查看: 6036|回复: 1

[项目] DNSCrypt 在RaspBerry Pi上编译通过!有win,mac版本下载!

    [复制链接]
  • TA的每日心情
    开心
    2016-8-15 09:30
  • 签到天数: 162 天

    连续签到: 1 天

    [LV.7]常住居民III

    发表于 2013-3-29 08:51:47 | 显示全部楼层 |阅读模式
    分享到:
    本帖最后由 haothree 于 2013-3-29 08:54 编辑

    Introducing DNSCrypt (Preview Release)
    Background: The need for a better DNS security
    DNS is one of the fundamental building blocks of the Internet.  It's used any time you visit a website, send an email, have an IM conversation or do anything else online.  While OpenDNS has provided world-class security using DNS for years, and OpenDNS is the most secure DNS service available, the underlying DNS protocol has not been secure enough for our comfort.  Many will remember the Kaminsky Vulnerability(http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html), which impacted nearly every DNS implementation in the world (though not OpenDNS).
    That said, the class of problems that the Kaminsky Vulnerability related to were a result of some of the underlying foundations of the DNS protocol that are inherently weak  -- particularly in the "last mile."  The "last mile" is the portion of your Internet connection between your computer and your ISP.  DNSCrypt is our way of securing the "last mile" of DNS traffic and resolving (no pun intended) an entire class of serious security concerns with the DNS protocol. As the world’s Internet connectivity becomes increasingly mobile and more and more people are connecting to several different WiFi networks in a single day, the need for a solution is mounting.
    There have been numerous examples of tampering, or man-in-the-middle attacks, and snooping of DNS traffic at the last mile and it represents a serious security risk that we've always wanted to fix. Today we can.
    Why DNSCrypt is so significant
    In the same way the SSL turns HTTP web traffic into HTTPS encrypted Web traffic, DNSCrypt turns regular DNS traffic into encrypted DNS traffic that is secure from eavesdropping and man-in-the-middle attacks.  It doesn't require any changes to domain names or how they work, it simply provides a method for securely encrypting communication between our customers and our DNS servers in our data centers.  We know that claims alone don't work in the security world, however, so we've opened up the source to our DNSCrypt code base and it's available on GitHub.
    DNSCrypt has the potential to be the most impactful advancement in Internet security since SSL, significantly improving every single Internet user's online security and privacy.
    Download Now:
    Download DNSCrypt for Mac(http://opendns.github.com/dnscrypt-osx-client/)

    Download DNSCrypt for Windows(http://shared.opendns.com/dnscrypt/packages/windows-client/DNSCryptWin-v0.0.6.exe)


    Frequently Asked Questions (FAQ):
    1. In plain English, what is DNSCrypt?
    DNSCrypt is a piece of lightweight software that everyone should use to boost online privacy and security.  It works by encrypting all DNS traffic between the user and OpenDNS, preventing any spying, spoofing or man-in-the-middle attacks.
    2. How can I use DNSCrypt today?
    DNSCrypt is immediately available as a technology preview.  It should work, shouldn't cause problems, but we're still making iterative changes regularly.  You can download a version for Mac or Windows from the links above.
    Tips:
    If you have a firewall or other middleware mangling your packets, you should try enabling DNSCrypt with TCP over port 443.  This will make most firewalls think it's HTTPS traffic and leave it alone.
    If you prefer reliability over security, enable fallback to insecure DNS.  If you can't reach us, we'll try using your DHCP-assigned or previously configured DNS servers.  This is a security risk though.
    3. What about DNSSEC? Does this eliminate the need for DNSSEC?
    No. DNSCrypt and DNSSEC are complementary.  DNSSEC does a number of things.  First, it provides authentication. (Is the DNS record I'm getting a response for coming from the owner of the domain name I'm asking about or has it been tampered with?)  Second, DNSSEC provides a chain of trust to help establish confidence that the answers you're getting are verifiable.  But unfortunately, DNSSEC doesn't actually provide encryption for DNS records, even those signed by DNSSEC.  Even if everyone in the world used DNSSEC, the need to encrypt all DNS traffic would not go away. Moreover, DNSSEC today represents a near-zero percentage of overall domain names and an increasingly smaller percentage of DNS records each day as the Internet grows.
    That said, DNSSEC and DNSCrypt can work perfectly together.  They aren't conflicting in any way.  Think of DNSCrypt as a wrapper around all DNS traffic and DNSSEC as a way of signing and providing validation for a subset of those records.  There are benefits to DNSSEC that DNSCrypt isn't trying to address. In fact, we hope DNSSEC adoption grows so that people can have more confidence in the entire DNS infrastructure, not just the link between our customers and OpenDNS.
    4. Is this using SSL? What's the crypto and what's the design?
    We are not using SSL.  While we make the analogy that DNSCrypt is like SSL in that it wraps all DNS traffic with encryption the same way SSL wraps all HTTP traffic, it's not the crypto library being used.  We're using elliptical-curve cryptography, in particular the Curve25519 eliptical curve.  The design goals are similar to those described in the DNSCurve forwarder design.

    回复

    使用道具 举报

  • TA的每日心情
    奋斗
    2014-7-16 09:10
  • 签到天数: 361 天

    连续签到: 1 天

    [LV.8]以坛为家I

    发表于 2013-3-29 08:53:08 | 显示全部楼层
    又是这么多纯英文,这是闹哪样呀》?
    回复 支持 反对

    使用道具 举报

    您需要登录后才可以回帖 注册/登录

    本版积分规则

    关闭

    站长推荐上一条 /2 下一条



    手机版|小黑屋|与非网

    GMT+8, 2024-5-4 03:48 , Processed in 0.125397 second(s), 17 queries , MemCache On.

    ICP经营许可证 苏B2-20140176  苏ICP备14012660号-2   苏州灵动帧格网络科技有限公司 版权所有.

    苏公网安备 32059002001037号

    Powered by Discuz! X3.4

    Copyright © 2001-2024, Tencent Cloud.