Last active
October 1, 2016 04:24
-
-
Save kitsuyui/bffd1e2c7081fa82b25c444b7214bf33 to your computer and use it in GitHub Desktop.
Homebrew で DNSCrypt を試してみる ref: http://qiita.com/kitsuyui/items/a75b45735a20a15c954a
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ brew install dnscrypt-proxy --with-plugins |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ sudo brew services restart dnscrypt-proxy |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ sudo tcpdump -i en0 'port 53' | |
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode | |
listening on en0, link-type EN10MB (Ethernet), capture size xxxxxx bytes | |
(略。キャプチャした結果がでる) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ nslookup example.com | |
Server: XXX.XXX.XXX.XXX | |
Address: XXX.XXX.XXX.XXX#53 | |
Non-authoritative answer: | |
Name: example.com | |
Address: 93.184.216.34 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ sudo killall -HUP mDNSResponder |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ sudo tcpdump -i en0 'port 53' | |
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode | |
listening on en0, link-type EN10MB (Ethernet), capture size ?????? bytes | |
HH:MM:SS.ssssss IP XXX.XXX.XXX.XXX.AAAAA > YYY.YYY.YYY.YYY.domain: ?????+ A? example.com. (29) | |
HH:MM:SS.ssssss IP YYY.YYY.YYY.YYY.domain > XXX.XXX.XXX.XXX.AAAAA: ????? 1/2/4 A 93.184.216.34 (181) | |
HH:MM:SS.ssssss IP XXX.XXX.XXX.XXX.BBBBB > YYY.YYY.YYY.YYY.domain: ?????+ PTR? XXX.XXX.XXX.XXX.in-addr.arpa. (44) | |
HH:MM:SS.ssssss IP YYY.YYY.YYY.YYY.domain > XXX.XXX.XXX.XXX.BBBBB: ????? NXDomain* 0/1/0 (100) | |
HH:MM:SS.ssssss IP XXX.XXX.XXX.XXX.CCCCC > YYY.YYY.YYY.YYY.domain: ?????+ PTR? YYY.YYY.YYY.YYY.in-addr.arpa. (42) | |
HH:MM:SS.ssssss IP YYY.YYY.YYY.YYY.domain > XXX.XXX.XXX.XXX.CCCCC: ????? NXDomain* 0/1/0 (98) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment