![]() ![]() Once that’s completed, restart your system by executing: Now let’s lock the nf file to connect through DNSCrypt permanently, even after reboots, do that by executing:ĭue a system protection, the next command line is available here: Sed -i "s|127.0.2.1|0.0.0.0|g" /lib/systemd/system/dnscrypt-proxy.socket cat /lib/systemd/system/dnscrypt-proxy.socket Let’s force DNSCrypt to be available on all network interfaces by executing: Thanks Web Horizon for providing reliable VPS instances, get yours here.Īfter upgrading your OS installation, install DNSCrypt and some additional utilities by executing this command line:Īpt install dnscrypt-proxy dnsutils jq wget nano -yīy default, DNSCrypt use the local IP address: 127.0.2.1 to pass-through all the web traffic from the ethernet network interface. I’ll be using a KVM-based instance that runs an up-to-date Debian Bullseye (11) installation. The following post will quickly explain how to setup your own DNSCrypt server and take advantages from Adguard to block ads at a DNS level. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |