You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Other] Use a realtime monotonic clock for QUIC idle timeout #109
[Fix] Some DnsCrypt stamps are not accepted
V1.5
[Feature] Fallback-only domains. See fallbackDomains or fallback_domains in respective adapters.
This is a list of domains (limited wildcards allowed) that will be forwarded directly to the fallback upstreams (if they exist).
There's also an option to automatically append DNS search domains to this list, see detectSearchDomains (Android and Apple only, Windows adapter handles search domains on its own).
WARNING: Note to application developers: you MUST get the default value of this field
from dnsproxy_settings::get_default()/DnsProxySettings.getDefault()/AGDnsProxyConfig.getDefault()
as it contains important default for Wi-Fi calling, but we can't add them automatically, because the user should see the defaults somewhere in UI and be able to edit them.
[Features] Retransmission handling: see enableRetransmissionHandling or enable_retransmission_handling.
Mostly intended for iOS.
If enable_retransmission_handling is true, retransmitted requests (defined as requests with the same id and sent from the same address that one of the requests that are currently being handled) will be handled only using fallback upstreams, and the answer to the original request will not be sent (to prevent possibly sending SERVFAIL, b/c iOS may mark the resolver as "bad" in this case and refuse to resolve anything from that point).
Enabling this feature shouldn't break anything on Android and Windows, but it should not be enabled if there are otherwise no issues with retransmitted requests.
[Feature] Add an ability to set up outbound proxy
[Android] see OutboundProxySettings
[Apple] see AGOutboundProxySettings. iOS may not want to implement this.
[C API] see ag_outbound_proxy_settings
[Feature] DNS stamp API has been reworked in adapters: DNS stamps can now be
dynamically edited and converted to various string representations.
[Feature] DNSLibs indicate that upstream uses DNSSEC. You may turn on ag::dnsproxy_settings::enable_dnssec_ok
and check ag::dns_request_processed_event::dnssec in callback. However, this should be off by default.
[Feature] DNS-over-QUIC default port changed. New port is 8853.
Now an address like quic://dns.adguard.com is processed in same way as quic://dns.adguard.com:8853.
So to force the use of the old port 784 specify it strictly - quic://dns.adguard.com:784. MIGRATION IS NEEDED!
That means that if you have custom user's quic:// URLs and DoQ sdns:// stamps in your server list, they (excluding AdGuard's) should be changed from quic://example.org to quic://example.org:784. DoQ sdns:// stamps should also be patched to include port, if they are in list.
AdGuard servers are already support 8853 port so URLs don't need to be changed.
[Feature] Allow retrieving the library version
see ag::dnsproxy::version()
see AGDnsProxy.libraryVersion (Apple)
see com.adguard.dnsproxy.DnsProxy.version() (Android)
see ag_dnsproxy_version() (C API)
[Feature] Add a "pretty URL" function for DNS stamps
see ag::server_stamp::pretty_url()
see AGDnsStamp.prettyUrl, AGDnsStamp.prettierUrl (Apple)
see com.adguard.dnsproxy.DnsStamp.getPrettyUrl(), com.adguard.dnsproxy.DnsStamp.getPrettierUrl() (Android)
see ag_dns_stamp::pretty_url, ag_dns_stamp::prettier_url (C API)
The text was updated successfully, but these errors were encountered:
sfionov
changed the title
Update DnsLibs to 1.5.35
Update DnsLibs to 1.5.38
May 28, 2021
V1.5.38
V1.5
[Feature] Fallback-only domains. See
fallbackDomains
orfallback_domains
in respective adapters.detectSearchDomains
(Android and Apple only, Windows adapter handles search domains on its own).from
dnsproxy_settings::get_default()
/DnsProxySettings.getDefault()
/AGDnsProxyConfig.getDefault()
as it contains important default for Wi-Fi calling, but we can't add them automatically, because the user should see the defaults somewhere in UI and be able to edit them.
[Features] Retransmission handling: see
enableRetransmissionHandling
orenable_retransmission_handling
.Mostly intended for iOS.
If
enable_retransmission_handling
is true, retransmitted requests (defined as requests with the same id and sent from the same address that one of the requests that are currently being handled) will be handled only using fallback upstreams, and the answer to the original request will not be sent (to prevent possibly sending SERVFAIL, b/c iOS may mark the resolver as "bad" in this case and refuse to resolve anything from that point).Enabling this feature shouldn't break anything on Android and Windows, but it should not be enabled if there are otherwise no issues with retransmitted requests.
[Feature] Add an ability to set up outbound proxy
OutboundProxySettings
AGOutboundProxySettings
. iOS may not want to implement this.ag_outbound_proxy_settings
[Feature] DNS stamp API has been reworked in adapters: DNS stamps can now be
dynamically edited and converted to various string representations.
[Feature] DNSLibs indicate that upstream uses DNSSEC. You may turn on
ag::dnsproxy_settings::enable_dnssec_ok
and check
ag::dns_request_processed_event::dnssec
in callback. However, this should be off by default.[Feature] DNS-over-QUIC default port changed. New port is 8853.
Now an address like
quic://dns.adguard.com
is processed in same way asquic://dns.adguard.com:8853
.So to force the use of the old port
784
specify it strictly -quic://dns.adguard.com:784
.MIGRATION IS NEEDED!
That means that if you have custom user's quic:// URLs and DoQ sdns:// stamps in your server list, they (excluding AdGuard's) should be changed from quic://example.org to quic://example.org:784. DoQ sdns:// stamps should also be patched to include port, if they are in list.
AdGuard servers are already support 8853 port so URLs don't need to be changed.
ag::dnsproxy::version()
AGDnsProxy.libraryVersion
(Apple)com.adguard.dnsproxy.DnsProxy.version()
(Android)ag_dnsproxy_version()
(C API)ag::server_stamp::pretty_url()
AGDnsStamp.prettyUrl
,AGDnsStamp.prettierUrl
(Apple)com.adguard.dnsproxy.DnsStamp.getPrettyUrl()
,com.adguard.dnsproxy.DnsStamp.getPrettierUrl()
(Android)ag_dns_stamp::pretty_url
,ag_dns_stamp::prettier_url
(C API)The text was updated successfully, but these errors were encountered: