edit
For testing
-
uncheck DNS 185.49.141.37 , 46.182.19.48
-
change ‘Protocol for DNS qeries’ to UDP
(Don’t forget to click “Save”) -
reboot IPFire
-
repeat connection tests with
ipfire.org
Additional information about dns2.digitalcourage.de
dns2.digitalcourage.de
Virtual machine for all DNS varieties:
Server location: external, German data center
IPV4: 46.182.19.48 (Please no longer record in new configurations!)*
IPV6: 2A02: 2970: 1002 :: 18 (please no longer record in new configurations!)*
Port: 53 (unencrypted DNS)
Port: 853 (encrypted DNS, but please use dns3.digitalcourage.de)
SHA256 SPKI Pinset of the server (tls_pubkey_pinset): v7rm6otqqd3x/wbsdhdzjidg+utmzvnox3jq3vi8tgu =
Common name of the certificate (tls_auth_name): dns2.digitalcourage.de
Exhibitor of the certificate: Let's Encrypt
No logging - only in the event of a fault
* DNS2.digitalcourage.de now sends over 2000 successful answers per second at peak times. Unfortunately, much more power will not be possible on this server. We thank you for the trust and ask not to enter this server in new configurations.
For technical reasons, this server uses a different IP in the backend (for the resolver), which is why the following IP is displayed for usual DNS leak tests: 46.182.18.9 / dns2.digitalcourage.de
https://digitalcourage.de/support/zensurfreier-dns-server