Move configuration to v3/ ; autogenerate compatibility files in v2/

Fixes #310
This commit is contained in:
Frank Denis 2020-06-21 22:13:45 +02:00
parent a81bdae05b
commit bc2afc5888
22 changed files with 2592 additions and 122 deletions

View File

@ -5,6 +5,12 @@ import os
import subprocess
from glob import glob
INCOMPATIBLE_WITH_LEGACY_VERSIONS = [
"cira-family", "cira-private", "cira-protected"
]
CURRENT_DIR = "v3"
LEGACY_DIR = "v2"
class Entry:
name = None
@ -49,12 +55,35 @@ class Entry:
return out
def format_legacy(self):
out = "## " + self.name + "\n\n"
out = out + self.description + "\n\n"
out = out + self.stamps[0] + "\n"
return out
def process(md_path, signatures_to_update):
md_legacy_path = LEGACY_DIR + "/" + os.path.basename(md_path)
print("\n[" + md_path + "]")
entries = {}
out = ""
previous_content = ""
out = ""
out_legacy = """
# *** THIS IS A LEGACY LIST ***
This is a temporary, legacy list, for dnscrypt-proxy <= 2.0.42 users.
If you are running up-to-date software, replace `/v2/` with `/v3/` in the sources URLs
of the `dnscrypt-proxy.toml` file (relevant lines start with `urls = ['https://...']`
and are present in the `[sources]` section).
THIS LIST IS AUTOMATICALLY GENERATED AS A SUBSET OF THE V3 LIST. DO NOT EDIT IT MANUALLY.
If you want to contribute changes to a resolvers list, only edit files from the `v3` directory.
--
"""
with open(md_path) as f:
previous_content = f.read()
@ -74,6 +103,8 @@ def process(md_path, signatures_to_update):
for name in sorted(entries.keys()):
entry = entries[name]
out = out + "\n" + entry.format() + "\n"
if not name in INCOMPATIBLE_WITH_LEGACY_VERSIONS:
out_legacy = out_legacy + "\n" + entry.format_legacy() + "\n"
if out == previous_content:
print("No changes")
@ -83,10 +114,20 @@ def process(md_path, signatures_to_update):
os.rename(md_path + ".tmp", md_path)
signatures_to_update.append(md_path)
with open(md_legacy_path) as f:
previous_content = f.read()
if out_legacy == previous_content:
print("No changes to the legacy version")
else:
with open(md_legacy_path + ".tmp", "wt") as f:
f.write(out_legacy)
os.rename(md_legacy_path + ".tmp", md_legacy_path)
signatures_to_update.append(md_legacy_path)
signatures_to_update = []
for md_path in glob("v2/*.md"):
for md_path in glob(CURRENT_DIR + "/*.md"):
process(md_path, signatures_to_update)
if signatures_to_update:

View File

@ -1,24 +1,18 @@
# DNS servers as .onion services
All DNSCrypt and DoH servers are accessible over Tor, via exit nodes.
This is safe as all the transactions are encrypted and authenticated.
# *** THIS IS A LEGACY LIST ***
However, it may be faster to directly access a server as an onion
service. This requires specifically configured servers.
This is a temporary, legacy list, for dnscrypt-proxy <= 2.0.42 users.
The servers below are not accessible without Tor.
If you are running up-to-date software, replace `/v2/` with `/v3/` in the sources URLs
of the `dnscrypt-proxy.toml` file (relevant lines start with `urls = ['https://...']`
and are present in the `[sources]` section).
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
THIS LIST IS AUTOMATICALLY GENERATED AS A SUBSET OF THE V3 LIST. DO NOT EDIT IT MANUALLY.
[sources.'onion-services']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/onion-services.md', 'https://download.dnscrypt.info/resolvers-list/v2/onion-services.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'onion-services.md'
If you want to contribute changes to a resolvers list, only edit files from the `v3` directory.
--
## onion-cloudflare
Cloudflare Onion Service

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i50FioNSlB3OYxNCJYpIr/frciztqTvWHAa1uUmTN2l9F8ZKIa9kM5ixZTxmX1hlpCw229H5qLqq1ANo/HuwqiQ8=
trusted comment: timestamp:1592768550 file:onion-services.md
HBUYH0qcRW3K4oEW/KIine/GrKkcy2S6Xfq9Pb/VzRqXEWo0CujaQ5tGpTKTsycAaHka6CoosGUzmOs54On4CA==
RWQf6LRCGA9i54x8glwqQ0pYxi+OYdOKUcN7OW3oluKN+zvCaKxvL0T0nvqVya7sXt5MX71OIogAFV1d3jhTlPFBoxk3Ire8KQo=
trusted comment: timestamp:1592770394 file:onion-services.md
YQJy6oDW4xdhNhk5IaiJAEaUeZLlgj99Y3eDgC61xOfoZrgqzJ2F3a/b8bgW7wuJiOSqoEoQXdlo8JW3ozFQDw==

View File

@ -1,18 +1,18 @@
# opennic
Resolvers from the [OpenNIC](https://www.opennic.org/) project.
# *** THIS IS A LEGACY LIST ***
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
This is a temporary, legacy list, for dnscrypt-proxy <= 2.0.42 users.
[sources.'opennic']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/opennic.md', 'https://download.dnscrypt.info/resolvers-list/v2/opennic.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'opennic.md'
If you are running up-to-date software, replace `/v2/` with `/v3/` in the sources URLs
of the `dnscrypt-proxy.toml` file (relevant lines start with `urls = ['https://...']`
and are present in the `[sources]` section).
THIS LIST IS AUTOMATICALLY GENERATED AS A SUBSET OF THE V3 LIST. DO NOT EDIT IT MANUALLY.
If you want to contribute changes to a resolvers list, only edit files from the `v3` directory.
--
## doh-ibksturm
doh-server (nginx - doh-httpproxy - unbound backend), DNSSEC / Non-Logged / Uncensored, OpenNIC and Root DNS-Zone Copy

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i5xLlTeDptDCf4Rn19jfvqA0kf9If+sWoZqZYYy/S99/AVhJKv3W88vbWfBxBBenCdHcwUYltJNIYwd7/trLZeg8=
trusted comment: timestamp:1592768550 file:opennic.md
C/L7YOhWIRsoXM8OJIy6do58yJu/V4w949fAUpDxcWrp5i38gVXY7YBgDP4EXdOuTrzPN6+0KECgMiiatUVFAQ==
RWQf6LRCGA9i5xo5lWmZT0QtCKLdmBJEh5ITcYEapeOO9XsclPwCbKE9G2f6xtDyPn+ig8GD0wnCxmn3o10u3Xa4rWSv2qjL9Q4=
trusted comment: timestamp:1592770394 file:opennic.md
0I6H8mtTH/hYQa41yYYJ1eyooIUjyYnZidbMKTUhLUFG5bq+thhXXejPMKiFhDjiCSe9zFU6nDARa8U0UPL2Cw==

View File

@ -1,25 +1,18 @@
# parental-control
A set of resolvers blocking popular websites that may not be appropriate
for children.
# *** THIS IS A LEGACY LIST ***
This is not bulletproof. In particular, websites in languages that are
not English will require additional, local rules.
This is a temporary, legacy list, for dnscrypt-proxy <= 2.0.42 users.
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
If you are running up-to-date software, replace `/v2/` with `/v3/` in the sources URLs
of the `dnscrypt-proxy.toml` file (relevant lines start with `urls = ['https://...']`
and are present in the `[sources]` section).
[sources.'parental-control']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/parental-control.md', 'https://download.dnscrypt.info/resolvers-list/v2/parental-control.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'parental-control.md'
THIS LIST IS AUTOMATICALLY GENERATED AS A SUBSET OF THE V3 LIST. DO NOT EDIT IT MANUALLY.
In order to enforce safe search results from Google and Youtube, you may
also want to enable cloaking (`cloaking_rules` in the configuration file).
If you want to contribute changes to a resolvers list, only edit files from the `v3` directory.
--
## adguard-dns-family
Adguard DNS with safesearch and adult content blocking
@ -27,15 +20,6 @@ Adguard DNS with safesearch and adult content blocking
sdns://AQIAAAAAAAAAFDE3Ni4xMDMuMTMwLjEzMjo1NDQzILgxXdexS27jIKRw3C7Wsao5jMnlhvhdRUXWuMm1AFq6ITIuZG5zY3J5cHQuZmFtaWx5Lm5zMS5hZGd1YXJkLmNvbQ
## cira-family
CIRA DoH resolvers, blocking trackers, malware, phishing and pornography.
Operated by the .CA registry. Built by Canadians for Canadians.
https://www.cira.ca/fr/cybersecurity-services/canadian-shield
sdns://AgEAAAAAAAAAACA_4zhjTgUQYz3kU8o1CxXOwzmz3Li6nyot0k0QqDj-6x1mYW1pbHkuY2FuYWRpYW5zaGllbGQuY2lyYS5jYQovZG5zLXF1ZXJ5
## cisco-familyshield
Block websites not suitable for children (DNSCrypt protocol)

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i52UtToPgih/Ec5ZpmGwlleDewldnQWpKX1wAwcJJd4RCcqZL72JpXNlflkjN6OrERCjQnxd8P2vghKeoZ3F/aAE=
trusted comment: timestamp:1592768550 file:parental-control.md
vs4JvoxoGPflyulBoegAZMJNr2+hYcQcYFLEEdkQKczcc+YlR+Odee75JQPDOF94tJI/KgTM00XjUijhC5v3DQ==
RWQf6LRCGA9i5zISlFX7bVPYshjqMol4KTq7HDppXmX7Mwa2prHlbW1HExf1yH+f5ZNlmKp205vFXLpb/6ggPz9QwzKMJ3R/3Q0=
trusted comment: timestamp:1592770394 file:parental-control.md
z2HHbB3v6p9MwZyNE4rYLbqWAeYVq49+gSWht63tl5P8gynZboGu/nbE2IxP64Bi/OtLjWJ855Y8LO1OM02ACA==

