Static
Test suite to validate using one of the DNS options available in an upstream server
DNS-over-HTTPS Server
Description
Configures DUT0 to connect, using DNS-over-HTTPS (DoH) over an upstream server.
Scenario
Step 1: Set the following configuration in DUT0
:
set system certificate trust running://remote.dns-server.crt set service dns proxy server-name RD set service dns proxy static RD protocol dns-over-https host name remote.dns set service dns proxy static RD protocol dns-over-https ip 10.215.168.1 set service dns proxy static RD protocol dns-over-https hash 49f1ad88a12ee9d7d2acc5f1be8e1c526fa803f3edb1ce34a8e7ac2004df5bb8 set service dns resolver local
Step 2: Run command system journal show | cat
at DUT0
and check if output matches the following regular expressions:
^(?m)^.*\[RD\] OK \(DoH\) - rtt: \d+ms$Show output
-- Logs begin at Thu 2023-11-23 22:44:16 UTC, end at Thu 2023-11-23 22:44:19 UTC. -- Nov 23 22:44:16.363713 osdx systemd-journald[619]: Runtime journal (/run/log/journal/1b38b2114cf0481baed8058b17ed7ac1) is 2.0M, max 16.0M, 14.0M free. Nov 23 22:44:16.376693 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'system journal clear'. Nov 23 22:44:16.745027 osdx OSDxCLI[18128]: User 'admin' entered the configuration menu. Nov 23 22:44:16.872160 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.10/24'. Nov 23 22:44:16.977240 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Nov 23 22:44:17.165543 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Nov 23 22:44:17.260291 osdx cfgd[1092]: [18128]Completed change to active configuration Nov 23 22:44:17.301256 osdx OSDxCLI[18128]: User 'admin' committed the configuration. Nov 23 22:44:17.335299 osdx OSDxCLI[18128]: User 'admin' left the configuration menu. Nov 23 22:44:17.531464 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. Nov 23 22:44:17.747878 osdx OSDxCLI[18128]: User 'admin' entered the configuration menu. Nov 23 22:44:17.875566 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set system certificate trust running://remote.dns-server.crt'. Nov 23 22:44:17.965729 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy server-name RD'. Nov 23 22:44:18.059696 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-over-https host name remote.dns'. Nov 23 22:44:18.149675 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-over-https ip 10.215.168.1'. Nov 23 22:44:18.271578 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-over-https hash 49f1ad88a12ee9d7d2acc5f1be8e1c526fa803f3edb1ce34a8e7ac2004df5bb8'. Nov 23 22:44:18.357383 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns resolver local'. Nov 23 22:44:18.485132 osdx ca-certificates[13003]: Updating certificates in /etc/ssl/certs... Nov 23 22:44:19.174742 osdx ca-certificates[13987]: 1 added, 0 removed; done. Nov 23 22:44:19.180912 osdx ca-certificates[13991]: Running hooks in /etc/ca-certificates/update.d... Nov 23 22:44:19.186512 osdx ca-certificates[13995]: done. Nov 23 22:44:19.298846 osdx systemd[1]: Started DNSCrypt client proxy. Nov 23 22:44:19.301757 osdx cfgd[1092]: [18128]Completed change to active configuration Nov 23 22:44:19.310422 osdx OSDxCLI[18128]: User 'admin' committed the configuration. Nov 23 22:44:19.328842 osdx dnscrypt-proxy[14045]: [2023-11-23 22:44:19] [NOTICE] dnscrypt-proxy 2.0.45 Nov 23 22:44:19.329238 osdx dnscrypt-proxy[14045]: [2023-11-23 22:44:19] [NOTICE] Network connectivity detected Nov 23 22:44:19.329859 osdx dnscrypt-proxy[14045]: [2023-11-23 22:44:19] [NOTICE] Dropping privileges Nov 23 22:44:19.332251 osdx dnscrypt-proxy[14045]: [2023-11-23 22:44:19] [NOTICE] Network connectivity detected Nov 23 22:44:19.332423 osdx dnscrypt-proxy[14045]: [2023-11-23 22:44:19] [NOTICE] Now listening to 127.0.0.1:53 [UDP] Nov 23 22:44:19.332507 osdx dnscrypt-proxy[14045]: [2023-11-23 22:44:19] [NOTICE] Now listening to 127.0.0.1:53 [TCP] Nov 23 22:44:19.332606 osdx dnscrypt-proxy[14045]: [2023-11-23 22:44:19] [NOTICE] Firefox workaround initialized Nov 23 22:44:19.332708 osdx dnscrypt-proxy[14045]: [2023-11-23 22:44:19] [NOTICE] Loading the set of cloaking rules from [/tmp/tmpNEYj3f] Nov 23 22:44:19.349412 osdx OSDxCLI[18128]: User 'admin' left the configuration menu. Nov 23 22:44:19.492671 osdx dnscrypt-proxy[14045]: [2023-11-23 22:44:19] [NOTICE] [RD] OK (DoH) - rtt: 124ms Nov 23 22:44:19.492896 osdx dnscrypt-proxy[14045]: [2023-11-23 22:44:19] [NOTICE] Server with the lowest initial latency: RD (rtt: 124ms) Nov 23 22:44:19.493012 osdx dnscrypt-proxy[14045]: [2023-11-23 22:44:19] [NOTICE] dnscrypt-proxy is ready - live servers: 1
Step 3: Run command show host lookup teldat.com type A
at DUT0
and check if output contains the following tokens:
teldat.com has address 19.18.17.16Show output
teldat.com has address 19.18.17.16
DNS-over-HTTPS Server With Stamp
Description
Configures DUT0 to connect, using DNS-over-HTTPS (DoH) over an upstream server (generating a DNS stamp and using it to configure the connection).
Scenario
Step 1: Run command service dns proxy stamp calculate dns-over-https host-name remote.dns host-path /dns-query host-port 443 ip 10.215.168.1 hash 49f1ad88a12ee9d7d2acc5f1be8e1c526fa803f3edb1ce34a8e7ac2004df5bb8
at DUT0
and expect this output:
Show output
sdns://AgAAAAAAAAAADDEwLjIxNS4xNjguMSBJ8a2IoS7p19KsxfG-jhxSb6gD8-2xzjSo56wgBN9buApyZW1vdGUuZG5zCi9kbnMtcXVlcnk
Step 2: Set the following configuration in DUT0
:
set system certificate trust running://remote.dns-server.crt set service dns proxy server-name RD set service dns proxy static RD stamp 'sdns://AgAAAAAAAAAADDEwLjIxNS4xNjguMSBJ8a2IoS7p19KsxfG-jhxSb6gD8-2xzjSo56wgBN9buApyZW1vdGUuZG5zCi9kbnMtcXVlcnk' set service dns resolver local
Step 3: Run command system journal show | cat
at DUT0
and check if output matches the following regular expressions:
^(?m)^.*\[RD\] OK \(DoH\) - rtt: \d+ms$Show output
-- Logs begin at Thu 2023-11-23 22:44:28 UTC, end at Thu 2023-11-23 22:44:31 UTC. -- Nov 23 22:44:28.386133 osdx systemd-journald[619]: Runtime journal (/run/log/journal/1b38b2114cf0481baed8058b17ed7ac1) is 2.0M, max 16.0M, 14.0M free. Nov 23 22:44:28.400151 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'system journal clear'. Nov 23 22:44:28.826772 osdx OSDxCLI[18128]: User 'admin' entered the configuration menu. Nov 23 22:44:29.000101 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.10/24'. Nov 23 22:44:29.133112 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Nov 23 22:44:29.297711 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Nov 23 22:44:29.424322 osdx cfgd[1092]: [18128]Completed change to active configuration Nov 23 22:44:29.474746 osdx OSDxCLI[18128]: User 'admin' committed the configuration. Nov 23 22:44:29.515916 osdx OSDxCLI[18128]: User 