diff --git a/website/index.html b/website/index.html index 3b3885e..c7ddda1 100644 --- a/website/index.html +++ b/website/index.html @@ -1,500 +1,766 @@ - Blahdns -- Dns service support DoH, DoT, DNSCrypt - - - - - - - - - - - - - -
-
- -
-

- A small hobby ads block DNS project with DoH, DoT, DNSCrypt support. -

-
-

You are not using Blahdns !!!

-
-
-
-
- - -
-

Announcements

-
- No logs | No EDNS Client-Subnet | OpenNIC support | Ethereum Name Service | DNSSEC ready | Yggdrasil | Filtered ads, trackers, malware, prevent CNAME Cloacking -
- -
-
-
-

Our servers

-
-
-
- -
-
-
-

Japan ๐Ÿ‡ฏ๐Ÿ‡ต

-
-
    -
  • -

    DNS-over-HTTPS

    - -

    IPv4-stamp:

    - -

    IPv6-stamp:

    - -

    DNS-over-TLS

    -

    IP address: -
    45.32.55.94 -
    2001:19f0:7001:3259:5400:02ff:fe71:0bc9 -

    tls_auth_name: -
    - port: 853, 443 (Strict SNI, without SNI will drop) -

    -

    DNSCrypt v2

    - port: 8443 -

    IPv4 - DNSStamp: -
    - -

    -

    IPv6 - DNSStamp: -
    - -

    -
  • -
-
-
- -
-
-
-

Singapore ๐Ÿ‡ธ๐Ÿ‡ฌ

-
-
    -
  • -

    DNS-over-HTTPS

    - -

    IPv4-stamp:

    - -

    IPv6-stamp:

    - -

    DNS-over-TLS

    -

    IP address:
    - 139.180.141.57
    - 2001:19f0:4400:6bed:5400:2ff:feb1:f9fa -
    -

    tls_auth_name: -
    - port: 853, 443 (Strict SNI, without SNI will drop) -

    -

    DNSCrypt v2

    - port: 8443 -

    IPv4 - DNSStamp: -
    - -

    -

    IPv6 - DNSStamp: -
    - -

    -
  • -
-
-
- -
-
-
-

Germany ๐Ÿ‡ฉ๐Ÿ‡ช

-
-
    -
  • -

    DNS-over-HTTPS

    - -

    IPv4-stamp:

    - -

    IPv6-stamp:

    - -

    DNS-over-TLS

    -

    IP address:
    - 78.46.244.143
    - 2a01:4f8:c17:ec67::1
    -

    tls_auth_name: -
    - port: 853, 443 (Strict SNI, without SNI will drop) -

    -

    DNSCrypt v2

    - port: 8443 -

    IPv4 - DNSStamp: -
    - -

    -

    IPv6 - DNSStamp: -
    - -

    -
  • -
-
-
- -
-
-
-

Finland ๐Ÿ‡ซ๐Ÿ‡ฎ

-
-
    -
  • -

    DNS-over-HTTPS

    - -

    IPv4-stamp:

    - -

    IPv6-stamp:

    - -

    DNS-over-TLS

    -

    IP address: -
    - 95.216.212.177
    - 2a01:4f9:c010:43ce::1
    -

    tls_auth_name: -
    - port: 853, 443 (Strict SNI, without SNI will drop) -

    -

    DNSCrypt v2

    - port: 8443 -

    IPv4 - DNSStamp: -
    - -

    -

    IPv6 - DNSStamp: -
    - -

    -
  • -
-
-
-
-
-

News

- - -
-
- -
-
- -
-
- -
-
-
-

-
-
-
- - - -
-
-

- Thanks to these great projects, Blahdns was born.
- 1. knot-resolver: Go -
2. Dnsdist: Go -
3. HAProxy: Go -
4. dns-over-https: Go -

-
-
- -
-
-

-
- DNS leak verification -
1. DNSSEC validation: Go -
2. Internet.nl: Go -
3. DNSSEC resolver algorithm test: Go -
4. Cloudflare tools: Go | Go -
5. Check my DNS: Go -
6. DNS randomness: Go -
7. DNS Spoofability test: Go -
8. DNSTrace: Go -
9. Threats search: Go -
10. Whoer.net Go -
11. EDNS test Go -
12. Cloudflare SNI Test Go .. You should have DNSSEC + TLS1.3 section in Green color. -
13. DNS Check Go - -