View File

@ -1,28 +1,18 @@
# public-resolvers
This is an extensive list of public DNS resolvers supporting the
DNSCrypt and DNS-over-HTTP2 protocols.
# *** THIS IS A LEGACY LIST ***
This list is maintained by Frank Denis <j @ dnscrypt [.] info>
This is a temporary, legacy list, for dnscrypt-proxy <= 2.0.42 users.
Warning: it includes servers that may censor content, servers that don't
verify DNSSEC records, and servers that will collect and monetize your
queries.
If you are running up-to-date software, replace `/v2/` with `/v3/` in the sources URLs
of the `dnscrypt-proxy.toml` file (relevant lines start with `urls = ['https://...']`
and are present in the `[sources]` section).
Adjust the `require_*` options in dnscrypt-proxy to filter that list
according to your needs.
THIS LIST IS AUTOMATICALLY GENERATED AS A SUBSET OF THE V3 LIST. DO NOT EDIT IT MANUALLY.
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
[sources.'public-resolvers']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/public-resolvers.md', 'https://download.dnscrypt.info/resolvers-list/v2/public-resolvers.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'public-resolvers.md'
If you want to contribute changes to a resolvers list, only edit files from the `v3` directory.
--
## a-and-a
Non-logging DoH server in the UK operated by Andrews & Arnold Ltd, a
@ -229,33 +219,6 @@ If you are within India, this might be a nice DNS server to use.
sdns://AQQAAAAAAAAAEjEzOS41OS40OC4yMjI6NDQzNCAFOt_yxaMpFtga2IpneSwwK6rV0oAyleham9IvhoceEBsyLmRuc2NyeXB0LWNlcnQuY2FwdG5lbW8uaW4
## cira-family
CIRA DoH resolvers, blocking trackers, malware, phishing and pornography.
Operated by the .CA registry. Built by Canadians for Canadians.
https://www.cira.ca/fr/cybersecurity-services/canadian-shield
sdns://AgEAAAAAAAAAACA_4zhjTgUQYz3kU8o1CxXOwzmz3Li6nyot0k0QqDj-6x1mYW1pbHkuY2FuYWRpYW5zaGllbGQuY2lyYS5jYQovZG5zLXF1ZXJ5
## cira-private
CIRA DoH resolvers, blocking trackers.
Operated by the .CA registry. Built by Canadians for Canadians.
https://www.cira.ca/fr/cybersecurity-services/canadian-shield
sdns://AgEAAAAAAAAAACA_4zhjTgUQYz3kU8o1CxXOwzmz3Li6nyot0k0QqDj-6x5wcml2YXRlLmNhbmFkaWFuc2hpZWxkLmNpcmEuY2EKL2Rucy1xdWVyeQ
## cira-protected
CIRA DoH resolvers, blocking trackers, malware and phishing.
Operated by the .CA registry. Built by Canadians for Canadians.
https://www.cira.ca/fr/cybersecurity-services/canadian-shield
sdns://AgEAAAAAAAAAACA_4zhjTgUQYz3kU8o1CxXOwzmz3Li6nyot0k0QqDj-6yBwcm90ZWN0ZWQuY2FuYWRpYW5zaGllbGQuY2lyYS5jYQovZG5zLXF1ZXJ5
## cisco
Remove your DNS blind spot (DNSCrypt protocol)
@ -1168,7 +1131,6 @@ sdns://AQcAAAAAAAAADTIzLjExMS43NC4yMDUg_0RyX8kcAcMdtRk5SAX5RKs3yiLLS6kdJlnsUpVbn
An open (non-logging, non-filtering, no ECS) DNSCrypt resolver operated by https://faelix.net/ with IPv4 nodes anycast within AS41495 in Switzerland.
sdns://AQcAAAAAAAAAEzE4NS4xMzQuMTk2LjU0Ojg0NDMgfsvvPi8BgDKNYODh0ewj5Oh32OoJoZNwGgTWs8C-i-EfMi5kbnNjcnlwdC1jZXJ0LnJkbnMuZmFlbGl4Lm5ldA
sdns://AQcAAAAAAAAAEzE4NS4xMzQuMTk2LjU1Ojg0NDMgfsvvPi8BgDKNYODh0ewj5Oh32OoJoZNwGgTWs8C-i-EfMi5kbnNjcnlwdC1jZXJ0LnJkbnMuZmFlbGl4Lm5ldA
## faelix-ch-ipv4-doh
@ -1176,7 +1138,6 @@ sdns://AQcAAAAAAAAAEzE4NS4xMzQuMTk2LjU1Ojg0NDMgfsvvPi8BgDKNYODh0ewj5Oh32OoJoZNwG
An open (non-logging, non-filtering, no ECS) DoH resolver operated by https://faelix.net/ with IPv4 nodes anycast within AS41495 in Switzerland.
sdns://AgcAAAAAAAAADjE4NS4xMzQuMTk2LjU0ID4aGg9sU_PpekktVwhLW5gHBZ7gV6sVBYdv2D_aPbg4D3JkbnMuZmFlbGl4Lm5ldAEv
sdns://AgcAAAAAAAAADjE4NS4xMzQuMTk2LjU1ID4aGg9sU_PpekktVwhLW5gHBZ7gV6sVBYdv2D_aPbg4D3JkbnMuZmFlbGl4Lm5ldAEv
## faelix-ch-ipv6
@ -1184,7 +1145,6 @@ sdns://AgcAAAAAAAAADjE4NS4xMzQuMTk2LjU1ID4aGg9sU_PpekktVwhLW5gHBZ7gV6sVBYdv2D_aP
An open (non-logging, non-filtering, no ECS) DNSCrypt resolver operated by https://faelix.net/ with IPv6 nodes anycast within AS41495 in Switzerland.
sdns://AQcAAAAAAAAAFFsyYTAxOjllMDE6OjU0XTo4NDQzIH7L7z4vAYAyjWDg4dHsI-Tod9jqCaGTcBoE1rPAvovhHzIuZG5zY3J5cHQtY2VydC5yZG5zLmZhZWxpeC5uZXQ
sdns://AQcAAAAAAAAAFFsyYTAxOjllMDE6OjU1XTo4NDQzIH7L7z4vAYAyjWDg4dHsI-Tod9jqCaGTcBoE1rPAvovhHzIuZG5zY3J5cHQtY2VydC5yZG5zLmZhZWxpeC5uZXQ
## faelix-ch-ipv6-doh
@ -1192,7 +1152,6 @@ sdns://AQcAAAAAAAAAFFsyYTAxOjllMDE6OjU1XTo4NDQzIH7L7z4vAYAyjWDg4dHsI-Tod9jqCaGTc
An open (non-logging, non-filtering, no ECS) DoH resolver operated by https://faelix.net/ with IPv6 nodes anycast within AS41495 in Switzerland.
sdns://AgcAAAAAAAAAD1syYTAxOjllMDE6OjU0XSA-GhoPbFPz6XpJLVcIS1uYBwWe4FerFQWHb9g_2j24OA9yZG5zLmZhZWxpeC5uZXQBLw
sdns://AgcAAAAAAAAAD1syYTAxOjllMDE6OjU1XSA-GhoPbFPz6XpJLVcIS1uYBwWe4FerFQWHb9g_2j24OA9yZG5zLmZhZWxpeC5uZXQBLw
## faelix-uk-ipv4
@ -1200,7 +1159,6 @@ sdns://AgcAAAAAAAAAD1syYTAxOjllMDE6OjU1XSA-GhoPbFPz6XpJLVcIS1uYBwWe4FerFQWHb9g_2
An open (non-logging, non-filtering, no ECS) DNSCrypt resolver operated by https://faelix.net/ with IPv4 nodes anycast within AS41495 in the UK.
sdns://AQcAAAAAAAAAEjQ2LjIyNy4yMDAuNTQ6ODQ0MyB-y-8-LwGAMo1g4OHR7CPk6HfY6gmhk3AaBNazwL6L4R8yLmRuc2NyeXB0LWNlcnQucmRucy5mYWVsaXgubmV0
sdns://AQcAAAAAAAAAEjQ2LjIyNy4yMDAuNTU6ODQ0MyB-y-8-LwGAMo1g4OHR7CPk6HfY6gmhk3AaBNazwL6L4R8yLmRuc2NyeXB0LWNlcnQucmRucy5mYWVsaXgubmV0
## faelix-uk-ipv4-doh
@ -1208,7 +1166,6 @@ sdns://AQcAAAAAAAAAEjQ2LjIyNy4yMDAuNTU6ODQ0MyB-y-8-LwGAMo1g4OHR7CPk6HfY6gmhk3AaB
An open (non-logging, non-filtering, no ECS) DoH resolver operated by https://faelix.net/ with IPv4 nodes anycast within AS41495 in the UK.
sdns://AgcAAAAAAAAADTQ2LjIyNy4yMDAuNTQgPhoaD2xT8-l6SS1XCEtbmAcFnuBXqxUFh2_YP9o9uDgPcmRucy5mYWVsaXgubmV0AS8
sdns://AgcAAAAAAAAADTQ2LjIyNy4yMDAuNTUgPhoaD2xT8-l6SS1XCEtbmAcFnuBXqxUFh2_YP9o9uDgPcmRucy5mYWVsaXgubmV0AS8
## faelix-uk-ipv6
@ -1216,7 +1173,6 @@ sdns://AgcAAAAAAAAADTQ2LjIyNy4yMDAuNTUgPhoaD2xT8-l6SS1XCEtbmAcFnuBXqxUFh2_YP9o9u
An open (non-logging, non-filtering, no ECS) DNSCrypt resolver operated by https://faelix.net/ with IPv6 nodes anycast within AS41495 in the UK.
sdns://AQcAAAAAAAAAFFsyYTAxOjllMDA6OjU0XTo4NDQzIH7L7z4vAYAyjWDg4dHsI-Tod9jqCaGTcBoE1rPAvovhHzIuZG5zY3J5cHQtY2VydC5yZG5zLmZhZWxpeC5uZXQ
sdns://AQcAAAAAAAAAFFsyYTAxOjllMDA6OjU1XTo4NDQzIH7L7z4vAYAyjWDg4dHsI-Tod9jqCaGTcBoE1rPAvovhHzIuZG5zY3J5cHQtY2VydC5yZG5zLmZhZWxpeC5uZXQ
## faelix-uk-ipv6-doh
@ -1224,7 +1180,6 @@ sdns://AQcAAAAAAAAAFFsyYTAxOjllMDA6OjU1XTo4NDQzIH7L7z4vAYAyjWDg4dHsI-Tod9jqCaGTc
An open (non-logging, non-filtering, no ECS) DoH resolver operated by https://faelix.net/ with IPv6 nodes anycast within AS41495 in the UK.
sdns://AgcAAAAAAAAAD1syYTAxOjllMDA6OjU0XSA-GhoPbFPz6XpJLVcIS1uYBwWe4FerFQWHb9g_2j24OA9yZG5zLmZhZWxpeC5uZXQBLw
sdns://AgcAAAAAAAAAD1syYTAxOjllMDA6OjU1XSA-GhoPbFPz6XpJLVcIS1uYBwWe4FerFQWHb9g_2j24OA9yZG5zLmZhZWxpeC5uZXQBLw
## ffmuc.net

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i5xns+QPfUeCV9HCEkmM+CjQvTBPM7ISmZJAdA2ZDVOPxRPy2VqOnPddWtiE7ekmI49d8ntiLGrrBy9IuVxqLugQ=
trusted comment: timestamp:1592768550 file:public-resolvers.md
99UCKErRtunO5cKTn/4MPBC3y6mqilU4jsGuXtGslkrZX4YsneWP5JBOrhFdmFnmJz+CiyomB6FK11j68zUHBg==
RWQf6LRCGA9i5/jimi6I1w+8g5N39DBgjZOD9IFE5YEjQdiIH6vCkEGXi2zdyKHIamz97Yg6ACN8F2TjQnzk8yXkwY0BFWOjMA0=
trusted comment: timestamp:1592770394 file:public-resolvers.md
3n+Rr5ypv/bLJ5gsB4RMvkMrBJwx2s+5uHwVkdorYZX77Tix/BEit3OLFJRVFfiDZ1V21psFkypxzLAjn7gYBg==

View File

@ -1,16 +1,17 @@
# Anonymized DNS relays
Anonymized DNS is a lightweight alternative to Tor and SOCKS proxies,
dedicated to DNS traffic. They hide the client IP address to DNS resolvers,
providing anonymity in addition to confidentiality and integrity.
# *** THIS IS A LEGACY LIST ***
DNS Anonymization is only compatible with servers supporting the
DNSCrypt protocol.
This is a temporary, legacy list, for dnscrypt-proxy <= 2.0.42 users.
See the link below for more information:
If you are running up-to-date software, replace `/v2/` with `/v3/` in the sources URLs
of the `dnscrypt-proxy.toml` file (relevant lines start with `urls = ['https://...']`
and are present in the `[sources]` section).
https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS
THIS LIST IS AUTOMATICALLY GENERATED AS A SUBSET OF THE V3 LIST. DO NOT EDIT IT MANUALLY.
If you want to contribute changes to a resolvers list, only edit files from the `v3` directory.
--
## anon-acsacsar-ams-ipv4

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i5xRPX0ZoZco2e8P+Z6xOYuh2izHYYNX0cXaZRSzk0Kh9AsnFgMeDMM4TFTINTothN8SXlzXlZYz3F7Uj6eZnxgY=
trusted comment: timestamp:1592768550 file:relays.md
PvPWr0/XxpFQYGvWBRSp0rSdgjz3RBgpoQ6GOyeVMJk29sws+3eWubY2lcPYKWuXhGobZ7JYWyLavDRHiUtzCg==
RWQf6LRCGA9i50X34qNFuymGIPC5fDWvOxoOECRoXFft7NKAC8/GFszNQ7mKkdPKBITagiaeNBHKg0RY8aAIENTpES4sFvCnjQc=
trusted comment: timestamp:1592770394 file:relays.md
oeVi90JrSzrNrLsrFrCWZYtnTNggL3YRi3bcI6JHo/fJ1y+IxQFUaZT/gO+6ecusLdeKi9U4Ob697gcZt47rAQ==

27
v3/onion-services.md Normal file
View File

@ -0,0 +1,27 @@
# DNS servers as .onion services
All DNSCrypt and DoH servers are accessible over Tor, via exit nodes.
This is safe as all the transactions are encrypted and authenticated.
However, it may be faster to directly access a server as an onion
service. This requires specifically configured servers.
The servers below are not accessible without Tor.
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
[sources.'onion-services']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/onion-services.md', 'https://download.dnscrypt.info/resolvers-list/v2/onion-services.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'onion-services.md'
--
## onion-cloudflare
Cloudflare Onion Service
sdns://AgcAAAAAAAAAACC0WWFtenR5met-s8i0oiShMtYstulWSybPBq-zBUEMNT5kbnM0dG9ycG5sZnMyaWZ1ejJzMnlmM2ZjN3JkbXNiaG02cnc3NWV1ajM1cGFjNmFwMjV6Z3FhZC5vbmlvbgovZG5zLXF1ZXJ5

View File

@ -0,0 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i50FioNSlB3OYxNCJYpIr/frciztqTvWHAa1uUmTN2l9F8ZKIa9kM5ixZTxmX1hlpCw229H5qLqq1ANo/HuwqiQ8=
trusted comment: timestamp:1592768550 file:onion-services.md
HBUYH0qcRW3K4oEW/KIine/GrKkcy2S6Xfq9Pb/VzRqXEWo0CujaQ5tGpTKTsycAaHka6CoosGUzmOs54On4CA==

132
v3/opennic.md Normal file
View File

@ -0,0 +1,132 @@
# opennic
Resolvers from the [OpenNIC](https://www.opennic.org/) project.
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
[sources.'opennic']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/opennic.md', 'https://download.dnscrypt.info/resolvers-list/v2/opennic.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'opennic.md'
--
## doh-ibksturm
doh-server (nginx - doh-httpproxy - unbound backend), DNSSEC / Non-Logged / Uncensored, OpenNIC and Root DNS-Zone Copy
Hosted in Switzerland on by ibksturm, aka Andreas Ziegler
sdns://AgcAAAAAAAAAACA-GhoPbFPz6XpJLVcIS1uYBwWe4FerFQWHb9g_2j24OBRpYmtzdHVybS5zeW5vbG9neS5tZQovZG5zLXF1ZXJ5
## ibksturm
dnscrypt-server (nginx - encrypted-dns - unbound backend), DNSSEC / Non-Logged / Uncensored, OpenNIC and Root DNS-Zone Copy
Hosted in Switzerland by ibksturm, aka Andreas Ziegler
sdns://AQcAAAAAAAAAEDg1LjUuOTMuMjMwOjg0NDMgwc9XUACwW8JsYh9ez5qiVgrOvwB-vss6f_SyDeC0Oe4YMi5kbnNjcnlwdC1jZXJ0Lmlia3N0dXJt
## ibksturm-ipv6
dnscrypt-server (nginx - encrypted-dns - unbound backend), DNSSEC / Non-Logged / Uncensored, OpenNIC and Root DNS-Zone Copy
Hosted in Switzerland by ibksturm, aka Andreas Ziegler
sdns://AQcAAAAAAAAALlsyYTAyOjEyMDU6NTA1NTpkZTYwOmIyNmU6YmZmZjpmZTFkOmUxOWJdOjg0NDMgwc9XUACwW8JsYh9ez5qiVgrOvwB-vss6f_SyDeC0Oe4YMi5kbnNjcnlwdC1jZXJ0Lmlia3N0dXJt
## opennic-R4SAS
DNSSEC - OpenNIC - Non-logging - Uncensored - hosted on ovh.com
Location: Gravelines, France.
Maintained by R4SAS.
sdns://AQcAAAAAAAAAETE1MS44MC4yMjIuNzk6NDQzIKnWMjpPJYAJJhl1FQLOIx4fdtned2yHxruyig7_2w5OIDIuZG5zY3J5cHQtY2VydC5vcGVubmljLmkycGQueHl6
## opennic-R4SAS-ipv6
DNSSEC - OpenNIC - Non-logging - Uncensored - hosted on ovh.com
Location: Gravelines, France.
Maintained by R4SAS.
sdns://AQcAAAAAAAAAG1syMDAxOjQ3MDoxZjE1OmI4MDo6NTNdOjQ0MyCp1jI6TyWACSYZdRUCziMeH3bZ3ndsh8a7sooO_9sOTiAyLmRuc2NyeXB0LWNlcnQub3Blbm5pYy5pMnBkLnh5eg
## opennic-bongobow
OpenNIC • Non-logging • No DNSSEC
Location: Munich, Germany
sdns://AQYAAAAAAAAAETUuMTg5LjE3MC4xOTY6NDY1IFQ1LFVAO4Luk8QH_cI0RJcNmlbvIr_P-eyQnM0yJDJrKDIuZG5zY3J5cHQtY2VydC5uczE2LmRlLmRucy5vcGVubmljLmdsdWU
## opennic-luggs
Public DNS server in Canada operated by Luggs
sdns://AQYAAAAAAAAADTE0Mi40LjIwNC4xMTEgHBl5MxvoI8zPCJp5BpN-XDQQKlasf2Jw4EYlsu3bBOMfMi5kbnNjcnlwdC1jZXJ0Lm5zMy5jYS5sdWdncy5jbw
## opennic-luggs-ipv6
Public DNS server in Canada operated by Luggs (IPv6)
sdns://AQYAAAAAAAAAIVsyNjA3OjUzMDA6MTIwOmE4YToxNDI6NDoyMDQ6MTExXSAcGXkzG-gjzM8ImnkGk35cNBAqVqx_YnDgRiWy7dsE4x8yLmRuc2NyeXB0LWNlcnQubnMzLmNhLmx1Z2dzLmNv
## opennic-luggs2
Second public DNS server in Canada operated by Luggs
sdns://AQYAAAAAAAAAEDE0Mi40LjIwNS40Nzo0NDMgvL-34FDBPaJCLACwsaya1kjFwmS8thcLiD1xishuugkfMi5kbnNjcnlwdC1jZXJ0Lm5zNC5jYS5sdWdncy5jbw
## opennic-luggs2-ipv6
Second public DNS server in Canada operated by Luggs (IPv6)
sdns://AQYAAAAAAAAAJFsyNjA3OjUzMDA6MTIwOmE4YToxNDI6NDoyMDU6NDddOjQ0MyC8v7fgUME9okIsALCxrJrWSMXCZLy2FwuIPXGKyG66CR8yLmRuc2NyeXB0LWNlcnQubnM0LmNhLmx1Z2dzLmNv
## opennic-rico4514
OpenNIC • Non-logging • No DNSSEC
Location: Texas, 13, MX
sdns://AQYAAAAAAAAAETE0Mi40LjIwNC4xMTE6NDQzIBwZeTMb6CPMzwiaeQaTflw0ECpWrH9icOBGJbLt2wTjHzIuZG5zY3J5cHQtY2VydC5uczMuY2EubHVnZ3MuY28
## publicarray-au
DNSSEC • OpenNIC • Non-logging • Uncensored - hosted on vultr.com
Maintained by publicarray - https://dns.seby.io
sdns://AQcAAAAAAAAADDQ1Ljc2LjExMy4zMSAIVGh4i6eKXqlF6o9Fg92cgD2WcDvKQJ7v_Wq4XrQsVhsyLmRuc2NyeXB0LWNlcnQuZG5zLnNlYnkuaW8
## publicarray-au-doh
DNSSEC • OpenNIC • Non-logging • Uncensored - hosted on vultr.com
Maintained by publicarray - https://dns.seby.io
sdns://AgcAAAAAAAAADDQ1Ljc2LjExMy4zMSA-GhoPbFPz6XpJLVcIS1uYBwWe4FerFQWHb9g_2j24OBBkb2guc2VieS5pbzo4NDQzCi9kbnMtcXVlcnk
## publicarray-au2
DNSSEC • OpenNIC • Non-logging • Uncensored - hosted on ovh.com.au
Maintained by publicarray - https://dns.seby.io
sdns://AQcAAAAAAAAADTEzOS45OS4yMjIuNzIgCwVoTw0L4dgal5LC1FbZUtHtLR_rVuV6rVnxO95e4GUbMi5kbnNjcnlwdC1jZXJ0LmRucy5zZWJ5Lmlv
## publicarray-au2-doh
DNSSEC • OpenNIC • Non-logging • Uncensored - hosted on ovh.com.au
Maintained by publicarray - https://dns.seby.io
sdns://AgcAAAAAAAAADTEzOS45OS4yMjIuNzIgPhoaD2xT8-l6SS1XCEtbmAcFnuBXqxUFh2_YP9o9uDgRZG9oLTIuc2VieS5pbzo0NDMKL2Rucy1xdWVyeQ

