Merge remote-tracking branch 'upstream/master'

This commit is contained in:
Ian Bashford 2020-10-28 22:32:58 +00:00
commit 3413a2ce73
25 changed files with 4287 additions and 1198 deletions

View File

@ -1,9 +1,7 @@
sudo: false
language: minimal
install:
- curl -qL https://github.com/jedisct1/dnscrypt-proxy/releases/download/2.0.25/dnscrypt-proxy-linux_x86_64-2.0.25.tar.gz | tar xzvf -
- curl -qL https://github.com/jedisct1/dnscrypt-proxy/releases/download/2.0.44/dnscrypt-proxy-linux_x86_64-2.0.44.tar.gz | tar xzvf -
- cd linux-x86_64
- cp example-dnscrypt-proxy.toml dnscrypt-proxy.toml
- sed -i -e 's/listen_addresses.*/listen_addresses = ["127.0.0.1:5300"]/' dnscrypt-proxy.toml

5
Makefile Normal file
View File

@ -0,0 +1,5 @@
all: clean
@./utils/format.py
clean:
-@rm -f */*~

View File

@ -1,4 +1,5 @@
[![Travis Status](https://travis-ci.org/DNSCrypt/dnscrypt-resolvers.svg?branch=master)](https://travis-ci.org/DNSCrypt/dnscrypt-resolvers/builds/)
[![Travis Status](https://travis-ci.com/DNSCrypt/dnscrypt-resolvers.svg?branch=master)](https://travis-ci.com/DNSCrypt/dnscrypt-resolvers/builds/)
[![Gitter chat](https://badges.gitter.im/gitter.svg)](https://gitter.im/dnscrypt-operators/Lobby)
# Lists of public DNSCrypt and DoH servers
@ -9,8 +10,8 @@ Interactive map of public DNS servers:
- https://dnscrypt.info/map
Stable download URLs:
- https://github.com/DNSCrypt/dnscrypt-resolvers/tree/master/v2
- https://download.dnscrypt.info/dnscrypt-resolvers/v2/
- https://github.com/DNSCrypt/dnscrypt-resolvers/tree/master/v3
- https://download.dnscrypt.info/dnscrypt-resolvers/v3/
More DNS server sources:
- https://github.com/jedisct1/dnscrypt-proxy/wiki/DNS-server-sources
@ -18,8 +19,8 @@ More DNS server sources:
# List of DNS relays
Anonymized DNS relays:
- https://github.com/DNSCrypt/dnscrypt-resolvers/blob/master/v2/relays.md
- https://download.dnscrypt.info/dnscrypt-resolvers/v2/relays.md
- https://github.com/DNSCrypt/dnscrypt-resolvers/blob/master/v3/relays.md
- https://download.dnscrypt.info/dnscrypt-resolvers/v3/relays.md
# Minisign public key

140
utils/format.py Executable file
View File

@ -0,0 +1,140 @@
#! /usr/bin/env python3
import sys
import os
import subprocess
from glob import glob
INCOMPATIBLE_WITH_LEGACY_VERSIONS = [
"cira-family", "cira-private", "cira-protected"
]
CURRENT_DIR = "v3"
LEGACY_DIR = "v2"
MINISIGN_PK = "RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3"
class Entry:
name = None
description = None
stamps = None
def __init__(self, name, description, stamps):
self.name = name
self.description = description
self.stamps = stamps
@staticmethod
def parse(raw_entry):
description = ""
stamps = []
lines = raw_entry.strip().splitlines()
if len(lines) < 2:
return None
name = lines[0].strip()
previous_was_blank = False
for line in lines[1:]:
line = line.strip()
if previous_was_blank is True and line == "":
continue
previous_was_blank = False
if line.startswith("sdns://"):
stamps.append(line)
else:
description = description + line + "\n"
description = description.strip()
if len(name) < 2 or len(description) < 10 or len(stamps) < 1:
return None
return Entry(name, description, stamps)
def format(self):
out = "## " + self.name + "\n\n"
out = out + self.description + "\n\n"
for stamp in self.stamps:
out = out + stamp + "\n"
return out
def format_legacy(self):
out = "## " + self.name + "\n\n"
out = out + self.description + "\n\n"
out = out + self.stamps[0] + "\n"
return out
def process(md_path, signatures_to_update):
md_legacy_path = LEGACY_DIR + "/" + os.path.basename(md_path)
print("\n[" + md_path + "]")
entries = {}
previous_content = ""
out = ""
out_legacy = """
# *** THIS IS A LEGACY LIST ***
This is a temporary, legacy list, for dnscrypt-proxy <= 2.0.42 users.
If you are running up-to-date software, replace `/v2/` with `/v3/` in the sources URLs
of the `dnscrypt-proxy.toml` file (relevant lines start with `urls = ['https://...']`
and are present in the `[sources]` section).
THIS LIST IS AUTOMATICALLY GENERATED AS A SUBSET OF THE V3 LIST. DO NOT EDIT IT MANUALLY.
If you want to contribute changes to a resolvers list, only edit files from the `v3` directory.
--
"""
with open(md_path) as f:
previous_content = f.read()
c = previous_content.split("\n## ")
out = out + c[0].strip() + "\n\n"
raw_entries = c[1:]
for i in range(0, len(raw_entries)):
entry = Entry.parse(raw_entries[i])
if not entry:
print(
"Invalid entry: [" + raw_entries[i] + "]", file=sys.stderr)
continue
if entry.name in entries:
print("Duplicate entry: [" + entry.name + "]", file=sys.stderr)
entries[entry.name] = entry
for name in sorted(entries.keys()):
entry = entries[name]
out = out + "\n" + entry.format() + "\n"
if not name in INCOMPATIBLE_WITH_LEGACY_VERSIONS:
out_legacy = out_legacy + "\n" + entry.format_legacy() + "\n"
if out == previous_content:
print("No changes")
else:
with open(md_path + ".tmp", "wt") as f:
f.write(out)
os.rename(md_path + ".tmp", md_path)
with open(md_legacy_path) as f:
previous_content = f.read()
if out_legacy == previous_content:
print("No changes to the legacy version")
else:
with open(md_legacy_path + ".tmp", "wt") as f:
f.write(out_legacy)
os.rename(md_legacy_path + ".tmp", md_legacy_path)
for path in [md_path, md_legacy_path]:
try:
subprocess.run(["minisign", "-V", "-P", MINISIGN_PK,
"-m", path], check=True)
except subprocess.CalledProcessError:
signatures_to_update.append(path)
signatures_to_update = []
for md_path in glob(CURRENT_DIR + "/*.md"):
process(md_path, signatures_to_update)
if signatures_to_update:
subprocess.run(["minisign", "-Sm", *signatures_to_update])

View File

@ -1,25 +1,21 @@
# DNS servers as .onion services
All DNSCrypt and DoH servers are accessible over Tor, via exit nodes.
This is safe as all the transactions are encrypted and authenticated.
# *** THIS IS A LEGACY LIST ***
However, it may be faster to directly access a server as an onion
service. This requires specifically configured servers.
This is a temporary, legacy list, for dnscrypt-proxy <= 2.0.42 users.
The servers below are not accessible without Tor.
If you are running up-to-date software, replace `/v2/` with `/v3/` in the sources URLs
of the `dnscrypt-proxy.toml` file (relevant lines start with `urls = ['https://...']`
and are present in the `[sources]` section).
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
THIS LIST IS AUTOMATICALLY GENERATED AS A SUBSET OF THE V3 LIST. DO NOT EDIT IT MANUALLY.
[sources.'onion-services']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/onion-services.md', 'https://download.dnscrypt.info/resolvers-list/v2/onion-services.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'onion-services.md'
If you want to contribute changes to a resolvers list, only edit files from the `v3` directory.
--
## Cloudflare
## onion-cloudflare
Cloudflare Onion Service
sdns://AgcAAAAAAAAAACC0WWFtenR5met-s8i0oiShMtYstulWSybPBq-zBUEMNT5kbnM0dG9ycG5sZnMyaWZ1ejJzMnlmM2ZjN3JkbXNiaG02cnc3NWV1ajM1cGFjNmFwMjV6Z3FhZC5vbmlvbgovZG5zLXF1ZXJ5

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i57UeoL6gijqmy+7Nz1MWzEyfOt5pnmp02aUx8TIlcCtkZ5spYi7gbd5rsvDoemNCrJEqwE3V3T2U815698Nb9A8=
trusted comment: timestamp:1572526705 file:onion-services.md
zrU0N1rpH0kAmwiEm2pZ6oG2D2i62QgnLasxy3eobJNLf9Fd+6E1SqC4RiAuW+NSybEEY9aefiDRrPq3VVQBBQ==
RWQf6LRCGA9i54x8glwqQ0pYxi+OYdOKUcN7OW3oluKN+zvCaKxvL0T0nvqVya7sXt5MX71OIogAFV1d3jhTlPFBoxk3Ire8KQo=
trusted comment: timestamp:1593348916 file:onion-services.md
1hm/lSDU123BcT6lMdasp5un0rSGJ2CVkvfuMrH1zd2GudEEtm1BMu49DWrgEi8Gu/Z52q4+z9dZt/gLv3jpAw==