Browser or Device privacy leaks test -
1. Browserleaks: Go -
2. Device leak: Go -
3. Creepy JS: Go -
4. Webbkoll: Go -
5. Hardenize Report: Go -
6. STARTTLS check: Go -
7. SSL Test: Go -
8. DKIM, SPF, SpamAssassin Email Validator Go - -

-
-
- -
-
-

DNS over HTTPS (DoH) -
DNS over HTTPS is a new protocol designed to encrypt and secure DNS traffic over HTTPS. -
It prevents DNS hijacking and ISPs from sniffing your traffic. -
You can use will Infra on Android Phone, Mozilla firefox nightly, Chrome coming soon. -
DNSCrypt v2 client does support DoH, see dnscrypt configuration - example on Windows, macOS, iOS (DNSCloak) -

-
-
- -
-
-

Encrypted DNS - DNS over TLS -
DNS over TLS support is available on all our services through port 853 (standard port, some service may support 443). -
DNS over TLS encrypts and authenticates all your DNS traffic to protect your privacy and prevent DNS hijacking and sniffing. -
Client software: Stubby | Unbound -
How to get SPKI -
Be sure you already install package apt install gnutls-bin -
- gnutls-cli --print-cert -p 853 45.32.55.94 | grep "pin-sha256" | head -1 - -
OR - kdig -d @45.32.55.94 +tls-ca +tls-host=dot-jp.blahdns.com blahdns.com - -
TLS1.3 support check -
- openssl s_client -connect 45.32.55.94:853 - -
Will return message: - - New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 - Server public key is 2048 bit - Secure Renegotiation IS NOT supported - Compression: NONE - Expansion: NONE - No ALPN negotiated - Early data was not sent - Verify return code: 0 (ok) - --- - --- - Post-Handshake New Session Ticket arrived: - SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - - For troubleshooting go HERE -

-
-
- -
-
-

The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses - so browsers can load Internet resources. -

-

Each device connected to the Internet has a unique IP address which other machines use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses - such as 2400:cb00:2048:1::c629:d7a2 (in IPv6). -

-
-
-
-
-

FAQ

-
-
- - - - - -
-
-
    -
  • How to fix Chrome on Android phone leaking DNS, check HERE -
  • -
  • Supported TLS v1.3, 1.2
  • -
  • We drop ANY type.
  • -
  • Why you building this porject? I started this project around 2016. During that time, with my private dns, I need an easy way to filter ads and tracker, so I rent a server and learn how to achive this.
  • -
  • Why you dont like huge traffic? I'm still a student. and I run this service with my pocket money and - spare time. Just as a hobby to learn somehting new. buying big server or Anti-DDOS service will cost lot. -
  • -
-
- - -
-

DNSSEC validation: https://dnssec.vs.uni-due.de

-

curl -H 'content-type: application/dns-message' -vL -v 'https://doh-jp.blahdns.com/dns-query?dns=AAABAAABAAAAAAAAA3d3dwdleGFtcGxlA2NvbQAAAQAB' | hexdump -C

-

kdig google.com @2001:19f0:7001:1ded:5400:1ff:fe90:945b +tls -p 443

-

kdig google.com @45.32.55.94

-

https://gist.github.com/meanevo/e70ca58e361fb4d1a9d262a8f12b173a (HAProxy) https://stuff-things.net/2016/11/30/haproxy-sni/ https://pre-prod.chown.me/blog/running-dot-on-openbsd.html https://www.haproxy.com/blog/introduction-to-haproxy-acls/

-
-
-

Does Blahdns block CNAME Cloacking? Yes, click here to read more.

-
- -
-

-

    -
  • Thanks for Adam Srxxx for 2 USD
  • -
  • Thanks for Slawomir Mxxx for 5 USD
  • -
  • Thanks for Giuseppe Macxxx for 5 USD
  • -
  • Thanks for Austin Sarxxx for 25 USD
  • -
  • Thanks for Jonni Rauhxxx for 25 USD
  • -
  • Thanks for Regin Jaxxx for 50 EUR
  • -
  • Thanks for Kristian NyXXXard JenXXXX for 5 USD and 10 EUR
  • -
  • Thanks for Martin LohrXXXrg for 10 EUR
  • -
  • Thanks for Ferdinand MuXXXch for 3 USD
  • -
  • Thanks for MarsXXXn for 5 USD
  • -
  • Thanks for Lawerence LeXXXng for 20 AUD
  • -
  • Thanks for ๅ„ชๆจน XXไธ‹ for 3 USD
  • -
  • Thanks for Ardi KaXXXin for 5 SGD
  • -
  • Thanks for Kung JXXXe for 3 USD
  • -
  • Thanks for Braian KapXXXan for 9 USD
  • -
  • Thanks for Lorenzo OXXXi for 20 USD
  • -
  • Thanks for Felix HungXXXberg for 3 USD
  • -
  • Thanks for Marco GXXXze for 10 USD
  • -
  • Thanks for mikXXXla for 10 EUR
  • -
  • Thanks for Tim 331 for 20 TWD
  • -
-

