RISOLTO [TAILS] volume persiste criptato & anonimato

Pubblicità
@e_ale92

Allora, prima cosa ho installato il programma:

Codice:
sudo apt-get install dnscrypt-proxy

Codice:
amnesia@amnesia:~$ sudo dpkg -l | grep dnscrypt
[sudo] password di amnesia:
ii  dnscrypt-proxy                                   1.9.4-1                              amd64        Tool for securing communications between a client and a DNS resolver
amnesia@amnesia:~$

L'ho aggiunto alla lista dei programmi persistenti :

Codice:
File: /live/persistence/TailsData_unlocked/live-additional-software.conf

florence
dnscrypt-proxy





                                              [ Lette 2 righe ]
^G Guida     ^O Salva     ^W Cerca     ^K Taglia    ^J Giustifica^C Posizione
^X Esci      ^R Inserisci ^\ Sostituisc^U Incolla   ^T Ortografia^_ Vai a riga



Poi ho aperto il file per la configurazione ma è vuoto

Codice:
sudo nano /etc/dnscrypt-proxy.conf

Infine ho provato gli ip su dnsleaktest.com/ ma sono sempre quelli di tiscali, forse ho sbagliato qualcosa ?
 
@e_ale92

Allora, prima cosa ho installato il programma:

Codice:
sudo apt-get install dnscrypt-proxy

Codice:
amnesia@amnesia:~$ sudo dpkg -l | grep dnscrypt
[sudo] password di amnesia:
ii  dnscrypt-proxy                                   1.9.4-1                              amd64        Tool for securing communications between a client and a DNS resolver
amnesia@amnesia:~$

L'ho aggiunto alla lista dei programmi persistenti :

Codice:
File: /live/persistence/TailsData_unlocked/live-additional-software.conf

florence
dnscrypt-proxy





                                              [ Lette 2 righe ]
^G Guida     ^O Salva     ^W Cerca     ^K Taglia    ^J Giustifica^C Posizione
^X Esci      ^R Inserisci ^\ Sostituisc^U Incolla   ^T Ortografia^_ Vai a riga



Poi ho aperto il file per la configurazione ma è vuoto

Codice:
sudo nano /etc/dnscrypt-proxy.conf

Infine ho provato gli ip su dnsleaktest.com/ ma sono sempre quelli di tiscali, forse ho sbagliato qualcosa ?
prendi il sample che mi avevi linkato all'inizio e che trovi alla pagina github della configurazione (quella che avevi tradotto) ed edita la famosa riga 16.
senza quello è normale che i dns siano quelli di Tiscali.
 
prendi il sample che mi avevi linkato all'inizio e che trovi alla pagina github della configurazione (quella che avevi tradotto) ed edita la famosa riga 16.
senza quello è normale che i dns siano quelli di Tiscali.

Ciao, scusami non avevo capito, dunque è proprio il sample che devo editare, pensavo che il sample era solo un esempio, credevo che il programma avesse una sua configurazione di base.

Quindi incollo tutto il sample con la riga 16 modificata ?

https://raw.githubusercontent.com/jedisct1/dnscrypt-proxy/master/dnscrypt-proxy.conf

Mi dicevi che forse non è la riga 16 e che di default c'è la parola random.

La parte dove andrò a sostituire la riga mi pare sia questa :

Codice:
ResolverName random

## Full path to the list of available DNSCrypt resolvers (dnscrypt-resolvers.csv)
## An up-to-date list is available here:
## https://download.dnscrypt.org/dnscrypt-proxy/dnscrypt-resolvers.csv
## and the dnscrypt-update-resolvers.sh script can be used in order to
## automatically download and verify updates.
# ResolversList /usr/local/share/dnscrypt-proxy/dnscrypt-resolvers.csv

Mi dicevi che è la prima opzione che vedo ad inizio file, dunque la riga è questa ?

Codice:
## Full path to the list of available DNSCrypt resolvers (dnscrypt-resolvers.csv)

Che andrò a sostituire così :

Codice:
## ResolverName dnscrypt.eu-nl
 
copia e incolla questo. ho già sostituito la riga

Codice:
######################################################
#                                                    #
#    Sample configuration file for dnscrypt-proxy    #
#                                                    #
######################################################


############## Resolver settings ##############

## [CHANGE THIS] Short name of the resolver to use
## Usually the only thing you need to change in this configuration file.
## This corresponds to the first column in the dnscrypt-resolvers.csv file.
## Alternatively, "random" (without quotes) picks a random random resolver
## accessible over IPv4, that doesn't log and supports DNSSEC.

ResolverName dnscrypt.eu-nl


## Full path to the list of available DNSCrypt resolvers (dnscrypt-resolvers.csv)
## An up-to-date list is available here:
## https://download.dnscrypt.org/dnscrypt-proxy/dnscrypt-resolvers.csv
## and the dnscrypt-update-resolvers.sh script can be used in order to
## automatically download and verify updates.

# ResolversList /usr/local/share/dnscrypt-proxy/dnscrypt-resolvers.csv


## Manual settings, only for a custom resolver not present in the CSV file

# ProviderName    2.dnscrypt.resolver.example
# ProviderKey     E801:B84E:A606:BFB0:BAC0:CE43:445B:B15E:BA64:B02F:A3C4:AA31:AE10:636A:0790:324D
# ResolverAddress 203.0.113.1:443



############## Process options ##############

## [NOT AVAILABLE ON WINDOWS] Run the proxy as a background process.
## Unless you are using systemd, you probably want to change this to "yes"
## after having verified that the rest of the configuration works as expected.

Daemonize no


## Write the PID number to a file
## If "User" is defined, having a PID file will spawn an additional,
## minimal process, whose sole purpose is to delete the PID file
## after the main process exits.

# PidFile /var/run/dnscrypt-proxy.pid


## [NOT AVAILABLE ON WINDOWS] Start the process, bind the required ports, and
## run the server as a less-privileged system user.
## The value for this parameter is a user name.

# User _dnscrypt-proxy



############## Network/protocol settings ##############

## Local address and port to listen to.
## A 127.0.0.x address is recommended for local use, but 0.0.0.0 or
## a specific interface address can be used on a router, or to
## configure a single machine to act as a DNS proxy for different
## devices.
## If the socket is created by systemd, the proxy cannot change the address
## using this option. You should edit systemd's dnscrypt-proxy.socket file
## instead.

# LocalAddress 127.0.0.1:53


## Cache DNS responses to avoid outgoing traffic when the same queries
## are repeated multiple times in a row.

LocalCache on


## Creates a new key pair for every query.
## This prevents logging servers from correlating client public keys with
## IP addresses. However, this option implies extra CPU load, and is not
## very useful with trusted/non-logging servers.

EphemeralKeys off


## Maximum number of active requests waiting for a response.
## Keep it reasonable relative to the expected number of clients.

# MaxActiveRequests 250


## This is the maximum payload size allowed when using the UDP protocol.
## The default is safe, and rarely needs to be changed.

# EDNSPayloadSize 1252


## Ignore the time stamps when checking the certificates
## Do not enable this option ever, unless you know that you need it.

# IgnoreTimestamps no


## Do not send queries using UDP. Only use TCP.
## Even if some resolvers mitigate this, DNS over TCP is almost always slower
## than UDP and doesn't offer additional security.
## Only enable this option if UDP doesn't work on your network.

# TCPOnly no


############## Logging ##############

## Log the received DNS queries to a file, so you can watch in real-time what
## is happening on the network.
## The value for this parameter is a full path to the log file.
## The file name can be prefixed with ltsv: in order to store logs using the
## LTSV format (ex: ltsv:/tmp/dns-queries.log).

# QueryLogFile /tmp/dns-queries.log


## Log file to write server errors and information to.
## If you use this tool for privacy, keeping logs of any kind is usually not
## a good idea.

# LogFile /var/log/dnscrypt-proxy.log


## Don't log events with priority above this log level after the service has
## been started up. Default is 6.
## Valid values are between 0 (critical) to 7 (debug-level messages).

# LogLevel 6


## [NOT AVAILABLE ON WINDOWS] Send server logs to the syslog daemon
## Log entries can optionally be prefixed with a string.

# Syslog       off
# SyslogPrefix dnscrypt



############## Local filtering ##############

## If your network doesn't support IPv6, chances are that your
## applications are still constantly trying to resolve IPv6 addresses,
## causing unnecessary slowdowns.
## This causes the proxy to immediately reply to IPv6 requests,
## without having to send a useless request to upstream resolvers, and
## having to wait for a response.
## This uses a plugin that requires dnscrypt-proxy to be compiled with
## the ldns library.

BlockIPv6 no


## Want to filter ads, malware, sensitive or inappropriate websites and
## domain names? This feature can block lists of IP addresses and names
## matching a list of patterns. The list of rules remains private, and
## the filtering process directly happens on your own network. In order
## to filter IP addresses, the list of IPs has to be put into a text
## file, with one IP address per line. Lists of domain names can also be
## blocked as well. Put the list into a text file, one domain per line.
## Domains can include wildcards (*) in order to match patterns. For
## example *sex* will match any name that contains the sex substring, and
## ads.* will match anything starting with ads. The Internet has plenty
## of free feeds of IP addresses and domain names used for malware,
## phishing and spam that you can use with this feature.
##
## This uses a plugin that requires dnscrypt-proxy to be compiled with
## the ldns library.
##
## To enable, uncomment one of the following definitions:

## Block query names matching the rules stored in that file:
# BlackList domains:"/etc/dnscrypt-blacklist-domains.txt"

## Block responses whose IP addresses match IPs stored in that file:
# BlackList ips:"/etc/dnscrypt-blacklist-ips.txt"

## Block both domain names and IP addresses:
# BlackList domains:"/etc/dnscrypt-blacklist-domains.txt" ips:"/etc/dnscrypt-blacklist-ips.txt"

## Same as the above + log the blocked queries in a file.
## The log file can be prefixed with ltsv: (ex: ltsv:/tmp/log.txt) in order to
## store logs using the LTSV format.
# BlackList domains:"/etc/dnscrypt-blacklist-domains.txt" logfile:"/var/log/dnscrypt-blocked.log"
# BlackList ips:"/etc/dnscrypt-blacklist-ips.txt" logfile:"/var/log/dnscrypt-blocked.log"
# BlackList domains:"/etc/dnscrypt-blacklist-domains.txt" ips:"/etc/dnscrypt-blacklist-ips.txt" logfile:"/var/log/dnscrypt-blocked.log"


############## Forwarding ##############

## Forward queries for specific zones to one or more non-DNSCrypt resolvers.
## For instance, this can be used to redirect queries for local domains to
## the router, or queries for an internal domain to an internal DNS server.
## Multiple whitespace-delimited zones and IP addresses can be specified.
## Do not enable this unless you absolutely know you need it.
## If you see useless queries to these zones, you'd better block them with
## the BlackList feature instead of sending them in clear text to the router.
## This uses a plugin that requires dnscrypt-proxy to be compiled with
## the ldns library.

# Forward domains:"test private localdomain lan" to:"192.168.100.254"


############## User identification ##############

## Use a client public key for identification
## By default, the client uses a randomized key pair in order to make tracking
## more difficult. This option does the opposite and uses a static key pair, so
## that DNS providers can offer premium services to queries signed with a known
## set of public keys. A client cannot decrypt the received responses without
## also knowing the secret key.
## The value for this property is the path to a file containing the secret key,
## encoded as a hexadecimal string. The corresponding public key is computed
## automatically.

# ClientKey /etc/dnscrypt-client-secret.key



############## Monitoring ##############

## Do not actually start the proxy, but check that a valid certificate can be
## retrieved from the server and that it will remain valid for the specified
## time period. The process exit code is 0 if a valid certificate can be used,
## 2 if no valid certificates can be used, 3 if a timeout occurred, and 4 if a
## currently valid certificate is going to expire before the given margin.
## Useful in a cron job to monitor your own dnscrypt-servers.
## The margin is specified in minutes.

# Test 2880



############## Recursive configuration ##############

## A configuration file can include other configuration files by inserting
## the `Include` directive anywhere (the full path required, no quotes):

# Include /etc/dnscrypt-proxy-common.conf
 
copia e incolla questo. ho già sostituito la riga

Codice:
######################################################
#                                                    #
#    Sample configuration file for dnscrypt-proxy    #
#                                                    #
######################################################


############## Resolver settings ##############

## [CHANGE THIS] Short name of the resolver to use
## Usually the only thing you need to change in this configuration file.
## This corresponds to the first column in the dnscrypt-resolvers.csv file.
## Alternatively, "random" (without quotes) picks a random random resolver
## accessible over IPv4, that doesn't log and supports DNSSEC.

ResolverName dnscrypt.eu-nl


## Full path to the list of available DNSCrypt resolvers (dnscrypt-resolvers.csv)
## An up-to-date list is available here:
## https://download.dnscrypt.org/dnscrypt-proxy/dnscrypt-resolvers.csv
## and the dnscrypt-update-resolvers.sh script can be used in order to
## automatically download and verify updates.

# ResolversList /usr/local/share/dnscrypt-proxy/dnscrypt-resolvers.csv


## Manual settings, only for a custom resolver not present in the CSV file

# ProviderName    2.dnscrypt.resolver.example
# ProviderKey     E801:B84E:A606:BFB0:BAC0:CE43:445B:B15E:BA64:B02F:A3C4:AA31:AE10:636A:0790:324D
# ResolverAddress 203.0.113.1:443



############## Process options ##############

## [NOT AVAILABLE ON WINDOWS] Run the proxy as a background process.
## Unless you are using systemd, you probably want to change this to "yes"
## after having verified that the rest of the configuration works as expected.