View File

@ -1,14 +1,15 @@
# opennic
Resolvers from the [OpenNIC](https://www.opennic.org/) project.
# *** THIS IS A LEGACY LIST ***
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
This is a temporary, legacy list, for dnscrypt-proxy <= 2.0.42 users.
[sources.'opennic']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/opennic.md', 'https://download.dnscrypt.info/resolvers-list/v2/opennic.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'opennic.md'
If you are running up-to-date software, replace `/v2/` with `/v3/` in the sources URLs
of the `dnscrypt-proxy.toml` file (relevant lines start with `urls = ['https://...']`
and are present in the `[sources]` section).
THIS LIST IS AUTOMATICALLY GENERATED AS A SUBSET OF THE V3 LIST. DO NOT EDIT IT MANUALLY.
If you want to contribute changes to a resolvers list, only edit files from the `v3` directory.
--
@ -17,33 +18,66 @@ To use that list, add this to the `[sources]` section of your
doh-server (nginx - doh-httpproxy - unbound backend), DNSSEC / Non-Logged / Uncensored, OpenNIC and Root DNS-Zone Copy
Hosted in Switzerland on by ibksturm, aka Andreas Ziegler
sdns://AgcAAAAAAAAAACA-GhoPbFPz6XpJLVcIS1uYBwWe4FerFQWHb9g_2j24OBFpYmtzdHVybS5kZWR5bi5pbwovZG5zLXF1ZXJ5
sdns://AgcAAAAAAAAAACA-GhoPbFPz6XpJLVcIS1uYBwWe4FerFQWHb9g_2j24OBRpYmtzdHVybS5zeW5vbG9neS5tZQovZG5zLXF1ZXJ5
## ibksturm
dnscrypt-server (nginx-dnscrypt-wrapper-unbound backend), DNSSEC / Non-Logged / Uncensored, OpenNIC and Root DNS-Zone Copy
dnscrypt-server (nginx - encrypted-dns - unbound backend), DNSSEC / Non-Logged / Uncensored, OpenNIC and Root DNS-Zone Copy
Hosted in Switzerland by ibksturm, aka Andreas Ziegler
sdns://AQcAAAAAAAAACzg1LjcuMTM5LjI4IBuR6jsTpCthR_P_b_jSxBJF9ch_jC7ZTVp7EHV2YgLaGDIuZG5zY3J5cHQtY2VydC5pYmtzdHVybQ
sdns://AQcAAAAAAAAAEjgzLjc4LjEyMC4yMjc6ODQ0MyDBz1dQALBbwmxiH17PmqJWCs6_AH6-yzp_9LIN4LQ57hgyLmRuc2NyeXB0LWNlcnQuaWJrc3R1cm0
## opennic-ethservices
## ibksturm-ipv6
OpenNIC • DNSSEC • 24-hour Logs • AnonymousLogs • NoFilters
Location: Frankfurt, Germany
By ethservices.
dnscrypt-server (nginx - encrypted-dns - unbound backend), DNSSEC / Non-Logged / Uncensored, OpenNIC and Root DNS-Zone Copy
Hosted in Switzerland by ibksturm, aka Andreas Ziegler
sdns://AQUAAAAAAAAAEjk0LjI0Ny40My4yNTQ6NTM1MyDUQmYmXRg576Roac_42Ue6uQtQ664-FvA20PgVt_UIfigyLmRuc2NyeXB0LWNlcnQub3Blbm5pYzEuZXRoLXNlcnZpY2VzLmRl
sdns://AQcAAAAAAAAALlsyYTAyOjEyMDU6MzRlNzo4ZTMwOmIyNmU6YmZmZjpmZTFkOmUxOWJdOjg0NDMgwc9XUACwW8JsYh9ez5qiVgrOvwB-vss6f_SyDeC0Oe4YMi5kbnNjcnlwdC1jZXJ0Lmlia3N0dXJt
## opennic-ethservices2
## opennic-R4SAS
OpenNIC • DNSSEC • 24-hour Logs • AnonymousLogs • NoFilters
Location: Frankfurt, Germany
By ethservices.
DNSSEC - OpenNIC - Non-logging - Uncensored - hosted on ovh.com
Location: Gravelines, France.
Maintained by R4SAS.
sdns://AQYAAAAAAAAAEzE5NS4xMC4xOTUuMTk1OjUzNTMg8hbE05QkH0WdwNiGcxtcLvFewNj3USVp1A-VL0P77HIoMi5kbnNjcnlwdC1jZXJ0Lm9wZW5uaWMyLmV0aC1zZXJ2aWNlcy5kZQ
sdns://AQcAAAAAAAAAETE1MS44MC4yMjIuNzk6NDQzIKnWMjpPJYAJJhl1FQLOIx4fdtned2yHxruyig7_2w5OIDIuZG5zY3J5cHQtY2VydC5vcGVubmljLmkycGQueHl6
## opennic-R4SAS-ipv6
DNSSEC - OpenNIC - Non-logging - Uncensored - hosted on ovh.com
Location: Gravelines, France.
Maintained by R4SAS.
sdns://AQcAAAAAAAAAG1syMDAxOjQ3MDoxZjE1OmI4MDo6NTNdOjQ0MyCp1jI6TyWACSYZdRUCziMeH3bZ3ndsh8a7sooO_9sOTiAyLmRuc2NyeXB0LWNlcnQub3Blbm5pYy5pMnBkLnh5eg
## opennic-bongobow
OpenNIC • Non-logging • No DNSSEC
Location: Munich, Germany
sdns://AQYAAAAAAAAAETUuMTg5LjE3MC4xOTY6NDY1IFQ1LFVAO4Luk8QH_cI0RJcNmlbvIr_P-eyQnM0yJDJrKDIuZG5zY3J5cHQtY2VydC5uczE2LmRlLmRucy5vcGVubmljLmdsdWU
## opennic-fische
OpenNIC • Non-logging • DNSSEC
Location: Nurnberg, Germany
sdns://AQcAAAAAAAAAEDc4LjQ3LjI0My4zOjEwNTMgN4CAbUDR-b3uJJMVzfCdL9ivVV7s8wRhifLRPWBfSmQdMi5kbnNjcnlwdC1jZXJ0Lm5zMS5maXNjaGUuaW8
## opennic-iriseden
OpenNIC • Non-logging • DNSSEC
Location: Paris, France
Maintained by iriseden.
sdns://AQcAAAAAAAAAEzYyLjIxMC4xNzcuMTg5OjEwNTMgW8vytBGk6u3kvCpl4q88XjqW-w6JJiJ7QBObcFV7gYAfMi5kbnNjcnlwdC1jZXJ0Lm5zMS5pcmlzZWRlbi5mcg
## opennic-luggs
@ -53,13 +87,6 @@ Public DNS server in Canada operated by Luggs
sdns://AQYAAAAAAAAADTE0Mi40LjIwNC4xMTEgHBl5MxvoI8zPCJp5BpN-XDQQKlasf2Jw4EYlsu3bBOMfMi5kbnNjcnlwdC1jZXJ0Lm5zMy5jYS5sdWdncy5jbw
## opennic-luggs-ipv6
Public DNS server in Canada operated by Luggs (IPv6)
sdns://AQYAAAAAAAAAIVsyNjA3OjUzMDA6MTIwOmE4YToxNDI6NDoyMDQ6MTExXSAcGXkzG-gjzM8ImnkGk35cNBAqVqx_YnDgRiWy7dsE4x8yLmRuc2NyeXB0LWNlcnQubnMzLmNhLmx1Z2dzLmNv
## opennic-luggs2
Second public DNS server in Canada operated by Luggs
@ -67,11 +94,12 @@ Second public DNS server in Canada operated by Luggs
sdns://AQYAAAAAAAAAEDE0Mi40LjIwNS40Nzo0NDMgvL-34FDBPaJCLACwsaya1kjFwmS8thcLiD1xishuugkfMi5kbnNjcnlwdC1jZXJ0Lm5zNC5jYS5sdWdncy5jbw
## opennic-luggs2-ipv6
## opennic-rico4514
Second public DNS server in Canada operated by Luggs (IPv6)
OpenNIC • Non-logging • No DNSSEC
Location: Texas, 13, MX
sdns://AQYAAAAAAAAAJFsyNjA3OjUzMDA6MTIwOmE4YToxNDI6NDoyMDU6NDddOjQ0MyC8v7fgUME9okIsALCxrJrWSMXCZLy2FwuIPXGKyG66CR8yLmRuc2NyeXB0LWNlcnQubnM0LmNhLmx1Z2dzLmNv
sdns://AQYAAAAAAAAAETE0Mi40LjIwNC4xMTE6NDQzIBwZeTMb6CPMzwiaeQaTflw0ECpWrH9icOBGJbLt2wTjHzIuZG5zY3J5cHQtY2VydC5uczMuY2EubHVnZ3MuY28
## publicarray-au
@ -105,21 +133,3 @@ Maintained by publicarray - https://dns.seby.io
sdns://AgcAAAAAAAAADTEzOS45OS4yMjIuNzIgPhoaD2xT8-l6SS1XCEtbmAcFnuBXqxUFh2_YP9o9uDgRZG9oLTIuc2VieS5pbzo0NDMKL2Rucy1xdWVyeQ
## opennic-R4SAS
DNSSEC - OpenNIC - Non-logging - Uncensored - hosted on ovh.com
Location: Gravelines, France.
Maintained by R4SAS.
sdns://AQcAAAAAAAAAETE1MS44MC4yMjIuNzk6NDQzIKnWMjpPJYAJJhl1FQLOIx4fdtned2yHxruyig7_2w5OIDIuZG5zY3J5cHQtY2VydC5vcGVubmljLmkycGQueHl6
## opennic-R4SAS-ipv6
DNSSEC - OpenNIC - Non-logging - Uncensored - hosted on ovh.com
Location: Gravelines, France.
Maintained by R4SAS.
sdns://AQcAAAAAAAAAG1syMDAxOjQ3MDoxZjE1OmI4MDo6NTNdOjQ0MyCp1jI6TyWACSYZdRUCziMeH3bZ3ndsh8a7sooO_9sOTiAyLmRuc2NyeXB0LWNlcnQub3Blbm5pYy5pMnBkLnh5eg

