A fast and secure DoH (DNS-over-HTTPS) server written in Rust.
This requires the rust
compiler to be installed.
With built-in support for HTTPS (default):
sh
cargo install doh-proxy
Without built-in support for HTTPS:
sh
cargo install doh-proxy --no-default-features
```text A DNS-over-HTTPS (DoH) proxy
USAGE: doh-proxy [FLAGS] [OPTIONS]
FLAGS: -K, --disable-keepalive Disable keepalive -P, --disable-post Disable POST queries -h, --help Prints help information -V, --version Prints version information
OPTIONS:
-E, --err-ttl
-i, --tls-cert-path <tls_cert_path> Path to the PEM-encoded certificates (only required for built-in TLS)
```
The recommended way to use doh-proxy
is to use a TLS termination proxy (such as hitch or relayd), a CDN or a web server with proxying abilities as a front-end.
That way, the DoH service can be exposed as a virtual host, sharing the same IP addresses as existing websites.
If doh-proxy
and the HTTP/2 front-end run on the same host, using the HTTP protocol to communicate between both is fine.
If both are on distinct networks, such as when using a CDN, doh-proxy
can handle HTTPS requests, provided that it was compiled with the tls
feature.
The certificates and private keys must be encoded in PEM format. They can be stored in the same file.
In order to enable built-in HTTPS support, add the --tls-cert-path
option to specify the location of the certificates file, as well as the private keys file using --tls-cert-key-path
.
Once HTTPS is enabled, HTTP connections will not be accepted.
A sample self-signed certificate localhost.pem
can be used for testing.
The file also includes the private key.
acme.sh
can be used to create and update TLS certificates using Let's Encrypt and other ACME-compliant providers.
The certificates path must be set to the full certificates chain (fullchain.cer
) and the key path to the secret keys (the .key
file):
sh
doh-proxy -i /path/to/fullchain.cer -I /path/to/domain.key ...
Once started, doh-proxy
automatically reloads the certificates as they change; there is no need to restart the server.
DNSCrypt is an alternative encrypted DNS protocol that is faster and more lightweight than DoH.
Both DNSCrypt and DoH connections can be accepted on the same TCP port using Encrypted DNS Server.
Encrypted DNS Server forwards DoH queries to Nginx or rust-doh
when a TLS connection is detected, or directly responds to DNSCrypt queries.
It also provides DNS caching, server-side filtering, metrics, and TCP connection reuse in order to mitigate exhaustion attacks.
Unless the front-end is a CDN, an ideal setup is to use rust-doh
behind Encrypted DNS Server
.
encrypted-dns-server
Add the following section to the configuration file:
toml
[tls]
upstream_addr = "127.0.0.1:3000"
nginx
In an existing server
, a /doh
endpoint can be exposed that way:
text
location /doh {
proxy_pass http://127.0.0.1:3000;
}
This example assumes that the DoH proxy is listening locally to port 3000
.
HTTP caching can be added (see the proxy_cache_path
and proxy_cache
directives in the Nginx documentation), but be aware that a DoH server will quickly create a gigantic amount of files.
Use the online DNS stamp calculator to compute the stamp for your server.
Add it to the [static]
section of dnscrypt-proxy
and check that everything works as expected.
Then, start dnscrypt-proxy
with the -show-certs
command-line flag to print the hashes for your certificate chain.
Here is an example output:
text
[NOTICE] Advertised cert: [CN=dohtrial.att.net,O=AT&T Services\, Inc.,L=Dallas,ST=Texas,C=US] [f679e8451940f06141854dc94e1eb79fa5e04463c15b88f3b392da793c16c353]
[NOTICE] Advertised cert: [CN=DigiCert Global CA G2,O=DigiCert Inc,C=US] [f61e576877da9650294cccb5f96c75fcb71bda1bbc4646367c4ebeda89d7318f]
The first printed certificate is the certificate of the server itself. The next line is the one that signed that certificate. As you keep going down, you are getting closer to the certificate authority.
Unless you are using intermediate certificates, your safest option is probably to include the last printed hash certificate in your DNS stamp.
Go back to the online DNS stamp calculator, and copy&paste the hash (in this example: f61e576877da9650294cccb5f96c75fcb71bda1bbc4646367c4ebeda89d7318f
).
If you are using Let's Encrypt, the last line is likely to be:
text
Advertised cert: [CN=Let's Encrypt Authority X3,O=Let's Encrypt,C=US] [3e1a1a0f6c53f3e97a492d57084b5b9807059ee057ab1505876fd83fda3db838]
There you have it. Your certificate hash is 3e1a1a0f6c53f3e97a492d57084b5b9807059ee057ab1505876fd83fda3db838
.
This Go code snippet can also compute the hash of certificates given a .der
file.
3e1a1a0f6c53f3e97a492d57084b5b9807059ee057ab1505876fd83fda3db838
3286ff65a65faf32085eea1388c3738ba7e37873c906cce3c4a28b4cc2a58988
cc1060d39c8329b62b6fbc7d0d6df9309869b981e7e6392d5cd8fa408f4d80e6
doh-proxy
can be used with dnscrypt-proxy
as a client.
doh-proxy
is used in production for the doh.crypto.sx
public DNS resolver and many others.
An extensive list of public DoH servers can be found here: public encrypted DNS servers.