Daemonize no


## Write the PID number to a file
## If "User" is defined, having a PID file will spawn an additional,
## minimal process, whose sole purpose is to delete the PID file
## after the main process exits.

# PidFile /var/run/dnscrypt-proxy.pid


## [NOT AVAILABLE ON WINDOWS] Start the process, bind the required ports, and
## run the server as a less-privileged system user.
## The value for this parameter is a user name.

# User _dnscrypt-proxy



############## Network/protocol settings ##############

## Local address and port to listen to.
## A 127.0.0.x address is recommended for local use, but 0.0.0.0 or
## a specific interface address can be used on a router, or to
## configure a single machine to act as a DNS proxy for different
## devices.
## If the socket is created by systemd, the proxy cannot change the address
## using this option. You should edit systemd's dnscrypt-proxy.socket file
## instead.

# LocalAddress 127.0.0.1:53


## Cache DNS responses to avoid outgoing traffic when the same queries
## are repeated multiple times in a row.

LocalCache on


## Creates a new key pair for every query.
## This prevents logging servers from correlating client public keys with
## IP addresses. However, this option implies extra CPU load, and is not
## very useful with trusted/non-logging servers.

EphemeralKeys off


## Maximum number of active requests waiting for a response.
## Keep it reasonable relative to the expected number of clients.

# MaxActiveRequests 250


## This is the maximum payload size allowed when using the UDP protocol.
## The default is safe, and rarely needs to be changed.

# EDNSPayloadSize 1252


## Ignore the time stamps when checking the certificates
## Do not enable this option ever, unless you know that you need it.

# IgnoreTimestamps no


## Do not send queries using UDP. Only use TCP.
## Even if some resolvers mitigate this, DNS over TCP is almost always slower
## than UDP and doesn't offer additional security.
## Only enable this option if UDP doesn't work on your network.

# TCPOnly no


############## Logging ##############

## Log the received DNS queries to a file, so you can watch in real-time what
## is happening on the network.
## The value for this parameter is a full path to the log file.
## The file name can be prefixed with ltsv: in order to store logs using the
## LTSV format (ex: ltsv:/tmp/dns-queries.log).

# QueryLogFile /tmp/dns-queries.log


## Log file to write server errors and information to.
## If you use this tool for privacy, keeping logs of any kind is usually not
## a good idea.

# LogFile /var/log/dnscrypt-proxy.log


## Don't log events with priority above this log level after the service has
## been started up. Default is 6.
## Valid values are between 0 (critical) to 7 (debug-level messages).

# LogLevel 6


## [NOT AVAILABLE ON WINDOWS] Send server logs to the syslog daemon
## Log entries can optionally be prefixed with a string.

# Syslog       off
# SyslogPrefix dnscrypt



############## Local filtering ##############

## If your network doesn't support IPv6, chances are that your
## applications are still constantly trying to resolve IPv6 addresses,
## causing unnecessary slowdowns.
## This causes the proxy to immediately reply to IPv6 requests,
## without having to send a useless request to upstream resolvers, and
## having to wait for a response.
## This uses a plugin that requires dnscrypt-proxy to be compiled with
## the ldns library.

BlockIPv6 no


## Want to filter ads, malware, sensitive or inappropriate websites and
## domain names? This feature can block lists of IP addresses and names
## matching a list of patterns. The list of rules remains private, and
## the filtering process directly happens on your own network. In order
## to filter IP addresses, the list of IPs has to be put into a text
## file, with one IP address per line. Lists of domain names can also be
## blocked as well. Put the list into a text file, one domain per line.
## Domains can include wildcards (*) in order to match patterns. For
## example *sex* will match any name that contains the sex substring, and
## ads.* will match anything starting with ads. The Internet has plenty
## of free feeds of IP addresses and domain names used for malware,
## phishing and spam that you can use with this feature.
##
## This uses a plugin that requires dnscrypt-proxy to be compiled with
## the ldns library.
##
## To enable, uncomment one of the following definitions:

## Block query names matching the rules stored in that file:
# BlackList domains:"/etc/dnscrypt-blacklist-domains.txt"

## Block responses whose IP addresses match IPs stored in that file:
# BlackList ips:"/etc/dnscrypt-blacklist-ips.txt"

## Block both domain names and IP addresses:
# BlackList domains:"/etc/dnscrypt-blacklist-domains.txt" ips:"/etc/dnscrypt-blacklist-ips.txt"