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i58Ij104kVFXeiDSYk0pC2rkJxSBVkn7LZwhDeWNANR1sv/VWXJx5LqtWPDN8YDI+sjeFQ6o2jcEjLOfnhQioYgg=
trusted comment: timestamp:1572800149 file:opennic.md
CfB+K4lTjMgi3a+VQtWP1o1I5G9NKANUvBi6Ew6bj9tljV+tkj5v+qTuaeKtR+NZ4sRvjgeDge3B97frDfrYAw==
RWQf6LRCGA9i56edh0mKiOqR5AkpwoUA8hWGqUEq8FCO4TeyYcOIwn83BD0bi3EV93uSZprwzlfkZ/WELYG0pLoeg3dIYkukVQk=
trusted comment: timestamp:1603647533 file:opennic.md
/f0WuF4vPP4RvDMTfWhYehKULZINmfcL+Oq27S1uODNna3cU5gpoz7Dz16juXgVC//KB6HlO8t5t/2gLz6v2Dg==

View File

@ -1,21 +1,15 @@
# parental-control
A set of resolvers blocking popular websites that may not be appropriate
for children.
# *** THIS IS A LEGACY LIST ***
This is not bulletproof. In particular, websites in languages that are
not English will require additional, local rules.
This is a temporary, legacy list, for dnscrypt-proxy <= 2.0.42 users.
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
If you are running up-to-date software, replace `/v2/` with `/v3/` in the sources URLs
of the `dnscrypt-proxy.toml` file (relevant lines start with `urls = ['https://...']`
and are present in the `[sources]` section).
[sources.'parental-control']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/parental-control.md', 'https://download.dnscrypt.info/resolvers-list/v2/parental-control.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'parental-control.md'
THIS LIST IS AUTOMATICALLY GENERATED AS A SUBSET OF THE V3 LIST. DO NOT EDIT IT MANUALLY.
In order to enforce safe search results from Google and Youtube, you may
also want to enable cloaking (`cloaking_rules` in the configuration file).
If you want to contribute changes to a resolvers list, only edit files from the `v3` directory.
--
@ -28,9 +22,24 @@ sdns://AQIAAAAAAAAAFDE3Ni4xMDMuMTMwLjEzMjo1NDQzILgxXdexS27jIKRw3C7Wsao5jMnlhvhdR
## cisco-familyshield
Block websites not suitable for children
Block websites not suitable for children (DNSCrypt protocol)
sdns://AQAAAAAAAAAAEjIwOC42Ny4yMjAuMTIzOjQ0MyC3NRFAIG8iXT4r2CLX_WkeocM8yNZmjQy-BL-rykP7eRsyLmRuc2NyeXB0LWNlcnQub3BlbmRucy5jb20
Warning: modifies your queries to include a copy of your network
address when forwarding them to a selection of companies and organizations.
Currently incompatible with DNS anonymization.
sdns://AQEAAAAAAAAADjIwOC42Ny4yMjAuMTIzILc1EUAgbyJdPivYItf9aR6hwzzI1maNDL4Ev6vKQ_t5GzIuZG5zY3J5cHQtY2VydC5vcGVuZG5zLmNvbQ
## cisco-familyshield-ipv6
Block websites not suitable for children (IPv6)
Warning: modifies your queries to include a copy of your network
address when forwarding them to a selection of companies and organizations.
sdns://AgAAAAAAAAAADDE0Ni4xMTIuNDEuMyBUDrXp92r0ml9Aq9cu3mXf2w_ugmc61w74ZllxOxR-Vxxkb2guZmFtaWx5c2hpZWxkLm9wZW5kbnMuY29tCi9kbnMtcXVlcnk
## cleanbrowsing-adult
@ -44,6 +53,17 @@ By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAEzE4NS4yMjguMTY4LjEwOjg0NDMgvKwy-tVDaRcfCDLWB1AnwyCM7vDo6Z-UGNx3YGXUjykRY2xlYW5icm93c2luZy5vcmc
## cleanbrowsing-adult-ipv6
Blocks access to all adult, pornographic and explicit sites. It does
not block proxy or VPNs, nor mixed-content sites. Sites like Reddit
are allowed. Google and Bing are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAFVsyYTBkOjJhMDA6MTo6MV06ODQ0MyC8rDL61UNpFx8IMtYHUCfDIIzu8Ojpn5QY3HdgZdSPKRFjbGVhbmJyb3dzaW5nLm9yZw
## cleanbrowsing-family
Blocks access to all adult, pornographic and explicit sites. It also
@ -56,7 +76,7 @@ By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAFDE4NS4yMjguMTY4LjE2ODo4NDQzILysMvrVQ2kXHwgy1gdQJ8MgjO7w6OmflBjcd2Bl1I8pEWNsZWFuYnJvd3Npbmcub3Jn
## doh-cleanbrowsing-family
## cleanbrowsing-family-ipv6
Blocks access to all adult, pornographic and explicit sites. It also
blocks proxy and VPN domains that are used to bypass the filters.
@ -65,7 +85,32 @@ Youtube are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AgMAAAAAAAAAAAAVZG9oLmNsZWFuYnJvd3Npbmcub3JnEy9kb2gvZmFtaWx5LWZpbHRlci8
sdns://AQMAAAAAAAAAFFsyYTBkOjJhMDA6MTo6XTo4NDQzILysMvrVQ2kXHwgy1gdQJ8MgjO7w6OmflBjcd2Bl1I8pEWNsZWFuYnJvd3Npbmcub3Jn
## cloudflare-family
Cloudflare DNS (anycast) with malware protection and parental control - aka 1.1.1.3 / 1.0.0.3
sdns://AgMAAAAAAAAABzEuMC4wLjMAGWZhbWlseS5jbG91ZGZsYXJlLWRucy5jb20KL2Rucy1xdWVyeQ
## cloudflare-family-ipv6
Cloudflare DNS over IPv6 (anycast) with malware protection and parental control
sdns://AgMAAAAAAAAAFlsyNjA2OjQ3MDA6NDcwMDo6MTExM10AGWZhbWlseS5jbG91ZGZsYXJlLWRucy5jb20KL2Rucy1xdWVyeQ
## dnsforfamily
Block adult websites, porn websites, gambling websites and advertisements.
No DNS queries are logged. As of March 2019 2.1million websites are blocked and new websites are added to blacklist daily
Completely free, no ads or any commercial motive.
Provided by: https://dnsforfamily.com
sdns://AQIAAAAAAAAADDc4LjQ3LjY0LjE2MSATJeLOABXNSYcSJIoqR5_iUYz87Y4OecMLB84aEAKPrRBkbnNmb3JmYW1pbHkuY29t
## doh-cleanbrowsing-adult
@ -79,7 +124,7 @@ By https://cleanbrowsing.org/
sdns://AgMAAAAAAAAAAAAVZG9oLmNsZWFuYnJvd3Npbmcub3JnEi9kb2gvYWR1bHQtZmlsdGVyLw
## cleanbrowsing-family-ipv6
## doh-cleanbrowsing-family
Blocks access to all adult, pornographic and explicit sites. It also
blocks proxy and VPN domains that are used to bypass the filters.
@ -88,18 +133,16 @@ Youtube are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAFFsyYTBkOjJhMDA6MTo6XTo4NDQzILysMvrVQ2kXHwgy1gdQJ8MgjO7w6OmflBjcd2Bl1I8pEWNsZWFuYnJvd3Npbmcub3Jn
sdns://AgMAAAAAAAAAAAAVZG9oLmNsZWFuYnJvd3Npbmcub3JnEy9kb2gvZmFtaWx5LWZpbHRlci8
## cleanbrowsing-adult-ipv6
## safesurfer
Blocks access to all adult, pornographic and explicit sites. It does
not block proxy or VPNs, nor mixed-content sites. Sites like Reddit
are allowed. Google and Bing are set to the Safe Mode.
Family safety focused blocklist for over 2 million adult sites, as well as phishing and malware and more.
Free to use, paid for customizing blocking for more categories+sites and viewing usage at my.safesurfer.io. Logs taken for viewing
usage, data never sold - https://safesurfer.io
By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAFVsyYTBkOjJhMDA6MTo6MV06ODQ0MyC8rDL61UNpFx8IMtYHUCfDIIzu8Ojpn5QY3HdgZdSPKRFjbGVhbmJyb3dzaW5nLm9yZw
sdns://AQMAAAAAAAAADjEwNC4xOTcuMjguMTIxICcgf9USBOg2e0g0AF35_9HTC74qnDNjnm7b-K7ZHUDYIDIuZG5zY3J5cHQtY2VydC5zYWZlc3VyZmVyLmNvLm56
## sfw.scaleway-fr
@ -108,15 +151,5 @@ Uses deep learning to block adult websites. Free, DNSSEC, no logs.
Hosted in Paris, running on a 1-XS server donated by Scaleway.com
Maintained by Frank Denis - https://fr.dnscrypt.info/sfw.html
sdns://AQcAAAAAAAAAEzE2My4xNzIuMTgwLjEyNTo0NDMg32Jzv8dSGSqLWjm8DIWsP_lkRdc2RPZicoJdNVjxof8fMi5kbnNjcnlwdC1jZXJ0LnNmdy5zY2FsZXdheS1mcg
sdns://AQMAAAAAAAAAEzE2My4xNzIuMTgwLjEyNTo0NDMg32Jzv8dSGSqLWjm8DIWsP_lkRdc2RPZicoJdNVjxof8fMi5kbnNjcnlwdC1jZXJ0LnNmdy5zY2FsZXdheS1mcg
## dnsforfamily
Block adult websites, porn websites, gambling websites and advertisements.
No DNS queries are logged. As of March 2019 2.1million websites are blocked and new websites are added to blacklist daily
Completely free, no ads or any commercial motive.
Provided by: https://dnsforfamily.com
sdns://AQIAAAAAAAAADDc4LjQ3LjY0LjE2MSATJeLOABXNSYcSJIoqR5_iUYz87Y4OecMLB84aEAKPrRBkbnNmb3JmYW1pbHkuY29t

