Static
Test suite to validate using one of the DNS options available in an upstream server
DNS-over-HTTPS Server
Description
Configures DUT0 to connect, using DNS-over-HTTPS (DoH) over an upstream server.
Scenario
Step 1: Set the following configuration in DUT0
:
set system certificate trust running://remote.dns-server.crt set service dns proxy server-name RD set service dns proxy static RD protocol dns-over-https host name remote.dns set service dns proxy static RD protocol dns-over-https ip 10.215.168.1 set service dns proxy static RD protocol dns-over-https hash 563c4f02c5ec6eb3d02a1ff7b1e2ca38884464e5e7e227ba087ee6524ee6fbac set service dns resolver local
Step 2: Run command system journal show | cat
at DUT0
and check if output matches the following regular expressions:
^(?m)^.*\[RD\] OK \(DoH\) - rtt: \d+ms$Show output
-- Logs begin at Wed 2024-04-03 21:45:46 UTC, end at Wed 2024-04-03 21:45:49 UTC. -- Apr 03 21:45:46.354438 osdx systemd-journald[625]: Runtime journal (/run/log/journal/c88512c9e850498898bc11ea5f3658d6) is 2.0M, max 16.0M, 14.0M free. Apr 03 21:45:46.373221 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'system journal clear'. Apr 03 21:45:46.734276 osdx OSDxCLI[26772]: User 'admin' entered the configuration menu. Apr 03 21:45:46.857358 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.10/24'. Apr 03 21:45:46.949742 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Apr 03 21:45:47.078900 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Apr 03 21:45:47.174660 osdx cfgd[1091]: [26772]Completed change to active configuration Apr 03 21:45:47.218841 osdx OSDxCLI[26772]: User 'admin' committed the configuration. Apr 03 21:45:47.250340 osdx OSDxCLI[26772]: User 'admin' left the configuration menu. Apr 03 21:45:47.457351 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. Apr 03 21:45:47.670698 osdx OSDxCLI[26772]: User 'admin' entered the configuration menu. Apr 03 21:45:47.772685 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set system certificate trust running://remote.dns-server.crt'. Apr 03 21:45:47.867327 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy server-name RD'. Apr 03 21:45:47.961432 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-over-https host name remote.dns'. Apr 03 21:45:48.055132 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-over-https ip 10.215.168.1'. Apr 03 21:45:48.157405 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-over-https hash 563c4f02c5ec6eb3d02a1ff7b1e2ca38884464e5e7e227ba087ee6524ee6fbac'. Apr 03 21:45:48.286627 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns resolver local'. Apr 03 21:45:48.483257 osdx ca-certificates[18775]: Updating certificates in /etc/ssl/certs... Apr 03 21:45:49.242787 osdx ca-certificates[19759]: 1 added, 0 removed; done. Apr 03 21:45:49.249030 osdx ca-certificates[19763]: Running hooks in /etc/ca-certificates/update.d... Apr 03 21:45:49.254445 osdx ca-certificates[19767]: done. Apr 03 21:45:49.383093 osdx systemd[1]: Started DNSCrypt client proxy. Apr 03 21:45:49.387002 osdx cfgd[1091]: [26772]Completed change to active configuration Apr 03 21:45:49.396386 osdx OSDxCLI[26772]: User 'admin' committed the configuration. Apr 03 21:45:49.426994 osdx dnscrypt-proxy[19817]: [2024-04-03 21:45:49] [NOTICE] dnscrypt-proxy 2.0.45 Apr 03 21:45:49.427378 osdx dnscrypt-proxy[19817]: [2024-04-03 21:45:49] [NOTICE] Network connectivity detected Apr 03 21:45:49.428071 osdx dnscrypt-proxy[19817]: [2024-04-03 21:45:49] [NOTICE] Dropping privileges Apr 03 21:45:49.430255 osdx dnscrypt-proxy[19817]: [2024-04-03 21:45:49] [NOTICE] Network connectivity detected Apr 03 21:45:49.430394 osdx dnscrypt-proxy[19817]: [2024-04-03 21:45:49] [NOTICE] Now listening to 127.0.0.1:53 [UDP] Apr 03 21:45:49.430490 osdx dnscrypt-proxy[19817]: [2024-04-03 21:45:49] [NOTICE] Now listening to 127.0.0.1:53 [TCP] Apr 03 21:45:49.430589 osdx dnscrypt-proxy[19817]: [2024-04-03 21:45:49] [NOTICE] Firefox workaround initialized Apr 03 21:45:49.430664 osdx dnscrypt-proxy[19817]: [2024-04-03 21:45:49] [NOTICE] Loading the set of cloaking rules from [/tmp/tmpCPSwNM] Apr 03 21:45:49.440790 osdx OSDxCLI[26772]: User 'admin' left the configuration menu. Apr 03 21:45:49.651604 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'system journal show | cat'. Apr 03 21:45:49.655594 osdx dnscrypt-proxy[19817]: [2024-04-03 21:45:49] [NOTICE] [RD] OK (DoH) - rtt: 189ms Apr 03 21:45:49.655594 osdx dnscrypt-proxy[19817]: [2024-04-03 21:45:49] [NOTICE] Server with the lowest initial latency: RD (rtt: 189ms) Apr 03 21:45:49.655594 osdx dnscrypt-proxy[19817]: [2024-04-03 21:45:49] [NOTICE] dnscrypt-proxy is ready - live servers: 1
Step 3: Run command show host lookup teldat.com type A
at DUT0
and check if output contains the following tokens:
teldat.com has address 19.18.17.16Show output
teldat.com has address 19.18.17.16
DNS-over-HTTPS Server With Stamp
Description
Configures DUT0 to connect, using DNS-over-HTTPS (DoH) over an upstream server (generating a DNS stamp and using it to configure the connection).
Scenario
Step 1: Run command service dns proxy stamp calculate dns-over-https host-name remote.dns host-path /dns-query host-port 443 ip 10.215.168.1 hash 563c4f02c5ec6eb3d02a1ff7b1e2ca38884464e5e7e227ba087ee6524ee6fbac
at DUT0
and expect this output:
Show output
sdns://AgAAAAAAAAAADDEwLjIxNS4xNjguMSBWPE8Cxexus9AqH_ex4so4iERk5efiJ7oIfuZSTub7rApyZW1vdGUuZG5zCi9kbnMtcXVlcnk
Step 2: Set the following configuration in DUT0
:
set system certificate trust running://remote.dns-server.crt set service dns proxy server-name RD set service dns proxy static RD stamp 'sdns://AgAAAAAAAAAADDEwLjIxNS4xNjguMSBWPE8Cxexus9AqH_ex4so4iERk5efiJ7oIfuZSTub7rApyZW1vdGUuZG5zCi9kbnMtcXVlcnk' set service dns resolver local
Step 3: Run command system journal show | cat
at DUT0
and check if output matches the following regular expressions:
^(?m)^.*\[RD\] OK \(DoH\) - rtt: \d+ms$Show output
-- Logs begin at Wed 2024-04-03 21:45:57 UTC, end at Wed 2024-04-03 21:46:00 UTC. -- Apr 03 21:45:57.363869 osdx systemd-journald[625]: Runtime journal (/run/log/journal/c88512c9e850498898bc11ea5f3658d6) is 2.0M, max 16.0M, 14.0M free. Apr 03 21:45:57.381411 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'system journal clear'. Apr 03 21:45:57.746354 osdx OSDxCLI[26772]: User 'admin' entered the configuration menu. Apr 03 21:45:57.872352 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.10/24'. Apr 03 21:45:58.023665 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Apr 03 21:45:58.188449 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Apr 03 21:45:58.284119 osdx cfgd[1091]: [26772]Completed change to active configuration Apr 03 21:45:58.329710 osdx OSDxCLI[26772]: User 'admin' committed the configuration. Apr 03 21:45:58.375251 osdx OSDxCLI[26772]: User 'admin' left the configuration menu. Apr 03 21:45:58.554542 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. Apr 03 21:45:58.771132 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'service dns proxy stamp calculate dns-over-https host-name remote.dns host-path /dns-query host-port 443 ip 10.215.168.1 hash 563c4f02c5ec6eb3d02a1ff7b1e2ca38884464e5e7e227ba087ee6524ee6fbac'. Apr 03 21:45:58.948076 osdx OSDxCLI[26772]: User 'admin' entered the configuration menu. Apr 03 21:45:59.059288 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set system certificate trust running://remote.dns-server.crt'. Apr 03 21:45:59.179744 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy server-name RD'. Apr 03 21:45:59.298150 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy static RD stamp 'sdns://AgAAAAAAAAAADDEwLjIxNS4xNjguMSBWPE8Cxexus9AqH_ex4so4iERk5efiJ7oIfuZSTub7rApyZW1vdGUuZG5zCi9kbnMtcXVlcnk''. Apr 03 21:45:59.427236 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns resolver local'. Apr 03 21:45:59.565930 osdx ca-certificates[21566]: Updating certificates in /etc/ssl/certs... Apr 03 21:45:59.948149 osdx zebra[1033]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): Apr 03 21:46:00.214075 osdx ca-certificates[22550]: 1 added, 0 removed; done. Apr 03 21:46:00.220512 osdx ca-certificates[22554]: Running hooks in /etc/ca-certificates/update.d... Apr 03 21:46:00.226250 osdx ca-certificates[22558]: done. Apr 03 21:46:00.333397 osdx systemd[1]: Started DNSCrypt client proxy. Apr 03 21:46:00.337617 osdx cfgd[1091]: [26772]Completed change to active configuration Apr 03 21:46:00.346800 osdx OSDxCLI[26772]: User 'admin' committed the configuration. Apr 03 21:46:00.366620 osdx dnscrypt-proxy[22608]: [2024-04-03 21:46:00] [NOTICE] dnscrypt-proxy 2.0.45 Apr 03 21:46:00.367466 osdx dnscrypt-proxy[22608]: [2024-04-03 21:46:00] [NOTICE] Network connectivity detected Apr 03 21:46:00.367466 osdx dnscrypt-proxy[22608]: [2024-04-03 21:46:00] [NOTICE] Dropping privileges Apr 03 21:46:00.369832 osdx dnscrypt-proxy[22608]: [2024-04-03 21:46:00] [NOTICE] Network connectivity detected Apr 03 21:46:00.369977 osdx dnscrypt-proxy[22608]: [2024-04-03 21:46:00] [NOTICE] Now listening to 127.0.0.1:53 [UDP] Apr 03 21:46:00.370064 osdx dnscrypt-proxy[22608]: [2024-04-03 21:46:00] [NOTICE] Now listening to 127.0.0.1:53 [TCP] Apr 03 21:46:00.370156 osdx dnscrypt-proxy[22608]: [2024-04-03 21:46:00] [NOTICE] Firefox workaround initialized Apr 03 21:46:00.370232 osdx dnscrypt-proxy[22608]: [2024-04-03 21:46:00] [NOTICE] Loading the set of cloaking rules from [/tmp/tmp_t3Xz4] Apr 03 21:46:00.383056 osdx OSDxCLI[26772]: User 'admin' left the configuration menu. Apr 03 21:46:00.528308 osdx dnscrypt-proxy[22608]: [2024-04-03 21:46:00] [NOTICE] [RD] OK (DoH) - rtt: 118ms Apr 03 21:46:00.528939 osdx dnscrypt-proxy[22608]: [2024-04-03 21:46:00] [NOTICE] Server with the lowest initial latency: RD (rtt: 118ms) Apr 03 21:46:00.529030 osdx dnscrypt-proxy[22608]: [2024-04-03 21:46:00] [NOTICE] dnscrypt-proxy is ready - live servers: 1
Step 4: Run command show host lookup teldat.com type A
at DUT0
and check if output contains the following tokens:
teldat.com has address 19.18.17.16Show output
teldat.com has address 19.18.17.16
DNSCrypt Server
Description
Configures DUT0 to connect, using DNSCrypt over an upstream server.
Scenario
Step 1: Run command service dns proxy dnscrypt public-key running://dnscrypt.crt
at DUT0
and expect this output:
Show output
7b:34:34:cb:90:56:e5:68:1f:49:25:5f:bc:5e:ef:fa:27:91:15:94:3b:cf:1b:58:ff:17:de:b1:e3:4c:da:8f
Step 2: Set the following configuration in DUT0
:
set system certificate trust running://remote.dns-server.crt set service dns proxy server-name RD set service dns proxy static RD protocol dns-crypt ip 10.215.168.1 set service dns proxy static RD protocol dns-crypt port 8443 set service dns proxy static RD protocol dns-crypt provider name 2.dnscrypt-cert.remote.dns set service dns proxy static RD protocol dns-crypt provider public-key 7b:34:34:cb:90:56:e5:68:1f:49:25:5f:bc:5e:ef:fa:27:91:15:94:3b:cf:1b:58:ff:17:de:b1:e3:4c:da:8f set service dns resolver local
Step 3: Run command system journal show | cat
at DUT0
and check if output matches the following regular expressions:
^(?m)^.*\[RD\] OK \(DNSCrypt\) - rtt: \d+ms$Show output
-- Logs begin at Wed 2024-04-03 21:46:09 UTC, end at Wed 2024-04-03 21:46:12 UTC. -- Apr 03 21:46:09.356661 osdx systemd-journald[625]: Runtime journal (/run/log/journal/c88512c9e850498898bc11ea5f3658d6) is 2.0M, max 16.0M, 14.0M free. Apr 03 21:46:09.369887 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'system journal clear'. Apr 03 21:46:09.744944 osdx OSDxCLI[26772]: User 'admin' entered the configuration menu. Apr 03 21:46:09.864986 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.10/24'. Apr 03 21:46:09.958101 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Apr 03 21:46:10.098414 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Apr 03 21:46:10.220634 osdx cfgd[1091]: [26772]Completed change to active configuration Apr 03 21:46:10.271109 osdx OSDxCLI[26772]: User 'admin' committed the configuration. Apr 03 21:46:10.300668 osdx OSDxCLI[26772]: User 'admin' left the configuration menu. Apr 03 21:46:10.480535 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. Apr 03 21:46:10.614279 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'service dns proxy dnscrypt public-key running://dnscrypt.crt'. Apr 03 21:46:10.820102 osdx OSDxCLI[26772]: User 'admin' entered the configuration menu. Apr 03 21:46:10.951736 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set system certificate trust running://remote.dns-server.crt'. Apr 03 21:46:11.107168 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy server-name RD'. Apr 03 21:46:11.207301 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-crypt ip 10.215.168.1'. Apr 03 21:46:11.319492 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-crypt port 8443'. Apr 03 21:46:11.429762 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-crypt provider name 2.dnscrypt-cert.remote.dns'. Apr 03 21:46:11.615687 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy static RD protocol dns-crypt provider public-key 7b:34:34:cb:90:56:e5:68:1f:49:25:5f:bc:5e:ef:fa:27:91:15:94:3b:cf:1b:58:ff:17:de:b1:e3:4c:da:8f'. Apr 03 21:46:11.726782 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns resolver local'. Apr 03 21:46:11.902626 osdx ca-certificates[24352]: Updating certificates in /etc/ssl/certs... Apr 03 21:46:12.579883 osdx ca-certificates[25336]: 1 added, 0 removed; done. Apr 03 21:46:12.585822 osdx ca-certificates[25340]: Running hooks in /etc/ca-certificates/update.d... Apr 03 21:46:12.591219 osdx ca-certificates[25344]: done. Apr 03 21:46:12.703565 osdx systemd[1]: Started DNSCrypt client proxy. Apr 03 21:46:12.706462 osdx cfgd[1091]: [26772]Completed change to active configuration Apr 03 21:46:12.715180 osdx OSDxCLI[26772]: User 'admin' committed the configuration. Apr 03 21:46:12.733977 osdx dnscrypt-proxy[25394]: [2024-04-03 21:46:12] [NOTICE] dnscrypt-proxy 2.0.45 Apr 03 21:46:12.734396 osdx dnscrypt-proxy[25394]: [2024-04-03 21:46:12] [NOTICE] Network connectivity detected Apr 03 21:46:12.735012 osdx dnscrypt-proxy[25394]: [2024-04-03 21:46:12] [NOTICE] Dropping privileges Apr 03 21:46:12.737411 osdx dnscrypt-proxy[25394]: [2024-04-03 21:46:12] [NOTICE] Network connectivity detected Apr 03 21:46:12.737565 osdx dnscrypt-proxy[25394]: [2024-04-03 21:46:12] [NOTICE] Now listening to 127.0.0.1:53 [UDP] Apr 03 21:46:12.737679 osdx dnscrypt-proxy[25394]: [2024-04-03 21:46:12] [NOTICE] Now listening to 127.0.0.1:53 [TCP] Apr 03 21:46:12.737784 osdx dnscrypt-proxy[25394]: [2024-04-03 21:46:12] [NOTICE] Firefox workaround initialized Apr 03 21:46:12.737858 osdx dnscrypt-proxy[25394]: [2024-04-03 21:46:12] [NOTICE] Loading the set of cloaking rules from [/tmp/tmpdAdNvZ] Apr 03 21:46:12.756107 osdx OSDxCLI[26772]: User 'admin' left the configuration menu. Apr 03 21:46:12.757180 osdx dnscrypt-proxy[25394]: [2024-04-03 21:46:12] [NOTICE] [RD] OK (DNSCrypt) - rtt: 17ms Apr 03 21:46:12.757313 osdx dnscrypt-proxy[25394]: [2024-04-03 21:46:12] [NOTICE] Server with the lowest initial latency: RD (rtt: 17ms) Apr 03 21:46:12.757420 osdx dnscrypt-proxy[25394]: [2024-04-03 21:46:12] [NOTICE] dnscrypt-proxy is ready - live servers: 1
Step 4: Run command show host lookup teldat.com type A
at DUT0
and check if output contains the following tokens:
teldat.com has address 19.18.17.16Show output
teldat.com has address 19.18.17.16
DNSCrypt Server With Stamp
Description
Configures DUT0 to connect, using DNSCrypt over an upstream server (generating a DNS stamp and using it to configure the connection).
Scenario
Step 1: Run command service dns proxy dnscrypt public-key running://dnscrypt.crt
at DUT0
and expect this output:
Show output
7b:34:34:cb:90:56:e5:68:1f:49:25:5f:bc:5e:ef:fa:27:91:15:94:3b:cf:1b:58:ff:17:de:b1:e3:4c:da:8f
Step 2: Run command service dns proxy stamp calculate dns-crypt provider-name 2.dnscrypt-cert.remote.dns provider-key 7b:34:34:cb:90:56:e5:68:1f:49:25:5f:bc:5e:ef:fa:27:91:15:94:3b:cf:1b:58:ff:17:de:b1:e3:4c:da:8f ip 10.215.168.1 port 8443
at DUT0
and expect this output:
Show output
sdns://AQAAAAAAAAAAETEwLjIxNS4xNjguMTo4NDQzIHs0NMuQVuVoH0klX7xe7_onkRWUO88bWP8X3rHjTNqPGjIuZG5zY3J5cHQtY2VydC5yZW1vdGUuZG5z
Step 3: Set the following configuration in DUT0
:
set system certificate trust running://remote.dns-server.crt set service dns proxy server-name RD set service dns proxy static RD stamp 'sdns://AQAAAAAAAAAAETEwLjIxNS4xNjguMTo4NDQzIHs0NMuQVuVoH0klX7xe7_onkRWUO88bWP8X3rHjTNqPGjIuZG5zY3J5cHQtY2VydC5yZW1vdGUuZG5z' set service dns resolver local
Step 4: Run command system journal show | cat
at DUT0
and check if output matches the following regular expressions:
^(?m)^.*\[RD\] OK \(DNSCrypt\) - rtt: \d+ms$Show output
-- Logs begin at Wed 2024-04-03 21:46:21 UTC, end at Wed 2024-04-03 21:46:24 UTC. -- Apr 03 21:46:21.443174 osdx systemd-journald[625]: Runtime journal (/run/log/journal/c88512c9e850498898bc11ea5f3658d6) is 2.0M, max 16.0M, 14.0M free. Apr 03 21:46:21.456492 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'system journal clear'. Apr 03 21:46:21.821849 osdx OSDxCLI[26772]: User 'admin' entered the configuration menu. Apr 03 21:46:21.975409 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.10/24'. Apr 03 21:46:22.089634 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Apr 03 21:46:22.258184 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Apr 03 21:46:22.372268 osdx cfgd[1091]: [26772]Completed change to active configuration Apr 03 21:46:22.417772 osdx OSDxCLI[26772]: User 'admin' committed the configuration. Apr 03 21:46:22.450223 osdx OSDxCLI[26772]: User 'admin' left the configuration menu. Apr 03 21:46:22.627820 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. Apr 03 21:46:22.773078 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'service dns proxy dnscrypt public-key running://dnscrypt.crt'. Apr 03 21:46:22.932772 osdx OSDxCLI[26772]: User 'admin' executed a new command: 'service dns proxy stamp calculate dns-crypt provider-name 2.dnscrypt-cert.remote.dns provider-key 7b:34:34:cb:90:56:e5:68:1f:49:25:5f:bc:5e:ef:fa:27:91:15:94:3b:cf:1b:58:ff:17:de:b1:e3:4c:da:8f ip 10.215.168.1 port 8443'. Apr 03 21:46:23.151407 osdx OSDxCLI[26772]: User 'admin' entered the configuration menu. Apr 03 21:46:23.282095 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set system certificate trust running://remote.dns-server.crt'. Apr 03 21:46:23.408092 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy server-name RD'. Apr 03 21:46:23.540623 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns proxy static RD stamp 'sdns://AQAAAAAAAAAAETEwLjIxNS4xNjguMTo4NDQzIHs0NMuQVuVoH0klX7xe7_onkRWUO88bWP8X3rHjTNqPGjIuZG5zY3J5cHQtY2VydC5yZW1vdGUuZG5z''. Apr 03 21:46:23.666966 osdx OSDxCLI[26772]: User 'admin' added a new cfg line: 'set service dns resolver local'. Apr 03 21:46:23.819949 osdx ca-certificates[27136]: Updating certificates in /etc/ssl/certs... Apr 03 21:46:24.481699 osdx zebra[1033]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): Apr 03 21:46:24.481821 osdx zebra[1033]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): Apr 03 21:46:24.489839 osdx zebra[1033]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): Apr 03 21:46:24.627455 osdx ca-certificates[28120]: 1 added, 0 removed; done. Apr 03 21:46:24.633993 osdx ca-certificates[28125]: Running hooks in /etc/ca-certificates/update.d... Apr 03 21:46:24.639261 osdx ca-certificates[28128]: done. Apr 03 21:46:24.768684 osdx systemd[1]: Started DNSCrypt client proxy. Apr 03 21:46:24.771702 osdx cfgd[1091]: [26772]Completed change to active configuration Apr 03 21:46:24.779598 osdx OSDxCLI[26772]: User 'admin' committed the configuration. Apr 03 21:46:24.810477 osdx dnscrypt-proxy[28178]: [2024-04-03 21:46:24] [NOTICE] dnscrypt-proxy 2.0.45 Apr 03 21:46:24.810990 osdx dnscrypt-proxy[28178]: [2024-04-03 21:46:24] [NOTICE] Network connectivity detected Apr 03 21:46:24.811665 osdx dnscrypt-proxy[28178]: [2024-04-03 21:46:24] [NOTICE] Dropping privileges Apr 03 21:46:24.815126 osdx dnscrypt-proxy[28178]: [2024-04-03 21:46:24] [NOTICE] Network connectivity detected Apr 03 21:46:24.815359 osdx dnscrypt-proxy[28178]: [2024-04-03 21:46:24] [NOTICE] Now listening to 127.0.0.1:53 [UDP] Apr 03 21:46:24.815470 osdx dnscrypt-proxy[28178]: [2024-04-03 21:46:24] [NOTICE] Now listening to 127.0.0.1:53 [TCP] Apr 03 21:46:24.815600 osdx dnscrypt-proxy[28178]: [2024-04-03 21:46:24] [NOTICE] Firefox workaround initialized Apr 03 21:46:24.815702 osdx dnscrypt-proxy[28178]: [2024-04-03 21:46:24] [NOTICE] Loading the set of cloaking rules from [/tmp/tmpgFZa1J] Apr 03 21:46:24.817120 osdx dnscrypt-proxy[28178]: [2024-04-03 21:46:24] [NOTICE] [RD] OK (DNSCrypt) - rtt: 0ms Apr 03 21:46:24.817281 osdx dnscrypt-proxy[28178]: [2024-04-03 21:46:24] [NOTICE] Server with the lowest initial latency: RD (rtt: 0ms) Apr 03 21:46:24.817393 osdx dnscrypt-proxy[28178]: [2024-04-03 21:46:24] [NOTICE] dnscrypt-proxy is ready - live servers: 1 Apr 03 21:46:24.838439 osdx OSDxCLI[26772]: User 'admin' left the configuration menu.
Step 5: Run command show host lookup teldat.com type A
at DUT0
and check if output contains the following tokens:
teldat.com has address 19.18.17.16Show output
teldat.com has address 19.18.17.16