## Same as the above + log the blocked queries in a file.
## The log file can be prefixed with ltsv: (ex: ltsv:/tmp/log.txt) in order to
## store logs using the LTSV format.
# BlackList domains:"/etc/dnscrypt-blacklist-domains.txt" logfile:"/var/log/dnscrypt-blocked.log"
# BlackList ips:"/etc/dnscrypt-blacklist-ips.txt" logfile:"/var/log/dnscrypt-blocked.log"
# BlackList domains:"/etc/dnscrypt-blacklist-domains.txt" ips:"/etc/dnscrypt-blacklist-ips.txt" logfile:"/var/log/dnscrypt-blocked.log"


############## Forwarding ##############

## Forward queries for specific zones to one or more non-DNSCrypt resolvers.
## For instance, this can be used to redirect queries for local domains to
## the router, or queries for an internal domain to an internal DNS server.
## Multiple whitespace-delimited zones and IP addresses can be specified.
## Do not enable this unless you absolutely know you need it.
## If you see useless queries to these zones, you'd better block them with
## the BlackList feature instead of sending them in clear text to the router.
## This uses a plugin that requires dnscrypt-proxy to be compiled with
## the ldns library.

# Forward domains:"test private localdomain lan" to:"192.168.100.254"


############## User identification ##############

## Use a client public key for identification
## By default, the client uses a randomized key pair in order to make tracking
## more difficult. This option does the opposite and uses a static key pair, so
## that DNS providers can offer premium services to queries signed with a known
## set of public keys. A client cannot decrypt the received responses without
## also knowing the secret key.
## The value for this property is the path to a file containing the secret key,
## encoded as a hexadecimal string. The corresponding public key is computed
## automatically.

# ClientKey /etc/dnscrypt-client-secret.key



############## Monitoring ##############

## Do not actually start the proxy, but check that a valid certificate can be
## retrieved from the server and that it will remain valid for the specified
## time period. The process exit code is 0 if a valid certificate can be used,
## 2 if no valid certificates can be used, 3 if a timeout occurred, and 4 if a
## currently valid certificate is going to expire before the given margin.
## Useful in a cron job to monitor your own dnscrypt-servers.
## The margin is specified in minutes.

# Test 2880



############## Recursive configuration ##############

## A configuration file can include other configuration files by inserting
## the `Include` directive anywhere (the full path required, no quotes):

# Include /etc/dnscrypt-proxy-common.conf

Perfetto, grazie infinite, adesso lo faccio subito.
 
copia e incolla questo. ho già sostituito la riga

Codice:
######################################################
#                                                    #
#    Sample configuration file for dnscrypt-proxy    #
#                                                    #
######################################################


############## Resolver settings ##############

## [CHANGE THIS] Short name of the resolver to use
## Usually the only thing you need to change in this configuration file.
## This corresponds to the first column in the dnscrypt-resolvers.csv file.
## Alternatively, "random" (without quotes) picks a random random resolver
## accessible over IPv4, that doesn't log and supports DNSSEC.

ResolverName dnscrypt.eu-nl


## Full path to the list of available DNSCrypt resolvers (dnscrypt-resolvers.csv)
## An up-to-date list is available here:
## https://download.dnscrypt.org/dnscrypt-proxy/dnscrypt-resolvers.csv
## and the dnscrypt-update-resolvers.sh script can be used in order to
## automatically download and verify updates.

# ResolversList /usr/local/share/dnscrypt-proxy/dnscrypt-resolvers.csv


## Manual settings, only for a custom resolver not present in the CSV file

# ProviderName    2.dnscrypt.resolver.example
# ProviderKey     E801:B84E:A606:BFB0:BAC0:CE43:445B:B15E:BA64:B02F:A3C4:AA31:AE10:636A:0790:324D
# ResolverAddress 203.0.113.1:443



############## Process options ##############

## [NOT AVAILABLE ON WINDOWS] Run the proxy as a background process.
## Unless you are using systemd, you probably want to change this to "yes"
## after having verified that the rest of the configuration works as expected.

Daemonize no


## Write the PID number to a file
## If "User" is defined, having a PID file will spawn an additional,
## minimal process, whose sole purpose is to delete the PID file
## after the main process exits.

# PidFile /var/run/dnscrypt-proxy.pid


## [NOT AVAILABLE ON WINDOWS] Start the process, bind the required ports, and
## run the server as a less-privileged system user.
## The value for this parameter is a user name.