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i55tNJXy4Qz0B5MsY/seH2Cbk2GmTXE0Rtan1YHGg1Z6RpbwxT6uq5IlHbp44LyKNgK1GcgfSn1FHTMwaARaBMQs=
trusted comment: timestamp:1572526705 file:parental-control.md
MjlATWmRHz3uwB0uYWTJEvdyxCV2KNmOzCuVOD5DbrfUiXdP7jTVKX7gQGMADcTzu/GpbCdlUiF5IEAE4pH1Dw==
RWQf6LRCGA9i5wf+lqYhnTgSTRyPHdv3uJ3zS8ZdAbe79LQgHw0zXfhMNkRv7y/ZUG8QuiYAPrL9juHbBjxbhpwoY/BcLsKtJQ0=
trusted comment: timestamp:1593498378 file:parental-control.md
/VRAqOa7Ff9axw865KTN3aA/FxWgyVKtyeW+EzV0qGc+cR53vniPPKJ4nCIxU9+rDRgLgFHHyPMmaJlA4mWhDw==

File diff suppressed because it is too large Load Diff

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i50MUbK3+N0b97ej73ccV8HkfUU8aTxI7vQpNejex8eBqXrTQFdUkUdiTxQGJ/MdpsgEiCiPuIfhr5Dx4KBGAGQE=
trusted comment: timestamp:1572905956 file:public-resolvers.md
0JjrT5Sse4ezRQAQ9KOhkfkY73eXbV60sFVcx8Hhr+SVwA1crf9Ip9Jp93G5/Y6j5kocGO+9mvapuV+M3gZ4CA==
RWQf6LRCGA9i58FcuOUSCH7JL0FaI0OEMzgUOQLJXhTDO2tCOJG9uYmEBzUgVeR7E5lmrugXL09GLkX7prCNFJGk2EZMSwSE0wQ=
trusted comment: timestamp:1603733702 file:public-resolvers.md
mYjmbAIf6prlYzLwdHahEtuwgHiCt7sbskHcFtuzKtf0g0vwGg7y5s4pxeNFd8/u/PZjKl+VGKAGo2beZL7yDw==

