├── .cache
└── plugin
│ └── social
│ ├── 1c06b6564b57e614b36a65d12c7e2945.png
│ ├── 20755e15cc1f82126f80a2565e3fa5d4.png
│ ├── 2e0c3477378e081d14c6e9f8a9d6e373.png
│ ├── 2f00fcc6c221a538103f34b881bb59a5.png
│ ├── 3c0a6a188b8fef9cf736cc485d961849.png
│ ├── 3c51fd09f8ed30eaec841fb2045ad5b1.png
│ ├── 4a95d019ceb0055466d5d8b3a029d1e1.png
│ ├── 4b956ca77732b1cc5083fe643ca8306c.png
│ ├── 7348cf37779c449c073ddfd6659f4d64.png
│ ├── 75b337d93646e0c3ccce500f9da12f49.png
│ ├── 8f1d275bb89a351f1c7a819a100f72cc.png
│ ├── 929acd96f4c0eae7d7cd88354678597c.png
│ ├── 9b98de8ef9c861d31478b303f7859afb.png
│ ├── Roboto-Black.ttf
│ ├── Roboto-BlackItalic.ttf
│ ├── Roboto-Bold.ttf
│ ├── Roboto-BoldItalic.ttf
│ ├── Roboto-Italic.ttf
│ ├── Roboto-Light.ttf
│ ├── Roboto-LightItalic.ttf
│ ├── Roboto-Medium.ttf
│ ├── Roboto-MediumItalic.ttf
│ ├── Roboto-Regular.ttf
│ ├── Roboto-Thin.ttf
│ ├── Roboto-ThinItalic.ttf
│ ├── b665236659d416e75e419c6af9a14609.png
│ ├── c4cdbabb72eed4a123bf7417336a1de5.png
│ ├── d20b8f54930ac6e71cfd0b03117924df.png
│ ├── d9e25cfe516c514096708641f0e2d91b.png
│ ├── da9a9f80356749ffa0c1e667c25b6971.png
│ ├── de86a83da1783db5d93b108a18b96b22.png
│ ├── ea8684ba8dd6e1e223587077630f9a33.png
│ ├── f50d76f9c894216b3ab8509201e636a8.png
│ ├── fb8554416de38012260fb4c14bd5cddb.png
│ ├── ff29475245027f1e46118b05a7b731bb.png
│ └── ffd04b049fccf2226962eea9be67ac7e.png
├── .github
└── workflows
│ └── ci.yml
├── .gitignore
├── COPYING
├── LICENSE
├── README.md
├── docs
├── assets
│ ├── conf
│ │ ├── freebsd
│ │ │ ├── forward.conf
│ │ │ └── unbound.conf
│ │ ├── mobileconfig
│ │ │ └── Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig
│ │ └── openbsd
│ │ │ └── unbound.conf
│ ├── logo_light.png
│ ├── logo_light.svg
│ ├── mobileconfig
│ │ ├── Quad9_MobileConfig2025_en.ics
│ │ ├── Quad9_Secured_DNS_over_HTTPS_20250129.mobileconfig
│ │ ├── Quad9_Secured_DNS_over_HTTPS_20260126.mobileconfig
│ │ ├── Quad9_Secured_DNS_over_HTTPS_ECS_20250129.mobileconfig
│ │ ├── Quad9_Secured_DNS_over_HTTPS_ECS_20260126.mobileconfig
│ │ ├── Quad9_Secured_DNS_over_TLS_20250129.mobileconfig
│ │ ├── Quad9_Secured_DNS_over_TLS_20260126.mobileconfig
│ │ ├── Quad9_Secured_DNS_over_TLS_ECS_20250129.mobileconfig
│ │ ├── Quad9_Secured_DNS_over_TLS_ECS_20260126.mobileconfig
│ │ ├── Quad9_un_Secured_DNS_over_HTTPS_20250129.mobileconfig
│ │ ├── Quad9_un_Secured_DNS_over_HTTPS_20260126.mobileconfig
│ │ ├── Quad9_un_Secured_DNS_over_HTTPS_ECS_20250129.mobileconfig
│ │ ├── Quad9_un_Secured_DNS_over_HTTPS_ECS_20260126.mobileconfig
│ │ ├── Quad9_un_Secured_DNS_over_TLS_20250129.mobileconfig
│ │ ├── Quad9_un_Secured_DNS_over_TLS_20260126.mobileconfig
│ │ ├── Quad9_un_Secured_DNS_over_TLS_ECS_20250129.mobileconfig
│ │ └── Quad9_un_Secured_DNS_over_TLS_ECS_20260126.mobileconfig
│ └── quad9_all_white.svg
├── en
│ ├── FAQs.md
│ ├── Quad9_For_Organizations
│ │ └── DNS_Forwarder_Best_Practices.md
│ ├── Setup_Guides
│ │ ├── Android
│ │ │ └── Android_9+_(Encrypted).md
│ │ ├── ChromeOS_(Chromebook).md
│ │ ├── DNS_Forwarders
│ │ │ └── Windows_Server.md
│ │ ├── Linux_and_BSD
│ │ │ ├── Fedora_38.md
│ │ │ ├── FreeBSD_(Encrypted).md
│ │ │ ├── Linux_Mint_21.2.md
│ │ │ ├── MX_Linux_23.md
│ │ │ ├── OpenBSD_(Encrypted).md
│ │ │ ├── Ubuntu_20.04_and_22.04.md
│ │ │ └── Ubuntu_22.04_(Encrypted).md
│ │ ├── MacOS
│ │ │ └── Big_Sur_and_later_(Encrypted).md
│ │ ├── Miscellaneous
│ │ │ ├── Cloudflared_and_Quad9.md
│ │ │ └── Pi-Hole.md
│ │ ├── Open-Source_Routers
│ │ │ ├── IPFire_(Encrypted).md
│ │ │ ├── MikroTik_RouterOS_(Encrypted).md
│ │ │ ├── OPNsense_(Encrypted).md
│ │ │ ├── OpenWrt_LuCi.md
│ │ │ └── pfSense_(Encrypted).md
│ │ ├── Windows
│ │ │ ├── Windows_10.md
│ │ │ └── Windows_11_(Encrypted).md
│ │ └── iOS
│ │ │ └── iOS_14_and_later_(Encrypted).md
│ ├── assets
│ │ ├── conf
│ │ │ ├── freebsd
│ │ │ │ ├── forward.conf
│ │ │ │ └── unbound.conf
│ │ │ ├── mobileconfig
│ │ │ │ └── Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig
│ │ │ └── openbsd
│ │ │ │ └── unbound.conf
│ │ ├── logo_light.png
│ │ ├── logo_light.svg
│ │ └── quad9_all_white.svg
│ ├── images
│ │ ├── favicon.svg
│ │ ├── quad9_logo_dark.svg
│ │ └── quad9_logo_light.svg
│ ├── index.md
│ ├── jobs
│ │ └── Senior_Technical_Support_Engineer_(Remote).md
│ ├── services.md
│ └── stylesheets
│ │ └── extra.css
├── es
│ ├── FAQ.md
│ ├── Guías_de_configuración
│ │ ├── Android
│ │ │ └── Android_9+_(Encriptado).md
│ │ ├── ChromeOS_(Chromebook).md
│ │ ├── Linux_y_BSD
│ │ │ ├── FreeBSD_(Encriptado).md
│ │ │ ├── OpenBSD_(Encriptado).md
│ │ │ ├── Ubuntu_20.04_y_22.04.md
│ │ │ └── Ubuntu_22.04_(Encriptado).md
│ │ ├── Misceláneas
│ │ │ └── Cloudflared_y_Quad9.md
│ │ ├── Open_Source_Enrutadores
│ │ │ ├── IPFire_(Encriptado).md
│ │ │ ├── MikroTik_RouterOS_(Encriptado).md
│ │ │ ├── OPNsense_(Encriptado).md
│ │ │ ├── OpenWrt_(LuCi).md
│ │ │ └── pfSense_(Encriptado).md
│ │ ├── Windows
│ │ │ └── Windows_10.md
│ │ └── iOS
│ │ │ └── iOS_14_y_despues_(Encriptado).md
│ ├── Quad9_para_organizaciones
│ │ └── Recomendaciones_para_el_reenviardor_DNS.md
│ ├── assets
│ │ ├── conf
│ │ │ ├── freebsd
│ │ │ │ ├── forward.conf
│ │ │ │ └── unbound.conf
│ │ │ ├── mobileconfig
│ │ │ │ └── Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig
│ │ │ └── openbsd
│ │ │ │ └── unbound.conf
│ │ ├── logo_light.png
│ │ ├── logo_light.svg
│ │ └── quad9_all_white.svg
│ ├── images
│ │ ├── favicon.svg
│ │ ├── quad9_logo_dark.svg
│ │ └── quad9_logo_light.svg
│ ├── index.md
│ ├── servicios.md
│ └── stylesheets
│ │ └── extra.css
├── fr
│ ├── FAQ.md
│ ├── Guides_de_configuration
│ │ ├── Android
│ │ │ └── Android_9+_(Crypté).md
│ │ ├── ChromeOS_(Chromebook).md
│ │ ├── Linux_et_BSD
│ │ │ ├── Fedora_38.md
│ │ │ ├── FreeBSD_(Chiffré).md
│ │ │ ├── OpenBSD_(Chiffré).md
│ │ │ ├── Ubuntu_20.04_et_22.04.md
│ │ │ └── Ubuntu_22.04_(Chiffré).md
│ │ ├── MacOS
│ │ │ └── Big_Sur_et_plus_récent_(Chiffré).md
│ │ ├── Miscellaneous
│ │ │ ├── Cloudflared_et_Quad9.md
│ │ │ └── Pi-Hole.md
│ │ ├── Open-Source_Routers
│ │ │ ├── IPFire_(Chiffré).md
│ │ │ ├── MikroTik_RouterOS_(Chiffré).md
│ │ │ ├── OPNsense_(Chiffré).md
│ │ │ ├── OpenWrt_LuCi.md
│ │ │ └── pfSense_(Chiffré).md
│ │ └── Windows
│ │ │ ├── Windows_10.md
│ │ │ └── Windows_11_(Crypté).md
│ ├── Quad9_pour_les_organisations
│ │ └── Meilleures pratiques du DNS forwarder.md
│ ├── assets
│ │ ├── conf
│ │ │ ├── freebsd
│ │ │ │ ├── forward.conf
│ │ │ │ └── unbound.conf
│ │ │ ├── mobileconfig
│ │ │ │ └── Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig
│ │ │ └── openbsd
│ │ │ │ └── unbound.conf
│ │ ├── logo_light.png
│ │ ├── logo_light.svg
│ │ └── quad9_all_white.svg
│ ├── images
│ │ ├── favicon.svg
│ │ ├── quad9_logo_dark.svg
│ │ └── quad9_logo_light.svg
│ ├── index.md
│ ├── services.md
│ └── stylesheets
│ │ └── extra.css
├── images
│ ├── favicon.svg
│ ├── quad9_logo_dark.svg
│ └── quad9_logo_light.svg
├── ro
│ ├── FAQs.md
│ ├── Ghiduri_de_configurare
│ │ ├── Android
│ │ │ └── Android_9+_(Criptat).md
│ │ ├── ChromeOS_(Chromebook).md
│ │ ├── DNS_Forwarders
│ │ │ └── Windows_Server.md
│ │ ├── Linux_și_BSD
│ │ │ ├── Fedora_38.md
│ │ │ ├── FreeBSD_(Criptat).md
│ │ │ ├── Linux_Mint_21.2.md
│ │ │ ├── MX_Linux_23.md
│ │ │ ├── OpenBSD_(Criptat).md
│ │ │ ├── Ubuntu_20.04_and_22.04.md
│ │ │ └── Ubuntu_22.04_(Criptat).md
│ │ ├── MacOS
│ │ │ └── Big_Sur+_(Criptat).md
│ │ ├── Miscellaneous
│ │ │ ├── Cloudflared_and_Quad9.md
│ │ │ └── Pi-Hole.md
│ │ ├── Open-Source_Routers
│ │ │ ├── IPFire_(Criptat).md
│ │ │ ├── MikroTik_RouterOS_(Criptat).md
│ │ │ ├── OPNsense_(Criptat).md
│ │ │ ├── OpenWrt_LuCi.md
│ │ │ └── pfSense_(Criptat).md
│ │ ├── Windows
│ │ │ ├── Windows_10.md
│ │ │ └── Windows_11_(Criptat).md
│ │ └── iOS
│ │ │ └── iOS_14+_(Criptat).md
│ ├── Quad9_pentru_Organizații
│ │ └── DNS_Forwarder_Best_Practices.md
│ ├── assets
│ │ ├── conf
│ │ │ ├── freebsd
│ │ │ │ ├── forward.conf
│ │ │ │ └── unbound.conf
│ │ │ ├── mobileconfig
│ │ │ │ └── Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig
│ │ │ └── openbsd
│ │ │ │ └── unbound.conf
│ │ ├── logo_light.png
│ │ ├── logo_light.svg
│ │ └── quad9_all_white.svg
│ ├── images
│ │ ├── favicon.svg
│ │ ├── quad9_logo_dark.svg
│ │ └── quad9_logo_light.svg
│ ├── index.md
│ ├── servicii.md
│ └── stylesheets
│ │ └── extra.css
└── stylesheets
│ └── extra.css
└── mkdocs.yml
/.cache/plugin/social/1c06b6564b57e614b36a65d12c7e2945.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/1c06b6564b57e614b36a65d12c7e2945.png
--------------------------------------------------------------------------------
/.cache/plugin/social/20755e15cc1f82126f80a2565e3fa5d4.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/20755e15cc1f82126f80a2565e3fa5d4.png
--------------------------------------------------------------------------------
/.cache/plugin/social/2e0c3477378e081d14c6e9f8a9d6e373.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/2e0c3477378e081d14c6e9f8a9d6e373.png
--------------------------------------------------------------------------------
/.cache/plugin/social/2f00fcc6c221a538103f34b881bb59a5.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/2f00fcc6c221a538103f34b881bb59a5.png
--------------------------------------------------------------------------------
/.cache/plugin/social/3c0a6a188b8fef9cf736cc485d961849.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/3c0a6a188b8fef9cf736cc485d961849.png
--------------------------------------------------------------------------------
/.cache/plugin/social/3c51fd09f8ed30eaec841fb2045ad5b1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/3c51fd09f8ed30eaec841fb2045ad5b1.png
--------------------------------------------------------------------------------
/.cache/plugin/social/4a95d019ceb0055466d5d8b3a029d1e1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/4a95d019ceb0055466d5d8b3a029d1e1.png
--------------------------------------------------------------------------------
/.cache/plugin/social/4b956ca77732b1cc5083fe643ca8306c.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/4b956ca77732b1cc5083fe643ca8306c.png
--------------------------------------------------------------------------------
/.cache/plugin/social/7348cf37779c449c073ddfd6659f4d64.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/7348cf37779c449c073ddfd6659f4d64.png
--------------------------------------------------------------------------------
/.cache/plugin/social/75b337d93646e0c3ccce500f9da12f49.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/75b337d93646e0c3ccce500f9da12f49.png
--------------------------------------------------------------------------------
/.cache/plugin/social/8f1d275bb89a351f1c7a819a100f72cc.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/8f1d275bb89a351f1c7a819a100f72cc.png
--------------------------------------------------------------------------------
/.cache/plugin/social/929acd96f4c0eae7d7cd88354678597c.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/929acd96f4c0eae7d7cd88354678597c.png
--------------------------------------------------------------------------------
/.cache/plugin/social/9b98de8ef9c861d31478b303f7859afb.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/9b98de8ef9c861d31478b303f7859afb.png
--------------------------------------------------------------------------------
/.cache/plugin/social/Roboto-Black.ttf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/Roboto-Black.ttf
--------------------------------------------------------------------------------
/.cache/plugin/social/Roboto-BlackItalic.ttf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/Roboto-BlackItalic.ttf
--------------------------------------------------------------------------------
/.cache/plugin/social/Roboto-Bold.ttf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/Roboto-Bold.ttf
--------------------------------------------------------------------------------
/.cache/plugin/social/Roboto-BoldItalic.ttf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/Roboto-BoldItalic.ttf
--------------------------------------------------------------------------------
/.cache/plugin/social/Roboto-Italic.ttf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/Roboto-Italic.ttf
--------------------------------------------------------------------------------
/.cache/plugin/social/Roboto-Light.ttf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/Roboto-Light.ttf
--------------------------------------------------------------------------------
/.cache/plugin/social/Roboto-LightItalic.ttf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/Roboto-LightItalic.ttf
--------------------------------------------------------------------------------
/.cache/plugin/social/Roboto-Medium.ttf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/Roboto-Medium.ttf
--------------------------------------------------------------------------------
/.cache/plugin/social/Roboto-MediumItalic.ttf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/Roboto-MediumItalic.ttf
--------------------------------------------------------------------------------
/.cache/plugin/social/Roboto-Regular.ttf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/Roboto-Regular.ttf
--------------------------------------------------------------------------------
/.cache/plugin/social/Roboto-Thin.ttf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/Roboto-Thin.ttf
--------------------------------------------------------------------------------
/.cache/plugin/social/Roboto-ThinItalic.ttf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/Roboto-ThinItalic.ttf
--------------------------------------------------------------------------------
/.cache/plugin/social/b665236659d416e75e419c6af9a14609.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/b665236659d416e75e419c6af9a14609.png
--------------------------------------------------------------------------------
/.cache/plugin/social/c4cdbabb72eed4a123bf7417336a1de5.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/c4cdbabb72eed4a123bf7417336a1de5.png
--------------------------------------------------------------------------------
/.cache/plugin/social/d20b8f54930ac6e71cfd0b03117924df.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/d20b8f54930ac6e71cfd0b03117924df.png
--------------------------------------------------------------------------------
/.cache/plugin/social/d9e25cfe516c514096708641f0e2d91b.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/d9e25cfe516c514096708641f0e2d91b.png
--------------------------------------------------------------------------------
/.cache/plugin/social/da9a9f80356749ffa0c1e667c25b6971.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/da9a9f80356749ffa0c1e667c25b6971.png
--------------------------------------------------------------------------------
/.cache/plugin/social/de86a83da1783db5d93b108a18b96b22.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/de86a83da1783db5d93b108a18b96b22.png
--------------------------------------------------------------------------------
/.cache/plugin/social/ea8684ba8dd6e1e223587077630f9a33.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/ea8684ba8dd6e1e223587077630f9a33.png
--------------------------------------------------------------------------------
/.cache/plugin/social/f50d76f9c894216b3ab8509201e636a8.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/f50d76f9c894216b3ab8509201e636a8.png
--------------------------------------------------------------------------------
/.cache/plugin/social/fb8554416de38012260fb4c14bd5cddb.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/fb8554416de38012260fb4c14bd5cddb.png
--------------------------------------------------------------------------------
/.cache/plugin/social/ff29475245027f1e46118b05a7b731bb.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/ff29475245027f1e46118b05a7b731bb.png
--------------------------------------------------------------------------------
/.cache/plugin/social/ffd04b049fccf2226962eea9be67ac7e.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/.cache/plugin/social/ffd04b049fccf2226962eea9be67ac7e.png
--------------------------------------------------------------------------------
/.github/workflows/ci.yml:
--------------------------------------------------------------------------------
1 | name: ci
2 | on:
3 | push:
4 | branches:
5 | - master
6 | - main
7 | permissions:
8 | contents: write
9 | jobs:
10 | deploy:
11 | runs-on: ubuntu-latest
12 | steps:
13 | - uses: actions/checkout@v3
14 | - uses: actions/setup-python@v4
15 | with:
16 | python-version: 3.x
17 | - run: echo "cache_id=$(date --utc '+%V')" >> $GITHUB_ENV
18 | - uses: actions/cache@v3
19 | with:
20 | key: mkdocs-material-${{ env.cache_id }}
21 | path: .cache
22 | restore-keys: |
23 | mkdocs-material-
24 | - run: pip install \
25 | mkdocs-material \
26 | mkdocs-awesome-pages-plugin \
27 | pillow cairosvg \
28 | mkdocs-static-i18n
29 | - run: mkdocs gh-deploy --force
30 |
--------------------------------------------------------------------------------
/COPYING:
--------------------------------------------------------------------------------
1 | Non-code content – images, text, and such – licensed under Creative Commons Attribution 4.0 International (CC BY 4.0) license
2 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # Quad9 Documentation
2 | Quad9 Public-Facing Documentation available at [docs.quad9.net](https://docs.quad9.net) using [mkdocs-material](https://github.com/squidfunk/mkdocs-material).
3 |
4 | # New Article Requests or Corrections
5 |
6 | Pull requests are allowed for typos and minor corrections only. New articles will likely not be merged, since they will need to be translated.
7 |
8 | Please open an Issue in GitHub or [open a support ticket](https://quad9.net/support/contact) for requesting net-new articles.
9 |
10 | # Consumer Routers
11 |
12 | Due to the sheer amount of consumer-grade router makes, models, and variances in user interfaces between firmware versions, we will typically not add router-specific instructions.
13 |
14 | Open-source router software (IPFire, OPNsense, pfSense, etc) is supported, since we can test in a lab environment with VMs and do not require physical access to a device.
15 |
--------------------------------------------------------------------------------
/docs/assets/conf/freebsd/forward.conf:
--------------------------------------------------------------------------------
1 | # This file was generated by local-unbound-setup.
2 | # Modifications will be overwritten.
3 | forward-zone:
4 | name: "."
5 | forward-tls-upstream: yes # Use DNS-over-TLS
6 | forward-first: no # do NOT send direct
7 | ###IPv4
8 | # 9.9.9.9 - Threat-blocking with DNSSEC
9 | forward-addr: 9.9.9.9@853#dns.quad9.net
10 | forward-addr: 149.112.112.112@853#dns.quad9.net
11 |
12 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
13 | # forward-addr: 9.9.9.11@853#dns11.quad9.net
14 | # forward-addr: 149.112.112.11@853#dns11.quad9.net
15 |
16 | # 9.9.9.10 - No threat blocking, no DNSSEC
17 | # forward-addr: 9.9.9.10@853#dns10.quad9.net
18 | # forward-addr: 149.112.112.10@853#dns10.quad9.net
19 |
20 |
21 | ###IPv6 - Uncomment if your system is configured for IPv6.
22 | # 9.9.9.9 - Threat-blocking with DNSSEC
23 | # forward-addr: 2620:fe::fe@853#dns.quad9.net
24 | # forward-addr: 2620:fe::9@853#dns.quad9.net
25 |
26 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
27 | # forward-addr: 2620:fe::11@853#dns11.quad9.net
28 | # forward-addr: 2620:fe::fe:11@853#dns11.quad9.net
29 |
30 | # 9.9.9.10 - No threat blocking, no DNSSEC
31 | # forward-addr: 2620:fe::10@853#dns10.quad9.net
32 | # forward-addr: 2620:fe::fe:10@853#dns10.quad9.net
33 |
--------------------------------------------------------------------------------
/docs/assets/conf/freebsd/unbound.conf:
--------------------------------------------------------------------------------
1 | # This file was generated by local-unbound-setup.
2 | # Modifications will be overwritten.
3 | server:
4 | username: unbound
5 | directory: /var/unbound
6 | chroot: /var/unbound
7 | pidfile: /var/run/local_unbound.pid
8 | #auto-trust-anchor-file: /var/unbound/root.key
9 | tls-cert-bundle: /etc/ssl/cert.pem
10 |
11 | include: /var/unbound/forward.conf
12 | include: /var/unbound/lan-zones.conf
13 | include: /var/unbound/control.conf
14 | include: /var/unbound/conf.d/*.conf
15 |
--------------------------------------------------------------------------------
/docs/assets/conf/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/conf/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/conf/openbsd/unbound.conf:
--------------------------------------------------------------------------------
1 | # $OpenBSD: unbound.conf,v 1.21 2020/10/28 11:35:58 sthen Exp $
2 | # Modified by Quad9.net:
3 | # - Disable DNSSEC Validation. Quad9 already performs DNSSEC validation, and DNSSEC validation on a forwarder significantly decreases performance due to duplicate DNSSEC validation and can occassionally result in a false BOGUS result.
4 | # - DNS-over-TLS enabled.
5 | # - Pre-populate all Quad9 services
6 |
7 | server:
8 | interface: 127.0.0.1
9 | #interface: 127.0.0.1@5353 # listen on alternative port
10 | interface: ::1
11 | #do-ip6: no
12 |
13 | # override the default "any" address to send queries; if multiple
14 | # addresses are available, they are used randomly to counter spoofing
15 | #outgoing-interface: 192.0.2.1
16 | #outgoing-interface: 2001:db8::53
17 |
18 | access-control: 0.0.0.0/0 refuse
19 | access-control: 127.0.0.0/8 allow
20 | access-control: ::0/0 refuse
21 | access-control: ::1 allow
22 |
23 | hide-identity: yes
24 | hide-version: yes
25 |
26 | # Perform DNSSEC validation.
27 | #
28 | #auto-trust-anchor-file: "/var/unbound/db/root.key"
29 | #val-log-level: 2
30 |
31 | # Synthesize NXDOMAINs from DNSSEC NSEC chains.
32 | # https://tools.ietf.org/html/rfc8198
33 | #
34 | # aggressive-nsec: yes
35 |
36 | # Serve zones authoritatively from Unbound to resolver clients.
37 | # Not for external service.
38 | #
39 | #local-zone: "local." static
40 | #local-data: "mycomputer.local. IN A 192.0.2.51"
41 | #local-zone: "2.0.192.in-addr.arpa." static
42 | #local-data-ptr: "192.0.2.51 mycomputer.local"
43 |
44 | # Use TCP for "forward-zone" requests. Useful if you are making
45 | # DNS requests over an SSH port forwarding.
