PR-DNSd is a Passive-Recursive DNS daemon.
go get github.com/korc/PR-DNSd
sudo setcap cap_net_bind_service,cap_sys_chroot=ep go/bin/PR-DNSd
go/bin/PR-DNSd -upstream 9.9.9.9:53 -listen 127.0.0.1:53
echo nameserver 127.0.0.1 | sudo tee /etc/resolv.conf
dig google.com
dig -x $(dig +short google.com)
netstat/tcpview/lsof etc. outputAfter appropriate setcap, run:
PR-DNSd -tlslisten :853 -cert YOUR_SERVER_CRT_KEY_PEM -upstream 1.1.1.1:53 -store pr-dnsd
–cert string
TCP-TLS listener certificate (required for tls listener)
-chroot string
chroot to directory after start (default “/var/tmp”)
-count int
Count of replies allowed before debounce delay is applied (default 100)
-ctmout string
Client timeout for upstream queries
-debounce string
Required time duration between UDP replies to single IP to prevent DoS (default “200ms”)
-key string
TCP-TLS certificate key (default same as -cert value)
-listen string
listen address (default “:53”)
-silent
Don’t report normal data
-store string
Store PTR data to specified file
-tlslisten string
TCP-TLS listener address (default “:853”)
-upstream string
upstream DNS server (tcp-tls:// prefix for DoT) (default “1.1.1.1:53”)
(with tls and chroot, ensure ca-certificates and resolv.conf in chroot are properly set up)
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…