-
-
-
-
- - - - - +
+
+

Our servers

+
+
+ +
+
+ +
+
+

Switzerland ๐Ÿ‡จ๐Ÿ‡ญ

+
+
+

DNS-over-HTTPS & HTTP/3

+ +

IPv4-stamp:

+ +

IPv6-stamp:

+ +

DNS-over-TLS

+

IP address: +
45.91.92.121 +
2a0e:dc0:6:23::2 +

tls_auth_name: +
+ port: 853, 443 (Strict + SNI, without SNI will drop) +

+

DNSCrypt v2

+ port: 8443 +

IPv4 - DNSStamp: +
+ +

+

IPv6 - DNSStamp: +
+ +

+
+
+ + +
+
+

Japan ๐Ÿ‡ฏ๐Ÿ‡ต

+
+
+

DNS over QUIC

+ +

DNS-over-HTTPS & HTTP/3

+ +

IPv4-stamp:

+ +

IPv6-stamp:

+ +

DNS-over-TLS

+

IP address: +
212.52.0.122 +
2406:ef80:4:1537::1 + port: 853, 443 (Strict SNI, without SNI will drop) + +

DNSCrypt v2

+ port: 8443 +

IPv4 - DNSStamp:

+ +

IPv6 - DNSStamp:

+ +
+
+
+ + +
+ +
+

Singapore ๐Ÿ‡ธ๐Ÿ‡ฌ

+
+
+

DNS over QUIC

+

quic://dot-sg.blahdns.com:784

+

DNS-over-HTTPS & HTTP/3

+ +

IPv4-stamp:

+ +

IPv6-stamp:

+ +

DNS-over-TLS

+

IP address: +
103.167.150.45 +
2406:ef80:2:5ee4::1 +
+

tls_auth_name: +
+ port: 853, 443 (Strict + SNI, without SNI will drop) +

+

DNSCrypt v2

+ port: 8443 +

IPv4 - DNSStamp: +
+ +

+

IPv6 - DNSStamp: +
+ +

+
+
+ + +
+
+

Germany ๐Ÿ‡ฉ๐Ÿ‡ช

+
+
+

DNS over QUIC

+

quic://dot-de.blahdns.com:784

+

DNS-over-HTTPS & HTTP/3

+ +

IPv4-stamp:

+ +

IPv6-stamp:

+ +

DNS-over-TLS

+

IP address: +
78.46.244.143 +
2a01:4f8:c17:ec67::1 +
+

tls_auth_name: +
+ port: 853, 443 (Strict + SNI, without SNI will drop) +

+

DNSCrypt v2

+ port: 8443 +

IPv4 - DNSStamp: +
+ +

+

IPv6 - DNSStamp: +
+ +

+
+
+ + +
+
+

Finland ๐Ÿ‡ซ๐Ÿ‡ฎ

+
+
+

DNS over QUIC

+

quic://dot-fi.blahdns.com:784

+

DNS-over-HTTPS & HTTP/3

+ +

IPv4-stamp:

+ +

IPv6-stamp:

+ +

DNS-over-TLS

+

IP address: +
95.216.212.177 +
2a01:4f9:c010:43ce::1 +
+

tls_auth_name: +
+ port: 853, 443 + (Strict + SNI, without SNI will drop) +

+

DNSCrypt v2

+ port: 8443 +

IPv4 - DNSStamp: +
+ +

+

IPv6 - DNSStamp: +
+ +

+
+
+ +
+
+ + +
+

News

+ + +
+
+ +
+
+ +
+
+ +
+
+
+

+
+
+
+ +
+ +
+ +
+
+

Thanks to these great projects, Blahdns was born. +
1. knot-resolver: Go +
2. Dnsdist: Go +
3. HAProxy: Go +
4. dns-over-https: Go +