46 | #
47 | #tcp-upstream: yes
48 |
49 | # CA Certificates used for forward-tls-upstream (RFC7858) hostname
50 | # verification. Since it's outside the chroot it is only loaded at
51 | # startup and thus cannot be changed via a reload.
52 | tls-cert-bundle: "/etc/ssl/cert.pem"
53 |
54 | remote-control:
55 | control-enable: yes
56 | control-interface: /var/run/unbound.sock
57 |
58 | forward-zone:
59 | name: "."
60 | forward-tls-upstream: yes # Use DNS-over-TLS
61 | forward-first: no # do NOT send direct
62 | ###IPv4
63 | # 9.9.9.9 - Threat-blocking with DNSSEC
64 | forward-addr: 9.9.9.9@853#dns.quad9.net
65 | forward-addr: 149.112.112.112@853#dns.quad9.net
66 |
67 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
68 | # forward-addr: 9.9.9.11@853#dns11.quad9.net
69 | # forward-addr: 149.112.112.11@853#dns11.quad9.net
70 |
71 | # 9.9.9.10 - No threat blocking, no DNSSEC
72 | # forward-addr: 9.9.9.10@853#dns10.quad9.net
73 | # forward-addr: 149.112.112.10@853#dns10.quad9.net
74 |
75 |
76 | ###IPv6 - Uncomment if your system is configured for IPv6.
77 | # 9.9.9.9 - Threat-blocking with DNSSEC
78 | # forward-addr: 2620:fe::fe@853#dns.quad9.net
79 | # forward-addr: 2620:fe::9@853#dns.quad9.net
80 |
81 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
82 | # forward-addr: 2620:fe::11@853#dns11.quad9.net
83 | # forward-addr: 2620:fe::fe:11@853#dns11.quad9.net
84 |
85 | # 9.9.9.10 - No threat blocking, no DNSSEC
86 | # forward-addr: 2620:fe::10@853#dns10.quad9.net
87 | # forward-addr: 2620:fe::fe:10@853#dns10.quad9.net
88 |
--------------------------------------------------------------------------------
/docs/assets/logo_light.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/logo_light.png
--------------------------------------------------------------------------------
/docs/assets/logo_light.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_MobileConfig2025_en.ics:
--------------------------------------------------------------------------------
1 | BEGIN:VCALENDAR
2 | VERSION:2.0
3 | PRODID:-//ical.marudot.com//iCal Event Maker
4 | CALSCALE:GREGORIAN
5 | BEGIN:VEVENT
6 | DTSTAMP:20240713T120611Z
7 | UID:1720870904542-76385@ical.marudot.com
8 | DTSTART;VALUE=DATE:20250124
9 | DTEND;VALUE=DATE:20250126
10 | SUMMARY:Quad9 - New 2025 Apple MobileConfig
11 | DESCRIPTION:Hello Me\,\n\nI wanted to remind myself that the Quad9 .mobileconfig profile\, installed on my iOS and/or MacOS device to use Quad9 for encrypted DNS\, expires on January 29th\, 2025\, and I may want to download and import the new one from here:\n\nhttps://docs.quad9.net/Setup_Guides/iOS/iOS_14_and_later_%28Encrypted%29/
12 | TRANSP:TRANSPARENT
13 | CLASS:PRIVATE
14 | BEGIN:VALARM
15 | ACTION:DISPLAY
16 | DESCRIPTION:Quad9 - New 2025 Apple MobileConfig
17 | TRIGGER:-PT0M
18 | END:VALARM
19 | END:VEVENT
20 | END:VCALENDAR
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_Secured_DNS_over_HTTPS_20250129.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_Secured_DNS_over_HTTPS_20250129.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_Secured_DNS_over_HTTPS_20260126.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_Secured_DNS_over_HTTPS_20260126.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20250129.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20250129.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20260126.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20260126.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_Secured_DNS_over_TLS_20250129.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_Secured_DNS_over_TLS_20250129.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_Secured_DNS_over_TLS_20260126.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_Secured_DNS_over_TLS_20260126.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_Secured_DNS_over_TLS_ECS_20250129.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_Secured_DNS_over_TLS_ECS_20250129.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_Secured_DNS_over_TLS_ECS_20260126.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_Secured_DNS_over_TLS_ECS_20260126.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_HTTPS_20250129.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_HTTPS_20250129.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_HTTPS_20260126.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_HTTPS_20260126.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_HTTPS_ECS_20250129.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_HTTPS_ECS_20250129.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_HTTPS_ECS_20260126.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_HTTPS_ECS_20260126.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_TLS_20250129.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_TLS_20250129.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_TLS_20260126.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_TLS_20260126.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_TLS_ECS_20250129.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_TLS_ECS_20250129.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_TLS_ECS_20260126.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/assets/mobileconfig/Quad9_un_Secured_DNS_over_TLS_ECS_20260126.mobileconfig
--------------------------------------------------------------------------------
/docs/assets/quad9_all_white.svg:
--------------------------------------------------------------------------------
1 |
2 |
3 |
22 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Android/Android_9+_(Encrypted).md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | Android 9 and later includes the `Private DNS` feature, which allows you to connect to DNS servers using DNS over TLS (DoT). It is important to note, that the private DNS function does not work if the Quad9 Connect app is installed and enabled. To configure your Android device to use Quad9 in this way, follow the steps below.
4 |
5 | !!! warning "VPNs"
6 | The Private DNS feature will not be utilized if you are using a VPN. If using a VPN, instead, configure Quad9's IP addresses in your VPN's `Custom DNS` settings. Please refer to your VPN provider's documentation fr more information
7 |
8 | ## Instructions
9 |
10 | * Open the :material-cog: `Settings` app on your Android device.
11 | * Select :material-wifi: ` Network & Internet`.
12 | * Select `Private DNS`.
13 |
14 | * Select `Private DNS provider hostname`
15 | * Enter: `dns.quad9.net`
16 | * Press `Save`
17 |
18 | ## Verify Configuration
19 |
20 | Visit [on.quad9.net](https://on.quad9.net) in your browser of choice.
21 |
22 | Questions? Issues? Didn't work? Contact us!
23 |
24 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
25 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/ChromeOS_(Chromebook).md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | Quad9 Connect is an Android application compatible with ChromeOS using the Google Play Store. It creates a secure tunnel between the device and Quad9 for sending DNS queries via DNS over Quad9 Connect provides additional features like a query log, one-click service switching, and the ability to report false positives from the Query Log.
4 |
5 | Quad9 Connect is not a VPN, but uses the VPN functionality of the device to achieve encrypted DNS and the features associated with the application. When Quad9 Connect is enabled, it is not possible to use another VPN connection at the same time. If using a VPN, consider setting Quad9's DNS servers in the "Custom DNS" settings of your VPN client.
6 |
7 | ## Instructions
8 |
9 | * Install Quad9 Connect
10 | * In the **Google Play Store**, search for and install the app: `Quad9 Connect`
11 |
12 | * Display Preference
13 | * You can choose how you want the app to be displayed: `Phone`, `Tablet`, or `Resizable`. You can select your preference.
14 |
15 | * Read and click `OK` when prompted for the connection request.
16 |
17 | !!! note ""
18 | You have to connect to this VPN to use Quad9 Connect.
19 |
20 | * Click the `play` icon to connect!
21 |
22 | The number ‘9’ and VPN key logo should appear in the bottom right corner of your screen.
23 |
24 | ## Verify Configuration
25 |
26 | To confirm you're using Quad9, visit: [on.quad9.net](https://on.quad9.net)
27 |
28 | Questions? Issues? Didn't work? Contact us!
29 |
30 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
31 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/DNS_Forwarders/Windows_Server.md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | Set up Quad9 in Windows DNS Server for use in DNS forwarding.
4 |
5 | !!! note
6 | Before proceeding, please refer to our [DNS Forwarder Best Practices](https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/) article.
7 |
8 | ## Instructions
9 |
10 | * Open `Server Manager` from the `Start` menu.
11 | * From `Server Manager`, select `Tools` > `DNS`
12 |
13 | * From the DNS Manager, right-click your server and select `Properties`
14 | * Select the `Forwarders` tab and then select `Edit`.
15 | * Add the following IP addresses: `9.9.9.9`, `149.112.112.112`
16 | * If your network supports IPv6, also add: `2620:fe::fe`, `2620:fe::9`
17 | * Click "Apply"
18 |
19 | Questions? Issues? Contact us!
20 |
21 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
22 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Linux_and_BSD/Fedora_38.md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | The easiest way to set Quad9 on your entire network is via your router settings. If you'd prefer to set Quad9 on a single system, please follow the steps below to configure Fedora 38 to use Quad9.
4 |
5 | !!! warning "Firefox, VPNs"
6 | * **Firefox** is set to use Cloudflare DNS by default in some regions. If you're using Firefox, check that [this is disabled](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **VPNs** typically do not respect the system or router-level DNS settings. If you're using a VPN, configure Quad9's IP addresses in the `Custom DNS` settings of your VPN client. Refer to your VPN provider's documentation for further information.
8 |
9 | ## Instructions
10 |
11 | ### IPv4
12 |
13 | * Click the `Network` or `WiFi` icon in the system tray at the top-right corner of the screen.
14 | * Click the `>` next to the active connection.
15 | * Select `Wired Settings` or `Wireless Settings`.
16 |
17 | * Click the :gear: icon next to your connection.
18 |
19 | * Click the `IPv4` tab
20 | * Disable `Automatic DNS`
21 | * Enter the Quad9 IP addresses of your preferred service.
22 |
23 | Multiple IP addresses can be entered in the list using comas.
24 |
25 | `9.9.9.9, 149.112.112.112`
26 |
27 | * If you will not use IPv6, click `Apply` to complete the setup process, and then confirm you're using Quad9.
28 |
29 |
30 | ### IPv6 (Optional)
31 |
32 | If your network supports IPv6, it's also recommended to configure the Quad9 IPv6 addresses. If you're not sure if IPv6 is configured on your network, you can test that here: https://test-ipv6.com/
33 |
34 |
35 | * Select the `IPv6` tab
36 | * Disable `Automatic DNS`
37 | * Enter the Quad9 IP addresses of your preferred service.
38 |
39 | Multiple IP addresses can be entered in the list using comas.
40 |
41 | `2620:fe::fe, 2620:fe::9`
42 |
43 | * Click `Apply` to complete the setup process.
44 |
45 | ## Verify Configuration
46 |
47 | Confirm you're using Quad9 by visiting [on.quad9.net](https://on.quad9.net) in your preferred browser.
48 |
49 | Questions? Issues? Didn't work? Contact us!
50 |
51 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
52 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Linux_and_BSD/Linux_Mint_21.2.md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | The easiest way to set Quad9 on your entire network is via your router settings. If you'd prefer to set Quad9 on a single system, please follow the steps below to configure Linux Mint to use Quad9.
4 |
5 | !!! warning "Firefox, VPNs"
6 | * **Firefox** is set to use Cloudflare DNS by default in some regions. If you're using Firefox, check that [this is disabled](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **VPNs** typically do not respect the system or router-level DNS settings. If you're using a VPN, configure Quad9's IP addresses in the `Custom DNS` settings of your VPN client. Refer to your VPN provider's documentation for further information.
8 |
9 | ## Instructions
10 |
11 | * Click the `Network` or `Wi-Fi` icon on the system tray in the bottom-right corner.
12 | * Click `Network Settings`
13 | * Click the :gear: icon on the bottom-right corner of the dialogue window.
14 | ### IPv4
15 |
16 | * Select `IPv4` on the left-side menu.
17 | * In the `DNS` section:
18 | * Disable `Automatic`
19 | * Click the :plus: botton to add a second `Server` field.
20 | * Enter `9.9.9.9` in the first `Server` field, and `149.112.112.112` in the second.
21 | * Click `Apply`
22 |
23 | ## Verify Configuration
24 |
25 | Confirm you're using Quad9 by visiting [on.quad9.net](https://on.quad9.net) in your preferred browser.
26 |
27 | Questions? Issues? Didn't work? Contact us!
28 |
29 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
30 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Linux_and_BSD/MX_Linux_23.md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | The easiest way to set Quad9 on your entire network is via your router settings. If you'd prefer to set Quad9 on a single system, please follow the steps below to configure MX Linux 23 to use Quad9.
4 |
5 | !!! warning "Firefox, VPNs"
6 | * **Firefox** is set to use Cloudflare DNS by default in some regions. If you're using Firefox, check that [this is disabled](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **VPNs** typically do not respect the system or router-level DNS settings. If you're using a VPN, configure Quad9's IP addresses in the `Custom DNS` settings of your VPN client. Refer to your VPN provider's documentation for further information.
8 |
9 | ## Instructions
10 |
11 | * Right click on the Network/WiFi icon in the system tray on the left side of the screen.
12 | * Select `Edit Connections`
13 | * Select your connection Type (Wired or Wi-Fi), then click the :gear: button at the bottom of the window.
14 |
15 | * Select the `IPv4 Settings` tab.
16 | * Change `Method` to `Automatic (DHCP) addresses only`
17 | * In the `DNS Servers` field, add: `9.9.9.9,149.112.112.112`
18 | * Click `Save`
19 |
20 | ## Verify Configuration
21 |
22 | Confirm you're using Quad9 by visiting [on.quad9.net](https://on.quad9.net) in your preferred browser.
23 |
24 | Questions? Issues? Didn't work? Contact us!
25 |
26 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
27 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Linux_and_BSD/Ubuntu_20.04_and_22.04.md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | The easiest way to set Quad9 on your entire network is via your router settings. If you'd prefer to set Quad9 on a single system, please follow the steps below to configure Ubuntu 22.04 or 22.04 LTS to use Quad9.
4 |
5 | !!! warning "Firefox, VPNs"
6 | * **Firefox** is set to use Cloudflare DNS by default in some regions. If you're using Firefox, check that [this is disabled](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **VPNs** typically do not respect the system or router-level DNS settings. If you're using a VPN, configure Quad9's IP addresses in the `Custom DNS` settings of your VPN client. Refer to your VPN provider's documentation for further information.
8 |
9 | ## Instructions
10 |
11 | ### IPv4
12 |
13 | * From the Ubuntu desktop, select the drop down menu in the top right corner of the screen, expand either `Wired Connection` or `Wireless Connection` based on your connection type, then select `Wired Settings` or `Wireless Settings`.
14 |
15 | * Click the :gear: icon next to your connection.
16 |
17 | * Click the `IPv4` tab
18 | * Disable `Automatic DNS`
19 | * Enter the Quad9 IP addresses of your preferred service.
20 |
21 | Multiple IP addresses can be entered in the list using comas.
22 |
23 | `9.9.9.9, 149.112.112.112`
24 |
25 | * If you will not use IPv6, click `Apply` to complete the setup process, and then confirm you're using Quad9.
26 |
27 |
28 | ### IPv6 (Optional)
29 |
30 | If your network/computer support IPv6, it's also recommended to configure the Quad9 IPv6 addresses. If you're not sure if IPv6 is configured on your network, you can test that here: https://test-ipv6.com/
31 |
32 |
33 | * Select the `IPv6` tab
34 | * Disable `Automatic DNS`
35 | * Enter the Quad9 IP addresses of your preferred service.
36 |
37 | Multiple IP addresses can be entered in the list using comas.
38 |
39 | `2620:fe::fe, 2620:fe::9`
40 |
41 | * Click `Apply` to complete the setup process.
42 |
43 | ## Verify Configuration
44 |
45 | Confirm you're using Quad9 by visiting [on.quad9.net](https://on.quad9.net) in your preferred browser.
46 |
47 | Questions? Issues? Didn't work? Contact us!
48 |
49 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
50 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Linux_and_BSD/Ubuntu_22.04_(Encrypted).md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | Note: The maintainers of systemd-resolved emphasize that this DNS over TLS implementation is currently a work in progress. You may consider using Stubby instead if experiencing performance issues. See here for Ubuntu 18.04 / 20.04 + Stubby instructions.
4 |
5 | Ubuntu 22.04 and Linux Mint 20.3 or later support DNS over TLS natively in systemd-resolved, but the option is not available in the GUI.
6 |
7 | !!! bug
8 | While this is technically also supported in Ubuntu *20.04*, we do not recommend using this method for 20.04, since it uses an older systemd-resolve version which has problems.
9 |
10 | !!! bug
11 | The DNSSEC option should not be enabled in systemd-resolved. It is extremely buggy, and it would only duplicate the DNSSEC validation process which Quad9 already performs, significantly reducing performance.
12 |
13 | !!! warning "Firefox, VPNs"
14 | * **Firefox** is set to use Cloudflare DNS by default in some regions. If you're using Firefox, check that [this is disabled](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
15 | * **VPNs** typically do not respect the system or router-level DNS settings. If you're using a VPN, configure Quad9's IP addresses in the `Custom DNS` settings of your VPN client. Refer to your VPN provider's documentation for further information.
16 |
17 | ## Instructions
18 |
19 | * Configure Quad9 in the Network Settings ([Ubuntu](editme), [Linux Mint](editme)).
20 |
21 | * Open the `Terminal` application, and copy/paste these commands to enable DNS over TLS. When prompted for your password, type it in and hit `Enter`.
22 |
23 | ```
24 | sudo sed -i 's/#DNSOverTLS=no/DNSOverTLS=yes/g' /etc/systemd/resolved.conf
25 | ```
26 |
27 | * Restart the `systemd-resolvd` and `networking services` to recognize the changes to the file:
28 |
29 | ```
30 | sudo systemctl restart systemd-resolved.service && sudo service network-manager restart
31 | ```
32 | ## Verify Configuration
33 |
34 | * Confirm that DNS over TLS is being used by opening the `Terminal` application and running the following command, typing in your password and pressing `Enter``:
35 |
36 | ```
37 | $ dig +short txt proto.on.quad9.net.
38 | ```
39 | If the response is `dot.`, then it is working! If the response is `do53-udp.`, then it's still using plaintext. If there is no response, that means that Quad9 may not have been configured probably in the `Network Settings`.
40 |
41 | ## Undo
42 |
43 | If you experience any issues or want to undo this configuration change:
44 |
45 | * Open the Terminal application, and copy/paste these commands to disable DNS over TLS. You'll be prompted for your password.
46 |
47 | ```
48 | sudo sed -i 's/DNSOverTLS=yes/#DNSOverTLS=no/g' /etc/systemd/resolved.conf
49 | ```
50 |
51 | * Restart the `systemd-resolvd` and `networking` services to recognize the changes to the file we just made:
52 |
53 | ```
54 | sudo systemctl restart systemd-resolved.service && sudo service network-manager restart
55 | ```
56 |
57 | Questions? Issues? Didn't work? Contact us!
58 |
59 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
60 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Miscellaneous/Cloudflared_and_Quad9.md:
--------------------------------------------------------------------------------
1 | Cloudflared is a DNS over HTTPS proxy that can be configured to use Quad9 for DNS resolution.
2 |
3 | * In the `cloudflared.yml` configuration file, replace the Cloudflare IPs in the `proxy-dns-upstream` section with the Quad9 addresses associated with your desired features.
4 | * Restart the `cloudflared` service
5 |
6 | Before (Cloudflare DoH Servers)
7 | ```
8 | proxy-dns-upstream:
9 |
10 | - https://1.1.1.1/dns-query
11 | - https://1.0.0.1/dns-query
12 | ```
13 |
14 | IPv4
15 | ```
16 | proxy-dns-upstream:
17 |
18 | - https://9.9.9.9/dns-query
19 | - https://149.112.112.112/dns-query
20 | ```
21 |
22 | IPv6
23 | ```
24 | proxy-dns-upstream:
25 |
26 | - https://[2620:fe::fe]/dns-query
27 | - https://[2620:fe::9]/dns-query
28 | ```
29 |
30 | Questions? Issues? Didn't work? Contact us!
31 |
32 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
33 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Miscellaneous/Pi-Hole.md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | Pi-Hole is a popular DNS forwarder, often used primarily for blocking domains specifically associated with ads and tracking.
4 |
5 | ## Pi-Hole Setup
6 |
7 | For detailed setup instructions of Pi-Hole itself, please see the [Official Pi-Hole Documentation](https://docs.pi-hole.net/).
8 |
9 | ## Quad9 Setup
10 |
11 | Once you have installed Pi-Hole and can access the administration panel, Quad9 is already one of the default options.
12 |
13 | * In the Admin panel, navigate to `Settings` -> `DNS`
14 | * Check both IPv4 boxes next to Quad9 (filtered, DNSSEC)
15 | * If your network support IPv6, it's also recommended to check both IPv6 boxes. If you're not sure if IPv6 is configured on your network, you can test that here: https://test-ipv6.com/
16 |
17 | * Check/Enable the options:
18 | * `Never forward non-FQDNs` and `Never forward reverse lookups for private IP ranges` to prevent sending unanswerable DNS queries to Quad9.
19 | * Click `Save` at the bottom.
20 |
21 | ### Verify Configuration
22 |
23 | Once Quad9 has been configured in Pi-Hole, you can configure your router or a single computer to use the Pi-Hole's IP address as a DNS server. If the Query Log is enabled (Settings -> Privacy [tab]), you should see Quad9 recorded in the Status column:
24 |
25 | You can also confirm if Quad9 is being used manually on Linux, MacOS, or Windows.
26 |
27 | ### Blocked Domains
28 |
29 | Domains which are blocked by Quad9 will record Blocked (external, NXRA) in the Status column of the Query Log:
30 |
31 | Questions? Issues? Didn't work? Contact us!
32 |
33 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
34 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Open-Source_Routers/IPFire_(Encrypted).md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | IPFire is an open-source firewall and router, used in both consumer and commercial environments.
4 |
5 | IPFire utilizes Unbound, which has built-in DNS over TLS support, with the configuration being accessible in the GUI.
6 |
7 | This setup guide was tested using IPFire 2.27
8 |
9 | !!! warning "Backup Time!"
10 | Before making changes to a production environment, we recommend [backing up the existing configuration](https://wiki.ipfire.org/configuration/system/backup)
11 |
12 | ## Instructions
13 |
14 | * Navigate to `System` -> `Domain Name System`
15 | * Under `DNS Servers`, click `Add`
16 | * Go through this process twice, one for each Quad9 IP address, where the TLS Hostname will always be dns.quad9.net
17 | * IP address: `9.9.9.9`
18 | * IP address: `149.112.112.112`
19 |
20 | * Use ISP-assigned DNS Servers: `Disabled`
21 | * Protocol for DNS Queries: `TLS`
22 | * Enable Safe Search: `Disabled`
23 | * QNAME Minimisation: `Disabled`
24 | * Click `Save`
25 |
26 | ## Verify Configuratiom
27 |
28 | ### GUI
29 |
30 | Navigate to `Status` -> `Net-Traffic` in the top menu, and search for an active connect to either `9.9.9.9` or `149.112.112.112` via port 853 TCP
31 |
32 | ### CLI
33 |
34 | * Connect to your IPFire device via SSH
35 | * Install the tshark package
36 |
37 | ```
38 | pakfire -y install tshark
39 | ```
40 |
41 | * Start a packet capture with tshark to filter for DNS over TLS traffic:
42 |
43 | ```
44 | tshark -i any 'port 853'
45 | ```
46 |
47 | If the IPFire device is using DNS over HTTPS for DNS queries, you will see output like this:
48 | ```
49 | 1 0.000000000 192.168.1.150 → 9.9.9.9 TCP 76 37226 → 853 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=3103990808 TSecr=0 WS=512
50 | 2 0.006914259 9.9.9.9 → 192.168.1.150 TCP 76 853 → 37226 [SYN, ACK] Seq=0 Ack=1 Win=28960 Len=0 MSS=1460 TSval=2447463919 TSecr=3103990808 WS=256
51 | 3 0.006948874 192.168.1.150 → 9.9.9.9 TCP 68 37226 → 853 [ACK] Seq=1 Ack=1 Win=64512 Len=0 TSval=3103990815 TSecr=2447463919
52 | 4 0.007110658 192.168.1.150 → 9.9.9.9 TLSv1 387 Client Hello
53 | 5 0.013306457 9.9.9.9 → 192.168.1.150 TCP 68 853 → 37226 [ACK] Seq=1 Ack=320 Win=30208 Len=0 TSval=2447463926 TSecr=3103990815
54 | 6 0.013926633 9.9.9.9 → 192.168.1.150 TLSv1.3 2964 Server Hello, Change Cipher Spec, Application Data
55 | 7 0.013945067 192.168.1.150 → 9.9.9.9 TCP 68 37226 → 853 [ACK] Seq=320 Ack=2897 Win=62464 Len=0 TSval=3103990822 TSecr=2447463926
56 | ```
57 |
58 | Questions? Issues? Didn't work? Contact us!
59 |
60 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
61 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Open-Source_Routers/OPNsense_(Encrypted).md:
--------------------------------------------------------------------------------
1 | ### Overview
2 |
3 | OPNsense is an open-source firewall, used in both consumer and commercial environments.
4 |
5 | OPNsense utilizes Unbound, which has built-in DNS over TLS support, with the configuration being accessible in the GUI.
6 |
7 | !!! warning "Backup Time!"
8 | Before making changes to a production environment, we recommend [backing up the existing configuration](https://docs.opnsense.org/manual/backups.html#backup)
9 |
10 | ### Instructions
11 |
12 | * Navigate to `Services` -> `Unbound DNS` -> `DNS over TLS` on the left-side menu
13 | * Click the + button
14 | * Add 4 entries, using `dns.quad9.net` in the **Verify CN** Field, and `853` in the **Server Port:** field.
15 |
16 | Server IP: `9.9.9.9`
17 | Server IP: `149.112.112.112`
18 | Server IP: `2620:fe::fe`
19 | Server IP: `2620:fe::9`
20 |
21 | !!! warning "IPv6"
22 | If your network does not have IPv6, which you can test here, then IPv6 addresses should not be added, as it may result in a percentage of your DNS requests failing.
23 |
24 | * Click `Apply` to save the changes.
25 |
26 | * Navigate to `System` -> `Settings` -> `General` on the left-side menu.
27 |
28 | * Disable `Allow DNS server list to be overridden by DHCP/PPP on WAN`
29 | * Click `Save`
30 | * Click `Apply` at the top of the page
31 |
32 | ### Verify Configuration
33 |
34 | To confirm that OPNsense is now sending your queries via DNS over TLS, you can run a packet capture in command line, such as:
35 |
36 | ```
37 | tcpdump -i em0 'port 853'
38 | ```
39 |
40 | !!! note
41 | You may have to adjust the interface name from em0 to that of your device's WAN interface.
42 |
43 | You can also test from a macOS, Linux, or Windows system that is connected to this OPNsense router/firewall.
44 |
45 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
46 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Open-Source_Routers/OpenWrt_LuCi.md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | The OpenWrt Project is a Linux operating system targeting embedded devices, which is often used as an open-source solution for routers and firewalls.
4 |
5 | This guide covers setting Quad9 in the DNS forwarder settings. When using your OpenWrt router as a DNS server, it will forward DNS requests to Quad9.
6 |
7 | !!! warning "Backup Time!"
8 | Before making changes to a production environment, we recommend [backing up the existing configuration](https://openwrt.org/docs/guide-user/troubleshooting/backup_restore)
9 |
10 | ## Instructions
11 |
12 | * Log into your LuCI control panel, typically by opening `http://192.168.1.1` in your browser.
13 |
14 | * Navigate to `Network` -> `DHCP and DNS`
15 | * Set `9.9.9.9` and `149.112.112.112`, or the addresses of your preferred Quad9 service in the "DNS forwardings" input fields.
16 |
17 | * If your network supports IPv6, you can also add 2620:fe::fe and 2620:fe::9, or the IPv6 addresses of your preferred Quad9 service.
18 |
19 | * Navigate to `Resolv and Hosts Files` sub-tab, and make sure `Ignore resolv file` is `Enabled`.
20 |
21 | * Click `Save & Apply` at the bottom. Since you are not changing the DHCP settings, the change should be instantaneous .
22 |
23 | ## Verify Configuration
24 |
25 | * Confirm you're using Quad9 on Linux, MacOS, or Windows.
26 |
27 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
28 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Open-Source_Routers/pfSense_(Encrypted).md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | pfSense is an open-source firewall and router, used in both consumer and commercial environments.
4 |
5 | pfSense has [documentation for DNS over TLS](https://docs.netgate.com/pfsense/en/latest/recipes/dns-over-tls.html), which we recommend reviewing in addition to this article.
6 |
7 | pfSense utilizes Unbound, which has built-in DNS over TLS support, with the configuration being accessible in the GUI.
8 |
9 | !!! warning "Backup Time!"
10 | Before making changes to a production environment, we recommend [backing up the existing configuration](https://docs.netgate.com/pfsense/en/latest/backup/configuration.html)
11 |
12 | ## Instructions
13 |
14 | Navigate to `System` -> `General Setup` on the top menu.
15 |
16 | * Click `Add DNS Server` until there are 4 rows of entries available.
17 | * Add the Quad9 IPv4 and IPv6 addresses on the left fields:
18 | `9.9.9.9`,`149.112.112.112`,`2620:fe::fe`,`2620:fe::9`
19 |
20 | !!! warning
21 | If your network does not have IPv6, which you can test here, then IPv6 addresses should not be added, as it may result in a percentage of your DNS requests failing.
22 |
23 | * Add `dns.quad9.net` on all the Hostname fields on the right.
24 |
25 | Click "Save" at the bottom of the screen.
26 |
27 | Navigate to `Services` -> `DNS Forwarder` on the top menu.
28 | * Make sure Enable DNS forwarder is disabled. If it is enabled, disable it, and click `Save` at the bottom of the page.
29 |
30 | Navigate to `Services` -> `DNS Resolver` on the top menu.
31 |
32 | * Scroll down until you find the section seen in the following screenshot.
33 | * Disable Enable DNSSEC Support if enabled.
34 | !!! note "DNSSEC"
35 | DNSSEC is already enforced by Quad9, and enabling DNSSEC at the forwarder level can cause false DNSSEC failures.
36 | * Enable `DNS Query Forwarding`
37 | * Enable `Use SSL/TLS for outgoing DNS queries to Forwarding Servers`
38 | * Click `Save` at the bottom of the screen.
39 | * Click `Apply` Changes near the top of the screen to apply the saved changes.
40 |
41 | ## Veryify Configuration
42 |
43 | You can confirm that pfSense is now sending your queries via DNS over TLS using the built-in Packet Capture Tool.
44 |
45 | You can also run a test from a macOS, Linux, or Windows system on the network.
46 |
47 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
48 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Windows/Windows_10.md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | The easiest way to set Quad9 on your entire network is via your router settings. If you'd prefer to set Quad9 on an individual Windows device, please follow the steps below to configure Windows 10 to use Quad9.
4 |
5 | !!! warning "Firefox, VPNs"
6 | * **Firefox** is set to use Cloudflare DNS by default in some regions. If you're using Firefox, check that [this is disabled](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **VPNs** typically do not respect the system or router-level DNS settings. If you're using a VPN, configure Quad9's IP addresses in the `Custom DNS` settings of your VPN client. Refer to your VPN provider's documentation for further information.
8 |
9 | ## Instructions
10 |
11 | ### IPv4
12 |
13 | * Right click on the Network icon (Wired or WiFi) in the system tray and click `Open Network & Internet Settings`.
14 |
15 | * Click `Change adapter options`
16 |
17 | * Select `Properties`.
18 |
19 | * Select `Internet Protocol Version 4 (TCP/IPv4)`. Then, click `Properties`.
20 |
21 | * Select `Use the following DNS server addresses`.
22 | * Enter: `9.9.9.9` in Preferred DNS Server
23 | * Enter: `149.112.112.112` in Alternate DNS Server.
24 | * Click `OK`.
25 |
26 | ### IPv6
27 |
28 | If your networks supports IPv6, it's also recommended to configure the Quad9 IPv6 addresses. If you're not sure if IPv6 is configured on your network, you can test that here: https://test-ipv6.com/
29 |
30 | * Select Internet Protocol Version 6 (TCP/IPv6)
31 | * Click Properties.
32 |
33 | * Select `Use the following DNS server addresses`.
34 | * Enter: `2620:fe::fe` in Preferred DNS Server
35 | * Enter: `2620:fe::9` in Alternate DNS Server.
36 | * Click `OK`.
37 |
38 | * Close all configuration windows.
39 |
40 | ## Verify Configuration
41 |
42 | Confirm you're using Quad9 by visiting [on.quad9.net](https://on.quad9.net) in your preferred browser.
43 |
44 | Questions? Issues? Didn't work? Contact us!
45 |
46 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
47 |
--------------------------------------------------------------------------------
/docs/en/Setup_Guides/Windows/Windows_11_(Encrypted).md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | The easiest way to set Quad9 on your entire network is via your router settings. If you'd prefer to set Quad9 on an individual Windows device, please follow the steps below to configure Windows 11 to use Quad9.
4 |
5 | !!! warning "Firefox, VPNs"
6 | * **Firefox** is set to use Cloudflare DNS by default in some regions. If you're using Firefox, check that [this is disabled](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **VPNs** typically do not respect the system or router-level DNS settings. If you're using a VPN, configure Quad9's IP addresses in the `Custom DNS` settings of your VPN client. Refer to your VPN provider's documentation for further information.
8 |
9 |
10 | ## Instructions
11 |
12 | ### IPv4
13 |
14 | * Right click the Network or WiFi icon on the system tray, and left click `Network and Internet Settings`
15 |
16 | * Select `Ethernet` or `WiFi`, depending on your connection type.
17 |
18 | * Scroll down and click `Edit` next to `DNS server assignment`
19 |
20 | * Make the following changes:
21 | * Change `Automatic (DHCP)` to `Manual`
22 | * Toggle the `On` switch under `IPv4` to change the DNS server
23 | * Enter into `Preferred DNS`: 9.9.9.9
24 | * Set `DNS over HTTPS` to `On (automatic template)`
25 | * Enter into `Alternate DNS`: 149.112.112.112
26 | * Set `DNS over HTTPS` to `On (automatic template)`
27 | !!! note
28 | If using a laptop that roams to other networks which may block DNS over HTTPS, consider toggling the `Fallback to plaintext` switch.
29 |
30 | * Click `Save`
31 |
32 | ### IPv6
33 | If using IPv6, which you can confirm here: https://test-ipv6.com/, you should also scroll down and set up Quad9 on IPv6.
34 |
35 | * Make the following changes:
36 | * Toggle the `On` switch under `IPv6` to change the DNS server
37 | * Enter into `Preferred DNS`: 2620:fe::fe
38 | * Set `DNS over HTTPS` to `On (automatic template)`
39 | * Enter into `Alternate DNS`: 2620:fe::9
40 | * Set `DNS over HTTPS` to `On (automatic template)`
41 | !!! note
42 | If Windows is not configured with an IPv6 address, setting up an IPv6 DNS server could cause DNS resolution to fail.
43 | If using a laptop that roams to other networks which may block DNS over HTTPS, consider toggling the `Fallback to plaintext` switch.
44 |
45 | * Click `Save`
46 |
47 | ## Verify Configuration
48 |
49 | * Open the Terminal application, and execute this command:
50 |
51 | ```
52 | Resolve-DnsName -Type txt proto.on.quad9.net.
53 | ```
54 |
55 | The output should show `doh.` (DNS over HTTPS) in the `NameHost` section if you set Quad9 in the Network Settings and enabled encryption.
56 |
57 | ```
58 | Name Type TTL Section NameHost
59 | ---- ---- --- ------- --------
60 | proto.on.quad9.net CNAME 60 Answer doh
61 | ```
62 |
63 | Questions? Issues? Didn't work? Contact us!
64 |
65 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
66 |
--------------------------------------------------------------------------------
/docs/en/assets/conf/freebsd/forward.conf:
--------------------------------------------------------------------------------
1 | # This file was generated by local-unbound-setup.
2 | # Modifications will be overwritten.
3 | forward-zone:
4 | name: "."
5 | forward-tls-upstream: yes # Use DNS-over-TLS
6 | forward-first: no # do NOT send direct
7 | ###IPv4
8 | # 9.9.9.9 - Threat-blocking with DNSSEC
9 | forward-addr: 9.9.9.9@853#dns.quad9.net
10 | forward-addr: 149.112.112.112@853#dns.quad9.net
11 |
12 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
13 | # forward-addr: 9.9.9.11@853#dns11.quad9.net
14 | # forward-addr: 149.112.112.11@853#dns11.quad9.net
15 |
16 | # 9.9.9.10 - No threat blocking, no DNSSEC
17 | # forward-addr: 9.9.9.10@853#dns10.quad9.net
18 | # forward-addr: 149.112.112.10@853#dns10.quad9.net
19 |
20 |
21 | ###IPv6 - Uncomment if your system is configured for IPv6.
22 | # 9.9.9.9 - Threat-blocking with DNSSEC
23 | # forward-addr: 2620:fe::fe@853#dns.quad9.net
24 | # forward-addr: 2620:fe::9@853#dns.quad9.net
25 |
26 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
27 | # forward-addr: 2620:fe::11@853#dns11.quad9.net
28 | # forward-addr: 2620:fe::fe:11@853#dns11.quad9.net
29 |
30 | # 9.9.9.10 - No threat blocking, no DNSSEC
31 | # forward-addr: 2620:fe::10@853#dns10.quad9.net
32 | # forward-addr: 2620:fe::fe:10@853#dns10.quad9.net
33 |
--------------------------------------------------------------------------------
/docs/en/assets/conf/freebsd/unbound.conf:
--------------------------------------------------------------------------------
1 | # This file was generated by local-unbound-setup.
2 | # Modifications will be overwritten.
3 | server:
4 | username: unbound
5 | directory: /var/unbound
6 | chroot: /var/unbound
7 | pidfile: /var/run/local_unbound.pid
8 | #auto-trust-anchor-file: /var/unbound/root.key
9 | tls-cert-bundle: /etc/ssl/cert.pem
10 |
11 | include: /var/unbound/forward.conf
12 | include: /var/unbound/lan-zones.conf
13 | include: /var/unbound/control.conf
14 | include: /var/unbound/conf.d/*.conf
15 |
--------------------------------------------------------------------------------
/docs/en/assets/conf/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/en/assets/conf/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig
--------------------------------------------------------------------------------
/docs/en/assets/conf/openbsd/unbound.conf:
--------------------------------------------------------------------------------
1 | # $OpenBSD: unbound.conf,v 1.21 2020/10/28 11:35:58 sthen Exp $
2 | # Modified by Quad9.net:
3 | # - Disable DNSSEC Validation. Quad9 already performs DNSSEC validation, and DNSSEC validation on a forwarder significantly decreases performance due to duplicate DNSSEC validation and can occassionally result in a false BOGUS result.
4 | # - DNS-over-TLS enabled.
5 | # - Pre-populate all Quad9 services
6 |
7 | server:
8 | interface: 127.0.0.1
9 | #interface: 127.0.0.1@5353 # listen on alternative port
10 | interface: ::1
11 | #do-ip6: no
12 |
13 | # override the default "any" address to send queries; if multiple
14 | # addresses are available, they are used randomly to counter spoofing
15 | #outgoing-interface: 192.0.2.1
16 | #outgoing-interface: 2001:db8::53
17 |
18 | access-control: 0.0.0.0/0 refuse
19 | access-control: 127.0.0.0/8 allow
20 | access-control: ::0/0 refuse
21 | access-control: ::1 allow
22 |
23 | hide-identity: yes
24 | hide-version: yes
25 |
26 | # Perform DNSSEC validation.
27 | #
28 | #auto-trust-anchor-file: "/var/unbound/db/root.key"
29 | #val-log-level: 2
30 |
31 | # Synthesize NXDOMAINs from DNSSEC NSEC chains.
32 | # https://tools.ietf.org/html/rfc8198
33 | #
34 | # aggressive-nsec: yes
35 |
36 | # Serve zones authoritatively from Unbound to resolver clients.
37 | # Not for external service.
38 | #
39 | #local-zone: "local." static
40 | #local-data: "mycomputer.local. IN A 192.0.2.51"
41 | #local-zone: "2.0.192.in-addr.arpa." static
42 | #local-data-ptr: "192.0.2.51 mycomputer.local"
43 |
44 | # Use TCP for "forward-zone" requests. Useful if you are making
45 | # DNS requests over an SSH port forwarding.
46 | #
47 | #tcp-upstream: yes
48 |
49 | # CA Certificates used for forward-tls-upstream (RFC7858) hostname
50 | # verification. Since it's outside the chroot it is only loaded at
51 | # startup and thus cannot be changed via a reload.
52 | tls-cert-bundle: "/etc/ssl/cert.pem"
53 |
54 | remote-control:
55 | control-enable: yes
56 | control-interface: /var/run/unbound.sock
57 |
58 | forward-zone:
59 | name: "."
60 | forward-tls-upstream: yes # Use DNS-over-TLS
61 | forward-first: no # do NOT send direct
62 | ###IPv4
63 | # 9.9.9.9 - Threat-blocking with DNSSEC
64 | forward-addr: 9.9.9.9@853#dns.quad9.net
65 | forward-addr: 149.112.112.112@853#dns.quad9.net
66 |
67 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
68 | # forward-addr: 9.9.9.11@853#dns11.quad9.net
69 | # forward-addr: 149.112.112.11@853#dns11.quad9.net
70 |
71 | # 9.9.9.10 - No threat blocking, no DNSSEC
72 | # forward-addr: 9.9.9.10@853#dns10.quad9.net
73 | # forward-addr: 149.112.112.10@853#dns10.quad9.net
74 |
75 |
76 | ###IPv6 - Uncomment if your system is configured for IPv6.
77 | # 9.9.9.9 - Threat-blocking with DNSSEC
78 | # forward-addr: 2620:fe::fe@853#dns.quad9.net
79 | # forward-addr: 2620:fe::9@853#dns.quad9.net
80 |
81 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
82 | # forward-addr: 2620:fe::11@853#dns11.quad9.net
83 | # forward-addr: 2620:fe::fe:11@853#dns11.quad9.net
84 |
85 | # 9.9.9.10 - No threat blocking, no DNSSEC
86 | # forward-addr: 2620:fe::10@853#dns10.quad9.net
87 | # forward-addr: 2620:fe::fe:10@853#dns10.quad9.net
88 |
--------------------------------------------------------------------------------
/docs/en/assets/logo_light.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/en/assets/logo_light.png
--------------------------------------------------------------------------------
/docs/en/assets/logo_light.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/en/assets/quad9_all_white.svg:
--------------------------------------------------------------------------------
1 |
2 |
3 |
22 |
--------------------------------------------------------------------------------
/docs/en/images/favicon.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/en/images/quad9_logo_dark.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/en/images/quad9_logo_light.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/en/index.md:
--------------------------------------------------------------------------------
1 | # Overview
2 |
3 |
4 | { width="300" }
5 | { width="300" }
6 |
7 | Quad9 is a Swiss-based, non-profit organization which operates a privacy-and-security focused, open DNS recursive service for the masses, which is used by an estimated tens of millions of devices worldwide, and is intended for everyone, from home users to large-scale enterprises.
8 |
9 | Quad9 is funded in part by users just like you. If you value our service, please consider donating.
10 |
11 | [Donate :octicons-heart-fill-24:{ .heart }](https://quad9.net/donate){ .md-button .md-button--primary }
12 |
13 |
14 | ## Why Quad9?
15 |
16 | ### Privacy by law
17 |
18 | Quad9 will never log/record enduser IP addresses. Ever.
19 |
20 | These are not just words on a website. As an organization based in Switzerland, Quad9 is bound by strict Swiss internet privacy laws.
21 |
22 | ### Security
23 |
24 | When using Quad9's industry-leading threat blocking secure service (9.9.9.9), Quad9 will block DNS requests destined for domains associated with malicious intent, such as those associated with malware, viruses, adware, phishing, scams, etc.
25 |
26 | ### Encryption
27 |
28 | Quad9 supports DNS over TLS (DoT), DNS over HTTPS (DoH), and DNSCrypt.
29 |
30 | ## Questions / Support
31 |
32 | For any questions about Quad9 or our documentation, contact us!
33 |
34 | [Get Support](https://quad9.net/support/contact){ .md-button .md-button--primary }
35 |
--------------------------------------------------------------------------------
/docs/en/services.md:
--------------------------------------------------------------------------------
1 | Quad9 offers several variations of our free, private DNS service.
2 |
3 | ## 9.9.9.9 (Secure)
4 |
5 | Our most-popular service. A threat-blocking, privacy-first recursive DNS service.
6 |
7 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
8 | | --------------------------- | -------------------------------- | --------------- | -------------- |
9 | | `9.9.9.9`, `149.112.112.112`| `2620:fe::fe`, `2620:fe::9` | `dns.quad9.net` | `https://dns.quad9.net/dns-query` |
10 |
11 | ## 9.9.9.10 (No Threat Blocking)
12 |
13 | For users who want to take advantage of our privacy-first recursive DNS service, but do not want threat blocking, use our 9.9.9.10 service instead.
14 |
15 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
16 | | --------------------------- | -------------------------------- | --------------- | -------------- |
17 | | `9.9.9.10`, `149.112.112.10`| `2620:fe::10`, `2620:fe::fe:10` | `dns10.quad9.net` | `https://dns10.quad9.net/dns-query` |
18 |
19 | ## 9.9.9.11 (Secure + ECS)
20 |
21 | For users who do not route to the closest-possible Quad9 location, use our 9.9.9.11 for better CDN performance:
22 |
23 |
24 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
25 | | --------------------------- | -------------------------------- | --------------- | -------------- |
26 | | `9.9.9.11`, `149.112.112.11`| `2620:fe::11`, `2620:fe::fe:11` | `dns11.quad9.net` | `https://dns11.quad9.net/dns-query` |
27 |
28 | ## 9.9.9.12 (No Threat Blocking + ECS)
29 |
30 | For users who do not route to the closest-possible Quad9 location, and also do not want threat blocking, use our 9.9.9.12 for better CDN performance:
31 |
32 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
33 | | --------------------------- | -------------------------------- | --------------- | -------------- |
34 | | `9.9.9.12`, `149.112.112.12`| `2620:fe::12`, `2620:fe::fe:12` | `dns12.quad9.net` | `https://dns12.quad9.net/dns-query` |
35 |
36 | ## Alternate Ports
37 |
38 | Quad9 listens on the following, non-standard ports for better availability of our services in restrictive networking environments.
39 |
40 | | Protocol | Standard Port | Alternate Port
41 | | --------------------------- | ------------------ | ------------- |
42 | | `UDP/TCP (Plaintext)` | `53` | `9953` |
43 | | `DNS over TLS` | `853` | `8853` |
44 | | `DNS over HTTPS` | `443` | `5053` |
45 |
--------------------------------------------------------------------------------
/docs/en/stylesheets/extra.css:
--------------------------------------------------------------------------------
1 | @keyframes heart {
2 | 0%, 40%, 80%, 100% {
3 | transform: scale(1);
4 | }
5 | 20%, 60% {
6 | transform: scale(1.15);
7 | }
8 | }
9 | .heart {
10 | animation: heart 1000ms infinite;
11 | }
12 |
13 | .md-header {
14 | background-color: hsla(0, 0%, 0%, 0.32);
15 | }
16 |
17 | .md-ellipsis {
18 | font-size: 16px;
19 | }
20 |
21 | .md-nav__title {
22 | font-size: 16px;
23 | }
24 |
--------------------------------------------------------------------------------
/docs/es/Guías_de_configuración/Android/Android_9+_(Encriptado).md:
--------------------------------------------------------------------------------
1 | ## Descripción general
2 |
3 | Android 9 y versiones posteriores incluyen la función "DNS privado", que le permite conectarse a servidores DNS mediante DNS sobre TLS (DoT). Es importante tener en cuenta que la función DNS privada no funciona si la aplicación Quad9 Connect está instalada y habilitada. Para configurar su dispositivo Android para usar Quad9 de esta manera, siga los pasos a continuación.
4 |
5 | !!! advertencia "VPN"
6 | La función DNS privado no se utilizará si utiliza una VPN. Si utiliza una VPN, configure las direcciones IP de Quad9 en la configuración de "DNS personalizado" de su VPN. Consulte la documentación de su proveedor de VPN para obtener más información.
7 |
8 | ## Instrucciones
9 |
10 | * Abra la aplicación :material-cog: `Ajustes` en su dispositivo Android.
11 | * Seleccione :material-wifi: `Conexión y compartir`.
12 | * Seleccione `DNS privado`.
13 |
14 | * Seleccione `Nombre de host del provedor de DNS privado`
15 | * Ingrese: `dns.quad9.net`
16 | * Presione `Guardar`
17 |
18 | ## Verificar configuración
19 |
20 | Visite [on.quad9.net](https://on.quad9.net) en el navegador de su elección.
21 |
22 | ¿Preguntas? ¿Asuntos? ¿No funcionó? ¡Contáctenos!
23 |
24 | [Obtenga soporte](https://quad9.net/es/support/contact){ .md-button .md-button--primary }
25 |
--------------------------------------------------------------------------------
/docs/es/Guías_de_configuración/ChromeOS_(Chromebook).md:
--------------------------------------------------------------------------------
1 | ## Descripción general
2 |
3 | Quad9 Connect es una aplicación de Android compatible con ChromeOS mediante Google Play Store. Crea un túnel seguro entre el dispositivo y Quad9 para enviar consultas DNS a través de DNS a través de Quad9 Connect. Proporciona funciones adicionales como un registro de consultas, cambio de servicio con un solo clic y la capacidad de informar falsos positivos desde el registro de consultas.
4 |
5 | Quad9 Connect no es una VPN, pero utiliza la funcionalidad VPN del dispositivo para lograr DNS cifrado y las funciones asociadas con la aplicación. Cuando Quad9 Connect está habilitado, no es posible utilizar otra conexión VPN al mismo tiempo. Si utiliza una VPN, considere configurar los servidores DNS de Quad9 en la configuración "DNS personalizado" de su cliente VPN.
6 |
7 | ## Instrucciones
8 |
9 | * Instalar Quad9 Connect
10 | * En **Google Play Store**, busque e instale la aplicación: `Quad9 Connect`
11 |
12 | * Preferencia de visualización
13 | * Puedes elegir cómo quieres que se muestre la aplicación: `Phone`, `Tablet`, o `Resizable`. Puedes seleccionar tu preferencia.
14 |
15 | * Lea y haga clic en "Aceptar" cuando se le solicite la solicitud de conexión.
16 |
17 | !!! nota ""
18 | Tienes que conectarte a esta VPN para usar Quad9 Connect.
19 |
20 | * ¡Haga clic en el ícono "play" para conectarse!
21 |
22 | El número "9" y el logotipo de la clave VPN deberían aparecer en la esquina inferior derecha de la pantalla.
23 |
24 | ## Verificar configuración
25 |
26 | Para confirmar que está utilizando Quad9, visite: [on.quad9.net](https://on.quad9.net)
27 |
28 | ¿Preguntas? ¿Asuntos? ¿No funcionó? ¡Contáctenos!
