FS#57027 - [dnscrypt-proxy] abandoned then restarted upstream
Attached to Project:
Community Packages
Opened by Jared H (govgoat) - Tuesday, 09 January 2018, 16:18 GMT
Last edited by David Runge (dvzrv) - Friday, 06 April 2018, 18:49 GMT
Opened by Jared H (govgoat) - Tuesday, 09 January 2018, 16:18 GMT
Last edited by David Runge (dvzrv) - Friday, 06 April 2018, 18:49 GMT
|
Details
Description:
Upstream has abandoned the project. dnscrypt.org now redirects to dnsprivacy.org, and the github repo has been deleted. The source in the PKGBUILD now is an unresolved hostname. I did find that dyne.org has taken over maintenance of the project, found here -> https://github.com/dyne/dnscrypt-proxy. Hopefully this isn't unnecessary noise, wasn't sure where/how to make you the maintainer aware. Thanks! |
This task depends upon
Closed by David Runge (dvzrv)
Friday, 06 April 2018, 18:49 GMT
Reason for closing: Fixed
Additional comments about closing: 2.0.8 is now in community.
Friday, 06 April 2018, 18:49 GMT
Reason for closing: Fixed
Additional comments about closing: 2.0.8 is now in community.
It's already available in AUR: https://aur.archlinux.org/packages/dnscrypt-proxy-go/
I recommend to replace this package with 2.0 version after it comes out of beta phase.
it's out
However, the problem with
FS#49881still remains!Hope that the developer will support version 2 too.
@Severus: That's why there is CapabilityBoundingSet and AmbientCapabilities, which can be set to CAP_NET_BIND_SERVICE to explicitely allow that behavior for an unprivileged user.
The new design of the dnscrypt-proxy doesn't really require setting up several services, if one wants to use several distinct servers on separate ports, as it can deal with more than one server (and their disappearance) through its configuration.
Also, it is not required to use socket activation (but it is one possible way to get around the unprivileged port binding issue).
https://github.com/jedisct1/dnscrypt-proxy/pull/255/commits/a57f6815b5f307418d2ee5c72c48a64fd3b06d44
Not sure what you are talking about. Only root can start system-wide systemd services but then they can run unprivileged with DynamiUser option set. With socket activation they can listen on arbitrary defined port at the same time. This is what https://aur.archlinux.org/packages/dnscrypt-proxy-go already does.
@davezerave
You don't need additional capabilities and you don't need to upstream anything as everything is already here in AUR.
https://github.com/jedisct1/dnscrypt-proxy/pull/255/commits/a57f6815b5f307418d2ee5c72c48a64fd3b06d44 will break 99% usecases, I highly doubt it will be accepted.
@Janick.Hauck92: So what keeps you from upstreaming such a general setting then? DynamicUser can be used by any Linux distribution utilizing systemd.
As I wrote before: DynamicUser alone will still not enable you to bind to ports < 1024 (if you're not also using socket activation). If this (socket activation) is meant as the default setup for all use-cases (standalone, as backend for other DNS servers, etc.), then sure, it'll work.
In any case: These settings should be upstreamed.
Socket activation is already in upstream https://github.com/jedisct1/dnscrypt-proxy/blob/master/systemd/dnscrypt-proxy.socket .
https://github.com/jedisct1/dnscrypt-proxy/commit/bdc32cee90e099a49214c0b5315ea429959ea8c1
FS#49881has been merged upstream. If you find the time, switch to the new version! :)https://lists.archlinux.org/pipermail/aur-requests/2018-April/023329.html
https://lists.archlinux.org/pipermail/aur-requests/2018-April/023330.html
Feel free to test and report back!