e7ba2b4cf81968a6ab7b89cfcd2948a510cb79ac
services/DNS.md
... | ... | @@ -1,6 +1,6 @@ |
1 | 1 | # DNS |
2 | 2 | |
3 | -*(tl;dr)* We have a TLD for dn42, which is `.dn42`. The anycast resolver for `.dn42` runs on `172.22.0.53`. |
|
3 | +*(tl;dr)* We have a TLD for dn42, which is `.dn42`. The anycast resolver for `.dn42` runs on `172.22.0.53` and `fd42:d42:d42:53::1`. |
|
4 | 4 | |
5 | 5 | **DNS is build from [[whois database|services/Whois]]. So please edit your DNS-records there.** |
6 | 6 | |
... | ... | @@ -12,7 +12,7 @@ Below are several ways to use the `dn42` DNS service, from easiest to more chall |
12 | 12 | |
13 | 13 | Please be aware that this method sends **all** your DNS queries (e.g. `google.com`) to a random DNS server inside dn42. The server could fake the result and point you towards the russian mafia. They probably won't, but think about what you are doing. At the end of the day, your ISP could be evil as well, so it always boils down to a question of trust. |
14 | 14 | |
15 | -To do this, just use `172.22.0.53` as your resolver, for instance in `/etc/resolv.conf`. |
|
15 | +To do this, just use `172.22.0.53` or `fd42:d42:d42:53::1` as your resolver, for instance in `/etc/resolv.conf`. |
|
16 | 16 | |
17 | 17 | ### Forwarding `.dn42` queries to the anycast resolver |
18 | 18 |