GoChinaDNS is a DNS proxy, which smartly dispatches DNS questions to get nearest answers. This can be a drop-in replacement for ChinaDNS, with a better code implementation and several bugfixes.
Binaries for linux, windows and darwin (macOS) are available under Releases.
You will also need a list of IP ranges in China, such as @pexcn/chnroute.txt.
This project is written in Go. If you want to build it yourself, you need to install Go first.
git clone https://github.com/cherrot/gochinadns
cd gochinadns
go get -u ./...
cd cmd/chinadns
go build
Run:
./chinadns -p 5553 -c ./chnroute.txt -v
Test:
dig @::1 -p5553 google.com
./chinadns -p 5553 -c ./chnroute.txt -s 114.114.114.114,127.0.0.1:5353
In this example, 127.0.0.1:5353
is the trusted resolver and can be a local dns forwarder (e.g. dnscrypt-proxy
).
Note: you still need to make sure that your trusted upstream resolver is accessible through a secure channel otherwise your DNS will still get poisoned.
The default format for upstream resolvers is ip:port
for backwards compatibility with ChinaDNS.
Resolvers can also be passed as protocol[+protocol]@ip:port
where protocol is udp
or tcp
.
Protocols are dialed in the order they are written (left to right).
The rightmost protocol acts as a fallback and will only be dialed if the leftmost fails.
For example, if the upstream resolver is a local dns forwarder on port 5353, it can be passed as [email protected]:5353
because fallback to TCP is not necessary.
Similarly, if you run a transparent TCP proxy that proxies traffic to 8.8.8.8 you could use [email protected]
:
./chinadns -p 5553 -c ./china.list -s [email protected],[email protected]:5353,[email protected]
$ ./chinadns -h
Usage of chinadns:
-V Print version and exit.
-b string
Bind address. (default "::")
-c string
Path to China route list. Both IPv4 and IPv6 are supported. See http://ipverse.net (default "./china.list")
-d Drop results of trusted servers which containing IPs in China. (Bidirectional mode.) (default true)
-domain-blacklist string
Path to domain blacklist file.
-domain-polluted string
Path to polluted domains list. Queries of these domains will not be sent to DNS in China.
-force-tcp
Force DNS queries use TCP only. Only applies to resolvers declared in ip:port format.
-l string
Path to IP blacklist file.
-m Enable compression pointer mutation in DNS queries.
-p int
Listening port. (default 53)
-reuse-port
Enable SO_REUSEPORT to gain some performance optimization. Need Linux>=3.9 (default true)
-s value
Comma separated list of upstream DNS servers. Need China route list to check whether it's a trusted server or not.
Servers can be in format ip:port or protocol[+protocol]@ip:port where protocol is udp or tcp.
Protocols are dialed in order left to right. Rightmost protocol will only be dialed if the leftmost fails.
Protocols will override force-tcp flag. If empty, protocol defaults to udp+tcp (tcp if force-tcp is set) and port defaults to 53.
Examples: [email protected],[email protected]:5353,1.1.1.1 (default [email protected],[email protected])
-test-domains string
Domain names to test DNS connection health. (default "qq.com,163.com")
-timeout duration
DNS request timeout (default 1s)
-trusted-servers value
Comma separated list of servers which (located in China but) can be trusted.
Uses the same format as -s.
-udp-max-bytes int
Default DNS max message size on UDP. (default 4096)
-v Enable verbose logging.
-y float
Delay (in seconds) to query another DNS server when no reply received. (default 0.1)