# User _dnscrypt-proxy



############## Network/protocol settings ##############

## Local address and port to listen to.
## A 127.0.0.x address is recommended for local use, but 0.0.0.0 or
## a specific interface address can be used on a router, or to
## configure a single machine to act as a DNS proxy for different
## devices.
## If the socket is created by systemd, the proxy cannot change the address
## using this option. You should edit systemd's dnscrypt-proxy.socket file
## instead.

# LocalAddress 127.0.0.1:53


## Cache DNS responses to avoid outgoing traffic when the same queries
## are repeated multiple times in a row.

LocalCache on


## Creates a new key pair for every query.
## This prevents logging servers from correlating client public keys with
## IP addresses. However, this option implies extra CPU load, and is not
## very useful with trusted/non-logging servers.

EphemeralKeys off


## Maximum number of active requests waiting for a response.
## Keep it reasonable relative to the expected number of clients.

# MaxActiveRequests 250


## This is the maximum payload size allowed when using the UDP protocol.
## The default is safe, and rarely needs to be changed.

# EDNSPayloadSize 1252


## Ignore the time stamps when checking the certificates
## Do not enable this option ever, unless you know that you need it.

# IgnoreTimestamps no


## Do not send queries using UDP. Only use TCP.
## Even if some resolvers mitigate this, DNS over TCP is almost always slower
## than UDP and doesn't offer additional security.
## Only enable this option if UDP doesn't work on your network.

# TCPOnly no


############## Logging ##############

## Log the received DNS queries to a file, so you can watch in real-time what
## is happening on the network.
## The value for this parameter is a full path to the log file.
## The file name can be prefixed with ltsv: in order to store logs using the
## LTSV format (ex: ltsv:/tmp/dns-queries.log).

# QueryLogFile /tmp/dns-queries.log


## Log file to write server errors and information to.
## If you use this tool for privacy, keeping logs of any kind is usually not
## a good idea.

# LogFile /var/log/dnscrypt-proxy.log


## Don't log events with priority above this log level after the service has
## been started up. Default is 6.
## Valid values are between 0 (critical) to 7 (debug-level messages).

# LogLevel 6


## [NOT AVAILABLE ON WINDOWS] Send server logs to the syslog daemon
## Log entries can optionally be prefixed with a string.

# Syslog       off
# SyslogPrefix dnscrypt



############## Local filtering ##############

## If your network doesn't support IPv6, chances are that your
## applications are still constantly trying to resolve IPv6 addresses,
## causing unnecessary slowdowns.
## This causes the proxy to immediately reply to IPv6 requests,
## without having to send a useless request to upstream resolvers, and
## having to wait for a response.
## This uses a plugin that requires dnscrypt-proxy to be compiled with
## the ldns library.

BlockIPv6 no


## Want to filter ads, malware, sensitive or inappropriate websites and
## domain names? This feature can block lists of IP addresses and names
## matching a list of patterns. The list of rules remains private, and
## the filtering process directly happens on your own network. In order
## to filter IP addresses, the list of IPs has to be put into a text
## file, with one IP address per line. Lists of domain names can also be
## blocked as well. Put the list into a text file, one domain per line.
## Domains can include wildcards (*) in order to match patterns. For
## example *sex* will match any name that contains the sex substring, and
## ads.* will match anything starting with ads. The Internet has plenty
## of free feeds of IP addresses and domain names used for malware,
## phishing and spam that you can use with this feature.
##
## This uses a plugin that requires dnscrypt-proxy to be compiled with
## the ldns library.
##
## To enable, uncomment one of the following definitions:

## Block query names matching the rules stored in that file:
# BlackList domains:"/etc/dnscrypt-blacklist-domains.txt"

## Block responses whose IP addresses match IPs stored in that file:
# BlackList ips:"/etc/dnscrypt-blacklist-ips.txt"

## Block both domain names and IP addresses:
# BlackList domains:"/etc/dnscrypt-blacklist-domains.txt" ips:"/etc/dnscrypt-blacklist-ips.txt"

## Same as the above + log the blocked queries in a file.
## The log file can be prefixed with ltsv: (ex: ltsv:/tmp/log.txt) in order to
## store logs using the LTSV format.
# BlackList domains:"/etc/dnscrypt-blacklist-domains.txt" logfile:"/var/log/dnscrypt-blocked.log"
# BlackList ips:"/etc/dnscrypt-blacklist-ips.txt" logfile:"/var/log/dnscrypt-blocked.log"
# BlackList domains:"/etc/dnscrypt-blacklist-domains.txt" ips:"/etc/dnscrypt-blacklist-ips.txt" logfile:"/var/log/dnscrypt-blocked.log"


############## Forwarding ##############

## Forward queries for specific zones to one or more non-DNSCrypt resolvers.
## For instance, this can be used to redirect queries for local domains to
## the router, or queries for an internal domain to an internal DNS server.
## Multiple whitespace-delimited zones and IP addresses can be specified.
## Do not enable this unless you absolutely know you need it.
## If you see useless queries to these zones, you'd better block them with
## the BlackList feature instead of sending them in clear text to the router.
## This uses a plugin that requires dnscrypt-proxy to be compiled with
## the ldns library.