View File

@ -1,22 +1,213 @@
# Anonymized DNS relays
Anonymized DNS is a lightweight alternative to Tor and SOCKS proxies,
dedicated to DNS traffic. They hide the client IP address to DNS resolvers,
providing anonymity in addition to confidentiality and integrity.
# *** THIS IS A LEGACY LIST ***
DNS Anonymization is only compatible with servers supporting the
DNSCrypt protocol.
This is a temporary, legacy list, for dnscrypt-proxy <= 2.0.42 users.
See the link below for more information:
If you are running up-to-date software, replace `/v2/` with `/v3/` in the sources URLs
of the `dnscrypt-proxy.toml` file (relevant lines start with `urls = ['https://...']`
and are present in the `[sources]` section).
https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS
THIS LIST IS AUTOMATICALLY GENERATED AS A SUBSET OF THE V3 LIST. DO NOT EDIT IT MANUALLY.
If you want to contribute changes to a resolvers list, only edit files from the `v3` directory.
--
## anon-acsacsar-ams-ipv4
Anonymized DNS relay hosted in AMS on Scaleway
sdns://gRE1MS4xNTguMTY2Ljk3OjQ0Mw
## anon-acsacsar-ams-ipv6
Anonymized DNS relay hosted in AMS on Scaleway
sdns://gRpbMjAwMTpiYzg6MTgyNDo3Mzg6OjFdOjQ0Mw
## anon-ams-nl
Anonymized DNS relay hosted in Netherlands - NL
sdns://gRI1MS4xNS4xMjQuMjA4OjQzNDM
## anon-bcn
Anonymized DNS relay hosted in Barcelona, Spain.
sdns://gRMxODUuMjUzLjE1NC42Njo0MzQz
## anon-cs-ca2
Anonymized DNS relay hosted in CA - Vancouver provided by https://cryptostorm.is/
sdns://gRMxNjIuMjIxLjIwNy4yMjg6NDQz
## anon-cs-de2
Anonymized DNS relay hosted in Frankfurt, Germany provided by https://cryptostorm.is/
sdns://gRA4NC4xNi4yNDAuNDM6NDQz
## anon-cs-fr
Anonymized DNS relay hosted in Paris, France provided by https://cryptostorm.is/
sdns://gREyMTIuMTI5LjQ2LjMyOjQ0Mw
## anon-cs-fr2
Anonymized DNS relay hosted in Paris, France (secondary) provided by https://cryptostorm.is/
sdns://gRExOTUuMTU0LjQwLjQ4OjQ0Mw
## anon-cs-md
Anonymized DNS relay hosted in Chisinau, Moldova provided by https://cryptostorm.is/
sdns://gRMxNzguMTc1LjEzOS4yMTE6NDQz
## anon-cs-nl
Anonymized DNS relay hosted in Roosendaal, Netherlands provided by https://cryptostorm.is/
sdns://gRExODUuMTA3LjgwLjg0OjQ0Mw
## anon-cs-nl2
Anonymized DNS relay hosted in Rotterdam, Netherlands provided by https://cryptostorm.is/
sdns://gRIyMTMuMTYzLjY0LjIwODo0NDM
## anon-cs-pt
Anonymized DNS relay hosted in Lisbon, Portugal provided by https://cryptostorm.is/
sdns://gRExMDkuNzEuNDIuMjI4OjQ0Mw
## anon-cs-se
Anonymized DNS relay hosted in Stockholm, Sweden provided by https://cryptostorm.is/
sdns://gRMxMjguMTI3LjEwNC4xMDg6NDQz
## anon-cs-sk
Anonymized DNS relay hosted in South Korea provided by https://cryptostorm.is/
sdns://gRAyNy4yNTUuNzcuNTY6NDQz
## anon-cs-usca
Anonymized DNS relay hosted in US - Los Angeles, CA provided by https://cryptostorm.is/
sdns://gRAyMy4xOS42Ny4xMTY6NDQz
## anon-cs-usga
Anonymized DNS relay hosted in US - Atlanta, GA provided by https://cryptostorm.is/
sdns://gRE2NC40Mi4xODEuMjI3OjQ0Mw
## anon-cs-usnc
Anonymized DNS relay hosted in US - Charlotte, NC provided by https://cryptostorm.is/
sdns://gRIxNTUuMjU0LjI5LjExMzo0NDM
## anon-cs-usnv
Anonymized DNS relay hosted in US - Las Vegas, NV provided by https://cryptostorm.is/
sdns://gRAzNy4xMjAuMTQ3LjI6NDQz
## anon-cs-usor
Anonymized DNS relay hosted in US - Roseburg, OR provided by https://cryptostorm.is/
sdns://gRExMDQuMjU1LjE3NS4yOjQ0Mw
## anon-cs-ustx
Anonymized DNS relay hosted in US - Dallas, TX provided by https://cryptostorm.is/
sdns://gREyMDkuNTguMTQ3LjM2OjQ0Mw
## anon-dnscrypt.one
Anonymized DNS relay hosted in Germany (Nuremberg), https://dnscrypt.one
sdns://gRIxNDQuOTEuMTA2LjIyNzo0NDM
## anon-dnscrypt.uk-ipv4
Anonymized DNS relay hosted in UK on DigitalOcean
sdns://gRIxMzkuNTkuMjAwLjExNjo0NDM
## anon-dnscrypt.uk-ipv6
Anonymized DNS relay hosted in UK on DigitalOcean
sdns://gR5bMmEwMzpiMGMwOjE6ZTA6OjJlMzplMDAxXTo0NDM
## anon-ev-to
Anonymized DNS relay provided by evilvibes.com Location: Toronto, Canada
sdns://gQw2Ni44NS4zMC4xMDU
## anon-ev-va
Anonymized DNS relay provided by evilvibes.com Location: Vancouver, Canada
sdns://gQ4xMDQuMzYuMTQ4LjIyMQ
## anon-ibksturm
Hosted in Switzerland and maintained by @ibksturm, aka Andreas Ziegler.
sdns://gQ84My43Ny44NS43Ojg0NDM
sdns://gRI4My43OC4xMjAuMjI3Ojg0NDM
## anon-ibksturm-ipv6
Hosted in Switzerland and maintained by @ibksturm, aka Andreas Ziegler.
sdns://gS5bMmEwMjoxMjA1OjM0ZTc6OGUzMDpiMjZlOmJmZmY6ZmUxZDplMTliXTo4NDQz
## anon-inconnu
Anonymized DNS relay hosted in Seattle, WA (USA), maintained by Eric
Lagergren (@ericlagergren). Running the official Docker image on Vultr.
sdns://gRIxMDQuMjM4LjE1My40Njo0NDM
## anon-kama
@ -26,39 +217,25 @@ Anonymized DNS relay hosted in France and maintained by Frank Denis (@jedisct1).
sdns://gRIxMzcuNzQuMjIzLjIzNDo0NDM
## anon-suami
## anon-meganerd
Anonymized DNS relay hosted in France, maintained by @lucenera
Anonymized DNS relay hosted by MegaNerd.nl (https://www.meganerd.nl/encrypted-dns-server) in Amsterdam, The Netherlands
sdns://gRE1MS4xNTguMTA2LjQyOjQ0Mw
sdns://gRIxMzYuMjQ0Ljk3LjExNDo0NDM
## anon-charis
## anon-meganerd-ipv6
Anonymized DNS relay hosted in Germany, maintained by @lucenera
Anonymized DNS relay hosted by MegaNerd.nl (https://www.meganerd.nl/encrypted-dns-server) in Amsterdam, The Netherlands
sdns://gRE1MS4xNS4xMDYuMTc2OjQ0Mw
sdns://gStbMjAwMToxOWYwOjUwMDE6Y2JiOjU0MDA6M2ZmOmZlMDc6ZjcwZF06NDQz
## anon-tiarap
## anon-plan9-dns
Anonymized DNS relay hosted in Singapore
Anonymized DNS relay hosted in New Jersey, USA. Running the official Docker image on Vultr by @jlongua1
sdns://gRMxNzQuMTM4LjI5LjE3NToxNDQz
## anon-tiarap-ipv6
Anonymized IPv6 DNS relay hosted in Singapore
sdns://gSBbMjQwMDo2MTgwOjA6ZDA6OjVmNzM6NDAwMV06MTQ0Mw
## anon-ev-va
Anonymized DNS relay provided by evilvibes.com Location: Vancouver, Canada
sdns://gQ4xMDQuMzYuMTQ5LjE3Nw
sdns://gRIxNzMuMTk5LjEyNi4zNTo0NDM
## anon-publicarray
@ -76,236 +253,56 @@ Running on an instance donated by https://scaleway.com
sdns://gRMxNjMuMTcyLjE4MC4xMjU6NDQz
## anon-inconnu
## anon-scaleway-ams
Anonymized DNS relay hosted in Seattle, WA (USA), maintained by Eric
Lagergren (@ericlagergren). Running the official Docker image on Vultr.
Anonymized DNS relay hosted in Amsterdam and maintained by Frank Denis (@jedisct1).
Running on an instance donated by https://scaleway.com
sdns://gRIxMDQuMjM4LjE1My40Njo0NDM
sdns://gRE1MS4xNS4xMjIuMjUwOjQ0Mw
## anon-cs-ch
## anon-scaleway-ams-ipv6
Anonymized DNS relay hosted in Zurich, Switzerland provided by https://cryptostorm.is/
Anonymized DNS relay hosted in Amsterdam and maintained by Frank Denis (@jedisct1).
IPv6 only. Running on an instance donated by https://scaleway.com
sdns://gQ84MS4xNy4zMS4zNDo0NDM
sdns://gRpbMjAwMTpiYzg6MTgyMDo1MGQ6OjFdOjQ0Mw
## anon-cs-se
## anon-skyfighter
Anonymized DNS relay hosted in Stockholm, Sweden provided by https://cryptostorm.is/
Anonymized DNS relay hosted in Netherlands (https://scaleway.com) and maintained by @tuttimann.
sdns://gRMxMjguMTI3LjEwNC4xMDg6NDQz
sdns://gQ81MS4xNS42Mi42NTo0NDM
## anon-cs-dk
## anon-skyfighter-ipv6
Anonymized DNS relay hosted in Copenhagen, Denmark provided by https://cryptostorm.is/
Anonymized DNS relay hosted in Netherlands (https://scaleway.com) and maintained by @tuttimann.
IPv6 only.
sdns://gRMxODUuMjEyLjE2OS4xMzk6NDQz
sdns://gRtbMjAwMTpiYzg6MTgyNDoxNzBmOjoxXTo0NDM
## anon-cs-ro
## anon-sth-se
Anonymized DNS relay hosted in Bucharest, Romania provided by https://cryptostorm.is/
Anonymized DNS relay hosted in Sweden - SE
sdns://gRA1LjI1NC45Ni4xOTU6NDQz
sdns://gRI0NS4xNTMuMTg3Ljk2OjQzNDM
## anon-cs-nl
## anon-tiarap
Anonymized DNS relay hosted in Roosendaal, Netherlands provided by https://cryptostorm.is/
Anonymized DNS relay hosted in Singapore
sdns://gRExODUuMTA3LjgwLjg0OjQ0Mw
sdns://gRMxNzQuMTM4LjI5LjE3NToxNDQz
## anon-cs-md
## anon-tiarap-ipv6
Anonymized DNS relay hosted in Chisinau, Moldova provided by https://cryptostorm.is/
Anonymized IPv6 DNS relay hosted in Singapore
sdns://gRMxNzguMTc1LjEzOS4yMTE6NDQz
## anon-cs-it
Anonymized DNS relay hosted in Milan, Italy provided by https://cryptostorm.is/
sdns://gRIxODUuOTQuMTkzLjIzNDo0NDM
## anon-cs-lv
Anonymized DNS relay hosted in Riga, Latvia provided by https://cryptostorm.is/
sdns://gRMxMDkuMjQ4LjE0OS4xMzM6NDQz
## anon-cs-nl2
Anonymized DNS relay hosted in Rotterdam, Netherlands provided by https://cryptostorm.is/
sdns://gRIyMTMuMTYzLjY0LjIwODo0NDM
## anon-cs-sk
Anonymized DNS relay hosted in South Korea provided by https://cryptostorm.is/
sdns://gRAyNy4yNTUuNzcuNTY6NDQz
## anon-cs-fi
Anonymized DNS relay hosted in Helsinki, Finland provided by https://cryptostorm.is/
sdns://gRIxODUuMTE3LjExOC4yMDo0NDM
## anon-cs-pt
Anonymized DNS relay hosted in Lisbon, Portugal provided by https://cryptostorm.is/
sdns://gRExMDkuNzEuNDIuMjI4OjQ0Mw
## anon-cs-po
Anonymized DNS relay hosted in Warsaw, Poland provided by https://cryptostorm.is/
sdns://gQ81LjEzMy44LjE4Nzo0NDM
## anon-cs-fr
Anonymized DNS relay hosted in Paris, France provided by https://cryptostorm.is/
sdns://gREyMTIuMTI5LjQ2LjMyOjQ0Mw
## anon-cs-fr2
Anonymized DNS relay hosted in Paris, France (secondary) provided by https://cryptostorm.is/
sdns://gRExOTUuMTU0LjQwLjQ4OjQ0Mw
## anon-cs-de
Anonymized DNS relay hosted in Dusseldorf, Germany provided by https://cryptostorm.is/
sdns://gRI4OS4xNjMuMjE0LjE3NDo0NDM
## anon-cs-de2
Anonymized DNS relay hosted in Frankfurt, Germany provided by https://cryptostorm.is/
sdns://gRA4NC4xNi4yNDAuNDM6NDQz
## anon-cs-uk
Anonymized DNS relay hosted in UK - London provided by https://cryptostorm.is/
sdns://gRE4Mi4xNjMuNzIuMTIzOjQ0Mw
## anon-cs-ca
Anonymized DNS relay hosted in CA - Montreal provided by https://cryptostorm.is/
sdns://gRIxNjcuMTE0Ljg0LjEzMjo0NDM
## anon-cs-ca2
Anonymized DNS relay hosted in CA - Vancouver provided by https://cryptostorm.is/
sdns://gRMxNjIuMjIxLjIwNy4yMjg6NDQz
## anon-cs-usil
Anonymized DNS relay hosted in US - Chicago, IL provided by https://cryptostorm.is/
sdns://gRIxNzMuMjM0LjU2LjExNTo0NDM
## anon-cs-usny
Anonymized DNS relay hosted in US - New York City, NY provided by https://cryptostorm.is/
sdns://gRMxNzMuMjM0LjE1OS4yMzU6NDQz
## anon-cs-usca
Anonymized DNS relay hosted in US - Los Angeles, CA provided by https://cryptostorm.is/
sdns://gRAyMy4xOS42Ny4xMTY6NDQz
## anon-cs-usdc
Anonymized DNS relay hosted in US - Washington, DC provided by https://cryptostorm.is/
sdns://gRAxOTguNy41OC4yMjc6NDQz
## anon-cs-usnc
Anonymized DNS relay hosted in US - Charlotte, NC provided by https://cryptostorm.is/
sdns://gRIxNTUuMjU0LjI5LjExMzo0NDM
## anon-cs-usor
Anonymized DNS relay hosted in US - Roseburg, OR provided by https://cryptostorm.is/
sdns://gRExMDQuMjU1LjE3NS4yOjQ0Mw
## anon-cs-usga
Anonymized DNS relay hosted in US - Atlanta, GA provided by https://cryptostorm.is/
sdns://gRE2NC40Mi4xODEuMjI3OjQ0Mw
## anon-cs-ustx
Anonymized DNS relay hosted in US - Dallas, TX provided by https://cryptostorm.is/
sdns://gREyMDkuNTguMTQ3LjM2OjQ0Mw
## anon-cs-uswa
Anonymized DNS relay hosted in US - Seattle, WA provided by https://cryptostorm.is/
sdns://gRA2NC4xMjAuNS4yNTE6NDQz
## anon-cs-usnv
Anonymized DNS relay hosted in US - Las Vegas, NV provided by https://cryptostorm.is/
sdns://gRAzNy4xMjAuMTQ3LjI6NDQz
## anon-dnscrypt.uk-ipv4
Anonymized DNS relay hosted in UK on DigitalOcean
sdns://gRIxMzkuNTkuMjAwLjExNjo0NDM
## anon-dnscrypt.uk-ipv6
Anonymized DNS relay hosted in UK on DigitalOcean
sdns://gR5bMmEwMzpiMGMwOjE6ZTA6OjJlMzplMDAxXTo0NDM
sdns://gSBbMjQwMDo2MTgwOjA6ZDA6OjVmNzM6NDAwMV06MTQ0Mw
## anon-v.dnscrypt.uk-ipv4
@ -320,3 +317,18 @@ sdns://gRMxMDQuMjM4LjE4Ni4xOTI6NDQz
Anonymized DNS relay hosted in UK on Vultr
sdns://gSxbMjAwMToxOWYwOjc0MDI6MTU3NDo1NDAwOjJmZjpmZTY2OjJjZmZdOjQ0Mw
## anon-yofiji-se-ipv4
Anonymized DNS relay hosted in Sweden and maintained by yofiji.
sdns://gRMxODUuMTkzLjEyNy4yNDQ6NDQz
## anon-yofiji-se-ipv6
Anonymized DNS relay hosted in Sweden and maintained by yofiji.
sdns://gSlbMmEwYTozODQwOjEzMzc6MTI3OjA6YjljMTo3ZmY0OjEzMzddOjQ0Mw