4
v3/opennic.md.minisig Normal file
View File

@ -0,0 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i5xLlTeDptDCf4Rn19jfvqA0kf9If+sWoZqZYYy/S99/AVhJKv3W88vbWfBxBBenCdHcwUYltJNIYwd7/trLZeg8=
trusted comment: timestamp:1592768550 file:opennic.md
C/L7YOhWIRsoXM8OJIy6do58yJu/V4w949fAUpDxcWrp5i38gVXY7YBgDP4EXdOuTrzPN6+0KECgMiiatUVFAQ==

155
v3/parental-control.md Normal file
View File

@ -0,0 +1,155 @@
# parental-control
A set of resolvers blocking popular websites that may not be appropriate
for children.
This is not bulletproof. In particular, websites in languages that are
not English will require additional, local rules.
To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
[sources.'parental-control']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/parental-control.md', 'https://download.dnscrypt.info/resolvers-list/v2/parental-control.md']
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'parental-control.md'
In order to enforce safe search results from Google and Youtube, you may
also want to enable cloaking (`cloaking_rules` in the configuration file).
--
## adguard-dns-family
Adguard DNS with safesearch and adult content blocking
sdns://AQIAAAAAAAAAFDE3Ni4xMDMuMTMwLjEzMjo1NDQzILgxXdexS27jIKRw3C7Wsao5jMnlhvhdRUXWuMm1AFq6ITIuZG5zY3J5cHQuZmFtaWx5Lm5zMS5hZGd1YXJkLmNvbQ
## cira-family
CIRA DoH resolvers, blocking trackers, malware, phishing and pornography.
Operated by the .CA registry. Built by Canadians for Canadians.
https://www.cira.ca/fr/cybersecurity-services/canadian-shield
sdns://AgEAAAAAAAAAACA_4zhjTgUQYz3kU8o1CxXOwzmz3Li6nyot0k0QqDj-6x1mYW1pbHkuY2FuYWRpYW5zaGllbGQuY2lyYS5jYQovZG5zLXF1ZXJ5
## cisco-familyshield
Block websites not suitable for children (DNSCrypt protocol)
Warning: modifies your queries to include a copy of your network
address when forwarding them to a selection of companies and organizations.
Currently incompatible with DNS anonymization.
sdns://AQEAAAAAAAAADjIwOC42Ny4yMjAuMTIzILc1EUAgbyJdPivYItf9aR6hwzzI1maNDL4Ev6vKQ_t5GzIuZG5zY3J5cHQtY2VydC5vcGVuZG5zLmNvbQ
## cisco-familyshield-ipv6
Block websites not suitable for children (IPv6)
Warning: modifies your queries to include a copy of your network
address when forwarding them to a selection of companies and organizations.
sdns://AgAAAAAAAAAADDE0Ni4xMTIuNDEuMyBUDrXp92r0ml9Aq9cu3mXf2w_ugmc61w74ZllxOxR-Vxxkb2guZmFtaWx5c2hpZWxkLm9wZW5kbnMuY29tCi9kbnMtcXVlcnk
## cleanbrowsing-adult
Blocks access to all adult, pornographic and explicit sites. It does
not block proxy or VPNs, nor mixed-content sites. Sites like Reddit
are allowed. Google and Bing are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAEzE4NS4yMjguMTY4LjEwOjg0NDMgvKwy-tVDaRcfCDLWB1AnwyCM7vDo6Z-UGNx3YGXUjykRY2xlYW5icm93c2luZy5vcmc
## cleanbrowsing-adult-ipv6
Blocks access to all adult, pornographic and explicit sites. It does
not block proxy or VPNs, nor mixed-content sites. Sites like Reddit
are allowed. Google and Bing are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAFVsyYTBkOjJhMDA6MTo6MV06ODQ0MyC8rDL61UNpFx8IMtYHUCfDIIzu8Ojpn5QY3HdgZdSPKRFjbGVhbmJyb3dzaW5nLm9yZw
## cleanbrowsing-family
Blocks access to all adult, pornographic and explicit sites. It also
blocks proxy and VPN domains that are used to bypass the filters.
Mixed content sites (like Reddit) are also blocked. Google, Bing and
Youtube are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAFDE4NS4yMjguMTY4LjE2ODo4NDQzILysMvrVQ2kXHwgy1gdQJ8MgjO7w6OmflBjcd2Bl1I8pEWNsZWFuYnJvd3Npbmcub3Jn
## cleanbrowsing-family-ipv6
Blocks access to all adult, pornographic and explicit sites. It also
blocks proxy and VPN domains that are used to bypass the filters.
Mixed content sites (like Reddit) are also blocked. Google, Bing and
Youtube are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AQMAAAAAAAAAFFsyYTBkOjJhMDA6MTo6XTo4NDQzILysMvrVQ2kXHwgy1gdQJ8MgjO7w6OmflBjcd2Bl1I8pEWNsZWFuYnJvd3Npbmcub3Jn
## cloudflare-family
Cloudflare DNS (anycast) with malware protection and parental control
sdns://AgMAAAAAAAAABzEuMC4wLjMAGWZhbWlseS5jbG91ZGZsYXJlLWRucy5jb20KL2Rucy1xdWVyeQ
## dnsforfamily
Block adult websites, porn websites, gambling websites and advertisements.
No DNS queries are logged. As of March 2019 2.1million websites are blocked and new websites are added to blacklist daily
Completely free, no ads or any commercial motive.
Provided by: https://dnsforfamily.com
sdns://AQIAAAAAAAAADDc4LjQ3LjY0LjE2MSATJeLOABXNSYcSJIoqR5_iUYz87Y4OecMLB84aEAKPrRBkbnNmb3JmYW1pbHkuY29t
## doh-cleanbrowsing-adult
Blocks access to all adult, pornographic and explicit sites. It does
not block proxy or VPNs, nor mixed-content sites. Sites like Reddit
are allowed. Google and Bing are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AgMAAAAAAAAAAAAVZG9oLmNsZWFuYnJvd3Npbmcub3JnEi9kb2gvYWR1bHQtZmlsdGVyLw
## doh-cleanbrowsing-family
Blocks access to all adult, pornographic and explicit sites. It also
blocks proxy and VPN domains that are used to bypass the filters.
Mixed content sites (like Reddit) are also blocked. Google, Bing and
Youtube are set to the Safe Mode.
By https://cleanbrowsing.org/
sdns://AgMAAAAAAAAAAAAVZG9oLmNsZWFuYnJvd3Npbmcub3JnEy9kb2gvZmFtaWx5LWZpbHRlci8
## sfw.scaleway-fr
Uses deep learning to block adult websites. Free, DNSSEC, no logs.
Hosted in Paris, running on a 1-XS server donated by Scaleway.com
Maintained by Frank Denis - https://fr.dnscrypt.info/sfw.html
sdns://AQMAAAAAAAAAEzE2My4xNzIuMTgwLjEyNTo0NDMg32Jzv8dSGSqLWjm8DIWsP_lkRdc2RPZicoJdNVjxof8fMi5kbnNjcnlwdC1jZXJ0LnNmdy5zY2FsZXdheS1mcg