# Forward domains:"test private localdomain lan" to:"192.168.100.254"


############## User identification ##############

## Use a client public key for identification
## By default, the client uses a randomized key pair in order to make tracking
## more difficult. This option does the opposite and uses a static key pair, so
## that DNS providers can offer premium services to queries signed with a known
## set of public keys. A client cannot decrypt the received responses without
## also knowing the secret key.
## The value for this property is the path to a file containing the secret key,
## encoded as a hexadecimal string. The corresponding public key is computed
## automatically.

# ClientKey /etc/dnscrypt-client-secret.key



############## Monitoring ##############

## Do not actually start the proxy, but check that a valid certificate can be
## retrieved from the server and that it will remain valid for the specified
## time period. The process exit code is 0 if a valid certificate can be used,
## 2 if no valid certificates can be used, 3 if a timeout occurred, and 4 if a
## currently valid certificate is going to expire before the given margin.
## Useful in a cron job to monitor your own dnscrypt-servers.
## The margin is specified in minutes.

# Test 2880



############## Recursive configuration ##############

## A configuration file can include other configuration files by inserting
## the `Include` directive anywhere (the full path required, no quotes):

# Include /etc/dnscrypt-proxy-common.conf

Niente da fare purtroppo, ho copiato il testo e al riavvio ho il file vuoto, provo a copiare il file in etc nella cartella persistente ?
 
prova e vedi se viene linkato. ho come il sospetto che ci sia qualcosa di sbagliato nella procedura

Ora sono su tails, dopo aver copiato il file nella cartella etc del volume persistente ho riavviato, purtroppo mi segna ancora gli ip di tiscali, comunque se apro il file con il comando sudo nano /etc/dnscrypt-proxy.conf il testo che ho copiato è rimasto, prima che non ho copiato il file il testo non è stato memorizzato. E possibile che il sistema questi file non li legge ? Per linkato non ho capito esattamente dove devo controllare.
 
Ora sono su tails, dopo aver copiato il file nella cartella etc del volume persistente ho riavviato, purtroppo mi segna ancora gli ip di tiscali, comunque se apro il file con il comando sudo nano /etc/dnscrypt-proxy.conf il testo che ho copiato è rimasto, prima che non ho copiato il file il testo non è stato memorizzato. E possibile che il sistema questi file non li legge ? Per linkato non ho capito esattamente dove devo controllare.
okay, allora la persistenza funziona :luxhello:

potrebbe essere, sinceramente a questo punto non saprei
 
okay, allora la persistenza funziona :luxhello:

potrebbe essere, sinceramente a questo punto non saprei

Esiste un modo per verificare se il sistema sta leggendo gli ip che abbiamo inserito ? Per dnscrypt-proxy non esiste una gui per controllare se il software sta funzionando ? Il browser dovrebbe prendere gli indirizzi ip in automatico, ho l'impressione che questo file non venga letto dal sistema. Ovviamente tutta questa configurazione mi dicevi che la usi su archlinux, su un sistema normale ovviamente non ci sono questi problemi.

Ho pensato che magari ci sia qualcosa da aggiungere qui :

Codice:
sudo nano /live/persistence/TailsData_unlocked/persistence.conf          


/home/amnesia/Persistent        source=Persistent
/home/amnesia/.gnupg    source=gnupg
/home/amnesia/.ssh      source=openssh-client
/home/amnesia/.purple   source=pidgin
/home/amnesia/.thunderbird      source=thunderbird
/home/amnesia/.gnome2/keyrings  source=gnome-keyrings
/etc/NetworkManager/system-connections  source=nm-system-connections
/home/amnesia/.mozilla/firefox/bookmarks        source=bookmarks
/etc/cups       source=cups-configuration
/home/amnesia/.electrum source=electrum
/var/cache/apt/archives source=apt/cache
/var/lib/apt/lists      source=apt/lists
/home/amnesia   source=dotfiles,link
/etc    source=etc,link
 
Ultima modifica:
Esiste un modo per verificare se il sistema sta leggendo gli ip che abbiamo inserito ? Per dnscrypt-proxy non esiste una gui per controllare se il software sta funzionando ? Il browser dovrebbe prendere gli indirizzi ip in automatico, ho l'impressione che questo file non venga letto dal sistema. Ovviamente tutta questa configurazione mi dicevi che la usi su archlinux, su un sistema normale ovviamente non ci sono questi problemi.