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i5zkjO2JV1IH2otgyH8qa/gLe7qEmGd+r9F2BdbSIodiJowsgo+p5l8BYp1O61Ch9SzBCY2YpgWkf0/u5M3Rwhgg=
trusted comment: timestamp:1572713350 file:relays.md
GDXLT7KcgkkanxziyVeeu5AXJCFzVlQT5siPjQSFJG0H98GX8Sh4XRquwa6d7Hx5fy4/3XIB5AdPS8kk2XU4Cw==
RWQf6LRCGA9i52qLhq1YChkKbUiD2C7jmUqMbJuE1RFgjcesnk6O3Hc+VavBvSpR0rT5hS7bOf7dtUBgYy87o/ocuS42VU8W8Q8=
trusted comment: timestamp:1603733702 file:relays.md
8G4tYmZmojmAGd4unYFhUxafKmWOhU1pMuM7D8NrQuKqw8kDkgOfQT1cxB6l+s79Z3hChj90uh6VWsHyegkBCw==

2
v3/minisign.pub Normal file
View File

@ -0,0 +1,2 @@
untrusted comment: minisign public key used to sign the resolvers list
RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3

27
v3/onion-services.md Normal file
View File

@ -0,0 +1,27 @@
# DNS servers as .onion services
All DNSCrypt and DoH servers are accessible over Tor, via exit nodes.
This is safe as all the transactions are encrypted and authenticated.
However, it may be faster to directly access a server as an onion
service. This requires specifically configured servers.
The servers below are not accessible without Tor.
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
[sources.'onion-services']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/onion-services.md', 'https://download.dnscrypt.info/resolvers-list/v3/onion-services.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'onion-services.md'
--
## onion-cloudflare
Cloudflare Onion Service
sdns://AgcAAAAAAAAAACC0WWFtenR5met-s8i0oiShMtYstulWSybPBq-zBUEMNT5kbnM0dG9ycG5sZnMyaWZ1ejJzMnlmM2ZjN3JkbXNiaG02cnc3NWV1ajM1cGFjNmFwMjV6Z3FhZC5vbmlvbgovZG5zLXF1ZXJ5

View File

@ -0,0 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i58kHF1Gg04lD/GflpXX7LsfD+d+oyVbkTux8QA5BUxOH0gg7HgP3FTV/orocEYcT/EPs7bxAFi6yPP+fjgqhiAY=
trusted comment: timestamp:1593609508 file:onion-services.md
gv8FNDXTux6CfcEBIMf9xelP9JwZTGFx0PzV+GXDbNctXQMMw7TwTY13CsKZIRKIzuYZKZ8DSvoM/BFjWkYIAA==

135
v3/opennic.md Normal file
View File

@ -0,0 +1,135 @@
# opennic
Resolvers from the [OpenNIC](https://www.opennic.org/) project.
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
[sources.'opennic']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/opennic.md', 'https://download.dnscrypt.info/resolvers-list/v3/opennic.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'opennic.md'
--
## doh-ibksturm
doh-server (nginx - doh-httpproxy - unbound backend), DNSSEC / Non-Logged / Uncensored, OpenNIC and Root DNS-Zone Copy
Hosted in Switzerland on by ibksturm, aka Andreas Ziegler
sdns://AgcAAAAAAAAAACA-GhoPbFPz6XpJLVcIS1uYBwWe4FerFQWHb9g_2j24OBRpYmtzdHVybS5zeW5vbG9neS5tZQovZG5zLXF1ZXJ5
## ibksturm
dnscrypt-server (nginx - encrypted-dns - unbound backend), DNSSEC / Non-Logged / Uncensored, OpenNIC and Root DNS-Zone Copy
Hosted in Switzerland by ibksturm, aka Andreas Ziegler
sdns://AQcAAAAAAAAAEjgzLjc4LjEyMC4yMjc6ODQ0MyDBz1dQALBbwmxiH17PmqJWCs6_AH6-yzp_9LIN4LQ57hgyLmRuc2NyeXB0LWNlcnQuaWJrc3R1cm0
## ibksturm-ipv6
dnscrypt-server (nginx - encrypted-dns - unbound backend), DNSSEC / Non-Logged / Uncensored, OpenNIC and Root DNS-Zone Copy
Hosted in Switzerland by ibksturm, aka Andreas Ziegler
sdns://AQcAAAAAAAAALlsyYTAyOjEyMDU6MzRlNzo4ZTMwOmIyNmU6YmZmZjpmZTFkOmUxOWJdOjg0NDMgwc9XUACwW8JsYh9ez5qiVgrOvwB-vss6f_SyDeC0Oe4YMi5kbnNjcnlwdC1jZXJ0Lmlia3N0dXJt
## opennic-R4SAS
DNSSEC - OpenNIC - Non-logging - Uncensored - hosted on ovh.com
Location: Gravelines, France.
Maintained by R4SAS.
sdns://AQcAAAAAAAAAETE1MS44MC4yMjIuNzk6NDQzIKnWMjpPJYAJJhl1FQLOIx4fdtned2yHxruyig7_2w5OIDIuZG5zY3J5cHQtY2VydC5vcGVubmljLmkycGQueHl6
## opennic-R4SAS-ipv6
DNSSEC - OpenNIC - Non-logging - Uncensored - hosted on ovh.com
Location: Gravelines, France.
Maintained by R4SAS.
sdns://AQcAAAAAAAAAG1syMDAxOjQ3MDoxZjE1OmI4MDo6NTNdOjQ0MyCp1jI6TyWACSYZdRUCziMeH3bZ3ndsh8a7sooO_9sOTiAyLmRuc2NyeXB0LWNlcnQub3Blbm5pYy5pMnBkLnh5eg
## opennic-bongobow
OpenNIC • Non-logging • No DNSSEC
Location: Munich, Germany
sdns://AQYAAAAAAAAAETUuMTg5LjE3MC4xOTY6NDY1IFQ1LFVAO4Luk8QH_cI0RJcNmlbvIr_P-eyQnM0yJDJrKDIuZG5zY3J5cHQtY2VydC5uczE2LmRlLmRucy5vcGVubmljLmdsdWU
## opennic-fische
OpenNIC • Non-logging • DNSSEC
Location: Nurnberg, Germany
sdns://AQcAAAAAAAAAEDc4LjQ3LjI0My4zOjEwNTMgN4CAbUDR-b3uJJMVzfCdL9ivVV7s8wRhifLRPWBfSmQdMi5kbnNjcnlwdC1jZXJ0Lm5zMS5maXNjaGUuaW8
## opennic-iriseden
OpenNIC • Non-logging • DNSSEC
Location: Paris, France
Maintained by iriseden.
sdns://AQcAAAAAAAAAEzYyLjIxMC4xNzcuMTg5OjEwNTMgW8vytBGk6u3kvCpl4q88XjqW-w6JJiJ7QBObcFV7gYAfMi5kbnNjcnlwdC1jZXJ0Lm5zMS5pcmlzZWRlbi5mcg
## opennic-luggs
Public DNS server in Canada operated by Luggs
sdns://AQYAAAAAAAAADTE0Mi40LjIwNC4xMTEgHBl5MxvoI8zPCJp5BpN-XDQQKlasf2Jw4EYlsu3bBOMfMi5kbnNjcnlwdC1jZXJ0Lm5zMy5jYS5sdWdncy5jbw
## opennic-luggs2
Second public DNS server in Canada operated by Luggs
sdns://AQYAAAAAAAAAEDE0Mi40LjIwNS40Nzo0NDMgvL-34FDBPaJCLACwsaya1kjFwmS8thcLiD1xishuugkfMi5kbnNjcnlwdC1jZXJ0Lm5zNC5jYS5sdWdncy5jbw
## opennic-rico4514
OpenNIC • Non-logging • No DNSSEC
Location: Texas, 13, MX
sdns://AQYAAAAAAAAAETE0Mi40LjIwNC4xMTE6NDQzIBwZeTMb6CPMzwiaeQaTflw0ECpWrH9icOBGJbLt2wTjHzIuZG5zY3J5cHQtY2VydC5uczMuY2EubHVnZ3MuY28
## publicarray-au
DNSSEC • OpenNIC • Non-logging • Uncensored - hosted on vultr.com
Maintained by publicarray - https://dns.seby.io
sdns://AQcAAAAAAAAADDQ1Ljc2LjExMy4zMSAIVGh4i6eKXqlF6o9Fg92cgD2WcDvKQJ7v_Wq4XrQsVhsyLmRuc2NyeXB0LWNlcnQuZG5zLnNlYnkuaW8
## publicarray-au-doh
DNSSEC • OpenNIC • Non-logging • Uncensored - hosted on vultr.com
Maintained by publicarray - https://dns.seby.io
sdns://AgcAAAAAAAAADDQ1Ljc2LjExMy4zMSA-GhoPbFPz6XpJLVcIS1uYBwWe4FerFQWHb9g_2j24OBBkb2guc2VieS5pbzo4NDQzCi9kbnMtcXVlcnk
## publicarray-au2
DNSSEC • OpenNIC • Non-logging • Uncensored - hosted on ovh.com.au
Maintained by publicarray - https://dns.seby.io
sdns://AQcAAAAAAAAADTEzOS45OS4yMjIuNzIgCwVoTw0L4dgal5LC1FbZUtHtLR_rVuV6rVnxO95e4GUbMi5kbnNjcnlwdC1jZXJ0LmRucy5zZWJ5Lmlv
## publicarray-au2-doh
DNSSEC • OpenNIC • Non-logging • Uncensored - hosted on ovh.com.au
Maintained by publicarray - https://dns.seby.io
sdns://AgcAAAAAAAAADTEzOS45OS4yMjIuNzIgPhoaD2xT8-l6SS1XCEtbmAcFnuBXqxUFh2_YP9o9uDgRZG9oLTIuc2VieS5pbzo0NDMKL2Rucy1xdWVyeQ