29 |
30 | [Obtener soporte](https://quad9.net/es/support/contact){ .md-button .md-button--primary }
31 |
--------------------------------------------------------------------------------
/docs/es/Guías_de_configuración/Linux_y_BSD/Ubuntu_20.04_y_22.04.md:
--------------------------------------------------------------------------------
1 | ## Descripción general
2 |
3 | La forma más sencilla de configurar Quad9 en toda su red es a través de la configuración de su enrutador. Si prefiere configurar Quad9 en un solo sistema, siga los pasos a continuación para configurar Ubuntu 22.04 o 22.04 LTS para usar Quad9.
4 |
5 | !!! advertencia "Firefox, VPN"
6 | * **Firefox** está configurado para usar Cloudflare DNS de forma predeterminada en algunas regiones. Si está utilizando Firefox, verifique que [esto esté deshabilitado] (https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **Las VPN** normalmente no respetan la configuración DNS del sistema o del enrutador. Si está utilizando una VPN, configure las direcciones IP de Quad9 en la configuración de "DNS personalizado" de su cliente VPN. Consulte la documentación de su proveedor de VPN para obtener más información.
8 |
9 | ## Instrucciones
10 |
11 | ### IPv4
12 |
13 | * Desde el escritorio de Ubuntu, seleccione el menú desplegable en la esquina superior derecha de la pantalla, expanda "Wired Connection" o "Wireless Connection" según su tipo de conexión, luego seleccione "Wired Setting" o "Wireless Settings".
14 |
15 | * Haga clic en el icono :gear: junto a su conexión.
16 |
17 | * Haga clic en la pestaña `IPv4`
18 | * Desactivar `Automatic DNS`
19 | * Ingrese las direcciones IP Quad9 de su servicio preferido.
20 |
21 | Se pueden ingresar varias direcciones IP en la lista usando comas.
22 |
23 | `9.9.9.9, 149.112.112.112`
24 |
25 | * Si no va a utilizar IPv6, haga clic en "Apply" para completar el proceso de configuración y luego confirme que está utilizando Quad9.
26 |
27 |
28 | ### IPv6 (opcional)
29 |
30 | Si su red/computadora admite IPv6, también se recomienda configurar las direcciones IPv6 de Quad9. Si no está seguro de si IPv6 está configurado en su red, puede probarlo aquí: https://test-ipv6.com/
31 |
32 |
33 | * Select the `IPv6` tab
34 | * Desactivar `Automatic DNS`
35 | * Ingrese las direcciones IP Quad9 de su servicio preferido.
36 |
37 | Se pueden ingresar varias direcciones IP en la lista usando comas.
38 |
39 | `2620:fe::fe, 2620:fe::9`
40 |
41 | * Haga clic en "Apply" para completar el proceso de configuración.
42 |
43 | ## Verificar configuración
44 |
45 | Confirme que está utilizando Quad9 visitando [on.quad9.net](https://on.quad9.net) en su navegador preferido.
46 |
47 | ¿Preguntas? ¿Asuntos? ¿No funcionó? ¡Contáctenos!
48 |
49 | [Obtener soporte](https://quad9.net/support/contact){ .md-button .md-button--primary }
--------------------------------------------------------------------------------
/docs/es/Guías_de_configuración/Misceláneas/Cloudflared_y_Quad9.md:
--------------------------------------------------------------------------------
1 | Cloudflared es un proxy DNS over HTTPS que se puede configurar para usar Quad9 para la resolución de DNS.
2 |
3 | * En el archivo de configuración `cloudflared.yml`, reemplace las IP de Cloudflare en la sección `proxy-dns-upstream` con las direcciones Quad9 asociadas con las funciones que desee.
4 | * Reinicie el servicio `cloudflared`
5 |
6 | Antes (servidores DoH de Cloudflare)
7 | ```
8 | proxy-dns-upstream:
9 |
10 | - https://1.1.1.1/dns-query
11 | - https://1.0.0.1/dns-query
12 | ```
13 |
14 | IPv4
15 | ```
16 | proxy-dns-upstream:
17 |
18 | - https://9.9.9.9/dns-query
19 | - https://149.112.112.112/dns-query
20 | ```
21 |
22 | IPv6
23 | ```
24 | proxy-dns-upstream:
25 |
26 | - https://[2620:fe::fe]/dns-query
27 | - https://[2620:fe::9]/dns-query
28 | ```
29 |
30 | ¿Preguntas? ¿Asuntos? ¿No funcionó? ¡Contáctenos!
31 |
32 | [Obtenga soporte](https://quad9.net/es/support/contact){ .md-button .md-button--primary }
33 |
--------------------------------------------------------------------------------
/docs/es/Guías_de_configuración/Open_Source_Enrutadores/IPFire_(Encriptado).md:
--------------------------------------------------------------------------------
1 | ## Descripción general
2 |
3 | IPFire es un firewall y enrutador de código abierto, utilizado tanto en entornos comerciales como de consumo.
4 |
5 | IPFire utiliza Unbound, que tiene soporte DNS sobre TLS incorporado, y se puede acceder a la configuración en la GUI.
6 |
7 | Esta guía de configuración fue probada usando IPFire 2.27
8 |
9 | !!! advertencia "¡Tiempo de copia de seguridad!"
10 | Antes de realizar cambios en un entorno de producción, recomendamos [hacer una copia de seguridad de la configuración existente](https://wiki.ipfire.org/configuration/system/backup)
11 |
12 | ## Instrucciones
13 |
14 | * Vaya a `System` -> `Domain Name System`
15 | * En `DNS Servers`, haga clic en `Add` .
16 | * Realice este proceso dos veces, una para cada dirección IP de Quad9, donde el TLS Hostname siempre será dns.quad9.net
17 | * IP address `9.9.9.9`
18 | * IP address: `149.112.112.112`
19 |
20 | * Use ISP-assigned DNS Servers: `Disabled`
21 | * Protocol for DNS Queries: `TLS`
22 | * Enable Safe Search: `Disabled`
23 | * QNAME Minimisation: `Disabled`
24 | * Haga clic en `Save`
25 |
26 | ## Verificar configuración
27 |
28 | ### GUI
29 |
30 | Navegue hasta `Status` -> `Net-Traffic` en el menú superior y busque una conexión activa a `9.9.9.9` o `149.112.112.112` a través del puerto 853 TCP
31 |
32 | ### CLI
33 |
34 | * Conéctese a su dispositivo IPFire a través de SSH
35 | * Instale el paquete tshark
36 |
37 | ```
38 | pakfire -y install tshark
39 | ```
40 |
41 | * Inicie una captura de paquetes con tshark para filtrar el tráfico DNS sobre TLS:
42 |
43 | ```
44 | tshark -i any 'port 853'
45 | ```
46 |
47 | Si el dispositivo IPFire utiliza DNS sobre HTTPS para consultas de DNS, verá un resultado como este:
48 |
49 | ```
50 | 1 0.000000000 192.168.1.150 → 9.9.9.9 TCP 76 37226 → 853 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=3103990808 TSecr=0 WS=512
51 | 2 0.006914259 9.9.9.9 → 192.168.1.150 TCP 76 853 → 37226 [SYN, ACK] Seq=0 Ack=1 Win=28960 Len=0 MSS=1460 TSval=2447463919 TSecr=3103990808 WS=256
52 | 3 0.006948874 192.168.1.150 → 9.9.9.9 TCP 68 37226 → 853 [ACK] Seq=1 Ack=1 Win=64512 Len=0 TSval=3103990815 TSecr=2447463919
53 | 4 0.007110658 192.168.1.150 → 9.9.9.9 TLSv1 387 Client Hello
54 | 5 0.013306457 9.9.9.9 → 192.168.1.150 TCP 68 853 → 37226 [ACK] Seq=1 Ack=320 Win=30208 Len=0 TSval=2447463926 TSecr=3103990815
55 | 6 0.013926633 9.9.9.9 → 192.168.1.150 TLSv1.3 2964 Server Hello, Change Cipher Spec, Application Data
56 | 7 0.013945067 192.168.1.150 → 9.9.9.9 TCP 68 37226 → 853 [ACK] Seq=320 Ack=2897 Win=62464 Len=0 TSval=3103990822 TSecr=2447463926
57 | ```
58 |
59 | ¿Preguntas? ¿Asuntos? ¿No funcionó? ¡Contáctenos!
60 |
61 | [Obtenga soporte](https://quad9.net/support/contact){ .md-button .md-button--primary }
--------------------------------------------------------------------------------
/docs/es/Guías_de_configuración/Open_Source_Enrutadores/OPNsense_(Encriptado).md:
--------------------------------------------------------------------------------
1 | ### Descripción general
2 |
3 | OPNsense es un firewall de código abierto, utilizado tanto en entornos comerciales como de consumo.
4 |
5 | OPNsense utiliza Unbound, que tiene soporte DNS over TLS incorporado, y se puede acceder a la configuración en la GUI.
6 |
7 | !!! warning "¡Tiempo de copia de seguridad!"
8 | Antes de realizar cambios en un entorno de producción, recomendamos [hacer una copia de seguridad de la configuración existente](https://docs.opnsense.org/manual/backups.html#backup)
9 |
10 | ### Instrucciones
11 |
12 | * Navegue a `Services` -> `Unbound DNS` -> `DNS over TLS` en el menú del lado izquierdo
13 | * Haga clic en el botón +
14 | * Agregue 4 entradas, usando `dns.quad9.net` en el campo **Verify CN** y `853` en el campo **Server Port:**.
15 |
16 | IP del servidor: `9.9.9.9`
17 | IP del servidor: `149.112.112.112`
18 | IP del servidor: `2620:fe::fe`
19 | IP del servidor: `2620:fe::9`
20 |
21 | !!! warning "IPv6"
22 | Si su red no tiene IPv6, lo cual puede probar aquí, entonces no se deben agregar direcciones IPv6, ya que esto puede resultar en que un porcentaje de sus solicitudes de DNS fallen.
23 |
24 | * Haga clic en "Aplicar" para guardar los cambios.
25 |
26 | * Navegue a `System` -> `Settings` -> `General` en el menú del lado izquierdo.
27 |
28 | * Desactivar `Allow DNS server list to be overridden by DHCP/PPP on WAN`
29 | * Haga clic en `Save`
30 | * Haga clic en "Apply" en la parte superior de la página.
31 |
32 | ### Verificar configuración
33 |
34 | Para confirmar que OPNsense ahora envía sus consultas a través de DNS over TLS, puede ejecutar una captura de paquetes en la línea de comando, como por ejemplo:
35 |
36 | ```
37 | tcpdump -i em0 'port 853'
38 | ```
39 |
40 | !!! note
41 | Es posible que deba ajustar el nombre de la interfaz de em0 al de la interfaz WAN de su dispositivo.
42 |
43 | También puede realizar la prueba desde un sistema macOS, Linux o Windows que esté conectado a este enrutador/firewall de OPNsense.
44 |
45 | [Obtener soporte](https://quad9.net/support/contact){ .md-button .md-button--primary }
46 |
--------------------------------------------------------------------------------
/docs/es/Guías_de_configuración/Open_Source_Enrutadores/OpenWrt_(LuCi).md:
--------------------------------------------------------------------------------
1 | ## Descripción general
2 |
3 | El Proyecto OpenWrt es un sistema operativo Linux dirigido a dispositivos integrados, que a menudo se utiliza como una solución de código abierto para enrutadores y firewalls.
4 |
5 | Esta guía cubre la configuración de Quad9 en la configuración del reenviador DNS. Cuando utilice su enrutador OpenWrt como servidor DNS, reenviará las solicitudes de DNS a Quad9.
6 |
7 | !!! advertencia "¡Tiempo de copia de seguridad!"
8 | Antes de realizar cambios en un entorno de producción, recomendamos [hacer una copia de seguridad de la configuración existente](https://openwrt.org/docs/guide-user/troubleshooting/backup_restore)
9 |
10 | ## Instrucciones
11 |
12 | * Inicie sesión en su panel de control de LuCI, normalmente abriendo `http://192.168.1.1` en su navegador.
13 |
14 | * Navegue a ``Network` -> `DHCP and DNS`
15 | * Configure `9.9.9.9` y `149.112.112.112`, o las direcciones de su servicio Quad9 preferido en los campos de entrada "DNS forwardings".
16 |
17 | * Si su red admite IPv6, también puede agregar 2620:fe::fe y 2620:fe::9, o las direcciones IPv6 de su servicio Quad9 preferido.
18 |
19 | * Navegue a la subpestaña `Resolv and Hosts Files` y asegúrese de que "`Ignore resolv file`" esté "enabled".
20 |
21 | * Haga clic en Save & Apply` en la parte inferior. Dado que no está cambiando la configuración de DHCP, el cambio debería ser instantáneo.
22 |
23 | ## Verificar configuración
24 |
25 | * Confirma que estás usando Quad9 en Linux, MacOS o Windows.
26 |
27 | [Obtenga soporte](https://quad9.net/es/support/contact){ .md-button .md-button--primary }
28 |
--------------------------------------------------------------------------------
/docs/es/Guías_de_configuración/Open_Source_Enrutadores/pfSense_(Encriptado).md:
--------------------------------------------------------------------------------
1 | ## Descripción general
2 |
3 | pfSense es un firewall y enrutador de código abierto, utilizado tanto en entornos comerciales como de consumo.
4 |
5 | pfSense tiene [documentación para DNS sobre TLS](https://docs.netgate.com/pfsense/en/latest/recipes/dns-over-tls.html), que recomendamos revisar además de este artículo.
6 |
7 | pfSense utiliza Unbound, que tiene soporte DNS sobre TLS incorporado, y se puede acceder a la configuración en la GUI.
8 |
9 | !!! advertencia "¡Tiempo de copia de seguridad!"
10 | Antes de realizar cambios en un entorno de producción, recomendamos [hacer una copia de seguridad de la configuración existente](https://docs.netgate.com/pfsense/en/latest/backup/configuration.html)
11 |
12 |
13 | ## Instrucciones
14 |
15 | Navegue hasta `System` -> `Generate Setup` en el menú superior.
16 |
17 | * Haga clic en `Add DNS Server` hasta que haya 4 filas de entradas disponibles.
18 | * Agregue las direcciones IPv4 e IPv6 de Quad9 en los campos de la izquierda:
19 | `9.9.9.9`,`149.112.112.112`,`2620:fe::fe`,`2620:fe::9`
20 |
21 | !!! advertencia
22 | Si su red no tiene IPv6, lo cual puede probar aquí, entonces no se deben agregar direcciones IPv6, ya que esto puede resultar en que un porcentaje de sus solicitudes de DNS fallen.
23 |
24 | * Agregue `dns.quad9.net` en todos los campos de Hostname a la derecha.
25 |
26 | Haga clic en `Save` en la parte inferior de la pantalla.
27 |
28 | Navegue hasta `Services` -> `DNS Forwarder` en el menú superior.
29 | * Asegúrese de que Enable DNS forwarder esté deshabilitado. Si está habilitado, desactívelo y haga clic en "Save" en la parte inferior de la página.
30 |
31 | Navegue hasta `Services` -> `DNS Resolver` en el menú superior.
32 |
33 | *Desplázate hacia abajo hasta encontrar la sección que se ve en la siguiente captura de pantalla.
34 | * Desactive Enable DNSSEC Support si está habilitado.
35 | !!! nota "DNSSEC"
36 | Quad9 ya aplica DNSSEC y habilitar DNSSEC en el nivel del reenviador puede causar fallas falsas de DNSSEC.
37 | * Habilitar `DNS Query Forwarding`
38 | * Habilite `Use SSL/TLS for outgoing DNS queries to Forwarding Servers`
39 | * Haga clic en "Save" en la parte inferior de la pantalla.
40 | * Haga clic en "Apply Changes" cerca de la parte superior de la pantalla para aplicar los cambios guardados.
41 |
42 | ## Verificar configuración
43 |
44 | Puede confirmar que pfSense ahora envía sus consultas a través de DNS sobre TLS utilizando la herramienta de captura de paquetes incorporada.
45 |
46 | También puede ejecutar una prueba desde un sistema macOS, Linux o Windows en la red.
47 |
48 | [Obtenga soporte](https://quad9.net/es/support/contact){ .md-button .md-button--primary }
49 |
--------------------------------------------------------------------------------
/docs/es/Guías_de_configuración/Windows/Windows_10.md:
--------------------------------------------------------------------------------
1 | ## Descripción general
2 |
3 | La forma más sencilla de configurar Quad9 en toda su red es a través de la configuración de su enrutador. Si prefiere configurar Quad9 en un dispositivo Windows individual, siga los pasos a continuación para configurar Windows 10 para usar Quad9.
4 |
5 | !!! advertencia "Firefox, VPN"
6 | * **Firefox** está configurado para usar Cloudflare DNS de forma predeterminada en algunas regiones. Si está utilizando Firefox, verifique que [esto esté deshabilitado](https://support.mozilla.org/es/kb/dns-sobre-https#w_configurar-la-proteccion-doh).
7 | * **Las VPN** normalmente no respetan la configuración DNS del sistema o del enrutador. Si está utilizando una VPN, configure las direcciones IP de Quad9 en la configuración de "DNS personalizado" de su cliente VPN. Consulte la documentación de su proveedor de VPN para obtener más información.
8 |
9 | ## Instrucciones
10 |
11 | ### IPv4
12 |
13 | * Haga clic derecho en el ícono de Red (por cable o WiFi) en la bandeja del sistema y haga clic en "Red e Internet".
14 |
15 | * Haga clic en `Cambiar opciones del adaptador`
16 |
17 | * Seleccione `Propiedades`.
18 |
19 | * Seleccione `Protocolo de Internet versión 4 (TCP/IPv4)`. Luego, haga clic en "Propiedades".
20 |
21 | * Seleccione `Usar las siguientes direcciones de servidor DNS`.
22 | * Ingrese: `9.9.9.9` en Servidor DNS preferido
23 | * Ingrese: `149.112.112.112` en el servidor DNS alternativo
24 | * Haga clic en "Aceptar".
25 |
26 | ### IPv6
27 |
28 | Si sus redes admiten IPv6, también se recomienda configurar las direcciones IPv6 de Quad9. Si no está seguro de si IPv6 está configurado en su red, puede probarlo aquí: https://test-ipv6.com/
29 |
30 | * Seleccione `Protocolo de Internet versión 6 (TCP/IPv6) `
31 | * Haga clic en Propiedades.
32 |
33 | * Seleccione `Usar las siguientes direcciones de servidor DNS`.
34 | * Ingrese: `2620:fe::fe` en Servidor DNS preferido
35 | * Ingrese: `2620:fe::9` en el servidor DNS alternativo
36 | * Haga clic en "Aceptar".
37 |
38 | *Cierre todas las ventanas de configuración.
39 |
40 | ## Verificar configuración
41 |
42 | Confirme que está utilizando Quad9 visitando [on.quad9.net](https://on.quad9.net) en su navegador preferido.
43 |
44 | ¿Preguntas? ¿Asuntos? ¿No funcionó? ¡Contáctenos!
45 |
46 | [Obtener soporte](https://quad9.net/es/support/contact){ .md-button .md-button--primary }
47 |
--------------------------------------------------------------------------------
/docs/es/assets/conf/freebsd/forward.conf:
--------------------------------------------------------------------------------
1 | # This file was generated by local-unbound-setup.
2 | # Modifications will be overwritten.
3 | forward-zone:
4 | name: "."
5 | forward-tls-upstream: yes # Use DNS-over-TLS
6 | forward-first: no # do NOT send direct
7 | ###IPv4
8 | # 9.9.9.9 - Threat-blocking with DNSSEC
9 | forward-addr: 9.9.9.9@853#dns.quad9.net
10 | forward-addr: 149.112.112.112@853#dns.quad9.net
11 |
12 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
13 | # forward-addr: 9.9.9.11@853#dns11.quad9.net
14 | # forward-addr: 149.112.112.11@853#dns11.quad9.net
15 |
16 | # 9.9.9.10 - No threat blocking, no DNSSEC
17 | # forward-addr: 9.9.9.10@853#dns10.quad9.net
18 | # forward-addr: 149.112.112.10@853#dns10.quad9.net
19 |
20 |
21 | ###IPv6 - Uncomment if your system is configured for IPv6.
22 | # 9.9.9.9 - Threat-blocking with DNSSEC
23 | # forward-addr: 2620:fe::fe@853#dns.quad9.net
24 | # forward-addr: 2620:fe::9@853#dns.quad9.net
25 |
26 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
27 | # forward-addr: 2620:fe::11@853#dns11.quad9.net
28 | # forward-addr: 2620:fe::fe:11@853#dns11.quad9.net
29 |
30 | # 9.9.9.10 - No threat blocking, no DNSSEC
31 | # forward-addr: 2620:fe::10@853#dns10.quad9.net
32 | # forward-addr: 2620:fe::fe:10@853#dns10.quad9.net
33 |
--------------------------------------------------------------------------------
/docs/es/assets/conf/freebsd/unbound.conf:
--------------------------------------------------------------------------------
1 | # This file was generated by local-unbound-setup.
2 | # Modifications will be overwritten.
3 | server:
4 | username: unbound
5 | directory: /var/unbound
6 | chroot: /var/unbound
7 | pidfile: /var/run/local_unbound.pid
8 | #auto-trust-anchor-file: /var/unbound/root.key
9 | tls-cert-bundle: /etc/ssl/cert.pem
10 |
11 | include: /var/unbound/forward.conf
12 | include: /var/unbound/lan-zones.conf
13 | include: /var/unbound/control.conf
14 | include: /var/unbound/conf.d/*.conf
15 |
--------------------------------------------------------------------------------
/docs/es/assets/conf/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/es/assets/conf/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig
--------------------------------------------------------------------------------
/docs/es/assets/conf/openbsd/unbound.conf:
--------------------------------------------------------------------------------
1 | # $OpenBSD: unbound.conf,v 1.21 2020/10/28 11:35:58 sthen Exp $
2 | # Modified by Quad9.net:
3 | # - Disable DNSSEC Validation. Quad9 already performs DNSSEC validation, and DNSSEC validation on a forwarder significantly decreases performance due to duplicate DNSSEC validation and can occassionally result in a false BOGUS result.
4 | # - DNS-over-TLS enabled.
5 | # - Pre-populate all Quad9 services
6 |
7 | server:
8 | interface: 127.0.0.1
9 | #interface: 127.0.0.1@5353 # listen on alternative port
10 | interface: ::1
11 | #do-ip6: no
12 |
13 | # override the default "any" address to send queries; if multiple
14 | # addresses are available, they are used randomly to counter spoofing
15 | #outgoing-interface: 192.0.2.1
16 | #outgoing-interface: 2001:db8::53
17 |
18 | access-control: 0.0.0.0/0 refuse
19 | access-control: 127.0.0.0/8 allow
20 | access-control: ::0/0 refuse
21 | access-control: ::1 allow
22 |
23 | hide-identity: yes
24 | hide-version: yes
25 |
26 | # Perform DNSSEC validation.
27 | #
28 | #auto-trust-anchor-file: "/var/unbound/db/root.key"
29 | #val-log-level: 2
30 |
31 | # Synthesize NXDOMAINs from DNSSEC NSEC chains.
32 | # https://tools.ietf.org/html/rfc8198
33 | #
34 | # aggressive-nsec: yes
35 |
36 | # Serve zones authoritatively from Unbound to resolver clients.
37 | # Not for external service.
38 | #
39 | #local-zone: "local." static
40 | #local-data: "mycomputer.local. IN A 192.0.2.51"
41 | #local-zone: "2.0.192.in-addr.arpa." static
42 | #local-data-ptr: "192.0.2.51 mycomputer.local"
43 |
44 | # Use TCP for "forward-zone" requests. Useful if you are making
45 | # DNS requests over an SSH port forwarding.
46 | #
47 | #tcp-upstream: yes
48 |
49 | # CA Certificates used for forward-tls-upstream (RFC7858) hostname
50 | # verification. Since it's outside the chroot it is only loaded at
51 | # startup and thus cannot be changed via a reload.
52 | tls-cert-bundle: "/etc/ssl/cert.pem"
53 |
54 | remote-control:
55 | control-enable: yes
56 | control-interface: /var/run/unbound.sock
57 |
58 | forward-zone:
59 | name: "."
60 | forward-tls-upstream: yes # Use DNS-over-TLS
61 | forward-first: no # do NOT send direct
62 | ###IPv4
63 | # 9.9.9.9 - Threat-blocking with DNSSEC
64 | forward-addr: 9.9.9.9@853#dns.quad9.net
65 | forward-addr: 149.112.112.112@853#dns.quad9.net
66 |
67 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
68 | # forward-addr: 9.9.9.11@853#dns11.quad9.net
69 | # forward-addr: 149.112.112.11@853#dns11.quad9.net
70 |
71 | # 9.9.9.10 - No threat blocking, no DNSSEC
72 | # forward-addr: 9.9.9.10@853#dns10.quad9.net
73 | # forward-addr: 149.112.112.10@853#dns10.quad9.net
74 |
75 |
76 | ###IPv6 - Uncomment if your system is configured for IPv6.
77 | # 9.9.9.9 - Threat-blocking with DNSSEC
78 | # forward-addr: 2620:fe::fe@853#dns.quad9.net
79 | # forward-addr: 2620:fe::9@853#dns.quad9.net
80 |
81 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
82 | # forward-addr: 2620:fe::11@853#dns11.quad9.net
83 | # forward-addr: 2620:fe::fe:11@853#dns11.quad9.net
84 |
85 | # 9.9.9.10 - No threat blocking, no DNSSEC
86 | # forward-addr: 2620:fe::10@853#dns10.quad9.net
87 | # forward-addr: 2620:fe::fe:10@853#dns10.quad9.net
88 |
--------------------------------------------------------------------------------
/docs/es/assets/logo_light.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/es/assets/logo_light.png
--------------------------------------------------------------------------------
/docs/es/assets/logo_light.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/es/assets/quad9_all_white.svg:
--------------------------------------------------------------------------------
1 |
2 |
3 |
22 |
--------------------------------------------------------------------------------
/docs/es/images/favicon.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/es/images/quad9_logo_dark.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/es/images/quad9_logo_light.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/es/index.md:
--------------------------------------------------------------------------------
1 | # Descripción general
2 |
3 |
4 | { width="300" }
5 | { width="300" }
6 |
7 | Quad9 es una organización sin fines de lucro con sede en Suiza que opera un servicio recursivo de DNS abierto y centrado en la privacidad y la seguridad para las masas, que se utiliza en aproximadamente decenas de millones de dispositivos en todo el mundo y está destinado a todos, desde usuarios domesticos a empresas de gran escala.
8 |
9 | Quad9 está financiado en parte por usuarios como usted. Si valora nuestro servicio, considere hacer una donación.
10 |
11 | [Haga un donativo :octicons-heart-fill-24:{ .heart }](https://quad9.net/es/donate){ .md-button .md-button--primary }
12 |
13 |
14 | ## ¿Por qué Quad9?
15 |
16 | ### Privacidad por ley
17 |
18 | Quad9 nunca registrará/guardará las direcciones IP de los usuarios finales. Nunca.
19 |
20 | Estas no son sólo palabras en un sitio web. Como organización con sede en Suiza, Quad9 está sujeta a estrictas leyes suizas de privacidad en Internet.
21 |
22 | ### Seguridad
23 |
24 | Al utilizar el servicio seguro de bloqueo de amenazas líder en la industria de Quad9 (9.9.9.9), Quad9 bloqueará las solicitudes de DNS destinadas a dominios asociados con intenciones maliciosas, como aquellos asociados con malware, virus, adware, phishing, estafas, etc.
25 |
26 | ### Cifrado
27 |
28 | Quad9 soporta DNS sobre TLS (DoT), DNS sobre HTTPS (DoH) y DNSCrypt.
29 |
30 | ## Preguntas/Soporte
31 |
32 | Para cualquier pregunta sobre Quad9 o nuestra documentación, ¡contáctenos!
33 |
34 | [Obtenga soporte](https://quad9.net/es/support/contact){ .md-button .md-button--primary }
35 |
--------------------------------------------------------------------------------
/docs/es/servicios.md:
--------------------------------------------------------------------------------
1 | Quad9 ofrece varias variaciones de nuestro servicio DNS privado y gratuito.
2 |
3 | ## 9.9.9.9 (Seguro)
4 |
5 | Nuestro servicio más popular. Un servicio DNS recursivo que bloquea amenazas y da prioridad a la privacidad.
6 |
7 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
8 | | --------------------------- | -------------------------------- | --------------- | -------------- |
9 | | `9.9.9.9`, `149.112.112.112`| `2620:fe::fe`, `2620:fe::9` | `dns.quad9.net` | `https://dns.quad9.net/dns-query` |
10 |
11 | ## 9.9.9.10 (Sin bloqueo de amenazas)
12 |
13 | Para los usuarios que quieran aprovechar nuestro servicio DNS recursivo que prioriza la privacidad, pero no quieran bloquear amenazas, utilice nuestro servicio 9.9.9.10.
14 |
15 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
16 | | --------------------------- | -------------------------------- | --------------- | -------------- |
17 | | `9.9.9.10`, `149.112.112.10`| `2620:fe::10`, `2620:fe::fe:10` | `dns10.quad9.net` | `https://dns10.quad9.net/dns-query` |
18 |
19 | ## 9.9.9.11 (Seguro + ECS)
20 |
21 | Para los usuarios que no se dirigen a la ubicación Quad9 más cercana posible, utilice nuestra versión 9.9.9.11 para obtener un mejor rendimiento de CDN:
22 |
23 |
24 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
25 | | --------------------------- | -------------------------------- | --------------- | -------------- |
26 | | `9.9.9.11`, `149.112.112.11`| `2620:fe::11`, `2620:fe::fe:11` | `dns11.quad9.net` | `https://dns11.quad9.net/dns-query` |
27 |
28 | ## 9.9.9.12 (Sin bloqueo de amenazas + ECS)
29 |
30 | Para los usuarios que no se dirigen a la ubicación Quad9 más cercana posible y tampoco desean bloquear amenazas, utilice nuestra versión 9.9.9.12 para obtener un mejor rendimiento de CDN:
31 |
32 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
33 | | --------------------------- | -------------------------------- | --------------- | -------------- |
34 | | `9.9.9.12`, `149.112.112.12`| `2620:fe::12`, `2620:fe::fe:12` | `dns12.quad9.net` | `https://dns12.quad9.net/dns-query` |
35 |
36 | ## Puertos alternativos
37 |
38 | Quad9 escucha en los siguientes puertos no estándar para una mejor disponibilidad de nuestros servicios en entornos de red restrictivos.
39 |
40 | | Protocolo | Puerto estándar | Puerto alternativo
41 | | --------------------------- | ------------------ | ------------- |
42 | | `UDP/TCP (Plaintext)` | `53` | `9953` |
43 | | `DNS sobre TLS` | `853` | `8853` |
44 | | `DNS sobre HTTPS` | `443` | `5053` |
45 |
--------------------------------------------------------------------------------
/docs/es/stylesheets/extra.css:
--------------------------------------------------------------------------------
1 | @keyframes heart {
2 | 0%, 40%, 80%, 100% {
3 | transform: scale(1);
4 | }
5 | 20%, 60% {
6 | transform: scale(1.15);
7 | }
8 | }
9 | .heart {
10 | animation: heart 1000ms infinite;
11 | }
12 |
13 | .md-header {
14 | background-color: hsla(0, 0%, 0%, 0.32);
15 | }
16 |
17 | .md-ellipsis {
18 | font-size: 16px;
19 | }
20 |
21 | .md-nav__title {
22 | font-size: 16px;
23 | }
24 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/Android/Android_9+_(Crypté).md:
--------------------------------------------------------------------------------
1 | ## Aperçu
2 |
3 | Android 9 et les versions ultérieures incluent la fonctionnalité `DNS privé`, ce qui vous permet de vous connecter aux serveurs DNS en utilisant DNS over TLS (DoT). Il est important de noter que la fonction DNS privée ne fonctionnera pas si l'application Quad9 Connect est installée et activée. Pour configurer Quad9 sur votre appareil Android, suivez les étapes ci-dessous.
4 |
5 | !!! warning "VPNs"
6 | La fonction DNS privé ne sera pas prise en compte avec un VPN actif. Si vous utilisez un VPN, vous devrez configurer l'adresse IP de Quad9 dans les paramètres `DNS personnalisé` de votre VPN. Veuillez vous référer à la documentation de votre fournisseur VPN pour plus d'informations.
7 |
8 | ## Instructions
9 |
10 | * Ouvrez l'application :material-cog: `Paramètres` de votre appareil Android.
11 | * Selectionnez :material-wifi: `Connexions`.
12 | * Selectionnez `DNS privé`.
13 |
14 | * Selectionnez `Nom d'hôte du fournisseur DNS privé`
15 | * Entrez: `dns.quad9.net`
16 | * Appuyez sur `Enregistrer`
17 |
18 | ## Verifier la Configuration
19 |
20 | Allez sur [on.quad9.net](https://on.quad9.net) depuis le navigateur de votre choix.
21 |
22 | Des questions? Des Problèmes? Cela n'a pas fonctionné ? N'hesitez pas à nous contacter!
23 |
24 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
25 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/ChromeOS_(Chromebook).md:
--------------------------------------------------------------------------------
1 | ## Apperçu
2 |
3 | Quad9 Connect est une application Android compatible avec ChromeOS depuis le Google Play store. Elle crée un tunnel chiffré entre l'appareil et Quad9 afin d'envoyer des requêtes DNS via DNS over TLS. Quad9 Connect fournit des fonctionnalités supplémentaires telles qu'un journal des requêtes, le changement de service en un clic et la possibilité de signaler les faux positifs à partir du journal des requêtes.
4 |
5 | Quad9 Connect n'est pas un VPN mais il utilise la fonctionnalité VPN de l'appareil pour obtenir un DNS chiffré. Lorsque Quad9 Connect est activé, il n'est pas possible d'utiliser une autre connexion VPN en même temps. Si vous utilisez un VPN, pensez à configurer les serveurs DNS de Quad9 dans les paramètres « DNS personnalisé » de votre client VPN.
6 |
7 | ## Instructions
8 |
9 | * Installation de Quad9 Connect
10 | * Dans le **Play Store**, cherchez et installez l'application: `Quad9 Connect`
11 |
12 | * Préférence d'affichage
13 | * Vous pouvez choisir le type d'affichage de l'application: `Téléphone`, `Tablette` ou `Redimensionnable`. Vous pouvez sélectionner votre préférence.
14 |
15 | * Lisez et cliquez sur `OK` lorsque vous êtes invité à effectuer la demande de connexion.
16 |
17 | * Cliquez sur l'icône `Play` pour vous connecter!
18 |
19 | Le chiffre `9` et le logo de la clé VPN devraient apparaître dans le coin inférieur droit de votre écran.
20 |
21 | ## Verifier la Configuration
22 |
23 | Allez sur [on.quad9.net](https://on.quad9.net) depuis le navigateur de votre choix.
24 |
25 | Des questions? Des Problèmes? Cela n'a pas fonctionné ? N'hesitez pas à nous contacter!
26 |
27 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
28 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/Linux_et_BSD/Fedora_38.md:
--------------------------------------------------------------------------------
1 | ## Apperçu
2 |
3 | La manière la plus simple pour configurer Quad9 sur tout votre réseau se fait via les paramètres de votre routeur. Si vous préférez configurer Quad9 sur un appareil Windows individuel, veuillez suivre les étapes ci-dessous afin de configurer Fedora 38 pour utiliser Quad9.
4 |
5 | !!! warning "Firefox, VPNs"
6 | * **Firefox** est configuré pour utiliser Cloudflare DNS par défaut dans certaines régions. Si vous utilisez Firefox assurez vous que cette fonctionalité [soit desactivée](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **Les VPNs** ne respectent généralement pas les paramètres DNS du système ou du routeur. Si vous utilisez un VPN, configurez les adresses IP de Quad9 dans les paramètres « DNS personnalisé » de votre client VPN. Reportez-vous à la documentation de votre fournisseur VPN pour plus d'informations.
8 |
9 | ## Instructions
10 |
11 | ### IPv4
12 |
13 | * Cliquez sur l'icône `Filaire` ou `WiFi` dans la barre d'outil en haut à droite de votre écran.
14 | * Cliquez sur l'icône `>` à côté de votre connection active.
15 | * Sélectionnez `Paramètre Filaire` ou `Paramètre Wifi`.
16 |
17 | * Cliquez sur l'icône :gear: prêt de votre connection à droite .
18 |
19 | * Cliquez sur l'onglet `IPv4`
20 | * Dans Methode IPv4 Sélectionnez `Manuel`
21 | * Dans `DNS` Désactivez `Automatique`
22 | * Dans la barre écrivez `9.9.9.9, 149.112.112.112`
23 |
24 |
25 | * Si vous n'utilisez pas IPv6, cliquez sur `Appliquer` pour compléter votre configuration puis confirmez que vous utilisez Quad9.
26 |
27 |
28 | ### IPv6 (Optionel)
29 |
30 | Si votre réseau supporte IPv6, il est également recommandé de configurer l'addresse IPv6 de Quad9. Si vous n'êtes pas sûr que IPv6 soit configuré sur votre réseau, vous pouvez le vérifier ici: https://test-ipv6.com/
31 |
32 | * Cliquez sur l'onglet `IPv4`
33 | * Dans Methode IPv4 Sélectionnez `Manuel`
34 | * Dans `DNS` Désactivez `Automatique`
35 | * Dans la barre écrivez `2620:fe::fe, 2620:fe::9`
36 |
37 |
38 |
39 |
40 | * Cliquez sur `Appliquer` pour compléter votre configuration
41 |
42 | ## Verifier la Configuration
43 |
44 | Allez sur [on.quad9.net](https://on.quad9.net) depuis le navigateur de votre choix.
45 |
46 | Des questions? Des Problèmes? Cela n'a pas fonctionné ? N'hesitez pas à nous contacter!
47 |
48 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
49 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/Linux_et_BSD/Ubuntu_20.04_et_22.04.md:
--------------------------------------------------------------------------------
1 | ## Overview
2 |
3 | Le moyen le plus simple de configurer Quad9 sur l'ensemble de votre réseau consiste à utiliser les paramètres de votre routeur. Si vous préférez configurer Quad9 sur un seul système, veuillez suivre les étapes ci-dessous pour configurer Ubuntu 22.04 ou 22.04 LTS pour utiliser Quad9.
4 |
5 | !!! warning "Firefox, VPNs"
6 | * **Firefox** est configuré pour utiliser Cloudflare DNS par défaut dans certaines régions. Si vous utilisez Firefox assurez vous que cette fonctionalité [soit desactivée](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **Les VPNs** ne respectent généralement pas les paramètres DNS du système ou du routeur. Si vous utilisez un VPN, configurez les adresses IP de Quad9 dans les paramètres « DNS personnalisé » de votre client VPN. Reportez-vous à la documentation de votre fournisseur VPN pour plus d'informations.
8 |
9 | ## Instructions
10 |
11 | ### IPv4
12 |
13 | * Depuis le bureau Ubuntu, sélectionnez le menu déroulant dans le coin supérieur droit de l'écran, développez `Wired Connection` ou `Wireless Connection` en fonction de votre type de connexion, puis sélectionnez `Wired Settings` ou `Wireless Settings`.
14 |
15 | * Cliquez sur l'icône :gear: icon à côté de votre connexion.
16 |
17 | * Cliquez sur `IPv4` tab
18 | * Désactivez `Automatic DNS`
19 | * Entrez les adresses IP Quad9 de vos services préférés.
20 |
21 | Plusieurs adresses IP peuvent être saisies dans la liste à l'aide de virgules.
22 |
23 | `9.9.9.9, 149.112.112.112`
24 |
25 | * Si vous ne souhaitez pas utiliser IPv6, cliquez sur `Appliquer` afin de terminer le processus de configuration, puis confirmez que vous utilisez Quad9.
26 |
27 |
28 | ### IPv6 (Optionel)
29 |
30 | Si votre réseau/ordinateur prend en charge IPv6, il est également recommandé de configurer les adresses IPv6 de Quad9. Si vous n'êtes pas sûr qu'IPv6 soit configuré sur votre réseau, vous pouvez le tester ici : https://test-ipv6.com/
31 |
32 |
33 | * Selectionnez `IPv6` tab
34 | * Désactivez `Automatic DNS`
35 | * Entrez les adresses IP Quad9 de vos services préférés.
36 |
37 | Plusieurs adresses IP peuvent être saisies dans la liste à l'aide de virgules.
38 |
39 | `2620:fe::fe, 2620:fe::9`
40 |
41 | * Click `Apply` to complete the setup process.
42 |
43 | ## Verifier la Configuration
44 |
45 | Allez sur [on.quad9.net](https://on.quad9.net) depuis le navigateur de votre choix.
46 |
47 | Des questions? Des Problèmes? Cela n'a pas fonctionné? N'hesitez pas à nous contacter!
48 |
49 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
50 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/Linux_et_BSD/Ubuntu_22.04_(Chiffré).md:
--------------------------------------------------------------------------------
1 | ## Aperçu
2 |
3 | Ubuntu 22.04 et Linux Mint 20.3 ou ses versions plus récentes incluent DNS over TLS en systemd-resolved, mais l'option n'est pas disponible dans le GUI.
4 |
5 | !!! bug
6 | Techniquement, bien qu'elle soit également compatible avec Ubuntu *20.04*, nous ne recommandons pas l'utilisation de cette méthode sur la version 20.04 car la version de son systemd-resolv est plus ancienne, ce qui peut occasioner des problèmes.
7 |
8 | !!! bug
9 | L'option DNSSEC ne doit pas être activée dans systemd-resolved. Elle est extrêmement bugée et ne ferait que dupliquer le processus de validation DNSSEC déjà effectué par Quad9, ce qui réduirait considérablement les performances.
10 |
11 | !!! warning "Firefox, VPNs"
12 | * **Firefox** est configuré pour utiliser Cloudflare DNS par défaut dans certaines régions. Si vous utilisez Firefox assurez vous que cette fonctionalité soit desactivée.
13 | * **Les VPNs** ne respectent généralement pas les paramètres DNS du système ou du routeur. Si vous utilisez un VPN, configurez les adresses IP de Quad9 dans les paramètres « DNS personnalisé » de votre client VPN. Reportez-vous à la documentation de votre fournisseur VPN pour plus d'informations.
14 |
15 | ## Instructions
16 |
17 | * Configurer Quad9 dans les paramètres réseau ([Ubuntu](editme), [Linux Mint](editme)).
18 |
19 | * Ouvrez l'application `Terminal`, et copiez/collez ces lignes de commande afin d'activer DNS over TLS.Lorsque vous êtes invité à saisir votre mot de passe, saisissez-le et appuyez sur `Entrée`.
20 |
21 | ```
22 | sudo sed -i 's/#DNSOverTLS=no/DNSOverTLS=yes/g' /etc/systemd/resolved.conf
23 | ```
24 |
25 | * Redémarer `systemd-resolvd` et `networking services` afin d'enregistrer les changements dans le fichier:
26 |
27 | ```
28 | sudo systemctl restart systemd-resolved.service && sudo service network-manager restart
29 | ```
30 | ## Verifier la Configuration
31 |
32 | * Verifiez que DNS over TLS est actif en ouvrant l'application `Terminal` et entrez les commandes suivantes, saisissez votre mot de passe et appuyez sur `Entrée`:
33 |
34 | ```
35 | $ dig +short txt proto.on.quad9.net.
36 | ```
37 | Si la réponse est `dot.`, cela signifie que ca marche! Si la réponse est `do53-udp.`, alors il utilise encore du plaintext. S'il n'y a pas de réponse, cela signifie que Quad9 n'a probablement pas été configuré dans le `Paramètres réseau`.
38 |
39 | ## Annuler
40 |
41 | Si vous rencontrez des problèmes ou souhaitez annuler ce changement de configuration :
42 |
43 | * Ouvrez l'application `Terminal`, et copiez/collez ces lignes de commande afin de désactiver DNS over TLS. Lorsque vous êtes invité à saisir votre mot de passe, saisissez-le et appuyez sur `Entrée`.
44 |
45 | ```
46 | sudo sed -i 's/DNSOverTLS=yes/#DNSOverTLS=no/g' /etc/systemd/resolved.conf
47 | ```
48 |
49 | * Redémarrez les services `systemd-resolvd` et `networking` afin d'enregistrer les changements que nous venons d'effectuer dans le fichier:
50 |
51 | ```
52 | sudo systemctl restart systemd-resolved.service && sudo service network-manager restart
53 | ```
54 |
55 | Vous avez des questions? Vous rencontrez un probleme? Cela n'a pas marché? N'hésitez pas à nous contacter!
56 |
57 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
58 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/Miscellaneous/Cloudflared_et_Quad9.md:
--------------------------------------------------------------------------------
1 | Cloudflared est un proxy DNS over HTTPS qui peut être configuré pour utiliser Quad9 pour la résolution DNS.
2 |
3 | * Dans le fichier de configuration `cloudflared.yml` , remplacez les IP Cloudflare dans la section `proxy-dns-upstream` par les adresses Quad9 associées aux fonctionnalités souhaitées.
4 | * Redémarrez le service `cloudflared`
5 |
6 | Avant (Cloudflare DNS over HTTP Servers)
7 | ```
8 | proxy-dns-upstream:
9 |
10 | - https://1.1.1.1/dns-query
11 | - https://1.0.0.1/dns-query
12 | ```
13 |
14 | IPv4
15 | ```
16 | proxy-dns-upstream:
17 |
18 | - https://9.9.9.9/dns-query
19 | - https://149.112.112.112/dns-query
20 | ```
21 |
22 | IPv6
23 | ```
24 | proxy-dns-upstream:
25 |
26 | - https://[2620:fe::fe]/dns-query
27 | - https://[2620:fe::9]/dns-query
28 | ```
29 |
30 | Vous avez des questions? Vous rencontrez un probleme? Cela n'a pas marché? N'hésitez pas à nous contacter!
31 |
32 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
33 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/Miscellaneous/Pi-Hole.md:
--------------------------------------------------------------------------------
1 | ## Aperçu
2 |
3 | Pi-Hole est un redirecteur DNS populaire, souvent utilisé principalement pour bloquer les domaines spécifiquement associés aux publicités et aux trackers.
4 |
5 | ## Pi-Hole Configuration
6 |
7 | Pour des instructions de configuration détaillées de Pi-Hole lui-même, veuillez consulter la [Documentation officielle de Pi-Hole](https://docs.pi-hole.net/).
8 |
9 | ## Instructions
10 |
11 | Une fois que vous avez installé Pi-Hole et que vous pouvez accéder au panneau d'administration, Quad9 est déjà l'une des options par défaut.
12 |
13 | * Dans le panneau d'administration, allez dans `Settings` -> `DNS`
14 | * Cochez les deux cases IPv4 à côté de Quad9 (filtered, DNSSEC)
15 | * Si votre réseau ne dispose pas d'IPv6, ce que vous pouvez vérifier ici, alors les adresses IPv6 ne doivent pas être ajoutées, car cela pourrait entraîner l'échec d'un nombre conséquent de vos requêtes DNS. [Test here](https://port.tools/ipv6-test/).
16 |
17 | * Activez les options:
18 | * `Never forward non-FQDNs`
19 | * `Never forward reverse lookups for private IP ranges`
20 | * Click `Save` at the bottom.
21 |
22 | ## Verifier la Configuration
23 |
24 | Une fois Quad9 configuré dans Pi-Hole, vous pouvez configurer votre routeur ou un seul ordinateur pour utiliser l'adresse IP du Pi-Hole comme serveur DNS. Si le journal des requêtes est activé (Paramètres -> Confidentialité [tab]), vous devriez voir Quad9 enregistré dans la colonne Statut.
25 |
26 | ## Domaines Bloqués
27 |
28 | Les domaines bloqués par Quad9 seront enregistrés comme Bloqués (externe, NXRA) dans la colonne Statut du journal des requêtes.
29 |
30 | Vous avez des questions? Vous rencontrez un probleme? Cela n'a pas marché? N'hésitez pas à nous contacter!
31 |
32 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
33 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/Open-Source_Routers/IPFire_(Chiffré).md:
--------------------------------------------------------------------------------
1 | ## Aperçu
2 |
3 | IPFire est un routeur et pare-feu open-source, utilisé dans les structures grand public et commerciales.
4 |
5 | IPFire utilises Unbound, qui est compatible avec DNS over TLS, la configuration est accessible dans le GUI.
6 |
7 | Ce guide de configuration a été testé avec IPFire 2.27
8 |
9 | !!! warning "C'est l'heure du Backup!"
10 | Avant d'apporter des modifications à un environnement de production, nous vous recommandons de [sauvegarder la configuration existante](https://wiki.ipfire.org/configuration/system/backup)
11 |
12 | ## Instructions
13 |
14 | * Allez dans `System` -> `Domain Name System`
15 | * Sous `DNS Servers`, cliquez `Add`
16 | * Suivez ce processus deux fois, une pour chaque adresse IP Quad9, où le nom d'hôte TLS (hostname) sera toujours dns.quad9.net
17 | * IP address: `9.9.9.9`
18 | * IP address: `149.112.112.112`
19 |
20 | * Utilisez les serveurs DNS attribués par le FAI: `Disabled`
21 | * Protocole pour les requêtes DNS: `TLS`
22 | * Activer la recherche sécurisée: `Disabled`
23 | * Minimisation QNAME: `Disabled`
24 | * Cliquez `Enregistrer`
25 |
26 | ## Verifier la Configuration
27 |
28 | ### GUI
29 |
30 | Allez vers `Status` -> `Net-Traffic` dans le menu supérieur et recherchez une connexion active à `9.9.9.9` ou `149.112.112.112` via le port 853 TCP
31 |
32 | ### CLI
33 |
34 | * Connectez-vous à votre materiel IPFire via SSH
35 | * Installez le pack tshark
36 |
37 | ```
38 | pakfire -y install tshark
39 | ```
40 |
41 | * Démarrez un packet capture avec tshark afin de filtrer le trafique sur DNS over TLS:
42 |
43 | ```
44 | tshark -i any 'port 853'
45 | ```
46 |
47 | Si le materiel IPFire utilise DNS over HTTPS pour les requêtes DNS, you verrez ce type de résultat:
48 | ```
49 | 1 0.000000000 192.168.1.150 → 9.9.9.9 TCP 76 37226 → 853 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=3103990808 TSecr=0 WS=512
50 | 2 0.006914259 9.9.9.9 → 192.168.1.150 TCP 76 853 → 37226 [SYN, ACK] Seq=0 Ack=1 Win=28960 Len=0 MSS=1460 TSval=2447463919 TSecr=3103990808 WS=256
51 | 3 0.006948874 192.168.1.150 → 9.9.9.9 TCP 68 37226 → 853 [ACK] Seq=1 Ack=1 Win=64512 Len=0 TSval=3103990815 TSecr=2447463919
52 | 4 0.007110658 192.168.1.150 → 9.9.9.9 TLSv1 387 Client Hello
53 | 5 0.013306457 9.9.9.9 → 192.168.1.150 TCP 68 853 → 37226 [ACK] Seq=1 Ack=320 Win=30208 Len=0 TSval=2447463926 TSecr=3103990815
54 | 6 0.013926633 9.9.9.9 → 192.168.1.150 TLSv1.3 2964 Server Hello, Change Cipher Spec, Application Data
55 | 7 0.013945067 192.168.1.150 → 9.9.9.9 TCP 68 37226 → 853 [ACK] Seq=320 Ack=2897 Win=62464 Len=0 TSval=3103990822 TSecr=2447463926
56 | ```
57 |
58 | Vous avez des questions? Vous rencontrez un probleme? Cela n'a pas marché? N'hésitez pas à nous contacter!