Ho pensato che magari ci sia qualcosa da aggiungere qui :

Codice:
sudo nano /live/persistence/TailsData_unlocked/persistence.conf          


/home/amnesia/Persistent        source=Persistent
/home/amnesia/.gnupg    source=gnupg
/home/amnesia/.ssh      source=openssh-client
/home/amnesia/.purple   source=pidgin
/home/amnesia/.thunderbird      source=thunderbird
/home/amnesia/.gnome2/keyrings  source=gnome-keyrings
/etc/NetworkManager/system-connections  source=nm-system-connections
/home/amnesia/.mozilla/firefox/bookmarks        source=bookmarks
/etc/cups       source=cups-configuration
/home/amnesia/.electrum source=electrum
/var/cache/apt/archives source=apt/cache
/var/lib/apt/lists      source=apt/lists
/home/amnesia   source=dotfiles,link
/etc    source=etc,link
dnsleaktest serve proprio a quello

su linux? non saprei, ma si configura in quel modo, te lo assicuro


anyway, non so come risolvere. bisogna cercare online, solo che sono bloccato a letto con febbre e altro... :/
 
dnsleaktest serve proprio a quello

su linux? non saprei, ma si configura in quel modo, te lo assicuro


anyway, non so come risolvere. bisogna cercare online, solo che sono bloccato a letto con febbre e altro... :/

Ciao, si ho visto che su linux non esiste una gui per dnscrypt, non mi riferivo alla configurazione di dnscrypt, pensavo che forse occorre impostare qualcosa sulla scheda di rete di tails ? in modo che tails utilizzi i dns che abbiamo impostato, forse non li vede in automatico.

Guardavo anche questi tutorial per ubuntu :


Volevo chiederti se la configurazione in questione la posso provare su ubuntu ? Tu la usi su arch linux ?

Grazie per tutto l'aiuto, fammi sapere quando ti passa la febbre così se scopri qualcosa se vuoi facciamo qualche altro tentativo, per completare la guida volevo installare anche la vpn, ma se non si risolve il resto è inutile.
 
Ultima modifica:
Ciao, si ho visto che su linux non esiste una gui per dnscrypt, non mi riferivo alla configutazione di dnscrypt, pensavo che forse occorre impostare qualcosa sulla scheda di rete di tails ? in modo che tails utilizzi i dns che abbiamo impostato, forse non li vede in automatico.

Guardavo anche questi tutorial per ubuntu :


Volevo chiederti se la configurazione in questione la posso provare su ubuntu ? Tu la usi su arch linux ?

Grazie per tutto l'aiuto, fammi sapere quando ti passa la febbre così se scopri qualcosa se vuoi facciamo qualche altro tentativo, per completare la guida volevo installare anche la vpn, ma se non si risolve il resto è inutile.
certo che puoi, tails non è altro che una debian. io uso arch ma su Ubuntu la procedura è la stessa. puoi seguire tutto quello che ti ho già scritto e installare anche tor per la navigazione in totale anonimato e per l'accesso al web non indicizzato
 
certo che puoi, tails non è altro che una debian. io uso arch ma su Ubuntu la procedura è la stessa. puoi seguire tutto quello che ti ho già scritto e installare anche tor per la navigazione in totale anonimato e per l'accesso al web non indicizzato

Perfetto, grazie mille, allora domani con calma provo, si è solo per testare la configurazione, per me la cosa importante è riuscire ad' eseguire la procedura, riguardo ubuntu purtroppo non è un sistema progettato per l'anonimato, poi non essendo in live sono sempre a rischio diciamo, pensavo anche di installare subgraph : https://subgraph.com/, ho visto che esiste anche questa live pensata per l’indagine forense: https://www.caine-live.net/
 
Ultima modifica:
Uno degli Admin di questo foro ha scritto un ottimo libro riguardo l' anonimato (Hacklog. Manuale sulla sicurezza informatica) e relative impostazioni, programmi da usare, come usarli, accorgimenti vari... proprio per Tails.
Se non sbaglio nei vari post di questo topic ti è stato indicato anche il foro dove trovare tutto il malloppone. Tutto questo per dire che magari un' infarinatura prima di mettersi alla guida...
 
Pubblicità
Pubblicità
Indietro
Top