'admin' left the configuration menu. Nov 23 22:44:29.692431 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. Nov 23 22:44:29.900138 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'service dns proxy stamp calculate dns-over-https host-name remote.dns host-path /dns-query host-port 443 ip 10.215.168.1 hash 49f1ad88a12ee9d7d2acc5f1be8e1c526fa803f3edb1ce34a8e7ac2004df5bb8'. Nov 23 22:44:30.088773 osdx OSDxCLI[18128]: User 'admin' entered the configuration menu. Nov 23 22:44:30.200829 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set system certificate trust running://remote.dns-server.crt'. Nov 23 22:44:30.337578 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy server-name RD'. Nov 23 22:44:30.499844 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy static RD stamp 'sdns://AgAAAAAAAAAADDEwLjIxNS4xNjguMSBJ8a2IoS7p19KsxfG-jhxSb6gD8-2xzjSo56wgBN9buApyZW1vdGUuZG5zCi9kbnMtcXVlcnk''. Nov 23 22:44:30.641032 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns resolver local'. Nov 23 22:44:30.773044 osdx ca-certificates[15783]: Updating certificates in /etc/ssl/certs... Nov 23 22:44:31.494208 osdx ca-certificates[16767]: 1 added, 0 removed; done. Nov 23 22:44:31.500166 osdx ca-certificates[16771]: Running hooks in /etc/ca-certificates/update.d... Nov 23 22:44:31.505372 osdx ca-certificates[16775]: done. Nov 23 22:44:31.612802 osdx systemd[1]: Started DNSCrypt client proxy. Nov 23 22:44:31.616424 osdx cfgd[1092]: [18128]Completed change to active configuration Nov 23 22:44:31.624992 osdx OSDxCLI[18128]: User 'admin' committed the configuration. Nov 23 22:44:31.651260 osdx OSDxCLI[18128]: User 'admin' left the configuration menu. Nov 23 22:44:31.656238 osdx dnscrypt-proxy[16825]: [2023-11-23 22:44:31] [NOTICE] dnscrypt-proxy 2.0.45 Nov 23 22:44:31.656633 osdx dnscrypt-proxy[16825]: [2023-11-23 22:44:31] [NOTICE] Network connectivity detected Nov 23 22:44:31.657246 osdx dnscrypt-proxy[16825]: [2023-11-23 22:44:31] [NOTICE] Dropping privileges Nov 23 22:44:31.659768 osdx dnscrypt-proxy[16825]: [2023-11-23 22:44:31] [NOTICE] Network connectivity detected Nov 23 22:44:31.659951 osdx dnscrypt-proxy[16825]: [2023-11-23 22:44:31] [NOTICE] Now listening to 127.0.0.1:53 [UDP] Nov 23 22:44:31.660035 osdx dnscrypt-proxy[16825]: [2023-11-23 22:44:31] [NOTICE] Now listening to 127.0.0.1:53 [TCP] Nov 23 22:44:31.660133 osdx dnscrypt-proxy[16825]: [2023-11-23 22:44:31] [NOTICE] Firefox workaround initialized Nov 23 22:44:31.660212 osdx dnscrypt-proxy[16825]: [2023-11-23 22:44:31] [NOTICE] Loading the set of cloaking rules from [/tmp/tmpA1Ba0x] Nov 23 22:44:31.808286 osdx dnscrypt-proxy[16825]: [2023-11-23 22:44:31] [NOTICE] [RD] OK (DoH) - rtt: 112ms Nov 23 22:44:31.808286 osdx dnscrypt-proxy[16825]: [2023-11-23 22:44:31] [NOTICE] Server with the lowest initial latency: RD (rtt: 112ms) Nov 23 22:44:31.808286 osdx dnscrypt-proxy[16825]: [2023-11-23 22:44:31] [NOTICE] dnscrypt-proxy is ready - live servers: 1 Nov 23 22:44:31.840394 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'system journal show | cat'.
Step 4: Run command show host lookup teldat.com type A
at DUT0
and check if output contains the following tokens:
teldat.com has address 19.18.17.16Show output
teldat.com has address 19.18.17.16
DNSCrypt Server
Description
Configures DUT0 to connect, using DNSCrypt over an upstream server.
Scenario
Step 1: Run command service dns proxy dnscrypt public-key running://dnscrypt.crt
at DUT0
and expect this output:
Show output
74:b4:f4:99:63:72:a1:92:cf:5c:9a:a0:3a:42:3b:45:45:d8:d0:85:ac:e5:49:58:dd:f2:49:58:6d:79:be:6a
Step 2: Set the following configuration in DUT0
:
set system certificate trust running://remote.dns-server.crt set service dns proxy server-name RD set service dns proxy static RD protocol dns-crypt ip 10.215.168.1 set service dns proxy static RD protocol dns-crypt port 8443 set service dns proxy static RD protocol dns-crypt provider name 2.dnscrypt-cert.remote.dns set service dns proxy static RD protocol dns-crypt provider public-key 74:b4:f4:99:63:72:a1:92:cf:5c:9a:a0:3a:42:3b:45:45:d8:d0:85:ac:e5:49:58:dd:f2:49:58:6d:79:be:6a set service dns resolver local
Step 3: Run command system journal show | cat
at DUT0
and check if output matches the following regular expressions:
^(?m)^.*\[RD\] OK \(DNSCrypt\) - rtt: \d+ms$Show output
-- Logs begin at Thu 2023-11-23 22:44:40 UTC, end at Thu 2023-11-23 22:44:43 UTC. -- Nov 23 22:44:40.356672 osdx systemd-journald[619]: Runtime journal (/run/log/journal/1b38b2114cf0481baed8058b17ed7ac1) is 2.0M, max 16.0M, 14.0M free. Nov 23 22:44:40.370151 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'system journal clear'. Nov 23 22:44:40.721989 osdx OSDxCLI[18128]: User 'admin' entered the configuration menu. Nov 23 22:44:40.856080 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.10/24'. Nov 23 22:44:40.951698 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Nov 23 22:44:41.115027 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Nov 23 22:44:41.227036 osdx cfgd[1092]: [18128]Completed change to active configuration Nov 23 22:44:41.276074 osdx OSDxCLI[18128]: User 'admin' committed the configuration. Nov 23 22:44:41.307267 osdx OSDxCLI[18128]: User 'admin' left the configuration menu. Nov 23 22:44:41.497534 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. Nov 23 22:44:41.665109 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'service dns proxy dnscrypt public-key running://dnscrypt.crt'. Nov 23 22:44:41.820285 osdx OSDxCLI[18128]: User 'admin' entered the configuration menu. Nov 23 22:44:41.940356 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set system certificate trust running://remote.dns-server.crt'. Nov 23 22:44:42.057461 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy server-name RD'. Nov 23 22:44:42.150610 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-crypt ip 10.215.168.1'. Nov 23 22:44:42.239184 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-crypt port 8443'. Nov 23 22:44:42.336752 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-crypt provider name 2.dnscrypt-cert.remote.dns'. Nov 23 22:44:42.448484 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-crypt provider public-key 74:b4:f4:99:63:72:a1:92:cf:5c:9a:a0:3a:42:3b:45:45:d8:d0:85:ac:e5:49:58:dd:f2:49:58:6d:79:be:6a'. Nov 23 22:44:42.563143 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns resolver local'. Nov 23 22:44:42.732873 osdx ca-certificates[18572]: Updating certificates in /etc/ssl/certs... Nov 23 22:44:43.409006 osdx ca-certificates[19556]: 1 added, 0 removed; done. Nov 23 22:44:43.414871 osdx ca-certificates[19560]: Running hooks in /etc/ca-certificates/update.d... Nov 23 22:44:43.421604 osdx ca-certificates[19564]: done. Nov 23 22:44:43.561730 osdx systemd[1]: Started DNSCrypt client proxy. Nov 23 22:44:43.564558 osdx cfgd[1092]: [18128]Completed change to active configuration Nov 23 22:44:43.572378 osdx OSDxCLI[18128]: User 'admin' committed the configuration. Nov 23 22:44:43.591375 osdx dnscrypt-proxy[19614]: [2023-11-23 22:44:43] [NOTICE] dnscrypt-proxy 2.0.45 Nov 23 22:44:43.591750 osdx dnscrypt-proxy[19614]: [2023-11-23 22:44:43] [NOTICE] Network connectivity detected Nov 23 22:44:43.592427 osdx dnscrypt-proxy[19614]: [2023-11-23 22:44:43] [NOTICE] Dropping privileges Nov 23 22:44:43.594711 osdx dnscrypt-proxy[19614]: [2023-11-23 22:44:43] [NOTICE] Network connectivity detected Nov 23 22:44:43.594861 osdx dnscrypt-proxy[19614]: [2023-11-23 22:44:43] [NOTICE] Now listening to 127.0.0.1:53 [UDP] Nov 23 22:44:43.594943 osdx dnscrypt-proxy[19614]: [2023-11-23 22:44:43] [NOTICE] Now listening to 127.0.0.1:53 [TCP] Nov 23 22:44:43.595046 osdx dnscrypt-proxy[19614]: [2023-11-23 22:44:43] [NOTICE] Firefox workaround initialized Nov 23 22:44:43.595121 osdx dnscrypt-proxy[19614]: [2023-11-23 22:44:43] [NOTICE] Loading the set of cloaking rules from [/tmp/tmpmBO1ke] Nov 23 22:44:43.596575 osdx dnscrypt-proxy[19614]: [2023-11-23 22:44:43] [NOTICE] [RD] OK (DNSCrypt) - rtt: 0ms Nov 23 22:44:43.596667 osdx dnscrypt-proxy[19614]: [2023-11-23 22:44:43] [NOTICE] Server with the lowest initial latency: RD (rtt: 0ms) Nov 23 22:44:43.596747 osdx dnscrypt-proxy[19614]: [2023-11-23 22:44:43] [NOTICE] dnscrypt-proxy is ready - live servers: 1 Nov 23 22:44:43.609058 osdx OSDxCLI[18128]: User 'admin' left the configuration menu.
Step 4: Run command show host lookup teldat.com type A
at DUT0
and check if output contains the following tokens:
teldat.com has address 19.18.17.16Show output
teldat.com has address 19.18.17.16
DNSCrypt Server With Stamp
Description
Configures DUT0 to connect, using DNSCrypt over an upstream server (generating a DNS stamp and using it to configure the connection).
Scenario
Step 1: Run command service dns proxy dnscrypt public-key running://dnscrypt.crt
at DUT0
and expect this output:
Show output
74:b4:f4:99:63:72:a1:92:cf:5c:9a:a0:3a:42:3b:45:45:d8:d0:85:ac:e5:49:58:dd:f2:49:58:6d:79:be:6a
Step 2: Run command service dns proxy stamp calculate dns-crypt provider-name 2.dnscrypt-cert.remote.dns provider-key 74:b4:f4:99:63:72:a1:92:cf:5c:9a:a0:3a:42:3b:45:45:d8:d0:85:ac:e5:49:58:dd:f2:49:58:6d:79:be:6a ip 10.215.168.1 port 8443
at DUT0
and expect this output:
Show output
sdns://AQAAAAAAAAAAETEwLjIxNS4xNjguMTo4NDQzIHS09JljcqGSz1yaoDpCO0VF2NCFrOVJWN3ySVhteb5qGjIuZG5zY3J5cHQtY2VydC5yZW1vdGUuZG5z
Step 3: Set the following configuration in DUT0
:
set system certificate trust running://remote.dns-server.crt set service dns proxy server-name RD set service dns proxy static RD stamp 'sdns://AQAAAAAAAAAAETEwLjIxNS4xNjguMTo4NDQzIHS09JljcqGSz1yaoDpCO0VF2NCFrOVJWN3ySVhteb5qGjIuZG5zY3J5cHQtY2VydC5yZW1vdGUuZG5z' set service dns resolver local
Step 4: Run command system journal show | cat
at DUT0
and check if output matches the following regular expressions:
^(?m)^.*\[RD\] OK \(DNSCrypt\) - rtt: \d+ms$Show output
-- Logs begin at Thu 2023-11-23 22:44:52 UTC, end at Thu 2023-11-23 22:44:55 UTC. -- Nov 23 22:44:52.488487 osdx systemd-journald[619]: Runtime journal (/run/log/journal/1b38b2114cf0481baed8058b17ed7ac1) is 2.0M, max 16.0M, 14.0M free. Nov 23 22:44:52.501681 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'system journal clear'. Nov 23 22:44:52.926504 osdx OSDxCLI[18128]: User 'admin' entered the configuration menu. Nov 23 22:44:53.054564 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.10/24'. Nov 23 22:44:53.161121 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Nov 23 22:44:53.305527 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Nov 23 22:44:53.420779 osdx cfgd[1092]: [18128]Completed change to active configuration Nov 23 22:44:53.474283 osdx OSDxCLI[18128]: User 'admin' committed the configuration. Nov 23 22:44:53.524833 osdx OSDxCLI[18128]: User 'admin' left the configuration menu. Nov 23 22:44:53.744025 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. Nov 23 22:44:53.916268 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'service dns proxy dnscrypt public-key running://dnscrypt.crt'. Nov 23 22:44:54.072710 osdx OSDxCLI[18128]: User 'admin' executed a new command: 'service dns proxy stamp calculate dns-crypt provider-name 2.dnscrypt-cert.remote.dns provider-key 74:b4:f4:99:63:72:a1:92:cf:5c:9a:a0:3a:42:3b:45:45:d8:d0:85:ac:e5:49:58:dd:f2:49:58:6d:79:be:6a ip 10.215.168.1 port 8443'. Nov 23 22:44:54.246126 osdx OSDxCLI[18128]: User 'admin' entered the configuration menu. Nov 23 22:44:54.350473 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set system certificate trust running://remote.dns-server.crt'. Nov 23 22:44:54.441943 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy server-name RD'. Nov 23 22:44:54.548526 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns proxy static RD stamp 'sdns://AQAAAAAAAAAAETEwLjIxNS4xNjguMTo4NDQzIHS09JljcqGSz1yaoDpCO0VF2NCFrOVJWN3ySVhteb5qGjIuZG5zY3J5cHQtY2VydC5yZW1vdGUuZG5z''. Nov 23 22:44:54.621866 osdx OSDxCLI[18128]: User 'admin' added a new cfg line: 'set service dns resolver local'. Nov 23 22:44:54.818724 osdx ca-certificates[21353]: Updating certificates in /etc/ssl/certs... Nov 23 22:44:55.037095 osdx zebra[1034]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): Nov 23 22:44:55.037187 osdx zebra[1034]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): Nov 23 22:44:55.037270 osdx zebra[1034]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): Nov 23 22:44:55.037351 osdx zebra[1034]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): Nov 23 22:44:55.037431 osdx zebra[1034]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): Nov 23 22:44:55.037511 osdx zebra[1034]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): Nov 23 22:44:55.510320 osdx ca-certificates[22338]: 1 added, 0 removed; done. Nov 23 22:44:55.516196 osdx ca-certificates[22342]: Running hooks in /etc/ca-certificates/update.d... Nov 23 22:44:55.521413 osdx ca-certificates[22346]: done. Nov 23 22:44:55.624604 osdx systemd[1]: Started DNSCrypt client proxy. Nov 23 22:44:55.627414 osdx cfgd[1092]: [18128]Completed change to active configuration Nov 23 22:44:55.631905 osdx OSDxCLI[18128]: User 'admin' committed the configuration. Nov 23 22:44:55.653428 osdx dnscrypt-proxy[22396]: [2023-11-23 22:44:55] [NOTICE] dnscrypt-proxy 2.0.45 Nov 23 22:44:55.653800 osdx dnscrypt-proxy[22396]: [2023-11-23 22:44:55] [NOTICE] Network connectivity detected Nov 23 22:44:55.654380 osdx dnscrypt-proxy[22396]: [2023-11-23 22:44:55] [NOTICE] Dropping privileges Nov 23 22:44:55.656457 osdx dnscrypt-proxy[22396]: [2023-11-23 22:44:55] [NOTICE] Network connectivity detected Nov 23 22:44:55.656587 osdx dnscrypt-proxy[22396]: [2023-11-23 22:44:55] [NOTICE] Now listening to 127.0.0.1:53 [UDP] Nov 23 22:44:55.656669 osdx dnscrypt-proxy[22396]: [2023-11-23 22:44:55] [NOTICE] Now listening to 127.0.0.1:53 [TCP] Nov 23 22:44:55.656759 osdx dnscrypt-proxy[22396]: [2023-11-23 22:44:55] [NOTICE] Firefox workaround initialized Nov 23 22:44:55.656833 osdx dnscrypt-proxy[22396]: [2023-11-23 22:44:55] [NOTICE] Loading the set of cloaking rules from [/tmp/tmpR4bDAW] Nov 23 22:44:55.658105 osdx dnscrypt-proxy[22396]: [2023-11-23 22:44:55] [NOTICE] [RD] OK (DNSCrypt) - rtt: 0ms Nov 23 22:44:55.658199 osdx dnscrypt-proxy[22396]: [2023-11-23 22:44:55] [NOTICE] Server with the lowest initial latency: RD (rtt: 0ms) Nov 23 22:44:55.658282 osdx dnscrypt-proxy[22396]: [2023-11-23 22:44:55] [NOTICE] dnscrypt-proxy is ready - live servers: 1 Nov 23 22:44:55.668939 osdx OSDxCLI[18128]: User 'admin' left the configuration menu.
Step 5: Run command show host lookup teldat.com type A
at DUT0
and check if output contains the following tokens:
teldat.com has address 19.18.17.16Show output
teldat.com has address 19.18.17.16