+
+
+ +
+
+ Useful tools +
    +
  • + DNS leaks check Mullavad || Bash.ws +
  • +
  • + DNSSEC validation: Go +
  • +
  • + Internet.nl: Go +
  • +
  • + DNSSEC resolver algorithm test: Go +
  • +
  • + Cloudflare tools: Go | Go +
  • +
  • + Check my DNS: Go
  • +
  • + DNS randomness: Go +
  • +
  • + DNS Spoofability test: Go +
  • +
  • + DNSTrace: Go +
  • +
  • + Threats search: Go +
  • +
  • + EDNS test Go +
  • +
  • + Cloudflare SNI Test Go .. You should have DNSSEC + TLS1.3 section in Green color. +
  • +
  • + DNS Check Go +
  • + +
    Browser or Device privacy leaks test + +
  • 1. Browserleaks: Go
  • +
  • 2. Device leak: Go
  • +
  • 3. Creepy JS: Go
  • +
  • 4. Webbkoll: Go
  • +
  • 5. Hardenize Report: Go
  • +
  • 6. STARTTLS check: Go
  • +
  • 7. SSL Test: Go
  • +
  • 8. DKIM, SPF, SpamAssassin Email Validator Go
  • +
  • 9. LiquidWeb (DNS) Go
  • +
  • 10. BunnyCDN Diagnostic report Go
  • +
+ +
+
+ +
+
+

DNS over HTTPS (DoH) +
DNS over HTTPS is a new protocol designed to encrypt and secure DNS traffic over HTTPS. +
It prevents DNS hijacking and ISPs from sniffing your traffic. +
You can use will Infra on Android Phone, Mozilla firefox nightly, Chrome coming soon. +
DNSCrypt v2 client does support DoH, see dnscrypt configuration + example on Windows, macOS, iOS (DNSCloak) +

+
+
+ +
+
+

Encrypted DNS - DNS over TLS +
DNS over TLS support is available on all our services through port 853 (standard port, some service + may + support 443). +
DNS over TLS encrypts and authenticates all your DNS traffic to protect your privacy and prevent DNS + hijacking and sniffing. +
Client software: Stubby + | Unbound +

+
+
+ +
+
+

The Domain Name System (DNS) is the phonebook of the Internet. Humans access + information online through domain names, like nytimes.com or espn.com. Web browsers interact through + Internet Protocol (IP) addresses. DNS translates domain names to IP addresses + so browsers can load Internet resources. +

+

Each device connected to the Internet has a unique IP address which other machines + use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as + 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses + such as 2400:cb00:2048:1::c629:d7a2 (in IPv6). +

+
+
+
+ +
+

FAQ

+
+
+ + + + + + +
+ +
+
    +
  • How to fix Chrome on Android phone leaking DNS, check HERE +
  • +
  • Supported TLS v1.3, 1.2
  • +
  • We drop ANY type.
  • +
  • Why you building this porject? I started this project around 2016. During that time, with my private + dns, I need an easy way to filter ads and tracker, so I rent a server and learn how to achive this. +
  • +
  • Why you dont like huge traffic? I'm still a student. and I run this service with my pocket money + and + spare time. Just as a hobby to learn somehting new. buying big server or Anti-DDOS service will cost + lot. +
  • +
+
+ + + +
+

DNS over HTTP/3 Udp over QUIC protocol
+ docker run -it --rm ymuski/curl-http3 curl --http3 -H 'accept: application/dns-message' -v 'https://doh-fi.blahdns.com/dns-query?dns=q80BAAABAAAAAAAAA3d3dwdleGFtcGxlA2NvbQAAAQAB' | hexdump -C +

+

Curl Dns-over-HTTPS TCP HTTP/2
+ + curl -H 'content-type: application/dns-message' -vL -v + 'https://doh-jp.blahdns.com/dns-query?dns=AAABAAABAAAAAAAAA3d3dwdleGFtcGxlA2NvbQAAAQAB' | hexdump -C +

+

kdig DNS over TLS
+ kdig example.org @dot-jp.blahdns.com +tls -p 443
+ kdig @doh-jp.blahdns.com +https=doh-jp.blahdns.com/dns-query example.com.
+ kdig @doh-jp.blahdns.com +https=doh-jp.blahdns.com/dns-query +https-get example.com.
+ kdig -d @dot-jp.blahdns.com +tls-ca +tls-host=dot-jp.blahdns.com example.com.
+

+
+ +
+

Do Blahdns block CNAME Cloacking? Yes, click here to read more. +

+
We do block Sentry, Rollbar, Bugsnag --
+ +
+ +
+
    +
  • Thanks Matteo Bosso**sco for 5 USD
  • +
  • Thanks Adam C** for 10 USD
  • +
  • Thanks Jash** P for 5 USD
  • +
  • Thanks A Bran**ts for 10 USD
  • +
  • Thanks Lawrence Le**g for 20 USD
  • +
  • Thanks A Bran**ts for 30 USD
  • +
  • Thanks for Simon On** for 5 USD
  • +
  • Thanks A Br**dts for 5 USD
  • +
  • Thanks And**w Kriz for 10 USD
  • +
  • Thanks Etienne Gut*** for 15.66 USD
  • +
  • Thanks Alexander S** for 50 EUR
  • +
  • Thanks Gabrie** Nichole Di*** for 20 USD
  • +
  • Thanks Chxx Kxx ** for 10 USD
  • +
  • Thanks Ch*** Buiter for 5 USD
  • +
  • Thanks Daniel de*** for 35 USD
  • +
  • Thanks Rolf Schw*** for 5 USD
  • +
  • Thanks Si*** ร–ner for 5 USD
  • +
  • Thanks Poxx Kw*** for 5 USD
  • +
  • Thanks Antonius Sian*** for 250 TWD
  • +
  • Thanks Yo** J** Lim for 3.88 SGD
  • +
  • Thanks Alex *** for 5 USD
  • +
  • Thanks to Johannes P*** 5 USD
  • +
  • Thanks to Jordi San*** 14.04 USD
  • +
  • Thanks to Mark McCr*** for 12.08 EUR
  • +
  • Thanks to Kristian Ny*** for 52 EUR
  • +
  • Thanks to dt Boris Gren*** for 10 EUR
  • +
  • Thanks to dt ans*** for 12 USD
  • +
  • Thanks to Andries Lou*** for 1000 TWD
  • +
  • Thanks to Andries Lou*** for 807 TWD
  • +
  • Thanks to Yann Fa*** for 25 USD(LTC)
  • +
  • Thanks to Daniel De*** for 10 USD
  • +
  • Thanks to Christoph Be*** for 5 USD
  • +
  • Thanks to Etienne Gu*** for 30 EUR
  • +
  • Thanks to Michael Ka*** for 3.33 EUR
  • +
  • Thanks to Adam Sr*** for 13 USD
  • +
  • Thanks to Tobiax R*** for 5 EUR
  • +
  • Thanks to Pekka de G*** for 15 USD
  • +
  • Thanks to Loren Pe*** for 3 USD
  • +
  • Thanks to Adam S*** for 2 USD
  • +
  • Thanks to Slawomir M*** for 5 USD
  • +
  • Thanks to Giuseppe Ma*** for 5 USD
  • +
  • Thanks to Austin Sa*** for 25 USD
  • +
  • Thanks to Jonni Rau*** for 25 USD
  • +
  • Thanks to Regin Ja*** for 50 EUR
  • +
  • Thanks to Kristian Ny*** Jen*** for 5 USD and 10 EUR
  • +
  • Thanks to Martin Lohr*** for 10 EUR
  • +
  • Thanks to Ferdinand Mu*** for 3 USD
  • +
  • Thanks to Mars*** for 5 USD
  • +
  • Thanks to Lawerence Le*** for 20 AUD
  • +
  • Thanks to ๅ„ชๆจน*** for 3 USD
  • +
  • Thanks to Ardi Ka*** for 5 SGD
  • +
  • Thanks to Kung J*** for 3 USD
  • +
  • Thanks to Braian Kap*** for 9 USD
  • +
  • Thanks to Lorenzo O*** for 20 USD
  • +
  • Thanks to Felix Hung*** for 3 USD
  • +
  • Thanks to Marco G*** for 10 USD
  • +
  • Thanks to mik*** for 10 EUR
  • +
  • Thanks to Tim *** for 20 TWD
  • +
+
+ +
+

How to get strict SPKI

+ +

Method 1

+ Be sure you already install package apt install gnutls-bin +
+ + gnutls-cli --print-cert -p 853 dot-jp.blahdns.com | grep "pin-sha256" | head -1 + +

Method 2

+ + kdig -d @dot-jp.blahdns.com +tls-ca +tls-host=dot-jp.blahdns.com blahdns.com + +
+
+
+ + + + + +