You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, dokodemo-door acts as a passive TCP/UDP forwarder.
With sniffing, it could be possible to:
Apply routing.rules with domain: match
Allow/block specific domains (e.g., *.baidu.com, *.google.com)
Log or redirect based on the requested domain
Real world scenario: I'm running public DNS/DoT entry point, so want to enforce access rules. Certainly:
Allow public DNS queries only to the base domain ultibot.ru to use it as a bootstrap point for Xray client config;
Block everything else for public, but still run the Xray built-in resolver for all domains for private access (DNS over VLESS).
Adding this to Xray would make it even more powerful as a full-featured edge resolver.
Maybe the idea will be useful for Chinese people who host servers as well. This would be especially helpful for server operators in China who expose DNS or DoT endpoints and need to restrict access to specific domains while complying with local policies and avoiding DNS pollution or hijacking. Having sniffing in dokodemo-door would allow them to run Xray as a filtered edge DNS without needing to rely on external tools like dnsdist.
I believe no rewriting of destination address is needed to allow access control.
Thanks for delivering the great software, by the way. It is already very flexible, allowed me to use DNS over TLS by simply adding streamSettings for the outbound, and many more.
The text was updated successfully, but these errors were encountered:
Currently, dokodemo-door acts as a passive TCP/UDP forwarder.
With sniffing, it could be possible to:
domain:
matchReal world scenario: I'm running public DNS/DoT entry point, so want to enforce access rules. Certainly:
ultibot.ru
to use it as a bootstrap point for Xray client config;Adding this to Xray would make it even more powerful as a full-featured edge resolver.
Maybe the idea will be useful for Chinese people who host servers as well. This would be especially helpful for server operators in China who expose DNS or DoT endpoints and need to restrict access to specific domains while complying with local policies and avoiding DNS pollution or hijacking. Having sniffing in dokodemo-door would allow them to run Xray as a filtered edge DNS without needing to rely on external tools like dnsdist.
I believe no rewriting of destination address is needed to allow access control.
Thanks for delivering the great software, by the way. It is already very flexible, allowed me to use DNS over TLS by simply adding
streamSettings
for the outbound, and many more.The text was updated successfully, but these errors were encountered: