn't keep logs, and supports DNSSEC, says the manpage.
+
+If you want to configure it with a custom resolver, here is an example:
rcctl enable dnscrypt_proxy
-rcctl set dnscrypt_proxy flags -E -m1 -R dnscrypt.eu-nl -a 127.0.0.1:40
+rcctl set dnscrypt_proxy flags -E -m1 -R yourchoice -a 127.0.0.1:5301
rcctl start dnscrypt_proxy
The dnscrypt-proxy utility does not support failover resolvers; as described
@@ -43,7 +46,7 @@
ln -s dnscrypt_proxy /etc/rc.d/dnscrypt_proxy2
rcctl enable dnscrypt_proxy2
-rcctl set dnscrypt_proxy2 flags -E -m1 -R dnscrypt.eu-dk -a 127.0.0.1:41
+rcctl set dnscrypt_proxy2 flags -E -m1 -R yourchoice2 -a 127.0.0.1:5302
rcctl start dnscrypt_proxy2
For more information, see https://dnscrypt.org/
Index: net/dnscrypt-proxy/pkg/dnscrypt_proxy.rc
===================================================================
RCS file: /cvs/ports/net/dnscrypt-proxy/pkg/dnscrypt_proxy.rc,v
retrieving revision 1.3
diff -u -a -r1.3 dnscrypt_proxy.rc
--- net/dnscrypt-proxy/pkg/dnscrypt_proxy.rc 4 Feb 2016 14:29:25 -0000 1.3
+++ net/dnscrypt-proxy/pkg/dnscrypt_proxy.rc 9 Nov 2017 09:19:53 -0000
@@ -4,6 +4,10 @@
daemon="${TRUEPREFIX}/sbin/dnscrypt-proxy -d --user=_dnscrypt-proxy"
+# defaults to use a random resolver;
+# supposedly doesn't keep logs, and supports DNSSEC.
+daemon_flags="-R random"
+
. /etc/rc.d/rc.subr
rc_reload=NO