View File

@ -0,0 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i52UtToPgih/Ec5ZpmGwlleDewldnQWpKX1wAwcJJd4RCcqZL72JpXNlflkjN6OrERCjQnxd8P2vghKeoZ3F/aAE=
trusted comment: timestamp:1592768550 file:parental-control.md
vs4JvoxoGPflyulBoegAZMJNr2+hYcQcYFLEEdkQKczcc+YlR+Odee75JQPDOF94tJI/KgTM00XjUijhC5v3DQ==

1863
v3/public-resolvers.md Normal file

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i5xns+QPfUeCV9HCEkmM+CjQvTBPM7ISmZJAdA2ZDVOPxRPy2VqOnPddWtiE7ekmI49d8ntiLGrrBy9IuVxqLugQ=
trusted comment: timestamp:1592768550 file:public-resolvers.md
99UCKErRtunO5cKTn/4MPBC3y6mqilU4jsGuXtGslkrZX4YsneWP5JBOrhFdmFnmJz+CiyomB6FK11j68zUHBg==

298
v3/relays.md Normal file
View File

@ -0,0 +1,298 @@
# Anonymized DNS relays
Anonymized DNS is a lightweight alternative to Tor and SOCKS proxies,
dedicated to DNS traffic. They hide the client IP address to DNS resolvers,
providing anonymity in addition to confidentiality and integrity.
DNS Anonymization is only compatible with servers supporting the
DNSCrypt protocol.
See the link below for more information:
https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS
## anon-acsacsar-ams-ipv4
Anonymized DNS relay hosted in AMS on Scaleway
sdns://gRE1MS4xNTguMTY2Ljk3OjQ0Mw
## anon-acsacsar-ams-ipv6
Anonymized DNS relay hosted in AMS on Scaleway
sdns://gRpbMjAwMTpiYzg6MTgyNDo3Mzg6OjFdOjQ0Mw
## anon-ams-nl
Anonymized DNS relay hosted in Netherlands - NL
sdns://gRE1MS4xNS4xMjQuMjA4OjQ0Mw
## anon-cs-ca2
Anonymized DNS relay hosted in CA - Vancouver provided by https://cryptostorm.is/
sdns://gRMxNjIuMjIxLjIwNy4yMjg6NDQz
## anon-cs-de2
Anonymized DNS relay hosted in Frankfurt, Germany provided by https://cryptostorm.is/
sdns://gRA4NC4xNi4yNDAuNDM6NDQz
## anon-cs-fr
Anonymized DNS relay hosted in Paris, France provided by https://cryptostorm.is/
sdns://gREyMTIuMTI5LjQ2LjMyOjQ0Mw
## anon-cs-fr2
Anonymized DNS relay hosted in Paris, France (secondary) provided by https://cryptostorm.is/
sdns://gRExOTUuMTU0LjQwLjQ4OjQ0Mw
## anon-cs-md
Anonymized DNS relay hosted in Chisinau, Moldova provided by https://cryptostorm.is/
sdns://gRMxNzguMTc1LjEzOS4yMTE6NDQz
## anon-cs-nl
Anonymized DNS relay hosted in Roosendaal, Netherlands provided by https://cryptostorm.is/
sdns://gRExODUuMTA3LjgwLjg0OjQ0Mw
## anon-cs-nl2
Anonymized DNS relay hosted in Rotterdam, Netherlands provided by https://cryptostorm.is/
sdns://gRIyMTMuMTYzLjY0LjIwODo0NDM
## anon-cs-pt
Anonymized DNS relay hosted in Lisbon, Portugal provided by https://cryptostorm.is/
sdns://gRExMDkuNzEuNDIuMjI4OjQ0Mw
## anon-cs-se
Anonymized DNS relay hosted in Stockholm, Sweden provided by https://cryptostorm.is/
sdns://gRMxMjguMTI3LjEwNC4xMDg6NDQz
## anon-cs-sk
Anonymized DNS relay hosted in South Korea provided by https://cryptostorm.is/
sdns://gRAyNy4yNTUuNzcuNTY6NDQz
## anon-cs-usca
Anonymized DNS relay hosted in US - Los Angeles, CA provided by https://cryptostorm.is/
sdns://gRAyMy4xOS42Ny4xMTY6NDQz
## anon-cs-usga
Anonymized DNS relay hosted in US - Atlanta, GA provided by https://cryptostorm.is/
sdns://gRE2NC40Mi4xODEuMjI3OjQ0Mw
## anon-cs-usnc
Anonymized DNS relay hosted in US - Charlotte, NC provided by https://cryptostorm.is/
sdns://gRIxNTUuMjU0LjI5LjExMzo0NDM
## anon-cs-usnv
Anonymized DNS relay hosted in US - Las Vegas, NV provided by https://cryptostorm.is/
sdns://gRAzNy4xMjAuMTQ3LjI6NDQz
## anon-cs-usor
Anonymized DNS relay hosted in US - Roseburg, OR provided by https://cryptostorm.is/
sdns://gRExMDQuMjU1LjE3NS4yOjQ0Mw
## anon-cs-ustx
Anonymized DNS relay hosted in US - Dallas, TX provided by https://cryptostorm.is/
sdns://gREyMDkuNTguMTQ3LjM2OjQ0Mw
## anon-dnscrypt.uk-ipv4
Anonymized DNS relay hosted in UK on DigitalOcean
sdns://gRIxMzkuNTkuMjAwLjExNjo0NDM
## anon-dnscrypt.uk-ipv6
Anonymized DNS relay hosted in UK on DigitalOcean
sdns://gR5bMmEwMzpiMGMwOjE6ZTA6OjJlMzplMDAxXTo0NDM
## anon-ev-to
Anonymized DNS relay provided by evilvibes.com Location: Toronto, Canada
sdns://gQw2Ni44NS4zMC4xMTU
## anon-ev-va
Anonymized DNS relay provided by evilvibes.com Location: Vancouver, Canada
sdns://gQ0yMy4xMTEuNzQuMjA1
## anon-ibksturm
Hosted in Switzerland and maintained by @ibksturm, aka Andreas Ziegler.
sdns://gRA4NS41LjkzLjIzMDo4NDQz
## anon-ibksturm-ipv6
Hosted in Switzerland and maintained by @ibksturm, aka Andreas Ziegler.
sdns://gS5bMmEwMjoxMjA1OjUwNTU6ZGU2MDpiMjZlOmJmZmY6ZmUxZDplMTliXTo4NDQz
## anon-inconnu
Anonymized DNS relay hosted in Seattle, WA (USA), maintained by Eric
Lagergren (@ericlagergren). Running the official Docker image on Vultr.
sdns://gRIxMDQuMjM4LjE1My40Njo0NDM
## anon-kama
Anonymized DNS relay hosted in France and maintained by Frank Denis (@jedisct1).
sdns://gRIxMzcuNzQuMjIzLjIzNDo0NDM
## anon-meganerd
Anonymized DNS relay hosted by MegaNerd.nl (https://www.meganerd.nl/encrypted-dns-server) in Amsterdam, The Netherlands
sdns://gRIyMDkuMjUwLjI0MS4yNTo0NDM
## anon-meganerd-ipv6
Anonymized DNS relay hosted by MegaNerd.nl (https://www.meganerd.nl/encrypted-dns-server) in Amsterdam, The Netherlands
sdns://gStbMmEwNTpmNDgwOjE0MDA6NDM2OjU0MDA6MmZmOmZlYjg6OGQxY106NDQz
## anon-publicarray
Anonymized DNS relay hosted in Sydney, Australia and maintained by Sebastian Schmidt (@publicarray)
sdns://gRIxMzkuOTkuMjIyLjcyOjg0NDM
## anon-scaleway
Anonymized DNS relay hosted in France and maintained by Frank Denis (@jedisct1).
Running on an instance donated by https://scaleway.com
sdns://gRMxNjMuMTcyLjE4MC4xMjU6NDQz
## anon-scaleway-ams
Anonymized DNS relay hosted in Amsterdam and maintained by Frank Denis (@jedisct1).
Running on an instance donated by https://scaleway.com
sdns://gRE1MS4xNS4xMjIuMjUwOjQ0Mw
## anon-scaleway-ams-ipv6
Anonymized DNS relay hosted in Amsterdam and maintained by Frank Denis (@jedisct1).
IPv6 only. Running on an instance donated by https://scaleway.com
sdns://gRpbMjAwMTpiYzg6MTgyMDo1MGQ6OjFdOjQ0Mw
## anon-skyfighter
Anonymized DNS relay hosted in Netherlands (https://scaleway.com) and maintained by @tuttimann.
sdns://gQ81MS4xNS42Mi42NTo0NDM
## anon-skyfighter-ipv6
Anonymized DNS relay hosted in Netherlands (https://scaleway.com) and maintained by @tuttimann.
IPv6 only.
sdns://gRtbMjAwMTpiYzg6MTgyNDoxNzBmOjoxXTo0NDM
## anon-sth-se
Anonymized DNS relay hosted in Sweden - SE
sdns://gRE0NS4xNTMuMTg3Ljk2OjQ0Mw
## anon-tiarap
Anonymized DNS relay hosted in Singapore
sdns://gRMxNzQuMTM4LjI5LjE3NToxNDQz
## anon-tiarap-ipv6
Anonymized IPv6 DNS relay hosted in Singapore
sdns://gSBbMjQwMDo2MTgwOjA6ZDA6OjVmNzM6NDAwMV06MTQ0Mw
## anon-v.dnscrypt.uk-ipv4
Anonymized DNS relay hosted in UK on Vultr
sdns://gRMxMDQuMjM4LjE4Ni4xOTI6NDQz
## anon-v.dnscrypt.uk-ipv6
Anonymized DNS relay hosted in UK on Vultr
sdns://gSxbMjAwMToxOWYwOjc0MDI6MTU3NDo1NDAwOjJmZjpmZTY2OjJjZmZdOjQ0Mw

4
v3/relays.md.minisig Normal file
View File

@ -0,0 +1,4 @@
untrusted comment: signature from minisign secret key
RWQf6LRCGA9i5xRPX0ZoZco2e8P+Z6xOYuh2izHYYNX0cXaZRSzk0Kh9AsnFgMeDMM4TFTINTothN8SXlzXlZYz3F7Uj6eZnxgY=
trusted comment: timestamp:1592768550 file:relays.md
PvPWr0/XxpFQYGvWBRSp0rSdgjz3RBgpoQ6GOyeVMJk29sws+3eWubY2lcPYKWuXhGobZ7JYWyLavDRHiUtzCg==