Static
Test suite to validate using one of the DNS options available in an upstream server
DNS-over-HTTPS Server
Description
Configures DUT0 to connect, using DNS-over-HTTPS (DoH) over an upstream server.
Scenario
Step 1: Set the following configuration in DUT0
:
set system certificate trust running://certs/remote.dns-server.crt set service dns proxy server-name RD set service dns proxy static RD protocol dns-over-https host name remote.dns set service dns proxy static RD protocol dns-over-https ip 10.215.168.1 set service dns proxy static RD protocol dns-over-https hash 029f30c34b083de26ae4e176db2577cb64913132c357003e2fa24228571c3b1d set service dns resolver local
Step 2: Run command system journal show | cat
at DUT0
and check if output matches the following regular expressions:
^(?m)^.*\[RD\] OK \(DoH\) - rtt: \d+ms$Show output
-- Logs begin at Mon 2023-10-30 11:28:59 UTC, end at Mon 2023-10-30 11:29:02 UTC. -- Oct 30 11:28:59.364432 osdx systemd-journald[629]: Runtime journal (/run/log/journal/3d151f703f7748e3bca150e5e3f65077) is 2.0M, max 16.0M, 14.0M free. Oct 30 11:28:59.377388 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'system journal clear'. Oct 30 11:28:59.747827 osdx OSDxCLI[4196]: User 'admin' entered the configuration menu. Oct 30 11:28:59.868389 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.10/24'. Oct 30 11:28:59.957674 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Oct 30 11:29:00.090329 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Oct 30 11:29:00.201559 osdx cfgd[1093]: [4196]Completed change to active configuration Oct 30 11:29:00.252734 osdx OSDxCLI[4196]: User 'admin' committed the configuration. Oct 30 11:29:00.281122 osdx OSDxCLI[4196]: User 'admin' left the configuration menu. Oct 30 11:29:00.446737 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. Oct 30 11:29:00.625931 osdx OSDxCLI[4196]: User 'admin' entered the configuration menu. Oct 30 11:29:00.723934 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set system certificate trust running://certs/remote.dns-server.crt'. Oct 30 11:29:00.813102 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy server-name RD'. Oct 30 11:29:00.913971 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-over-https host name remote.dns'. Oct 30 11:29:01.017381 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-over-https ip 10.215.168.1'. Oct 30 11:29:01.125258 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-over-https hash 029f30c34b083de26ae4e176db2577cb64913132c357003e2fa24228571c3b1d'. Oct 30 11:29:01.223270 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns resolver local'. Oct 30 11:29:01.380789 osdx ca-certificates[6992]: Updating certificates in /etc/ssl/certs... Oct 30 11:29:02.087843 osdx ca-certificates[7976]: 1 added, 0 removed; done. Oct 30 11:29:02.096676 osdx ca-certificates[7981]: Running hooks in /etc/ca-certificates/update.d... Oct 30 11:29:02.103229 osdx ca-certificates[7984]: done. Oct 30 11:29:02.233511 osdx systemd[1]: Started DNSCrypt client proxy. Oct 30 11:29:02.236386 osdx cfgd[1093]: [4196]Completed change to active configuration Oct 30 11:29:02.243747 osdx OSDxCLI[4196]: User 'admin' committed the configuration. Oct 30 11:29:02.267004 osdx dnscrypt-proxy[8034]: [2023-10-30 11:29:02] [NOTICE] dnscrypt-proxy 2.0.45 Oct 30 11:29:02.267527 osdx dnscrypt-proxy[8034]: [2023-10-30 11:29:02] [NOTICE] Network connectivity detected Oct 30 11:29:02.268273 osdx dnscrypt-proxy[8034]: [2023-10-30 11:29:02] [NOTICE] Dropping privileges Oct 30 11:29:02.271408 osdx dnscrypt-proxy[8034]: [2023-10-30 11:29:02] [NOTICE] Network connectivity detected Oct 30 11:29:02.271607 osdx dnscrypt-proxy[8034]: [2023-10-30 11:29:02] [NOTICE] Now listening to 127.0.0.1:53 [UDP] Oct 30 11:29:02.271716 osdx dnscrypt-proxy[8034]: [2023-10-30 11:29:02] [NOTICE] Now listening to 127.0.0.1:53 [TCP] Oct 30 11:29:02.271841 osdx dnscrypt-proxy[8034]: [2023-10-30 11:29:02] [NOTICE] Firefox workaround initialized Oct 30 11:29:02.271941 osdx dnscrypt-proxy[8034]: [2023-10-30 11:29:02] [NOTICE] Loading the set of cloaking rules from [/tmp/tmpESmxqu] Oct 30 11:29:02.319522 osdx OSDxCLI[4196]: User 'admin' left the configuration menu. Oct 30 11:29:02.441520 osdx dnscrypt-proxy[8034]: [2023-10-30 11:29:02] [NOTICE] [RD] OK (DoH) - rtt: 133ms Oct 30 11:29:02.441701 osdx dnscrypt-proxy[8034]: [2023-10-30 11:29:02] [NOTICE] Server with the lowest initial latency: RD (rtt: 133ms) Oct 30 11:29:02.441814 osdx dnscrypt-proxy[8034]: [2023-10-30 11:29:02] [NOTICE] dnscrypt-proxy is ready - live servers: 1
Step 3: Run command show host lookup teldat.com type A
at DUT0
and check if output contains the following tokens:
teldat.com has address 19.18.17.16Show output
teldat.com has address 19.18.17.16
DNS-over-HTTPS Server With Stamp
Description
Configures DUT0 to connect, using DNS-over-HTTPS (DoH) over an upstream server (generating a DNS stamp and using it to configure the connection).
Scenario
Step 1: Run command service dns proxy stamp calculate dns-over-https host-name remote.dns host-path /dns-query host-port 443 ip 10.215.168.1 hash 029f30c34b083de26ae4e176db2577cb64913132c357003e2fa24228571c3b1d
at DUT0
and expect this output:
Show output
sdns://AgAAAAAAAAAADDEwLjIxNS4xNjguMSACnzDDSwg94mrk4XbbJXfLZJExMsNXAD4vokIoVxw7HQpyZW1vdGUuZG5zCi9kbnMtcXVlcnk
Step 2: Set the following configuration in DUT0
:
set system certificate trust running://certs/remote.dns-server.crt set service dns proxy server-name RD set service dns proxy static RD stamp 'sdns://AgAAAAAAAAAADDEwLjIxNS4xNjguMSACnzDDSwg94mrk4XbbJXfLZJExMsNXAD4vokIoVxw7HQpyZW1vdGUuZG5zCi9kbnMtcXVlcnk' set service dns resolver local
Step 3: Run command system journal show | cat
at DUT0
and check if output matches the following regular expressions:
^(?m)^.*\[RD\] OK \(DoH\) - rtt: \d+ms$Show output
-- Logs begin at Mon 2023-10-30 11:29:09 UTC, end at Mon 2023-10-30 11:29:12 UTC. -- Oct 30 11:29:09.363428 osdx systemd-journald[629]: Runtime journal (/run/log/journal/3d151f703f7748e3bca150e5e3f65077) is 2.0M, max 16.0M, 14.0M free. Oct 30 11:29:09.377054 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'system journal clear'. Oct 30 11:29:09.719223 osdx OSDxCLI[4196]: User 'admin' entered the configuration menu. Oct 30 11:29:09.841921 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.10/24'. Oct 30 11:29:09.930581 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Oct 30 11:29:10.053383 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Oct 30 11:29:10.146567 osdx cfgd[1093]: [4196]Completed change to active configuration Oct 30 11:29:10.189690 osdx OSDxCLI[4196]: User 'admin' committed the configuration. Oct 30 11:29:10.230559 osdx OSDxCLI[4196]: User 'admin' left the configuration menu. Oct 30 11:29:10.399871 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. Oct 30 11:29:10.587744 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'service dns proxy stamp calculate dns-over-https host-name remote.dns host-path /dns-query host-port 443 ip 10.215.168.1 hash 029f30c34b083de26ae4e176db2577cb64913132c357003e2fa24228571c3b1d'. Oct 30 11:29:10.782904 osdx OSDxCLI[4196]: User 'admin' entered the configuration menu. Oct 30 11:29:10.899839 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set system certificate trust running://certs/remote.dns-server.crt'. Oct 30 11:29:10.991411 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy server-name RD'. Oct 30 11:29:11.095564 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy static RD stamp 'sdns://AgAAAAAAAAAADDEwLjIxNS4xNjguMSACnzDDSwg94mrk4XbbJXfLZJExMsNXAD4vokIoVxw7HQpyZW1vdGUuZG5zCi9kbnMtcXVlcnk''. Oct 30 11:29:11.189794 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns resolver local'. Oct 30 11:29:11.345969 osdx ca-certificates[9709]: Updating certificates in /etc/ssl/certs... Oct 30 11:29:12.020766 osdx ca-certificates[10693]: 1 added, 0 removed; done. Oct 30 11:29:12.026788 osdx ca-certificates[10697]: Running hooks in /etc/ca-certificates/update.d... Oct 30 11:29:12.032231 osdx ca-certificates[10701]: done. Oct 30 11:29:12.152700 osdx systemd[1]: Started DNSCrypt client proxy. Oct 30 11:29:12.155554 osdx cfgd[1093]: [4196]Completed change to active configuration Oct 30 11:29:12.163222 osdx OSDxCLI[4196]: User 'admin' committed the configuration. Oct 30 11:29:12.191854 osdx dnscrypt-proxy[10751]: [2023-10-30 11:29:12] [NOTICE] dnscrypt-proxy 2.0.45 Oct 30 11:29:12.192238 osdx dnscrypt-proxy[10751]: [2023-10-30 11:29:12] [NOTICE] Network connectivity detected Oct 30 11:29:12.192800 osdx dnscrypt-proxy[10751]: [2023-10-30 11:29:12] [NOTICE] Dropping privileges Oct 30 11:29:12.195030 osdx dnscrypt-proxy[10751]: [2023-10-30 11:29:12] [NOTICE] Network connectivity detected Oct 30 11:29:12.195166 osdx dnscrypt-proxy[10751]: [2023-10-30 11:29:12] [NOTICE] Now listening to 127.0.0.1:53 [UDP] Oct 30 11:29:12.195247 osdx dnscrypt-proxy[10751]: [2023-10-30 11:29:12] [NOTICE] Now listening to 127.0.0.1:53 [TCP] Oct 30 11:29:12.195336 osdx dnscrypt-proxy[10751]: [2023-10-30 11:29:12] [NOTICE] Firefox workaround initialized Oct 30 11:29:12.195415 osdx dnscrypt-proxy[10751]: [2023-10-30 11:29:12] [NOTICE] Loading the set of cloaking rules from [/tmp/tmpgDlfmj] Oct 30 11:29:12.211703 osdx OSDxCLI[4196]: User 'admin' left the configuration menu. Oct 30 11:29:12.407306 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'system journal show | cat'. Oct 30 11:29:12.413190 osdx dnscrypt-proxy[10751]: [2023-10-30 11:29:12] [NOTICE] [RD] OK (DoH) - rtt: 171ms Oct 30 11:29:12.413190 osdx dnscrypt-proxy[10751]: [2023-10-30 11:29:12] [NOTICE] Server with the lowest initial latency: RD (rtt: 171ms) Oct 30 11:29:12.413190 osdx dnscrypt-proxy[10751]: [2023-10-30 11:29:12] [NOTICE] dnscrypt-proxy is ready - live servers: 1
Step 4: Run command show host lookup teldat.com type A
at DUT0
and check if output contains the following tokens:
teldat.com has address 19.18.17.16Show output
teldat.com has address 19.18.17.16
DNSCrypt Server
Description
Configures DUT0 to connect, using DNSCrypt over an upstream server.
Scenario
Step 1: Run command service dns proxy dnscrypt public-key running://certs/dnscrypt.crt
at DUT0
and expect this output:
Show output
d5:c7:87:c7:86:8c:82:14:ab:ee:1c:ae:af:b1:fe:db:77:4b:79:8f:7a:9e:6b:70:bd:0f:50:36:31:7f:43:78
Step 2: Set the following configuration in DUT0
:
set system certificate trust running://certs/remote.dns-server.crt set service dns proxy server-name RD set service dns proxy static RD protocol dns-crypt ip 10.215.168.1 set service dns proxy static RD protocol dns-crypt port 8443 set service dns proxy static RD protocol dns-crypt provider name 2.dnscrypt-cert.remote.dns set service dns proxy static RD protocol dns-crypt provider public-key d5:c7:87:c7:86:8c:82:14:ab:ee:1c:ae:af:b1:fe:db:77:4b:79:8f:7a:9e:6b:70:bd:0f:50:36:31:7f:43:78 set service dns resolver local
Step 3: Run command system journal show | cat
at DUT0
and check if output matches the following regular expressions:
^(?m)^.*\[RD\] OK \(DNSCrypt\) - rtt: \d+ms$Show output
-- Logs begin at Mon 2023-10-30 11:29:18 UTC, end at Mon 2023-10-30 11:29:21 UTC. -- Oct 30 11:29:18.360128 osdx systemd-journald[629]: Runtime journal (/run/log/journal/3d151f703f7748e3bca150e5e3f65077) is 2.0M, max 16.0M, 14.0M free. Oct 30 11:29:18.374049 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'system journal clear'. Oct 30 11:29:18.753361 osdx OSDxCLI[4196]: User 'admin' entered the configuration menu. Oct 30 11:29:18.875114 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.10/24'. Oct 30 11:29:18.964592 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Oct 30 11:29:19.095605 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Oct 30 11:29:19.184477 osdx cfgd[1093]: [4196]Completed change to active configuration Oct 30 11:29:19.226673 osdx OSDxCLI[4196]: User 'admin' committed the configuration. Oct 30 11:29:19.253145 osdx OSDxCLI[4196]: User 'admin' left the configuration menu. Oct 30 11:29:19.426177 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. Oct 30 11:29:19.558253 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'service dns proxy dnscrypt public-key running://certs/dnscrypt.crt'. Oct 30 11:29:19.731778 osdx OSDxCLI[4196]: User 'admin' entered the configuration menu. Oct 30 11:29:19.825125 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set system certificate trust running://certs/remote.dns-server.crt'. Oct 30 11:29:19.917955 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy server-name RD'. Oct 30 11:29:20.013510 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-crypt ip 10.215.168.1'. Oct 30 11:29:20.101392 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-crypt port 8443'. Oct 30 11:29:20.222094 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-crypt provider name 2.dnscrypt-cert.remote.dns'. Oct 30 11:29:20.318998 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-crypt provider public-key d5:c7:87:c7:86:8c:82:14:ab:ee:1c:ae:af:b1:fe:db:77:4b:79:8f:7a:9e:6b:70:bd:0f:50:36:31:7f:43:78'. Oct 30 11:29:20.467327 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns resolver local'. Oct 30 11:29:20.602693 osdx ca-certificates[12433]: Updating certificates in /etc/ssl/certs... Oct 30 11:29:21.250446 osdx ca-certificates[13418]: 1 added, 0 removed; done. Oct 30 11:29:21.256272 osdx ca-certificates[13422]: Running hooks in /etc/ca-certificates/update.d... Oct 30 11:29:21.262818 osdx ca-certificates[13426]: done. Oct 30 11:29:21.387224 osdx systemd[1]: Started DNSCrypt client proxy. Oct 30 11:29:21.389886 osdx cfgd[1093]: [4196]Completed change to active configuration Oct 30 11:29:21.396927 osdx OSDxCLI[4196]: User 'admin' committed the configuration. Oct 30 11:29:21.415618 osdx dnscrypt-proxy[13476]: [2023-10-30 11:29:21] [NOTICE] dnscrypt-proxy 2.0.45 Oct 30 11:29:21.416023 osdx dnscrypt-proxy[13476]: [2023-10-30 11:29:21] [NOTICE] Network connectivity detected Oct 30 11:29:21.416733 osdx dnscrypt-proxy[13476]: [2023-10-30 11:29:21] [NOTICE] Dropping privileges Oct 30 11:29:21.419143 osdx dnscrypt-proxy[13476]: [2023-10-30 11:29:21] [NOTICE] Network connectivity detected Oct 30 11:29:21.419326 osdx dnscrypt-proxy[13476]: [2023-10-30 11:29:21] [NOTICE] Now listening to 127.0.0.1:53 [UDP] Oct 30 11:29:21.419412 osdx dnscrypt-proxy[13476]: [2023-10-30 11:29:21] [NOTICE] Now listening to 127.0.0.1:53 [TCP] Oct 30 11:29:21.419910 osdx dnscrypt-proxy[13476]: [2023-10-30 11:29:21] [NOTICE] Firefox workaround initialized Oct 30 11:29:21.421959 osdx dnscrypt-proxy[13476]: [2023-10-30 11:29:21] [NOTICE] Loading the set of cloaking rules from [/tmp/tmpiRrPPt] Oct 30 11:29:21.422583 osdx OSDxCLI[4196]: User 'admin' left the configuration menu. Oct 30 11:29:21.424051 osdx dnscrypt-proxy[13476]: [2023-10-30 11:29:21] [NOTICE] [RD] OK (DNSCrypt) - rtt: 0ms Oct 30 11:29:21.424149 osdx dnscrypt-proxy[13476]: [2023-10-30 11:29:21] [NOTICE] Server with the lowest initial latency: RD (rtt: 0ms) Oct 30 11:29:21.424227 osdx dnscrypt-proxy[13476]: [2023-10-30 11:29:21] [NOTICE] dnscrypt-proxy is ready - live servers: 1
Step 4: Run command show host lookup teldat.com type A
at DUT0
and check if output contains the following tokens:
teldat.com has address 19.18.17.16Show output
teldat.com has address 19.18.17.16
DNSCrypt Server With Stamp
Description
Configures DUT0 to connect, using DNSCrypt over an upstream server (generating a DNS stamp and using it to configure the connection).
Scenario
Step 1: Run command service dns proxy dnscrypt public-key running://certs/dnscrypt.crt
at DUT0
and expect this output:
Show output
d5:c7:87:c7:86:8c:82:14:ab:ee:1c:ae:af:b1:fe:db:77:4b:79:8f:7a:9e:6b:70:bd:0f:50:36:31:7f:43:78
Step 2: Run command service dns proxy stamp calculate dns-crypt provider-name 2.dnscrypt-cert.remote.dns provider-key d5:c7:87:c7:86:8c:82:14:ab:ee:1c:ae:af:b1:fe:db:77:4b:79:8f:7a:9e:6b:70:bd:0f:50:36:31:7f:43:78 ip 10.215.168.1 port 8443
at DUT0
and expect this output:
Show output
sdns://AQAAAAAAAAAAETEwLjIxNS4xNjguMTo4NDQzINXHh8eGjIIUq-4crq-x_tt3S3mPep5rcL0PUDYxf0N4GjIuZG5zY3J5cHQtY2VydC5yZW1vdGUuZG5z
Step 3: Set the following configuration in DUT0
:
set system certificate trust running://certs/remote.dns-server.crt set service dns proxy server-name RD set service dns proxy static RD stamp 'sdns://AQAAAAAAAAAAETEwLjIxNS4xNjguMTo4NDQzINXHh8eGjIIUq-4crq-x_tt3S3mPep5rcL0PUDYxf0N4GjIuZG5zY3J5cHQtY2VydC5yZW1vdGUuZG5z' set service dns resolver local
Step 4: Run command system journal show | cat
at DUT0
and check if output matches the following regular expressions:
^(?m)^.*\[RD\] OK \(DNSCrypt\) - rtt: \d+ms$Show output
-- Logs begin at Mon 2023-10-30 11:29:28 UTC, end at Mon 2023-10-30 11:29:31 UTC. -- Oct 30 11:29:28.398840 osdx systemd-journald[629]: Runtime journal (/run/log/journal/3d151f703f7748e3bca150e5e3f65077) is 2.0M, max 16.0M, 14.0M free. Oct 30 11:29:28.413033 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'system journal clear'. Oct 30 11:29:28.812957 osdx OSDxCLI[4196]: User 'admin' entered the configuration menu. Oct 30 11:29:28.955832 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.10/24'. Oct 30 11:29:29.050337 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Oct 30 11:29:29.205775 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Oct 30 11:29:29.326422 osdx cfgd[1093]: [4196]Completed change to active configuration Oct 30 11:29:29.382699 osdx OSDxCLI[4196]: User 'admin' committed the configuration. Oct 30 11:29:29.428406 osdx OSDxCLI[4196]: User 'admin' left the configuration menu. Oct 30 11:29:29.589023 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. Oct 30 11:29:29.790608 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'service dns proxy dnscrypt public-key running://certs/dnscrypt.crt'. Oct 30 11:29:29.935039 osdx OSDxCLI[4196]: User 'admin' executed a new command: 'service dns proxy stamp calculate dns-crypt provider-name 2.dnscrypt-cert.remote.dns provider-key d5:c7:87:c7:86:8c:82:14:ab:ee:1c:ae:af:b1:fe:db:77:4b:79:8f:7a:9e:6b:70:bd:0f:50:36:31:7f:43:78 ip 10.215.168.1 port 8443'. Oct 30 11:29:30.125687 osdx OSDxCLI[4196]: User 'admin' entered the configuration menu. Oct 30 11:29:30.236911 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set system certificate trust running://certs/remote.dns-server.crt'. Oct 30 11:29:30.354463 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy server-name RD'. Oct 30 11:29:30.472948 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns proxy static RD stamp 'sdns://AQAAAAAAAAAAETEwLjIxNS4xNjguMTo4NDQzINXHh8eGjIIUq-4crq-x_tt3S3mPep5rcL0PUDYxf0N4GjIuZG5zY3J5cHQtY2VydC5yZW1vdGUuZG5z''. Oct 30 11:29:30.586824 osdx OSDxCLI[4196]: User 'admin' added a new cfg line: 'set service dns resolver local'. Oct 30 11:29:30.732408 osdx ca-certificates[15152]: Updating certificates in /etc/ssl/certs... Oct 30 11:29:31.490491 osdx ca-certificates[16136]: 1 added, 0 removed; done. Oct 30 11:29:31.498745 osdx ca-certificates[16140]: Running hooks in /etc/ca-certificates/update.d... Oct 30 11:29:31.503861 osdx ca-certificates[16144]: done. Oct 30 11:29:31.604694 osdx systemd[1]: Started DNSCrypt client proxy. Oct 30 11:29:31.607461 osdx cfgd[1093]: [4196]Completed change to active configuration Oct 30 11:29:31.611660 osdx OSDxCLI[4196]: User 'admin' committed the configuration. Oct 30 11:29:31.633826 osdx dnscrypt-proxy[16194]: [2023-10-30 11:29:31] [NOTICE] dnscrypt-proxy 2.0.45 Oct 30 11:29:31.634232 osdx dnscrypt-proxy[16194]: [2023-10-30 11:29:31] [NOTICE] Network connectivity detected Oct 30 11:29:31.634904 osdx dnscrypt-proxy[16194]: [2023-10-30 11:29:31] [NOTICE] Dropping privileges Oct 30 11:29:31.637248 osdx dnscrypt-proxy[16194]: [2023-10-30 11:29:31] [NOTICE] Network connectivity detected Oct 30 11:29:31.637416 osdx dnscrypt-proxy[16194]: [2023-10-30 11:29:31] [NOTICE] Now listening to 127.0.0.1:53 [UDP] Oct 30 11:29:31.637504 osdx dnscrypt-proxy[16194]: [2023-10-30 11:29:31] [NOTICE] Now listening to 127.0.0.1:53 [TCP] Oct 30 11:29:31.637601 osdx dnscrypt-proxy[16194]: [2023-10-30 11:29:31] [NOTICE] Firefox workaround initialized Oct 30 11:29:31.637676 osdx dnscrypt-proxy[16194]: [2023-10-30 11:29:31] [NOTICE] Loading the set of cloaking rules from [/tmp/tmpADflau] Oct 30 11:29:31.638992 osdx dnscrypt-proxy[16194]: [2023-10-30 11:29:31] [NOTICE] [RD] OK (DNSCrypt) - rtt: 0ms Oct 30 11:29:31.639091 osdx dnscrypt-proxy[16194]: [2023-10-30 11:29:31] [NOTICE] Server with the lowest initial latency: RD (rtt: 0ms) Oct 30 11:29:31.639174 osdx dnscrypt-proxy[16194]: [2023-10-30 11:29:31] [NOTICE] dnscrypt-proxy is ready - live servers: 1 Oct 30 11:29:31.668088 osdx OSDxCLI[4196]: User 'admin' left the configuration menu.
Step 5: Run command show host lookup teldat.com type A
at DUT0
and check if output contains the following tokens:
teldat.com has address 19.18.17.16Show output
teldat.com has address 19.18.17.16