4
v3/opennic.md.minisig Normal file
View File

@ -0,0 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i5yla4mCeNbbozdhKs6vx1Pb6+am43R6JZPJn5SrVPIgcyzAhWLOWgqOYYbsyivKbRArKMok4RiRHSx0G3uodvQg=
trusted comment: timestamp:1603647533 file:opennic.md
akgLfeJ3btoFMwwYPGeAmYtt4IJxOO+b9++svlM/jsDBuqPvi2wsJEve4sBeyAuF1UunyU3bjOhm9BtkmfDYDA==

173
v3/parental-control.md Normal file
View File

@ -0,0 +1,173 @@
# parental-control
A set of resolvers blocking popular websites that may not be appropriate
for children.
This is not bulletproof. In particular, websites in languages that are
not English will require additional, local rules.
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
[sources.'parental-control']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/parental-control.md', 'https://download.dnscrypt.info/resolvers-list/v3/parental-control.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'parental-control.md'
In order to enforce safe search results from Google and Youtube, you may
also want to enable cloaking (`cloaking_rules` in the configuration file).
--
## adguard-dns-family
Adguard DNS with safesearch and adult content blocking
sdns://AQIAAAAAAAAAFDE3Ni4xMDMuMTMwLjEzMjo1NDQzILgxXdexS27jIKRw3C7Wsao5jMnlhvhdRUXWuMm1AFq6ITIuZG5zY3J5cHQuZmFtaWx5Lm5zMS5hZGd1YXJkLmNvbQ
## cira-family
CIRA DoH resolvers, blocking trackers, malware, phishing and pornography.
Operated by the .CA registry. Built by Canadians for Canadians.
https://www.cira.ca/fr/cybersecurity-services/canadian-shield
sdns://AgEAAAAAAAAAACA_4zhjTgUQYz3kU8o1CxXOwzmz3Li6nyot0k0QqDj-6x1mYW1pbHkuY2FuYWRpYW5zaGllbGQuY2lyYS5jYQovZG5zLXF1ZXJ5
## cisco-familyshield
Block websites not suitable for children (DNSCrypt protocol)
Warning: modifies your queries to include a copy of your network
address when forwarding them to a selection of companies and organizations.
Currently incompatible with DNS anonymization.
sdns://AQEAAAAAAAAADjIwOC42Ny4yMjAuMTIzILc1EUAgbyJdPivYItf9aR6hwzzI1maNDL4Ev6vKQ_t5GzIuZG5zY3J5cHQtY2VydC5vcGVuZG5zLmNvbQ
## cisco-familyshield-ipv6
Block websites not suitable for children (IPv6)
Warning: modifies your queries to include a copy of your network
address when forwarding them to a selection of companies and organizations.
sdns://AgAAAAAAAAAADDE0Ni4xMTIuNDEuMyBUDrXp92r0ml9Aq9cu3mXf2w_ugmc61w74ZllxOxR-Vxxkb2guZmFtaWx5c2hpZWxkLm9wZW5kbnMuY29tCi9kbnMtcXVlcnk
## cleanbrowsing-adult
Blocks access to all adult, pornographic and explicit sites. It does
not block proxy or VPNs, nor mixed-content sites. Sites like Reddit
are allowed. Google and Bing are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAEzE4NS4yMjguMTY4LjEwOjg0NDMgvKwy-tVDaRcfCDLWB1AnwyCM7vDo6Z-UGNx3YGXUjykRY2xlYW5icm93c2luZy5vcmc
## cleanbrowsing-adult-ipv6
Blocks access to all adult, pornographic and explicit sites. It does
not block proxy or VPNs, nor mixed-content sites. Sites like Reddit
are allowed. Google and Bing are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAFVsyYTBkOjJhMDA6MTo6MV06ODQ0MyC8rDL61UNpFx8IMtYHUCfDIIzu8Ojpn5QY3HdgZdSPKRFjbGVhbmJyb3dzaW5nLm9yZw
## cleanbrowsing-family
Blocks access to all adult, pornographic and explicit sites. It also
blocks proxy and VPN domains that are used to bypass the filters.
Mixed content sites (like Reddit) are also blocked. Google, Bing and
Youtube are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAFDE4NS4yMjguMTY4LjE2ODo4NDQzILysMvrVQ2kXHwgy1gdQJ8MgjO7w6OmflBjcd2Bl1I8pEWNsZWFuYnJvd3Npbmcub3Jn
## cleanbrowsing-family-ipv6
Blocks access to all adult, pornographic and explicit sites. It also
blocks proxy and VPN domains that are used to bypass the filters.
Mixed content sites (like Reddit) are also blocked. Google, Bing and
Youtube are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAFFsyYTBkOjJhMDA6MTo6XTo4NDQzILysMvrVQ2kXHwgy1gdQJ8MgjO7w6OmflBjcd2Bl1I8pEWNsZWFuYnJvd3Npbmcub3Jn
## cloudflare-family
Cloudflare DNS (anycast) with malware protection and parental control - aka 1.1.1.3 / 1.0.0.3
sdns://AgMAAAAAAAAABzEuMC4wLjMAGWZhbWlseS5jbG91ZGZsYXJlLWRucy5jb20KL2Rucy1xdWVyeQ
## cloudflare-family-ipv6
Cloudflare DNS over IPv6 (anycast) with malware protection and parental control
sdns://AgMAAAAAAAAAFlsyNjA2OjQ3MDA6NDcwMDo6MTExM10AGWZhbWlseS5jbG91ZGZsYXJlLWRucy5jb20KL2Rucy1xdWVyeQ
sdns://AgMAAAAAAAAAFlsyNjA2OjQ3MDA6NDcwMDo6MTAwM10AGWZhbWlseS5jbG91ZGZsYXJlLWRucy5jb20KL2Rucy1xdWVyeQ
## dnsforfamily
Block adult websites, porn websites, gambling websites and advertisements.
No DNS queries are logged. As of March 2019 2.1million websites are blocked and new websites are added to blacklist daily
Completely free, no ads or any commercial motive.
Provided by: https://dnsforfamily.com
sdns://AQIAAAAAAAAADDc4LjQ3LjY0LjE2MSATJeLOABXNSYcSJIoqR5_iUYz87Y4OecMLB84aEAKPrRBkbnNmb3JmYW1pbHkuY29t
## doh-cleanbrowsing-adult
Blocks access to all adult, pornographic and explicit sites. It does
not block proxy or VPNs, nor mixed-content sites. Sites like Reddit
are allowed. Google and Bing are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AgMAAAAAAAAAAAAVZG9oLmNsZWFuYnJvd3Npbmcub3JnEi9kb2gvYWR1bHQtZmlsdGVyLw
## doh-cleanbrowsing-family
Blocks access to all adult, pornographic and explicit sites. It also
blocks proxy and VPN domains that are used to bypass the filters.
Mixed content sites (like Reddit) are also blocked. Google, Bing and
Youtube are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AgMAAAAAAAAAAAAVZG9oLmNsZWFuYnJvd3Npbmcub3JnEy9kb2gvZmFtaWx5LWZpbHRlci8
## safesurfer
Family safety focused blocklist for over 2 million adult sites, as well as phishing and malware and more.
Free to use, paid for customizing blocking for more categories+sites and viewing usage at my.safesurfer.io. Logs taken for viewing
usage, data never sold - https://safesurfer.io
sdns://AQMAAAAAAAAADjEwNC4xOTcuMjguMTIxICcgf9USBOg2e0g0AF35_9HTC74qnDNjnm7b-K7ZHUDYIDIuZG5zY3J5cHQtY2VydC5zYWZlc3VyZmVyLmNvLm56
sdns://AQMAAAAAAAAADzEwNC4xNTUuMjM3LjIyNSAnIH_VEgToNntINABd-f_R0wu-KpwzY55u2_iu2R1A2CAyLmRuc2NyeXB0LWNlcnQuc2FmZXN1cmZlci5jby5ueg
## sfw.scaleway-fr
Uses deep learning to block adult websites. Free, DNSSEC, no logs.
Hosted in Paris, running on a 1-XS server donated by Scaleway.com
Maintained by Frank Denis - https://fr.dnscrypt.info/sfw.html
sdns://AQMAAAAAAAAAEzE2My4xNzIuMTgwLjEyNTo0NDMg32Jzv8dSGSqLWjm8DIWsP_lkRdc2RPZicoJdNVjxof8fMi5kbnNjcnlwdC1jZXJ0LnNmdy5zY2FsZXdheS1mcg

View File

@ -0,0 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i57pjrrjJ5pTpDdjroWz2mctu/nB0MQ4IP1kGrGoUkir2GPVzY5Ckhz/ZkKXervTXy8klHtbNUJj/ax6lYhMI7A4=
trusted comment: timestamp:1593609508 file:parental-control.md
TzaQTIxb5gIPPC2lsTgyyduQ+F45bi/0U7ZItaXkkTe6jhAArA7LN/Pk2YGjsyk2Ix1vExjmLTOoUQdFu6y5Bw==

1946
v3/public-resolvers.md Normal file

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i5850gZYj9u/jpf2QlH8/BQEIZmMKPa3whK9KwOOvM4nPwD4sgmERUxrLdLwwVXA3GmIJXlmOAKpsQnVOPzlFYgk=
trusted comment: timestamp:1603733702 file:public-resolvers.md
742xhP+vVDi0Xd4TdplhfxZOTHwS1+vBMoF9IaddRYBbA2dOpYMvI2p/NIHI53nRjK6ra5/0NhGo55vko78iAQ==

333
v3/relays.md Normal file
View File

@ -0,0 +1,333 @@
# Anonymized DNS relays
Anonymized DNS is a lightweight alternative to Tor and SOCKS proxies,
dedicated to DNS traffic. They hide the client IP address to DNS resolvers,
providing anonymity in addition to confidentiality and integrity.
DNS Anonymization is only compatible with servers supporting the
DNSCrypt protocol.
See the link below for more information:
https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS
## anon-acsacsar-ams-ipv4
Anonymized DNS relay hosted in AMS on Scaleway
sdns://gRE1MS4xNTguMTY2Ljk3OjQ0Mw
## anon-acsacsar-ams-ipv6
Anonymized DNS relay hosted in AMS on Scaleway
sdns://gRpbMjAwMTpiYzg6MTgyNDo3Mzg6OjFdOjQ0Mw
## anon-ams-nl
Anonymized DNS relay hosted in Netherlands - NL
sdns://gRI1MS4xNS4xMjQuMjA4OjQzNDM
## anon-bcn
Anonymized DNS relay hosted in Barcelona, Spain.
sdns://gRMxODUuMjUzLjE1NC42Njo0MzQz
## anon-cs-ca2
Anonymized DNS relay hosted in CA - Vancouver provided by https://cryptostorm.is/
sdns://gRMxNjIuMjIxLjIwNy4yMjg6NDQz
## anon-cs-de2
Anonymized DNS relay hosted in Frankfurt, Germany provided by https://cryptostorm.is/
sdns://gRA4NC4xNi4yNDAuNDM6NDQz
## anon-cs-fr
Anonymized DNS relay hosted in Paris, France provided by https://cryptostorm.is/
sdns://gREyMTIuMTI5LjQ2LjMyOjQ0Mw
## anon-cs-fr2
Anonymized DNS relay hosted in Paris, France (secondary) provided by https://cryptostorm.is/
sdns://gRExOTUuMTU0LjQwLjQ4OjQ0Mw
## anon-cs-md
Anonymized DNS relay hosted in Chisinau, Moldova provided by https://cryptostorm.is/
sdns://gRMxNzguMTc1LjEzOS4yMTE6NDQz
## anon-cs-nl
Anonymized DNS relay hosted in Roosendaal, Netherlands provided by https://cryptostorm.is/
sdns://gRExODUuMTA3LjgwLjg0OjQ0Mw
## anon-cs-nl2
Anonymized DNS relay hosted in Rotterdam, Netherlands provided by https://cryptostorm.is/
sdns://gRIyMTMuMTYzLjY0LjIwODo0NDM
## anon-cs-pt
Anonymized DNS relay hosted in Lisbon, Portugal provided by https://cryptostorm.is/
sdns://gRExMDkuNzEuNDIuMjI4OjQ0Mw
## anon-cs-se
Anonymized DNS relay hosted in Stockholm, Sweden provided by https://cryptostorm.is/
sdns://gRMxMjguMTI3LjEwNC4xMDg6NDQz
## anon-cs-sk
Anonymized DNS relay hosted in South Korea provided by https://cryptostorm.is/
sdns://gRAyNy4yNTUuNzcuNTY6NDQz
## anon-cs-usca
Anonymized DNS relay hosted in US - Los Angeles, CA provided by https://cryptostorm.is/
sdns://gRAyMy4xOS42Ny4xMTY6NDQz
## anon-cs-usga
Anonymized DNS relay hosted in US - Atlanta, GA provided by https://cryptostorm.is/
sdns://gRE2NC40Mi4xODEuMjI3OjQ0Mw
## anon-cs-usnc
Anonymized DNS relay hosted in US - Charlotte, NC provided by https://cryptostorm.is/
sdns://gRIxNTUuMjU0LjI5LjExMzo0NDM
## anon-cs-usnv
Anonymized DNS relay hosted in US - Las Vegas, NV provided by https://cryptostorm.is/
sdns://gRAzNy4xMjAuMTQ3LjI6NDQz
## anon-cs-usor
Anonymized DNS relay hosted in US - Roseburg, OR provided by https://cryptostorm.is/
sdns://gRExMDQuMjU1LjE3NS4yOjQ0Mw
## anon-cs-ustx
Anonymized DNS relay hosted in US - Dallas, TX provided by https://cryptostorm.is/
sdns://gREyMDkuNTguMTQ3LjM2OjQ0Mw
## anon-dnscrypt.one
Anonymized DNS relay hosted in Germany (Nuremberg), https://dnscrypt.one
sdns://gRIxNDQuOTEuMTA2LjIyNzo0NDM
## anon-dnscrypt.uk-ipv4
Anonymized DNS relay hosted in UK on DigitalOcean
sdns://gRIxMzkuNTkuMjAwLjExNjo0NDM
## anon-dnscrypt.uk-ipv6
Anonymized DNS relay hosted in UK on DigitalOcean
sdns://gR5bMmEwMzpiMGMwOjE6ZTA6OjJlMzplMDAxXTo0NDM
## anon-ev-to
Anonymized DNS relay provided by evilvibes.com Location: Toronto, Canada
sdns://gQw2Ni44NS4zMC4xMDU
## anon-ev-va
Anonymized DNS relay provided by evilvibes.com Location: Vancouver, Canada
sdns://gQ4xMDQuMzYuMTQ4LjIyMQ
## anon-ibksturm
Hosted in Switzerland and maintained by @ibksturm, aka Andreas Ziegler.
sdns://gRI4My43OC4xMjAuMjI3Ojg0NDM
## anon-ibksturm-ipv6
Hosted in Switzerland and maintained by @ibksturm, aka Andreas Ziegler.
sdns://gS5bMmEwMjoxMjA1OjM0ZTc6OGUzMDpiMjZlOmJmZmY6ZmUxZDplMTliXTo4NDQz
## anon-inconnu
Anonymized DNS relay hosted in Seattle, WA (USA), maintained by Eric
Lagergren (@ericlagergren). Running the official Docker image on Vultr.
sdns://gRIxMDQuMjM4LjE1My40Njo0NDM
## anon-kama
Anonymized DNS relay hosted in France and maintained by Frank Denis (@jedisct1).
sdns://gRIxMzcuNzQuMjIzLjIzNDo0NDM
## anon-meganerd
Anonymized DNS relay hosted by MegaNerd.nl (https://www.meganerd.nl/encrypted-dns-server) in Amsterdam, The Netherlands
sdns://gRIxMzYuMjQ0Ljk3LjExNDo0NDM
## anon-meganerd-ipv6
Anonymized DNS relay hosted by MegaNerd.nl (https://www.meganerd.nl/encrypted-dns-server) in Amsterdam, The Netherlands
sdns://gStbMjAwMToxOWYwOjUwMDE6Y2JiOjU0MDA6M2ZmOmZlMDc6ZjcwZF06NDQz
## anon-plan9-dns
Anonymized DNS relay hosted in New Jersey, USA. Running the official Docker image on Vultr by @jlongua1
sdns://gRIxNzMuMTk5LjEyNi4zNTo0NDM
## anon-publicarray
Anonymized DNS relay hosted in Sydney, Australia and maintained by Sebastian Schmidt (@publicarray)
sdns://gRIxMzkuOTkuMjIyLjcyOjg0NDM
## anon-scaleway
Anonymized DNS relay hosted in France and maintained by Frank Denis (@jedisct1).
Running on an instance donated by https://scaleway.com
sdns://gRMxNjMuMTcyLjE4MC4xMjU6NDQz
## anon-scaleway-ams
Anonymized DNS relay hosted in Amsterdam and maintained by Frank Denis (@jedisct1).
Running on an instance donated by https://scaleway.com
sdns://gRE1MS4xNS4xMjIuMjUwOjQ0Mw
## anon-scaleway-ams-ipv6
Anonymized DNS relay hosted in Amsterdam and maintained by Frank Denis (@jedisct1).
IPv6 only. Running on an instance donated by https://scaleway.com
sdns://gRpbMjAwMTpiYzg6MTgyMDo1MGQ6OjFdOjQ0Mw
## anon-skyfighter
Anonymized DNS relay hosted in Netherlands (https://scaleway.com) and maintained by @tuttimann.
sdns://gQ81MS4xNS42Mi42NTo0NDM
## anon-skyfighter-ipv6
Anonymized DNS relay hosted in Netherlands (https://scaleway.com) and maintained by @tuttimann.
IPv6 only.
sdns://gRtbMjAwMTpiYzg6MTgyNDoxNzBmOjoxXTo0NDM
## anon-sth-se
Anonymized DNS relay hosted in Sweden - SE
sdns://gRI0NS4xNTMuMTg3Ljk2OjQzNDM
## anon-tiarap
Anonymized DNS relay hosted in Singapore
sdns://gRMxNzQuMTM4LjI5LjE3NToxNDQz
## anon-tiarap-ipv6
Anonymized IPv6 DNS relay hosted in Singapore
sdns://gSBbMjQwMDo2MTgwOjA6ZDA6OjVmNzM6NDAwMV06MTQ0Mw
## anon-v.dnscrypt.uk-ipv4
Anonymized DNS relay hosted in UK on Vultr
sdns://gRMxMDQuMjM4LjE4Ni4xOTI6NDQz
## anon-v.dnscrypt.uk-ipv6
Anonymized DNS relay hosted in UK on Vultr
sdns://gSxbMjAwMToxOWYwOjc0MDI6MTU3NDo1NDAwOjJmZjpmZTY2OjJjZmZdOjQ0Mw
## anon-yofiji-se-ipv4
Anonymized DNS relay hosted in Sweden and maintained by yofiji.
sdns://gRMxODUuMTkzLjEyNy4yNDQ6NDQz
## anon-yofiji-se-ipv6
Anonymized DNS relay hosted in Sweden and maintained by yofiji.
sdns://gSlbMmEwYTozODQwOjEzMzc6MTI3OjA6YjljMTo3ZmY0OjEzMzddOjQ0Mw

4
v3/relays.md.minisig Normal file
View File

@ -0,0 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i5+VsNurTQSmNk+b4vFZOCscc73pz2RRkdyWDmvEJlbIc8P8cjCO4He2XtNd2VLTa+B9py39YSfRMTWY48x/MNwo=
trusted comment: timestamp:1603733702 file:relays.md
w1p71PtUmOCYDUp+O2KuSVdNfiyMEsY3uFymSLW2pRZYihzAT5HKGpwoUClaSEuOYzzVmRqfIJbB9zGwR6V5BA==