59 |
60 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
61 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/Open-Source_Routers/OPNsense_(Chiffré).md:
--------------------------------------------------------------------------------
1 | ## Aperçu
2 |
3 | OPNsense est un routeur et pare-feu open-source firewall and router, utilisé dans les structures grand public et commerciales.
4 |
5 | OPNsense utilises Unbound, qui est compatible avec DNS over TLS, la configuration est accessible dans le GUI.
6 |
7 | !!! warning "C'est l'heure du Backup!"
8 | Avant d'apporter des modifications à un environnement de production, nous vous recommandons de [sauvegarder la configuration existante](https://docs.opnsense.org/manual/backups.html#backup)
9 |
10 | ### Instructions
11 |
12 | * Allez dans `Services` -> `Unbound DNS -> `DNS over TLS` dans le menu de gauche
13 | * Cliquez sur le boutton +
14 | * Ajoutez 4 entrées, en utilisant `dns.quad9.net` dans le champ **Verify CN**, et `853` dans le champ **Server Port:**.
15 |
16 | Server IP: `9.9.9.9`
17 | Server IP: `149.112.112.112`
18 | Server IP: `2620:fe::fe`
19 | Server IP: `2620:fe::9`
20 |
21 | !!! warning "IPv6"
22 | Si votre réseau ne dispose pas d'IPv6, ce que vous pouvez vérifier ici, alors les adresses IPv6 ne doivent pas être ajoutées, car cela pourrait entraîner l'échec d'un nombre conséquent de vos requêtes DNS.
23 |
24 | * Cliquez sur `Apply` pour enregistrer les modifications.
25 |
26 | * Allez dans `System` -> `Settings` -> `General` dans le menu de gauche.
27 |
28 | * Désactivez `Allow DNS server list to be overridden by DHCP/PPP on WAN`
29 | * Cliquez sur `Save`
30 | * Cliquez sur `Apply` en haut de la page.
31 |
32 | ## Verifier la Configuration
33 |
34 | Afin de confirmer qu'OPNsense envoie désormais vos requêtes via DNS over TLS, vous pouvez exécuter un packet capture dans la ligne de commande:
35 |
36 | ```
37 | tcpdump -i em0 'port 853'
38 | ```
39 |
40 | !!! note
41 | Vous devrez peut-être ajuster le nom de l'interface em0 à celui de l'interface WAN de votre appareil.
42 |
43 | Vous pouvez également tester à partir d'un système macOS, Linux ou Windows connecté à ce routeur/pare-feu OPNsense.
44 |
45 | Vous avez des questions? Vous rencontrez un probleme? Cela n'a pas marché? N'hésitez pas à nous contacter!
46 |
47 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
48 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/Open-Source_Routers/OpenWrt_LuCi.md:
--------------------------------------------------------------------------------
1 | ## Aperçu
2 |
3 | Le projet OpenWrt est un système d'exploitation Linux ciblant les appareils embarqués, souvent utilisé comme solution open source pour les routeurs et les pare-feu.
4 |
5 | Ce guide couvre la configuration de Quad9 dans les paramètres du redirecteur DNS. Lorsque vous utilisez votre routeur OpenWrt comme serveur DNS, il transmettra les requêtes DNS à Quad9.
6 |
7 | !!! warning "C'est l'heure du Backup!"
8 | Avant d'apporter des modifications à un environnement de production, nous vous recommandons de [sauvegarder la configuration existante](https://openwrt.org/docs/guide-user/troubleshooting/backup_restore)
9 |
10 | ## Instructions
11 |
12 | * Connectez-vous à votre panneau de configuration LuCI, généralement en ouvrant `http://192.168.1.1` dans votre navigateur.
13 |
14 | * Allez dans `Network` -> `DHCP and DNS`
15 | * Entrez `9.9.9.9` et `149.112.112.112`, ou les adresses de votre service Quad9 préféré dans les champs de saisie « Redirections DNS ».
16 |
17 | * Si votre réseau supporte IPv6, vous pouvez aussi ajouter 2620:fe::fe et 2620:fe::9, ou l'adresse IPv6 de votre service Quad9 préféré.
18 |
19 | * Allez dans l'onglet `Resolv and Hosts Files`, et assurez vous que `Ignore resolv file` soit `Enabled`.
20 |
21 | * Cliquez sur `Save & Apply` en bas. Puisque vous ne modifiez pas les paramètres DHCP, le changement devrait être instantané.
22 |
23 | ## Verifier la Configuration
24 |
25 | * Confirmez que vous utilisez Quad9 sous Linux, MacOS ou Windows.
26 |
27 | Vous avez des questions? Vous rencontrez un probleme? Cela n'a pas marché? N'hésitez pas à nous contacter!
28 |
29 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
30 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/Open-Source_Routers/pfSense_(Chiffré).md:
--------------------------------------------------------------------------------
1 | ## Aperçu
2 |
3 | pfSense est un routeur et pare-feu open-source, utilisé dans les structures grand public et commerciales.
4 |
5 | pfSense a une [documentation pour DNS over TLS](https://docs.netgate.com/pfsense/en/latest/recipes/dns-over-tls.html), que nous vous recommandons de consulter en plus de cet article.
6 |
7 | OPNsense utilises Unbound, qui est compatible avec DNS over TLS, la configuration est accessible dans le GUI.
8 |
9 | !!! warning "C'est l'heure du Backup!"
10 | Avant d'apporter des modifications à un environnement de production, nous vous recommandons de [sauvegarder la configuration existante](https://docs.netgate.com/pfsense/en/latest/backup/configuration.html)
11 |
12 | ## Instructions
13 |
14 | Allez dans `System` -> `Generate Setup` dans le menu en haut.
15 |
16 | * Cliquez sur `Add DNS Server` jusqu'à ce qu'il y ait 4 lignes d'entrées disponibles.
17 | * Add Ajoutez les adresses IPv4 et IPv6 de Quad9 dans les champs de gauche:
18 | `9.9.9.9`,`149.112.112.112`,`2620:fe::fe`,`2620:fe::9`
19 |
20 | !!! warning "IPv6"
21 | Si votre réseau ne dispose pas d'IPv6, ce que vous pouvez vérifier ici, alors les adresses IPv6 ne doivent pas être ajoutées, car cela pourrait entraîner l'échec d'un nombre conséquent de vos requêtes DNS.
22 |
23 | * Ajoutez `dns.quad9.net` dans tous les champs Hostname à droite.
24 |
25 | Cliquez sur "Enregistrer" en bas de l'écran.
26 |
27 | Allez dans `Services` -> `DNS Forwarder` dans le menu en haut.
28 | * Assurez vous que `Enable DNS forwarder` soit désactivé. Si cette option est activée, désactivez la, et cliquez `Save` en bas de la page.
29 |
30 | Allez dans `Services` -> `DNS Resolver` dans le menu du haut.
31 |
32 | * Désactivez `Enable DNSSEC Support`
33 | * Activez `DNS Query Forwarding`
34 | * Activez `Use SSL/TLS for outgoing DNS queries to Forwarding Servers`
35 | * Cliquez sur `Save` en bas de l'écran.
36 | * Cliquez sur `Apply Changes` prêt du haut de l'écran pour appliquer et sauvegarder les changements.
37 |
38 | ## Verifier la Configuration
39 |
40 | Vous pouvez confirmer que pfSense envoie désormais vos requêtes via DNS over TLS à l'aide de l'outil Packet Capture intégré.
41 |
42 | Vous pouvez également tester à partir d'un système macOS, Linux ou Windows connecté à ce routeur/pare-feu pfSense.
43 |
44 | Vous avez des questions? Vous rencontrez un probleme? Cela n'a pas marché? N'hésitez pas à nous contacter!
45 |
46 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
47 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/Windows/Windows_10.md:
--------------------------------------------------------------------------------
1 | ## Aperçu
2 |
3 | La manière la plus simple pour configurer Quad9 sur tout votre réseau se fait via les paramètres de votre routeur. Si vous préférez configurer Quad9 sur un appareil Windows individuel, veuillez suivre les étapes ci-dessous afin de configurer Windows 10 pour utiliser Quad9.
4 |
5 | !!! warning "Firefox, VPNs"
6 | * **Firefox** est configuré pour utiliser Cloudflare DNS par défaut dans certaines régions. Si vous utilisez Firefox assurez vous que cette fonctionalité [soit desactivée](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **Les VPNs** ne respectent généralement pas les paramètres DNS du système ou du routeur. Si vous utilisez un VPN, configurez les adresses IP de Quad9 dans les paramètres « DNS personnalisé » de votre client VPN. Reportez-vous à la documentation de votre fournisseur VPN pour plus d'informations.
8 |
9 | ## Instructions
10 |
11 | ### IPv4
12 |
13 | * Faites un clic droit sur votre icône réseau (Filaire ou WiFi) dans la barre d'outil en bas à droite et cliquez sur `Ouvrir les paramètres réseau et Internet`.
14 |
15 | * Sélectionnez `Propriétés`.
16 |
17 | * Sous Paramètres IP, Sélectionnez `Modifier`.
18 |
19 | * Sous `Modifier les Parametres IP` Sélectionnez `Manuel`. Puis cliquez sur l'icône sous `IPv4`. Assurez vous que IPv4 soit activé en bleu.
20 |
21 | * Entrez: `9.9.9.9` dans la barre sous `DNS preféré`.
22 |
23 | * Entrez: `149.112.112.112` dans la barre sous `Autre DNS`.
24 |
25 | * Cliquez sur `Enregistrer`.
26 |
27 | * Fermez toutes les fenêtres de configuration Windows.
28 |
29 | ### IPv6
30 |
31 | Si votre réseau supporte IPv6, il est également recommandé de configurer l'addresse IPv6 de Quad9. Si vous n'êtes pas sûr que IPv6 soit configuré sur votre réseau, vous pouvez le vérifier ici: https://test-ipv6.com/
32 |
33 | * Suivez le même procédé que pour IPv4. Cliquez sur l'icône sous `IPv6`. Assurez vous que IPv6 soit activé en bleu.
34 |
35 | * Entrez: `2620:fe::fe` dans la barre sous `DNS preféré`.
36 |
37 | * Entrez: `2620:fe::9` dans la barre sous `Autre DNS`.
38 |
39 | * Cliquez sur `Enregistrer`.
40 |
41 | * Fermez toutes les fenêtres de configuration Windows.
42 |
43 | ## Verifier la Configuration
44 |
45 | Allez sur [on.quad9.net](https://on.quad9.net) depuis le navigateur de votre choix.
46 |
47 | Des questions? Des Problèmes? Cela n'a pas fonctionné ? N'hesitez pas à nous contacter!
48 |
49 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
50 |
--------------------------------------------------------------------------------
/docs/fr/Guides_de_configuration/Windows/Windows_11_(Crypté).md:
--------------------------------------------------------------------------------
1 | ## Apperçu
2 |
3 | La manière la plus simple pour configurer Quad9 sur tout votre réseau se fait via les paramètres de votre routeur. Si vous préférez configurer Quad9 sur un appareil Windows individuel, veuillez suivre les étapes ci-dessous afin de configurer Windows 11 pour utiliser Quad9.
4 |
5 | !!! warning "Firefox, VPNs"
6 | * **Firefox** est configuré pour utiliser Cloudflare DNS par défaut dans certaines régions. Si vous utilisez Firefox assurez vous que cette fonctionalité [soit desactivée](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **Les VPNs** ne respectent généralement pas les paramètres DNS du système ou du routeur. Si vous utilisez un VPN, configurez les adresses IP de Quad9 dans les paramètres « DNS personnalisé » de votre client VPN. Reportez-vous à la documentation de votre fournisseur VPN pour plus d'informations.
8 |
9 |
10 | ## Instructions
11 |
12 | ### IPv4
13 |
14 | * Faites un clic droit sur votre icône réseau (Filaire ou WiFi) dans la barre d'outil en bas à droite et cliquez sur `Ouvrir les paramètres réseau et Internet`.
15 |
16 | * Sélectionnez `Propriétés`.
17 |
18 | * Sur `Attribution du serveur DNS` Cliquez sur `Modifier`.
19 |
20 | * Faites les changements suivants :
21 |
22 | * Changez l'option `Automatique (DHCP)` sur `Manuel`
23 | * Cliquez sur l'icône sous `IPv4` pour l'activer. Assurez vous que IPv4 soit activé en bleu.
24 | * Entrez: `9.9.9.9` dans la barre `DNS preféré`.
25 | * Dans `Chiffrement DNS préféré` sélectionnez `Chiffré uniquement (DNS over HTTPS)`
26 | * Entrez: `149.112.112.112` dans la barre `Autre DNS`.
27 | *Dans `Chiffrement DNS auxiliaire` sélectionnez `Chiffré uniquement (DNS over HTTPS)
28 |
29 | * Cliquez sur `Enregistrer`
30 |
31 |
32 | ### IPv6
33 |
34 | Si votre réseau supporte IPv6, il est également recommandé de configurer l'addresse IPv6 de Quad9. Si vous n'êtes pas sûr que IPv6 soit configuré sur votre réseau, vous pouvez le vérifier ici: https://test-ipv6.com/
35 |
36 | * Suivez le même procédé que pour IPv4. Cliquez sur l'icône sous `IPv6`. Assurez vous que IPv6 soit activé en bleu.
37 |
38 | * Entrez: `2620:fe::fe` dans la barre sous `DNS preféré`.
39 | * Dans `Chiffrement DNS préféré` sélectionnez `Chiffré uniquement (DNS over HTTPS)`
40 |
41 | * Entrez: `2620:fe::9` dans la barre sous `Autre DNS`.
42 | *Dans `Chiffrement DNS auxiliaire` sélectionnez `Chiffré uniquement (DNS over HTTPS)
43 |
44 | * Cliquez sur `Enregistrer`.
45 |
46 | * Fermez toutes les fenêtres de configuration Windows.
47 |
48 |
49 | ## Verifier la Configuration
50 |
51 |
52 | * Ouvrez le Terminal Windows Powershell et exécutez cette commande:
53 |
54 | ```
55 | Resolve-DnsName -Type txt proto.on.quad9.net.
56 | ```
57 |
58 | Le résultat devrait montrer `doh.` (DNS over HTTPS) dans la section `NameHost` si vous définissez Quad9 dans les paramètres réseau et activez le chiffrement.
59 |
60 | ```
61 | Name Type TTL Section NameHost
62 | ---- ---- --- ------- --------
63 | proto.on.quad9.net CNAME 60 Answer doh
64 | ```
65 |
66 | Des questions? Des Problèmes? Cela n'a pas fonctionné? N'hesitez pas à nous contacter!
67 |
68 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
69 |
--------------------------------------------------------------------------------
/docs/fr/assets/conf/freebsd/forward.conf:
--------------------------------------------------------------------------------
1 | # This file was generated by local-unbound-setup.
2 | # Modifications will be overwritten.
3 | forward-zone:
4 | name: "."
5 | forward-tls-upstream: yes # Use DNS-over-TLS
6 | forward-first: no # do NOT send direct
7 | ###IPv4
8 | # 9.9.9.9 - Threat-blocking with DNSSEC
9 | forward-addr: 9.9.9.9@853#dns.quad9.net
10 | forward-addr: 149.112.112.112@853#dns.quad9.net
11 |
12 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
13 | # forward-addr: 9.9.9.11@853#dns11.quad9.net
14 | # forward-addr: 149.112.112.11@853#dns11.quad9.net
15 |
16 | # 9.9.9.10 - No threat blocking, no DNSSEC
17 | # forward-addr: 9.9.9.10@853#dns10.quad9.net
18 | # forward-addr: 149.112.112.10@853#dns10.quad9.net
19 |
20 |
21 | ###IPv6 - Uncomment if your system is configured for IPv6.
22 | # 9.9.9.9 - Threat-blocking with DNSSEC
23 | # forward-addr: 2620:fe::fe@853#dns.quad9.net
24 | # forward-addr: 2620:fe::9@853#dns.quad9.net
25 |
26 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
27 | # forward-addr: 2620:fe::11@853#dns11.quad9.net
28 | # forward-addr: 2620:fe::fe:11@853#dns11.quad9.net
29 |
30 | # 9.9.9.10 - No threat blocking, no DNSSEC
31 | # forward-addr: 2620:fe::10@853#dns10.quad9.net
32 | # forward-addr: 2620:fe::fe:10@853#dns10.quad9.net
33 |
--------------------------------------------------------------------------------
/docs/fr/assets/conf/freebsd/unbound.conf:
--------------------------------------------------------------------------------
1 | # This file was generated by local-unbound-setup.
2 | # Modifications will be overwritten.
3 | server:
4 | username: unbound
5 | directory: /var/unbound
6 | chroot: /var/unbound
7 | pidfile: /var/run/local_unbound.pid
8 | #auto-trust-anchor-file: /var/unbound/root.key
9 | tls-cert-bundle: /etc/ssl/cert.pem
10 |
11 | include: /var/unbound/forward.conf
12 | include: /var/unbound/lan-zones.conf
13 | include: /var/unbound/control.conf
14 | include: /var/unbound/conf.d/*.conf
15 |
--------------------------------------------------------------------------------
/docs/fr/assets/conf/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/fr/assets/conf/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig
--------------------------------------------------------------------------------
/docs/fr/assets/conf/openbsd/unbound.conf:
--------------------------------------------------------------------------------
1 | # $OpenBSD: unbound.conf,v 1.21 2020/10/28 11:35:58 sthen Exp $
2 | # Modified by Quad9.net:
3 | # - Disable DNSSEC Validation. Quad9 already performs DNSSEC validation, and DNSSEC validation on a forwarder significantly decreases performance due to duplicate DNSSEC validation and can occassionally result in a false BOGUS result.
4 | # - DNS-over-TLS enabled.
5 | # - Pre-populate all Quad9 services
6 |
7 | server:
8 | interface: 127.0.0.1
9 | #interface: 127.0.0.1@5353 # listen on alternative port
10 | interface: ::1
11 | #do-ip6: no
12 |
13 | # override the default "any" address to send queries; if multiple
14 | # addresses are available, they are used randomly to counter spoofing
15 | #outgoing-interface: 192.0.2.1
16 | #outgoing-interface: 2001:db8::53
17 |
18 | access-control: 0.0.0.0/0 refuse
19 | access-control: 127.0.0.0/8 allow
20 | access-control: ::0/0 refuse
21 | access-control: ::1 allow
22 |
23 | hide-identity: yes
24 | hide-version: yes
25 |
26 | # Perform DNSSEC validation.
27 | #
28 | #auto-trust-anchor-file: "/var/unbound/db/root.key"
29 | #val-log-level: 2
30 |
31 | # Synthesize NXDOMAINs from DNSSEC NSEC chains.
32 | # https://tools.ietf.org/html/rfc8198
33 | #
34 | # aggressive-nsec: yes
35 |
36 | # Serve zones authoritatively from Unbound to resolver clients.
37 | # Not for external service.
38 | #
39 | #local-zone: "local." static
40 | #local-data: "mycomputer.local. IN A 192.0.2.51"
41 | #local-zone: "2.0.192.in-addr.arpa." static
42 | #local-data-ptr: "192.0.2.51 mycomputer.local"
43 |
44 | # Use TCP for "forward-zone" requests. Useful if you are making
45 | # DNS requests over an SSH port forwarding.
46 | #
47 | #tcp-upstream: yes
48 |
49 | # CA Certificates used for forward-tls-upstream (RFC7858) hostname
50 | # verification. Since it's outside the chroot it is only loaded at
51 | # startup and thus cannot be changed via a reload.
52 | tls-cert-bundle: "/etc/ssl/cert.pem"
53 |
54 | remote-control:
55 | control-enable: yes
56 | control-interface: /var/run/unbound.sock
57 |
58 | forward-zone:
59 | name: "."
60 | forward-tls-upstream: yes # Use DNS-over-TLS
61 | forward-first: no # do NOT send direct
62 | ###IPv4
63 | # 9.9.9.9 - Threat-blocking with DNSSEC
64 | forward-addr: 9.9.9.9@853#dns.quad9.net
65 | forward-addr: 149.112.112.112@853#dns.quad9.net
66 |
67 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
68 | # forward-addr: 9.9.9.11@853#dns11.quad9.net
69 | # forward-addr: 149.112.112.11@853#dns11.quad9.net
70 |
71 | # 9.9.9.10 - No threat blocking, no DNSSEC
72 | # forward-addr: 9.9.9.10@853#dns10.quad9.net
73 | # forward-addr: 149.112.112.10@853#dns10.quad9.net
74 |
75 |
76 | ###IPv6 - Uncomment if your system is configured for IPv6.
77 | # 9.9.9.9 - Threat-blocking with DNSSEC
78 | # forward-addr: 2620:fe::fe@853#dns.quad9.net
79 | # forward-addr: 2620:fe::9@853#dns.quad9.net
80 |
81 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
82 | # forward-addr: 2620:fe::11@853#dns11.quad9.net
83 | # forward-addr: 2620:fe::fe:11@853#dns11.quad9.net
84 |
85 | # 9.9.9.10 - No threat blocking, no DNSSEC
86 | # forward-addr: 2620:fe::10@853#dns10.quad9.net
87 | # forward-addr: 2620:fe::fe:10@853#dns10.quad9.net
88 |
--------------------------------------------------------------------------------
/docs/fr/assets/logo_light.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/fr/assets/logo_light.png
--------------------------------------------------------------------------------
/docs/fr/assets/logo_light.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/fr/assets/quad9_all_white.svg:
--------------------------------------------------------------------------------
1 |
2 |
3 |
22 |
--------------------------------------------------------------------------------
/docs/fr/images/favicon.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/fr/images/quad9_logo_dark.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/fr/images/quad9_logo_light.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/fr/index.md:
--------------------------------------------------------------------------------
1 | # Aperçu
2 |
3 |
4 | { width="300" }
5 | { width="300" }
6 |
7 | Quad9 est un organisme à but non lucratif basé en Suisse qui propose un service DNS gratuit, ouvert, récursif, axé sur la confidentialité et la sécurité, destiné à tous, utilisé par des dizaines de millions d'appareils à travers le monde, allant du simple utilisateur privé aux grandes entreprises.
8 |
9 | Quad9 est financé en partie par des utilisateurs comme vous. Si vous appréciez notre service, pensez à faire un don.
10 |
11 | [Faire un don :octicons-heart-fill-24:{ .heart }](https://quad9.net/fr/donate){ .md-button .md-button--primary }
12 |
13 |
14 | ## Pourquoi Quad9?
15 |
16 | ### Loi sur la confidentialité
17 |
18 | Quad9 n'enregistrera jamais les adresses IP de ses utilisateurs.
19 |
20 | Ce ne sont pas des paroles en l'air. En tant qu'organisme basée en Suisse, Quad9 est soumis aux lois suisses sur la confidentialité en ligne.
21 |
22 | ### Securité
23 |
24 | En utilisant notre service sécurisé de blocage des menaces en ligne (9.9.9.9),leader sur le marché, Quad9 bloquera les requêtes DNS malintentionnée, telles que les logiciels malveillants, les virus, les logiciels publicitaires, les tentatives de phishing, les escroqueries, etc.
25 |
26 | ### Cryptage
27 |
28 | Quad9 supporte les DNS over TLS (DoT), DNS over HTTPS (DoH), et DNSCrypt.
29 |
30 | ## Questions / Support
31 |
32 | Pour toute questions sur Quad9 ou notre documentation, n'hesitez pas à nous contacter!
33 |
34 | [Obtenir de l'aide](https://quad9.net/fr/support/contact){ .md-button .md-button--primary }
35 |
--------------------------------------------------------------------------------
/docs/fr/services.md:
--------------------------------------------------------------------------------
1 | Quad9 propose plusieurs variantes de notre service DNS privé et gratuit.
2 |
3 | ## 9.9.9.9 (Sécurisé)
4 |
5 | Notre service le plus populaire. Un service DNS confidentiel, récursif, contre les menaces.
6 |
7 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
8 | | --------------------------- | -------------------------------- | --------------- | -------------- |
9 | | `9.9.9.9`, `149.112.112.112`| `2620:fe::fe`, `2620:fe::9` | `dns.quad9.net` | `https://dns.quad9.net/dns-query` |
10 |
11 | ## 9.9.9.10 (Pas de blocage des menaces)
12 |
13 | Pour les utilisateurs qui souhaitent profiter de notre service DNS récursif et confidentiel, mais qui ne souhaitent pas bloquer les menaces, utilisez plutôt notre service 9.9.9.10.
