DnsSafeguard is a fast and secure DNS client written in Rust, designed to intercept DNS queries over a UDP socket and Dns over HTTPS (DoH) to securely transmit them to a DNS server using DNS over HTTPS/TLS/QUIC (DoH/DoT/DoQ) protocols. By leveraging TLS client hello fragmentation and UDP Noise, it successfully bypasses the Great Firewall (GFW) censorship.
This crate uses #![forbid(unsafe_code)]
to ensure everything is implemented in 100% safe Rust.
- Secure Communication: Utilizes Rustls for encrypted communication (TLS) with DNS servers.
- UDP Socket: Captures DNS queries on a UDP socket for efficient handling.
- DoH Protocol: Transmits DNS queries using the DoH protocol, supporting HTTP versions (HTTP/1.1, H2, H3) to ensure enhanced privacy.
- DoT Protocol: Transmits DNS queries using the DoT protocol.
- DoQ Protocol: Transmits DNS queries using the DoQ protocol, providing highly secure and efficient communication, avoiding head-of-line blocking.
- Rules: Create rules for groups of domains and keywords to control DNS queries effectively.
- Overwrite: Overwrite IPs from DNS responses.
- Censorship Bypass: Implements TLS client hello fragmentation with four methods to evade GFW TLS censorship.
- Customizable UDP Noise: Implements 7 dynamic types of UDP Noise to bypass QUIC blocking.
- IPv6 Support
- HTTP/3 Support
- HTTP/2 Support
- HTTP/2 TLS Fragmentation
- HTTP/1.1 Multi-Connection
- DNS over TLS (DoT)
- UDP Noise Implementation
- Advanced Rules Management
- DNS over QUIC (DoQ) Support
- Local HTTP/1.1 and HTTP/2 DoH Server (POST + GET)
- Block DNS queries based on record type
- Respond to the DNS query with a static IP(V4 and V6)
- Owerwrite IPs from DNS responses
- Interface/Adapter binding
- POST Method (H2, H3)
- Logging
To build the project, execute the following command in the project directory:
cargo build --release
- Download the Latest Release:
- Visit the releases page and download the latest version of your DNS client.
- Extract the downloaded archive to a folder of your choice.
- Configure the
config.json
File:- Locate the
config.json
file in the extracted folder. - Open it using a text editor.
- Modify the necessary settings based on the instructions in the “Configuration File” section.
- Locate the
- Run the DNS Client:
- Execute the DNS client application (e.g., DnsSafeguard.exe).
- You should see log messages indicating that the client is attempting to establish a connection.
- Verify Connection Establishment:
- Keep an eye on the logs. When you see the message “Connection established,” it means the DNS client has successfully connected to the DNS server.
- Set Up Windows DNS:
- Go to your Windows network settings.
- Configure the DNS server address to match the IP address specified in the
config.json
file for theserve_addrs
section.
Follow the same steps as Windows except for step 5: open the /etc/resolv.conf
file and configure the DNS server address to match the IP address specified in the config.json
file for the serve_addrs
section. For example, if serve_addrs
value is 127.0.0.1
, then the content in /etc/resolv.conf
must be nameserver 127.0.0.1
.
The config.json
file is a crucial part of the DnsSafeguard application. It contains the necessary settings to control the behavior of the DNS client.
The configuration file is structured in JSON format and includes the following settings:
Log
:level
: Specifies the logging verbosity. Available options:off
,error
,warn
,info
,debug
,trace
.file
: Path to the log output file. Set to null to disable file logging and enable console output instead. Logging to both file and console simultaneously is not supported. You must choose one.
Protocol
: Specifies the protocol used for DNS queries.h1
: Single HTTP/1.1 Connection.h1_multi
: Multiple HTTP/1.1 Connection.h2
: HTTP/2 Connection.h3
: HTTP/3 Connection.dot
: DOT Connection (DNS over TLS).doq
: DoQ Connection (DNS over QUIC).
Server Name
: The domain name of the DNS server.IP As SNI
: When enabled, the server name is not used as SNI, which can be a good alternative to the fragmenting method. Some public DNS servers, like Google, support this. Supported protocols include H1, H2, DoT, and H1_multi.Disable Certificate Validation
: This option ignores certificate server name matching, enabling the use of domain fronting. For example, you can usewww.google.com
as the server name, which is not blocked by the Great Firewall (GFW). Many DNS servers, such as Google, Quad9, and NextDNS, support this option. However, Cloudflare does not, as it uses SNI guard. This is the best option for bypassing the GFW. Disable Fragmenting.Remote Addrs
: The IP address and port for the DNS server connection.Interface
: Name of the Interface/Adapter to bind to. Usenull
for default.Serve Addrs
: Local UDP address to listen for incoming DNS queries. Use[::]:53
to enable dual-stack support, but note that network changes may require an application restart. For most setups,127.0.0.1:53
is recommended.Custom Http Path
: Specify a custom HTTP path for HTTP-based protocols such as H1, H2, and H3. Usenull
for default which is the standard DoH path.- Examples:
/jsd3n5nb4/dns-query
,/user/d618995a10e74acec7ed454ac6e39d6eb/dns-query
. - Warning: Custom path must end with
/dns-query
.
- Examples:
Http Method
: Values areGET
andPOST
. GET is more compatible, it consumes more memory. POST, on the other hand, eliminates the need to encode DNS queries in base64url, resulting in lower memory usage. However, it requires two write system calls.Response Timeout
: How long to wait for http response for DoQ, H3 and H1.Connection Keep Alive
: Sends periodic keep-alive signals—such asGET /
(H2/H3), empty DNS headers (DoT), or empty buffers (DoQ)—at a specified interval in seconds to maintain connections with remote servers that may ignore standard HTTP/2 or QUIC keep-alives; set tonull
to disable.Native Tls
: Enables Native TLS using SChannel on Windows, Security.framework on macOS, and OpenSSL elsewhere; fragmenting is not supported. Compatible withh1
,h2
, anddot
.Fragmenting
: The fragmentation method to use during the TLS handshake. Fragmenting pageNoise
: UDP noise setting.ntype
: Noise type. Variants includedns
,str
,lsd
,tracker
,stun
,tftp
andrand
.Content
: Domain fordns
ntype. Text forstr
ntype.Packet Length
: Specifies the length of each noise packet in bytes forrand
ntype.Packets
: Indicates the total number of UDP noise packets to send forrand
ntype.Sleep
: Defines the sleep time (in milliseconds) after each UDP noise packet is sent.
Quic
: Configuration for QUIC protocol.Congestion Controller
: The congestion controller algorithm, options arebbr
,cubic
andnewreno
.Keep Alive Interval
: The interval in seconds to keep the connection alive.Datagram Receive Buffer Size
: Size of the receive buffer for datagrams. Usenull
for default.Datagram Send Buffer Size
: Size of the send buffer for datagrams. Usenull
for default.Connecting Timeout
: Specifies the maximum connection timeout duration in seconds.Packet Threshold
: Maximum reordering in packet number space before FACK style loss detection considers a packet lost. Should not be less than 3, per RFC5681.Max Idle Timeout
: Maximum duration in seconds of inactivity to accept before timing out the connection.null
represents an infinite timeout.
Connection
:H1 Multi Connections
: Number of connections for theh1 multi
protocol.Reconnect Sleep
: Duration to sleep before reconnecting (in seconds).
Tcp Socket Options
:Send Buffer Size
: The size (in bytes) of the socket's send buffer. Usenull
for default.Recv Buffer Size
: The size (in bytes) of the socket's receive buffer. Usenull
for default.Nodelay
: Disables Nagle's algorithm when set to true. This reduces latency for small packets. Usenull
for default.Keepalive
: keepalive enables TCP keepalive probes when set to true. Helps detect dead peers and maintain long-lived connections. Usenull
for default.
DoH Server
: Local DNS over HTTPS (HTTP/2) server for browsers.Listen Address
: The IP address and port of the local DoH server (e.g.,127.0.0.1:443
).ALPN
: Set up the HTTP version to serve. Supported variants areh2
andhttp/1.1
.Certificate
: Path to the certificate file (e.g.,/path/to/certificate.crt
).Key
: Path to the key file (e.g.,/path/to/key.key
).Cache Control
: cache control as response header.Response Timeout
: List of two durations (in seconds) specifying how long to wait for a response attempt.Log Errors
: Enable logging DoH sever errors.
Rules
: Block or bypass DNS queries containing specified domains or keywords. Rules Page.Overwrite
: Overwrite IPs from DNS responses. Overwrite Page.
This project is licensed under the Apache 2.0 License - see the LICENSE file for details.