14 |
15 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
16 | | --------------------------- | -------------------------------- | --------------- | -------------- |
17 | | `9.9.9.10`, `149.112.112.10`| `2620:fe::10`, `2620:fe::fe:10` | `dns10.quad9.net` | `https://dns10.quad9.net/dns-query` |
18 |
19 | ## 9.9.9.11 (Securisé + ECS)
20 |
21 | Pour les utilisateurs qui ne souhaitent pas router vers l'emplacement Quad9 le plus proche, utilisez 9.9.9.11 pour de meilleures performances CDN:
22 |
23 |
24 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
25 | | --------------------------- | -------------------------------- | --------------- | -------------- |
26 | | `9.9.9.11`, `149.112.112.11`| `2620:fe::11`, `2620:fe::fe:11` | `dns11.quad9.net` | `https://dns11.quad9.net/dns-query` |
27 |
28 | ## 9.9.9.12 (Pas de blocage des menaces + ECS)
29 |
30 | Pour les utilisateurs qui ne souhaitent pas router vers l'emplacement Quad9 le plus proche, et qui ne souhaitent pas bloquer les menaces, utilisez 9.9.9.12 pour de meilleures performances CDN:
31 |
32 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
33 | | --------------------------- | -------------------------------- | --------------- | -------------- |
34 | | `9.9.9.12`, `149.112.112.12`| `2620:fe::12`, `2620:fe::fe:12` | `dns12.quad9.net` | `https://dns12.quad9.net/dns-query` |
35 |
36 | ## Ports alternatifs
37 |
38 | Quad9 propose les ports non standard suivants pour une meilleure disponibilité de nos services dans des environnements réseau restrictifs.
39 |
40 | | Protocol | Standard Port | Alternate Port
41 | | --------------------------- | ------------------ | ------------- |
42 | | `UDP/TCP (Plaintext)` | `53` | `9953` |
43 | | `DNS over TLS` | `853` | `8853` |
44 | | `DNS over HTTPS` | `443` | `5053` |
45 |
--------------------------------------------------------------------------------
/docs/fr/stylesheets/extra.css:
--------------------------------------------------------------------------------
1 | @keyframes heart {
2 | 0%, 40%, 80%, 100% {
3 | transform: scale(1);
4 | }
5 | 20%, 60% {
6 | transform: scale(1.15);
7 | }
8 | }
9 | .heart {
10 | animation: heart 1000ms infinite;
11 | }
12 |
13 | .md-header {
14 | background-color: hsla(0, 0%, 0%, 0.32);
15 | }
16 |
17 | .md-ellipsis {
18 | font-size: 16px;
19 | }
20 |
21 | .md-nav__title {
22 | font-size: 16px;
23 | }
24 |
--------------------------------------------------------------------------------
/docs/images/favicon.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/images/quad9_logo_dark.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/images/quad9_logo_light.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/Android/Android_9+_(Criptat).md:
--------------------------------------------------------------------------------
1 | ## Prezentare generală
2 |
3 | Android 9 și versiunile ulterioare includ funcția `DNS privat`, care vă permite să vă conectați la servere DNS utilizând DNS over TLS (DoT). Este important de reținut, că funcția DNS privat nu funcționează dacă aplicația Quad9 Connect este instalată și activată. Pentru a vă configura dispozitivul Android pentru a utiliza Quad9 în acest mod, urmați pașii de mai jos.
4 |
5 | !!! avertisment "VPN-uri"
6 | Funcția DNS privat nu va fi utilizată dacă utilizați un VPN. Dacă utilizați un VPN, configurați în schimb adresele IP ale Quad9 în setările `DNS personalizat` ale VPN-ului dumneavoastră. Vă rugăm să consultați documentația furnizorului dvs. de VPN pentru mai multe informații
7 |
8 | ## Instrucțiuni
9 |
10 | * Deschideți aplicația :material-cog: `Setări` de pe dispozitivul Android.
11 | * Selectați :material-wifi: ` Rețea și internet`.
12 | * Selectați `DNS Privat`.
13 |
14 | * Selectați `Nume gazdă furnizor DNS privat`
15 | * Introduceți: `dns.quad9.net`
16 | * Apăsați `Salvați`
17 |
18 | ## Verificarea configurației
19 |
20 | Vizitați [on.quad9.net](https://on.quad9.net) în browserul ales de dvs.
21 |
22 | Întrebări? Probleme? Nu a funcționat? Contactați-ne!
23 |
24 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
25 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/ChromeOS_(Chromebook).md:
--------------------------------------------------------------------------------
1 | ## Prezentare generală
2 |
3 | Quad9 Connect este o aplicație Android compatibilă cu ChromeOS utilizând Google Play Store. Aceasta creează un tunel securizat între dispozitiv și Quad9 pentru trimiterea interogărilor DNS prin DNS peste Quad9 Connect oferă funcții suplimentare, cum ar fi un jurnal al interogărilor, schimbarea serviciului cu un singur clic și posibilitatea de a raporta fals pozitive din jurnalul interogărilor.
4 |
5 | Quad9 Connect nu este un VPN, ci utilizează funcționalitatea VPN a dispozitivului pentru a obține DNS criptat și caracteristicile asociate cu aplicația. Atunci când Quad9 Connect este activat, nu este posibil să utilizați o altă conexiune VPN în același timp. Dacă utilizați un VPN, luați în considerare setarea serverelor DNS ale Quad9 în setările "DNS personalizat" ale clientului VPN.
6 |
7 | ## Instrucțiuni
8 |
9 | * Instalați Quad9 Connect
10 | * În **Google Play Store**, căutați și instalați aplicația: `Quad9 Connect`
11 |
12 | * Preferințe de afișare
13 | * Puteți alege modul în care doriți ca aplicația să fie afișată: `Phone`, `Tablet`, sau `Resizable`. Vă puteți selecta preferința.
14 |
15 | * Citiți și faceți clic pe `OK` atunci când vi se solicită cererea de conectare.
16 |
17 | !!! notă ""
18 | Trebuie să vă conectați la acest VPN pentru a utiliza Quad9 Connect.
19 |
20 | * Faceți clic pe pictograma `play` pentru a vă conecta!
21 |
22 | Numărul "9" și logo-ul cheii VPN ar trebui să apară în colțul din dreapta jos al ecranului.
23 |
24 | ## Verificarea configurației
25 |
26 | Pentru a confirma că utilizați Quad9, vizitați: [on.quad9.net](https://on.quad9.net)
27 |
28 | Întrebări? Probleme? Nu a funcționat? Contactați-ne!
29 |
30 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
31 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/DNS_Forwarders/Windows_Server.md:
--------------------------------------------------------------------------------
1 | ## Prezentare generală
2 |
3 | Configurați Quad9 în Windows DNS Server pentru utilizarea în redirecționarea DNS.
4 |
5 | !!! notă
6 | Înainte de a continua, vă rugăm să consultați articolul [Cele mai bune practici pentru redirecționarea DNS](https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/).
7 |
8 | ## Instrucțiuni
9 |
10 | * Deschideți `Manager server` din meniul `Porniți`.
11 | * Din `Manager server`, selectați `Instrumente` > `DNS`
12 |
13 | * Din DNS Manager, faceți clic dreapta pe serverul dvs. și selectați `Proprietăți`
14 | * Selectați fila `Redirecționări` și apoi selectați `Editați`.
15 | * Adăugați următoarele adrese IP: `9.9.9.9`, `149.112.112.112`
16 | * Dacă rețeaua dvs. acceptă IPv6, adăugați și: `2620:fe::fe`, `2620:fe::9`
17 | * Faceți clic pe "Aplicare"
18 |
19 | Întrebări? Probleme? Contactați-ne!
20 |
21 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
22 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/Linux_și_BSD/Fedora_38.md:
--------------------------------------------------------------------------------
1 | ## Prezentare generală
2 |
3 | Cel mai simplu mod de a configura Quad9 pe întreaga rețea este prin setările routerului. Dacă preferați să setați Quad9 pe un singur sistem, vă rugăm să urmați pașii de mai jos pentru a configura Fedora 38 pentru a utiliza Quad9.
4 |
5 | !!! avertisment "Firefox, VPN-uri"
6 | * **Firefox** este setat să utilizeze Cloudflare DNS în mod implicit în unele regiuni. Dacă utilizați Firefox, verificați dacă [acest lucru este dezactivat](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **VPN-urile** de obicei nu respectă setările DNS la nivel de sistem sau router. Dacă utilizați un VPN, configurați adresele IP ale Quad9 în setările `Custom DNS` ale clientului VPN. Consultați documentația furnizorului dvs. de VPN pentru informații suplimentare.
8 |
9 | ## Instrucțiuni
10 |
11 | ### IPv4
12 |
13 | * Faceți clic pe pictograma `Network` sau `WiFi` din bara de sistem din colțul din dreapta sus al ecranului.
14 | * Faceți clic pe `>` de lângă conexiunea activă.
15 | * Selectați `Wired Settings` sau `Wireless Settings`.
16 |
17 | * Faceți clic pe pictograma :gear: din dreptul conexiunii dvs.
18 |
19 | * Faceți clic pe fila `IPv4`.
20 | * Dezactivați `Automatic DNS`
21 | * Introduceți adresele IP Quad9 ale serviciului dvs. preferat.
22 |
23 | Mai multe adrese IP pot fi introduse în listă cu ajutorul virgulelor.
24 |
25 | `9.9.9.9, 149.112.112.112`
26 |
27 | * Dacă nu veți utiliza IPv6, faceți clic pe `Apply` pentru a finaliza procesul de configurare, apoi confirmați că utilizați Quad9.
28 |
29 |
30 | ### IPv6 (Opțional)
31 |
32 | Dacă rețeaua dvs. acceptă IPv6, se recomandă și configurarea adreselor Quad9 IPv6. Dacă nu sunteți sigur dacă IPv6 este configurat în rețeaua dumneavoastră, puteți testa acest lucru aici: https://test-ipv6.com/
33 |
34 |
35 | * Selectați fila `IPv6`.
36 | * Dezactivați `Automatic DNS`
37 | * Introduceți adresele IP Quad9 ale serviciului dvs. preferat.
38 |
39 | Mai multe adrese IP pot fi introduse în listă cu ajutorul virgulelor.
40 |
41 | `2620:fe::fe, 2620:fe::9`
42 |
43 | * Faceți clic pe `Apply` pentru a finaliza procesul de configurare.
44 |
45 | ## Verificarea configurației
46 |
47 | Confirmați că utilizați Quad9 vizitând [on.quad9.net](https://on.quad9.net) în browserul dvs. preferat.
48 |
49 | Întrebări? Probleme? Nu a funcționat? Contactați-ne!
50 |
51 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
52 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/Linux_și_BSD/Linux_Mint_21.2.md:
--------------------------------------------------------------------------------
1 | ## Prezentare generală
2 |
3 | Cel mai simplu mod de a seta Quad9 pe întreaga rețea este prin setările routerului. Dacă preferați să setați Quad9 pe un singur sistem, vă rugăm să urmați pașii de mai jos pentru a configura Linux Mint pentru a utiliza Quad9.
4 |
5 | !!! avertisment "Firefox, VPN-uri"
6 | * **Firefox** este setat să utilizeze Cloudflare DNS în mod implicit în unele regiuni. Dacă utilizați Firefox, verificați dacă [acest lucru este dezactivat](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **VPN-urile** de obicei nu respectă setările DNS la nivel de sistem sau router. Dacă utilizați un VPN, configurați adresele IP ale Quad9 în setările `Custom DNS` ale clientului VPN. Consultați documentația furnizorului dvs. de VPN pentru informații suplimentare.
8 |
9 | ## Instrucțiuni
10 |
11 | * Faceți clic pe pictograma `Network` sau `Wi-Fi` din bara de sistem din colțul din dreapta jos.
12 | * Faceți clic pe `Network Settings`
13 | * Faceți clic pe pictograma :gear: din colțul din dreapta jos al ferestrei de dialog.
14 | ### IPv4
15 |
16 | * Selectați `IPv4` în meniul din partea stângă.
17 | * În secțiunea `DNS`:
18 | * Dezactivați `Automatic`
19 | * Faceți clic pe butonul :plus: pentru a adăuga un al doilea câmp `Server`.
20 | * Introduceți `9.9.9.9` în primul câmp `Server`, iar `149.112.112.112` în al doilea.
21 | * Faceți clic pe `Apply`
22 |
23 | ## Verificarea configurației
24 |
25 | Confirmați că utilizați Quad9 vizitând [on.quad9.net](https://on.quad9.net) în browserul dvs. preferat.
26 |
27 | Întrebări? Probleme? Nu a funcționat? Contactați-ne!
28 |
29 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
30 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/Linux_și_BSD/MX_Linux_23.md:
--------------------------------------------------------------------------------
1 | ## Prezentare generală
2 |
3 | Cel mai simplu mod de a seta Quad9 pe întreaga rețea este prin setările routerului. Dacă preferați să configurați Quad9 pe un singur sistem, vă rugăm să urmați pașii de mai jos pentru a configura MX Linux 23 pentru a utiliza Quad9.
4 |
5 | !!! avertisment „Firefox, VPN-uri”
6 | * **Firefox** este setat să utilizeze Cloudflare DNS în mod implicit în unele regiuni. Dacă utilizați Firefox, verificați dacă [acest lucru este dezactivat](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **VPN-urile** de obicei nu respectă setările DNS la nivel de sistem sau router. Dacă utilizați un VPN, configurați adresele IP ale Quad9 în setările `Custom DNS` ale clientului VPN. Consultați documentația furnizorului dvs. de VPN pentru informații suplimentare.
8 |
9 | ## Instrucțiuni
10 |
11 | * Faceți clic dreapta pe pictograma Rețea/WiFi din bara de sistem din partea stângă a ecranului.
12 | * Selectați `Edit Connections`
13 | * Selectați tipul conexiunii (Wired sau Wi-Fi), apoi faceți clic pe butonul :gear: din partea de jos a ferestrei.
14 |
15 | * Selectați fila `IPv4 Settings`.
16 | * Modificați `Method` la `Automatic (DHCP) addresses only`
17 | * În câmpul `DNS Servers`, adăugați: `9.9.9.9,149.112.112.112`
18 | * Faceți clic pe `Save`
19 |
20 | ## Verificarea configurației
21 |
22 | Confirmați că utilizați Quad9 vizitând [on.quad9.net](https://on.quad9.net) în browserul dvs. preferat.
23 |
24 | Întrebări? Probleme? Nu a funcționat? Contactați-ne!
25 |
26 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
27 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/Linux_și_BSD/Ubuntu_20.04_and_22.04.md:
--------------------------------------------------------------------------------
1 | ## Prezentare generală
2 |
3 | Cel mai simplu mod de a seta Quad9 pe întreaga rețea este prin setările routerului. Dacă preferați să setați Quad9 pe un singur sistem, vă rugăm să urmați pașii de mai jos pentru a configura Ubuntu 22.04 sau 22.04 LTS pentru a utiliza Quad9.
4 |
5 | !!! avertisment "Firefox, VPN-uri"
6 | * **Firefox** este setat să utilizeze Cloudflare DNS în mod implicit în unele regiuni. Dacă utilizați Firefox, verificați dacă [acest lucru este dezactivat](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **VPN-urile** de obicei nu respectă setările DNS la nivel de sistem sau router. Dacă utilizați un VPN, configurați adresele IP ale Quad9 în setările `Custom DNS` ale clientului VPN. Consultați documentația furnizorului dvs. de VPN pentru informații suplimentare.
8 |
9 | ## Instrucțiuni
10 |
11 | ### IPv4
12 |
13 | * De pe desktop-ul Ubuntu, selectați meniul derulant din colțul din dreapta sus al ecranului, extindeți `Wired Connection` sau `Wireless Connection` în funcție de tipul conexiunii, apoi selectați `Wired Settings` sau `Wireless Settings`.
14 |
15 | * Faceți clic pe pictograma :gear: de lângă conexiunea dvs.
16 |
17 | * Faceți clic pe fila `IPv4`.
18 | * Dezactivați `Automatic DNS`
19 | * Introduceți adresele IP Quad9 ale serviciului dvs. preferat.
20 |
21 | Mai multe adrese IP pot fi introduse în listă cu ajutorul virgulelor.
22 |
23 | `9.9.9.9, 149.112.112.112`
24 |
25 | * Dacă nu veți utiliza IPv6, faceți clic pe `Apply` pentru a finaliza procesul de configurare, apoi confirmați că utilizați Quad9.
26 |
27 |
28 | ### IPv6 (opțional)
29 |
30 | Dacă rețeaua/computerul dvs. acceptă IPv6, se recomandă și configurarea adreselor Quad9 IPv6. Dacă nu sunteți sigur dacă IPv6 este configurat în rețeaua dvs., puteți testa acest lucru aici: https://test-ipv6.com/
31 |
32 |
33 |
34 | * Selectați fila `IPv6`
35 | * Dezactivați `Automatic DNS`
36 | * Introduceți adresele IP Quad9 ale serviciului dvs. preferat.
37 |
38 | Mai multe adrese IP pot fi introduse în listă cu ajutorul virgulelor.
39 |
40 | `2620:fe::fe, 2620:fe::9`
41 |
42 | * Faceți clic pe `Apply` pentru a finaliza procesul de configurare.
43 |
44 | ## Verificarea configurației
45 |
46 | Confirmați că utilizați Quad9 vizitând [on.quad9.net](https://on.quad9.net) în browserul dvs. preferat.
47 |
48 | Întrebări? Probleme? Nu a funcționat? Contactați-ne!
49 |
50 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
51 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/Miscellaneous/Cloudflared_and_Quad9.md:
--------------------------------------------------------------------------------
1 | Cloudflared este un proxy DNS over HTTPS care poate fi configurat pentru a utiliza Quad9 pentru rezoluția DNS.
2 |
3 | * În fișierul de configurare `cloudflared.yml`, înlocuiți IP-urile Cloudflare din secțiunea `proxy-dns-upstream` cu adresele Quad9 asociate cu caracteristicile dorite.
4 | * Reporniți serviciul `cloudflared`.
5 |
6 | Înainte (Cloudflare DoH Servers)
7 | ```
8 | proxy-dns-upstream:
9 |
10 | - https://1.1.1.1/dns-query
11 | - https://1.0.0.1/dns-query
12 | ```
13 |
14 | IPv4
15 | ```
16 | proxy-dns-upstream:
17 |
18 | - https://9.9.9.9/dns-query
19 | - https://149.112.112.112/dns-query
20 | ```
21 |
22 | IPv6
23 | ```
24 | proxy-dns-upstream:
25 |
26 | - https://[2620:fe::fe]/dns-query
27 | - https://[2620:fe::9]/dns-query
28 | ```
29 |
30 | Întrebări? Probleme? Nu a funcționat? Contactați-ne!
31 |
32 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
33 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/Miscellaneous/Pi-Hole.md:
--------------------------------------------------------------------------------
1 | ## Prezentare generală
2 |
3 | Pi-Hole este un redirecționator DNS popular, adesea utilizat în principal pentru blocarea domeniilor asociate în mod specific cu reclame și urmărire.
4 |
5 | ## Configurarea Pi-Hole
6 |
7 | Pentru instrucțiuni detaliate de configurare a Pi-Hole în sine, consultați [Documentația oficială Pi-Hole] (https://docs.pi-hole.net/).
8 |
9 | ## Configurarea Quad9
10 |
11 | Odată ce ați instalat Pi-Hole și puteți accesa panoul de administrare, Quad9 este deja una dintre opțiunile implicite.
12 |
13 | * În panoul de administrare, navigați la `Settings` -> `DNS`
14 | * Bifați ambele căsuțe IPv4 de lângă Quad9 (filtered, DNSSEC)
15 | * Dacă rețeaua dvs. acceptă IPv6, se recomandă de asemenea bifarea ambelor casete IPv6. Dacă nu sunteți sigur dacă IPv6 este configurat în rețeaua dumneavoastră, puteți testa acest lucru aici: https://test-ipv6.com/
16 |
17 | * Bifați/activați opțiunile:
18 | * `Never forward non-FQDNs` și `Never forward reverse lookups for private IP ranges` pentru a preveni trimiterea de interogări DNS fără răspuns către Quad9.
19 | * Faceți clic pe `Save` la sfârșit.
20 |
21 | ### Verificarea configurației
22 |
23 | Odată ce Quad9 a fost configurat în Pi-Hole, puteți configura routerul sau un singur computer pentru a utiliza adresa IP a Pi-Hole ca server DNS. Dacă jurnalul de interogare este activat (Settings -> Privacy [fila]), ar trebui să vedeți Quad9 înregistrat în coloana Status:
24 |
25 | De asemenea, puteți confirma dacă Quad9 este utilizat manual pe Linux, MacOS sau Windows.
26 |
27 | ### Domenii blocate
28 |
29 | Domeniile care sunt blocate de Quad9 vor înregistra Blocked (extern, NXRA) în coloana Status din Query Log:
30 |
31 | Întrebări? Probleme? Nu a funcționat? Contactați-ne!
32 |
33 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
34 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/Open-Source_Routers/IPFire_(Criptat).md:
--------------------------------------------------------------------------------
1 | ## Prezentare generală
2 |
3 | IPFire este un firewall și un router open-source, utilizat atât în medii comerciale, cât și de consum.
4 |
5 | IPFire utilizează Unbound, care are încorporat suport DNS over TLS, configurația fiind accesibilă în GUI.
6 |
7 | Acest ghid de configurare a fost testat utilizând IPFire 2.27
8 |
9 | !!! avertisment "Backup Time!"
10 | Înainte de a face modificări într-un mediu de producție, vă recomandăm [să faceți o copie de siguranță a configurației existente](https://wiki.ipfire.org/configuration/system/backup)
11 |
12 | ## Instrucțiuni
13 |
14 | * Navigați la `System` -> `Domain Name System`
15 | * Sub `DNS Servers`, faceți clic pe `Add`
16 | * Treceți prin acest proces de două ori, câte una pentru fiecare adresă IP Quad9, unde numele de gazdă TLS va fi întotdeauna dns.quad9.net
17 | * IP address: `9.9.9.9`
18 | * IP address: `149.112.112.112`
19 |
20 | * Use ISP-assigned DNS Servers: `Disabled`
21 | * Protocol for DNS Queries: `TLS`
22 | * Enable Safe Search: `Disabled`
23 | * QNAME Minimisation: `Disabled`
24 | * Faceți clic pe `Save`
25 |
26 | ## Verificarea configurației
27 |
28 | ### GUI
29 |
30 | Navigați la `Status` -> `Net-Traffic` în meniul de sus și căutați o conexiune activă la `9.9.9.9` sau `149.112.112.112` prin portul 853 TCP
31 |
32 | ### CLI
33 |
34 | * Conectați-vă la dispozitivul IPFire prin SSH
35 | * Instalați pachetul tshark
36 |
37 | ```
38 | pakfire -y install tshark
39 | ```
40 |
41 | * Începeți o captură de pachete cu tshark pentru a filtra traficul DNS peste TLS:
42 |
43 | ```
44 | tshark -i any 'port 853'
45 | ```
46 |
47 | Dacă dispozitivul IPFire utilizează DNS over HTTPS pentru interogările DNS, veți vedea o ieșire ca aceasta:
48 | ```
49 | 1 0.000000000 192.168.1.150 → 9.9.9.9 TCP 76 37226 → 853 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=3103990808 TSecr=0 WS=512
50 | 2 0.006914259 9.9.9.9 → 192.168.1.150 TCP 76 853 → 37226 [SYN, ACK] Seq=0 Ack=1 Win=28960 Len=0 MSS=1460 TSval=2447463919 TSecr=3103990808 WS=256
51 | 3 0.006948874 192.168.1.150 → 9.9.9.9 TCP 68 37226 → 853 [ACK] Seq=1 Ack=1 Win=64512 Len=0 TSval=3103990815 TSecr=2447463919
52 | 4 0.007110658 192.168.1.150 → 9.9.9.9 TLSv1 387 Client Hello
53 | 5 0.013306457 9.9.9.9 → 192.168.1.150 TCP 68 853 → 37226 [ACK] Seq=1 Ack=320 Win=30208 Len=0 TSval=2447463926 TSecr=3103990815
54 | 6 0.013926633 9.9.9.9 → 192.168.1.150 TLSv1.3 2964 Server Hello, Change Cipher Spec, Application Data
55 | 7 0.013945067 192.168.1.150 → 9.9.9.9 TCP 68 37226 → 853 [ACK] Seq=320 Ack=2897 Win=62464 Len=0 TSval=3103990822 TSecr=2447463926
56 | ```
57 |
58 | Întrebări? Probleme? Nu a funcționat? Contactați-ne!
59 |
60 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
61 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/Open-Source_Routers/OPNsense_(Criptat).md:
--------------------------------------------------------------------------------
1 | ### Prezentare generală
2 |
3 | OPNsense este un firewall open-source, utilizat atât în mediile comerciale, cât și în cele de consum.
4 |
5 | OPNsense utilizează Unbound, care are încorporat suport DNS over TLS, configurarea fiind accesibilă în GUI.
6 |
7 | !!! avertisment "Backup Time!"
8 | Înainte de a face modificări într-un mediu de producție, vă recomandăm [să faceți o copie de rezervă a configurației existente](https://docs.opnsense.org/manual/backups.html#backup)
9 |
10 | ### Instrucțiuni
11 |
12 | * Navigați la `Servicii` -> `Unbound DNS` -> `DNS over TLS` în meniul din partea stângă
13 | * Faceți clic pe butonul +
14 | * Adăugați 4 intrări, folosind `dns.quad9.net` în câmpul **Verify CN**, și `853` în câmpul **Server Port:**.
15 |
16 | Server IP: `9.9.9.9`
17 | Server IP: `149.112.112.112`
18 | Server IP: `2620:fe::fe`
19 | Server IP: `2620:fe::9`
20 |
21 | !!! avertisment "IPv6"
22 | Dacă rețeaua dvs. nu are IPv6, lucru pe care îl puteți testa aici, atunci adresele IPv6 nu ar trebui adăugate, deoarece pot duce la eșecul unui procent din cererile DNS.
23 |
24 | * Faceți clic pe `Apply` pentru a salva modificările.
25 |
26 | * Navigați la `System` -> `Settings` -> `General` în meniul din partea stângă.
27 |
28 | * Dezactivați „Permiteți ca lista de servere DNS să fie suprascrisă de DHCP/PPP pe WAN
29 | * Faceți clic pe `Save`
30 | * Faceți clic pe `Apply` în partea de sus a paginii
31 |
32 | ### Verificarea configurației
33 |
34 | Pentru a confirma că OPNsense trimite acum interogările dvs. prin DNS peste TLS, puteți rula o captură de pachete în linia de comandă, cum ar fi:
35 |
36 | ```
37 | tcpdump -i em0 'port 853'
38 | ```
39 |
40 | !!! notă
41 | Este posibil să trebuiască să ajustați numele interfeței de la em0 la cel al interfeței WAN a dispozitivului dumneavoastră.
42 |
43 | De asemenea, puteți testa de pe un sistem macOS, Linux sau Windows care este conectat la acest router/firewall OPNsense.
44 |
45 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
46 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/Open-Source_Routers/OpenWrt_LuCi.md:
--------------------------------------------------------------------------------
1 | ## Prezentare generală
2 |
3 | Proiectul OpenWrt este un sistem de operare Linux destinat dispozitivelor integrate, care este adesea utilizat ca soluție open-source pentru routere și firewall-uri.
4 |
5 | Acest ghid acoperă setarea Quad9 în setările DNS forwarder. Atunci când utilizați routerul OpenWrt ca server DNS, acesta va redirecționa solicitările DNS către Quad9.
6 |
7 | !!! avertisment "Timp de rezervă!"
8 | Înainte de a face modificări într-un mediu de producție, vă recomandăm [să faceți o copie de rezervă a configurației existente](https://openwrt.org/docs/guide-user/troubleshooting/backup_restore)
9 |
10 | ## Instrucțiuni
11 |
12 | * Conectați-vă la panoul de control LuCI, de obicei prin deschiderea `http://192.168.1.1` în browser.
13 |
14 | * Navigați la `Network` -> `DHCP and DNS`
15 | * Setați `9.9.9.9` și `149.112.112.112`, sau adresele serviciului Quad9 preferat în câmpurile de introducere "DNS forwardings".
16 |
17 | * Dacă rețeaua dvs. acceptă IPv6, puteți adăuga și 2620:fe::fe și 2620:fe::9, sau adresele IPv6 ale serviciului Quad9 preferat.
18 |
19 | * Navigați la subpagina `Resolv and Hosts Files` și asigurați-vă că `Ignore resolv file` este `Enabled`.
20 |
21 | * Faceți clic pe `Save & Apply` în partea de jos. Deoarece nu modificați setările DHCP, modificarea ar trebui să fie instantanee.
22 |
23 | ## Verificarea configurației
24 |
25 | * Confirmați că utilizați Quad9 pe Linux, MacOS sau Windows.
26 |
27 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
28 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/Open-Source_Routers/pfSense_(Criptat).md:
--------------------------------------------------------------------------------
1 | ## Prezentare generală
2 |
3 | pfSense este un firewall și un router open-source, utilizat atât în medii comerciale, cât și de consum.
4 |
5 | pfSense are [documentație pentru DNS over TLS](https://docs.netgate.com/pfsense/en/latest/recipes/dns-over-tls.html), pe care recomandăm să o consultați în plus față de acest articol.
6 |
7 | pfSense utilizează Unbound, care are încorporat suport DNS over TLS, configurația fiind accesibilă în interfața grafică.
8 |
9 | !!! avertisment "Backup Time!"
10 | Înainte de a face modificări într-un mediu de producție, vă recomandăm [să faceți o copie de siguranță a configurației existente](https://docs.netgate.com/pfsense/en/latest/backup/configuration.html)
11 |
12 | ## Instrucțiuni
13 |
14 | Navigați la `System` -> `General Setup` din meniul de sus.
15 |
16 | * Faceți clic pe `Add DNS Server` până când există 4 rânduri de intrări disponibile.
17 | * Adăugați adresele Quad9 IPv4 și IPv6 în câmpurile din stânga:
18 | `9.9.9.9`,`149.112.112.112`,`2620:fe::fe`,`2620:fe::9`
19 |
20 | !!! avertizare
21 | Dacă rețeaua dvs. nu are IPv6, lucru pe care îl puteți testa aici, atunci adresele IPv6 nu ar trebui adăugate, deoarece ar putea duce la eșecul unui procent din cererile DNS.
22 |
23 | * Adăugați `dns.quad9.net` în toate câmpurile Hostname din dreapta.
24 |
25 | Faceți clic pe "Save" în partea de jos a ecranului.
26 |
27 | Navigați la `Services` -> `DNS Forwarder` din meniul de sus.
28 | * Asigurați-vă că Enable DNS forwarder este dezactivat. Dacă este activat, dezactivați-l și faceți clic pe `Save` în partea de jos a paginii.
29 |
30 | Navigați la `Services` -> `DNS Resolver` din meniul de sus.
31 |
32 | * Derulați în jos până găsiți secțiunea vizibilă în următoarea captură de ecran.
33 | * Dezactivați Enable DNSSEC Support dacă este activat.
34 | !!! Notă "DNSSEC"
35 | DNSSEC este deja impus de Quad9, iar activarea DNSSEC la nivel de forwarder poate cauza eșecuri DNSSEC false.
36 | * Activați `DNS Query Forwarding`
37 | * Activați `Use SSL/TLS for outgoing DNS queries to Forwarding Servers`
38 | * Faceți clic pe `Save` în partea de jos a ecranului.
39 | * Faceți clic pe `Apply` Changes în partea de sus a ecranului pentru a aplica modificările salvate.
40 |
41 | ## Configurarea Veryify
42 |
43 | Puteți confirma că pfSense trimite acum interogările dvs. prin DNS peste TLS utilizând Instrumentul de captare a pachetelor încorporat.
44 |
45 | De asemenea, puteți efectua un test de pe un sistem macOS, Linux sau Windows din rețea.
46 |
47 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
48 |
--------------------------------------------------------------------------------
/docs/ro/Ghiduri_de_configurare/Windows/Windows_10.md:
--------------------------------------------------------------------------------
1 | ## Prezentare generală
2 |
3 | Cel mai simplu mod de a seta Quad9 pe întreaga rețea este prin setările routerului. Dacă preferați să setați Quad9 pe un dispozitiv Windows individual, vă rugăm să urmați pașii de mai jos pentru a configura Windows 10 pentru a utiliza Quad9.
4 |
5 | !!! avertisment "Firefox, VPN-uri"
6 | * **Firefox** este setat să utilizeze Cloudflare DNS în mod implicit în unele regiuni. Dacă utilizați Firefox, verificați dacă [acest lucru este dezactivat](https://support.mozilla.org/en-US/kb/dns-over-https#w_configure-doh-protection-settings).
7 | * **VPN-urile** de obicei nu respectă setările DNS la nivel de sistem sau router. Dacă utilizați un VPN, configurați adresele IP ale Quad9 în setările `DNS personalizat` ale clientului VPN. Consultați documentația furnizorului dvs. de VPN pentru informații suplimentare.
8 |
9 | ## Instrucțiuni
10 |
11 | ### IPv4
12 |
13 | * Faceți clic dreapta pe pictograma Rețea (Wired sau WiFi) din bara de sistem și faceți clic pe `Deschideți Setări rețea și internet`.
14 |
15 | * Faceți clic pe `Modificați opțiunile adaptorului`
16 |
17 | * Selectați `Proprietăți`.
18 |
19 | * Selectați `Protocolul internet versiunea 4 (TCP/IPv4)`. Apoi, faceți clic pe `Proprietăți`.
20 |
21 | * Selectați `Utilizați următoarele adrese de servere DNS`.
22 | * Introduceți: `9.9.9.9` în Preferred DNS Server
23 | * Introduceți: `149.112.112.112` în Server DNS alternativ.
24 | * Faceți clic pe `OK`.
25 |
26 | ### IPv6
27 |
28 | Dacă rețeaua dvs. acceptă IPv6, se recomandă, de asemenea, configurarea adreselor Quad9 IPv6. Dacă nu sunteți sigur dacă IPv6 este configurat în rețeaua dvs., puteți testa acest lucru aici: https://test-ipv6.com/
29 |
30 | * Selectați Internet Protocol Version 6 (TCP/IPv6)
31 | * Faceți clic pe Properties (Proprietăți).
32 |
33 | * Selectați `Utilizați următoarele adrese de servere DNS`.
34 | * Introduceți: `2620:fe::fe` în Preferred DNS Server
35 | * Introduceți: `2620:fe::9` în Server DNS alternativ.
36 | * Faceți clic pe `OK`.
37 |
38 | * Închideți toate ferestrele de configurare.
39 |
40 | ## Verificarea configurației
41 |
42 | Confirmați că utilizați Quad9 vizitând [on.quad9.net](https://on.quad9.net) în browserul dvs. preferat.
43 |
44 | Întrebări? Probleme? Nu a funcționat? Contactați-ne!
45 |
46 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
47 |
--------------------------------------------------------------------------------
/docs/ro/assets/conf/freebsd/forward.conf:
--------------------------------------------------------------------------------
1 | # This file was generated by local-unbound-setup.
2 | # Modifications will be overwritten.
3 | forward-zone:
4 | name: "."
5 | forward-tls-upstream: yes # Use DNS-over-TLS
6 | forward-first: no # do NOT send direct
7 | ###IPv4
8 | # 9.9.9.9 - Threat-blocking with DNSSEC
9 | forward-addr: 9.9.9.9@853#dns.quad9.net
10 | forward-addr: 149.112.112.112@853#dns.quad9.net
11 |
12 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
13 | # forward-addr: 9.9.9.11@853#dns11.quad9.net
14 | # forward-addr: 149.112.112.11@853#dns11.quad9.net
15 |
16 | # 9.9.9.10 - No threat blocking, no DNSSEC
17 | # forward-addr: 9.9.9.10@853#dns10.quad9.net
18 | # forward-addr: 149.112.112.10@853#dns10.quad9.net
19 |
20 |
21 | ###IPv6 - Uncomment if your system is configured for IPv6.
22 | # 9.9.9.9 - Threat-blocking with DNSSEC
23 | # forward-addr: 2620:fe::fe@853#dns.quad9.net
24 | # forward-addr: 2620:fe::9@853#dns.quad9.net
25 |
26 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
27 | # forward-addr: 2620:fe::11@853#dns11.quad9.net
28 | # forward-addr: 2620:fe::fe:11@853#dns11.quad9.net
29 |
30 | # 9.9.9.10 - No threat blocking, no DNSSEC
31 | # forward-addr: 2620:fe::10@853#dns10.quad9.net
32 | # forward-addr: 2620:fe::fe:10@853#dns10.quad9.net
33 |
--------------------------------------------------------------------------------
/docs/ro/assets/conf/freebsd/unbound.conf:
--------------------------------------------------------------------------------
1 | # This file was generated by local-unbound-setup.
2 | # Modifications will be overwritten.
3 | server:
4 | username: unbound
5 | directory: /var/unbound
6 | chroot: /var/unbound
7 | pidfile: /var/run/local_unbound.pid
8 | #auto-trust-anchor-file: /var/unbound/root.key
9 | tls-cert-bundle: /etc/ssl/cert.pem
10 |
11 | include: /var/unbound/forward.conf
12 | include: /var/unbound/lan-zones.conf
13 | include: /var/unbound/control.conf
14 | include: /var/unbound/conf.d/*.conf
15 |
--------------------------------------------------------------------------------
/docs/ro/assets/conf/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/ro/assets/conf/mobileconfig/Quad9_Secured_DNS_over_HTTPS_ECS_20240201.mobileconfig
--------------------------------------------------------------------------------
/docs/ro/assets/conf/openbsd/unbound.conf:
--------------------------------------------------------------------------------
1 | # $OpenBSD: unbound.conf,v 1.21 2020/10/28 11:35:58 sthen Exp $
2 | # Modified by Quad9.net:
3 | # - Disable DNSSEC Validation. Quad9 already performs DNSSEC validation, and DNSSEC validation on a forwarder significantly decreases performance due to duplicate DNSSEC validation and can occassionally result in a false BOGUS result.
4 | # - DNS-over-TLS enabled.
5 | # - Pre-populate all Quad9 services
6 |
7 | server:
8 | interface: 127.0.0.1
9 | #interface: 127.0.0.1@5353 # listen on alternative port
10 | interface: ::1
11 | #do-ip6: no
12 |
13 | # override the default "any" address to send queries; if multiple
14 | # addresses are available, they are used randomly to counter spoofing
15 | #outgoing-interface: 192.0.2.1
16 | #outgoing-interface: 2001:db8::53
17 |
18 | access-control: 0.0.0.0/0 refuse
19 | access-control: 127.0.0.0/8 allow
20 | access-control: ::0/0 refuse
21 | access-control: ::1 allow
22 |
23 | hide-identity: yes
24 | hide-version: yes
25 |
26 | # Perform DNSSEC validation.
27 | #
28 | #auto-trust-anchor-file: "/var/unbound/db/root.key"
29 | #val-log-level: 2
30 |
31 | # Synthesize NXDOMAINs from DNSSEC NSEC chains.
32 | # https://tools.ietf.org/html/rfc8198
33 | #
34 | # aggressive-nsec: yes
35 |
36 | # Serve zones authoritatively from Unbound to resolver clients.
37 | # Not for external service.
38 | #
39 | #local-zone: "local." static
40 | #local-data: "mycomputer.local. IN A 192.0.2.51"
41 | #local-zone: "2.0.192.in-addr.arpa." static
42 | #local-data-ptr: "192.0.2.51 mycomputer.local"
43 |
44 | # Use TCP for "forward-zone" requests. Useful if you are making
45 | # DNS requests over an SSH port forwarding.
46 | #
47 | #tcp-upstream: yes
48 |
49 | # CA Certificates used for forward-tls-upstream (RFC7858) hostname
50 | # verification. Since it's outside the chroot it is only loaded at
51 | # startup and thus cannot be changed via a reload.
52 | tls-cert-bundle: "/etc/ssl/cert.pem"
53 |
54 | remote-control:
55 | control-enable: yes
56 | control-interface: /var/run/unbound.sock
57 |
58 | forward-zone:
59 | name: "."
60 | forward-tls-upstream: yes # Use DNS-over-TLS
61 | forward-first: no # do NOT send direct
62 | ###IPv4
63 | # 9.9.9.9 - Threat-blocking with DNSSEC
64 | forward-addr: 9.9.9.9@853#dns.quad9.net
65 | forward-addr: 149.112.112.112@853#dns.quad9.net
66 |
67 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
68 | # forward-addr: 9.9.9.11@853#dns11.quad9.net
69 | # forward-addr: 149.112.112.11@853#dns11.quad9.net
70 |
71 | # 9.9.9.10 - No threat blocking, no DNSSEC
72 | # forward-addr: 9.9.9.10@853#dns10.quad9.net
73 | # forward-addr: 149.112.112.10@853#dns10.quad9.net
74 |
75 |
76 | ###IPv6 - Uncomment if your system is configured for IPv6.
77 | # 9.9.9.9 - Threat-blocking with DNSSEC
78 | # forward-addr: 2620:fe::fe@853#dns.quad9.net
79 | # forward-addr: 2620:fe::9@853#dns.quad9.net
80 |
81 | # 9.9.9.11 - Threat blocking, DNSSEC, and ECS
82 | # forward-addr: 2620:fe::11@853#dns11.quad9.net
83 | # forward-addr: 2620:fe::fe:11@853#dns11.quad9.net
84 |
85 | # 9.9.9.10 - No threat blocking, no DNSSEC
86 | # forward-addr: 2620:fe::10@853#dns10.quad9.net
87 | # forward-addr: 2620:fe::fe:10@853#dns10.quad9.net
88 |
--------------------------------------------------------------------------------
/docs/ro/assets/logo_light.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Quad9DNS/documentation/185e1289a33781e23ccea6c952f14e9b8c69234e/docs/ro/assets/logo_light.png
--------------------------------------------------------------------------------
/docs/ro/assets/logo_light.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/ro/assets/quad9_all_white.svg:
--------------------------------------------------------------------------------
1 |
2 |
3 |
22 |
--------------------------------------------------------------------------------
/docs/ro/images/favicon.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/ro/images/quad9_logo_dark.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/ro/images/quad9_logo_light.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/docs/ro/index.md:
--------------------------------------------------------------------------------
1 | # Prezentare generală
2 |
3 |
4 | { width="300" }
5 | { width="300" }
6 |
7 | Quad9 este o organizație non-profit, cu sediul în Elveția, care operează un serviciu DNS recursiv deschis, axat pe confidențialitate și securitate, destinat maselor, care este utilizat de aproximativ zeci de milioane de dispozitive din întreaga lume și este destinat tuturor, de la utilizatori casnici la întreprinderi de mari dimensiuni.
8 |
9 | Quad9 este finanțat în parte de utilizatori ca dumneavoastră. Dacă apreciați serviciul nostru, vă rugăm să luați în considerare donarea.
10 |
11 | [Faceti o donatie :octicons-heart-fill-24:{ .heart }](https://quad9.net/donate){ .md-button .md-button--primary }
12 |
13 |
14 | ## De ce Quad9?
15 |
16 | ### Confidențialitate prin lege
17 |
18 | Quad9 nu va înregistra niciodată adresele IP ale utilizatorilor finali. Niciodată.
19 |
20 | Acestea nu sunt doar cuvinte pe un site web. Ca organizație cu sediul în Elveția, Quad9 este obligată să respecte legile elvețiene stricte privind confidențialitatea pe internet.
21 |
22 | ### Securitate
23 |
24 | Atunci când se utilizează serviciul securizat Quad9 de blocare a amenințărilor, lider în industrie (9.9.9.9), Quad9 va bloca cererile DNS destinate domeniilor asociate cu intenții malițioase, cum ar fi cele asociate cu malware, viruși, adware, phishing, escrocherii etc.
25 |
26 | ### Criptare
27 |
28 | Quad9 acceptă DNS over TLS (DoT), DNS over HTTPS (DoH) și DNSCrypt.
29 |
30 | ## Întrebări / Asistență
31 |
32 | Pentru orice întrebări despre Quad9 sau documentația noastră, contactați-ne!
33 |
34 | [Obțineți asistență](https://quad9.net/support/contact){ .md-button .md-button--primary }
35 |
--------------------------------------------------------------------------------
/docs/ro/servicii.md:
--------------------------------------------------------------------------------
1 | Quad9 oferă mai multe variante ale serviciului nostru DNS gratuit și privat.
2 |
3 | ## 9.9.9.9 (Securizat)
4 |
5 | Cel mai popular serviciu al nostru. Un serviciu DNS recursiv care blochează amenințările și ține cont în primul rând de confidențialitate.
6 |
7 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
8 | | --------------------------- | -------------------------------- | --------------- | -------------- |
9 | | `9.9.9.9`, `149.112.112.112`| `2620:fe::fe`, `2620:fe::9` | `dns.quad9.net` | `https://dns.quad9.net/dns-query` |
10 |
11 | ## 9.9.9.10 (Fără blocarea amenințărilor)
12 |
13 | Pentru utilizatorii care doresc să profite de serviciul nostru DNS recursiv bazat pe confidențialitate, dar nu doresc blocarea amenințărilor, utilizați în schimb serviciul nostru 9.9.9.10.
14 |
15 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
16 | | --------------------------- | -------------------------------- | --------------- | -------------- |
17 | | `9.9.9.10`, `149.112.112.10`| `2620:fe::10`, `2620:fe::fe:10` | `dns10.quad9.net` | `https://dns10.quad9.net/dns-query` |
18 |
19 | ## 9.9.9.11 (Securizat + ECS)
20 |
21 | Pentru utilizatorii care nu direcționează către cea mai apropiată locație Quad9 posibilă, utilizați 9.9.9.11 pentru o performanță CDN mai bună:
22 |
23 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
24 | | --------------------------- | -------------------------------- | --------------- | -------------- |
25 | | `9.9.9.11`, `149.112.112.11`| `2620:fe::11`, `2620:fe::fe:11` | `dns11.quad9.net` | `https://dns11.quad9.net/dns-query` |
26 |
27 | ## 9.9.9.12 (Fără blocarea amenințărilor + ECS)
28 |
29 | Pentru utilizatorii care nu direcționează către cea mai apropiată locație Quad9 posibilă și care, de asemenea, nu doresc blocarea amenințărilor, utilizați versiunea noastră 9.9.9.12 pentru o performanță CDN mai bună:
30 |
31 | | IPv4 | IPv6 | DNS over TLS | DNS over HTTPS |
32 | | --------------------------- | -------------------------------- | --------------- | -------------- |
33 | | `9.9.9.12`, `149.112.112.12`| `2620:fe::12`, `2620:fe::fe:12` | `dns12.quad9.net` | `https://dns12.quad9.net/dns-query` |
34 |
35 | ## Porturi alternative
36 |
37 | Quad9 ascultă pe următoarele porturi non-standard pentru o mai bună disponibilitate a serviciilor noastre în medii de rețea restrictive:
38 |
39 | | Protocol | Standard Port | Alternate Port
40 | | --------------------------- | ------------------ | ------------- |
41 | | `UDP/TCP (Plaintext)` | `53` | `9953` |
42 | | `DNS over TLS` | `853` | `8853` |
43 | | `DNS over HTTPS` | `443` | `5053` |
44 |
--------------------------------------------------------------------------------
/docs/ro/stylesheets/extra.css:
--------------------------------------------------------------------------------
1 | @keyframes heart {
2 | 0%, 40%, 80%, 100% {
3 | transform: scale(1);
4 | }
5 | 20%, 60% {
6 | transform: scale(1.15);
7 | }
8 | }
9 | .heart {
10 | animation: heart 1000ms infinite;
11 | }
12 |
13 | .md-header {
14 | background-color: hsla(0, 0%, 0%, 0.32);
15 | }
16 |
17 | .md-ellipsis {
18 | font-size: 16px;
19 | }
20 |
21 | .md-nav__title {
22 | font-size: 16px;
23 | }
24 |
--------------------------------------------------------------------------------
/docs/stylesheets/extra.css:
--------------------------------------------------------------------------------
1 | @keyframes heart {
2 | 0%, 40%, 80%, 100% {
3 | transform: scale(1);
4 | }
5 | 20%, 60% {
6 | transform: scale(1.15);
7 | }
8 | }
9 | .heart {
10 | animation: heart 1000ms infinite;
11 | }
12 |
13 | .md-header {
14 | background-color: hsla(0, 0%, 0%, 0.32);
15 | }
16 |
17 | .md-ellipsis {
18 | font-size: 16px;
19 | }
20 |
21 | .md-nav__title {
22 | font-size: 16px;
23 | }
24 |
--------------------------------------------------------------------------------
/mkdocs.yml:
--------------------------------------------------------------------------------
1 | site_name: Quad9 Documentation
2 | site_url: https://quad9dns.github.io/documentation
3 | repo_url: https://github.com/Quad9DNS/documentation
4 |
5 | plugins:
6 | - social:
7 | cards_layout_options:
8 | background_color: "#2E303E"
9 | - search
10 | - i18n:
11 | reconfigure_material: true
12 | fallback_to_default: false
13 | docs_structure: folder
14 | languages:
15 | - locale: en
16 | default: true
17 | name: English
18 | build: true
19 | - locale: fr
20 | name: Français
21 | build: true
22 | - locale: es
23 | name: Español
24 | build: true
25 | - locale: ro
26 | name: Româna
27 | build: true
28 | markdown_extensions:
29 | - admonition
30 | - attr_list
31 | - md_in_html
32 | - pymdownx.inlinehilite
33 | - pymdownx.snippets
34 | - pymdownx.superfences
35 | - pymdownx.emoji:
36 | emoji_index: !!python/name:materialx.emoji.twemoji
37 | emoji_generator: !!python/name:materialx.emoji.to_svg
38 | - pymdownx.tabbed:
39 | alternate_style: true
40 |
41 | extra_css:
42 | - stylesheets/extra.css
43 |
44 | theme:
45 | name: material
46 | favicon: images/favicon.svg
47 | logo: assets/logo_light.svg
48 | font: false
49 | features:
50 | - navigation.index
51 | - navigation.sections
52 | # - navigation.instant
53 | - toc.integrate
54 | - content.code.copy
55 | - header.autohide
56 | language: en
57 | palette:
58 | - scheme: slate
59 | toggle:
60 | icon: material/brightness-7
61 | name: Switch to Light Mode
62 | primary: pink
63 | accent: pink
64 | - scheme: default
65 | toggle:
66 | icon: material/brightness-4
67 | name: Switch to Dark Mode
68 | primary: pink
69 | accent: pink
70 |
71 | extra:
72 | alternate:
73 | - name: English
74 | link: /
75 | lang: en
76 | - name: Français
77 | link: /fr/
78 | lang: fr
79 | - name: Español
80 | link: /es/
81 | lang: es
82 | - name: Româna
83 | link: /ro/
84 | lang: ro
85 | social:
86 | - icon: fontawesome/brands/twitter
87 | link: https://twitter.com/quad9dns
88 | - icon: fontawesome/brands/linkedin
89 | link: https://www.linkedin.com/company/quad9-dns/
90 | - icon: fontawesome/brands/reddit
91 | link: https://www.reddit.com/r/Quad9/
92 | - icon: fontawesome/brands/facebook
93 | link: https://www.facebook.com/quad9dns/
94 | - icon: fontawesome/brands/mastodon
95 | link: https://mastodon.social/@quad9dns
96 |
97 | copyright: |
98 | © 2023-2024 Quad9.net - All content licensed under Creative Commons Attribution-ShareAlike 4.0 License unless otherwise specified
99 |
--------------------------------------------------------------------------------