Technitium Install: Fast, Secure, Authoritative DNS Server for You and Your Clients' Networks

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 63

  • @SnordCranston23
    @SnordCranston23 2 месяца назад +9

    I don't know if the original video was deleted but it's still nice to see a technitium video. I've used it for a couple of years now. Thanks for the video!

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад +2

      It was. was trying to redact my details, but I apparently suck at it because they are still here. Luckily I'm moving soon, so please don;t bother the new owners.

    • @geogmz8277
      @geogmz8277 2 месяца назад +2

      @@AwesomeOpenSource You can use RUclips Studio editor no need to re-upload... It has a Blurring feature.. It takes a while to show the blur on the actual video but is something.

  • @Mikesco3
    @Mikesco3 2 месяца назад +5

    I really enjoyed your video, but it would be good to have a second video to point to about hardening your digital ocean server afterwards..
    (Hardening ssh, enabling firewall, etc)

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад +2

      Indeed. On my production system, I added both name servers to my Netbird VPN, then setup a firewall on DO to block everything but port 53 (as this is where ns requests run). I access 80, 443, and 22 through Reveerse proxy over the VPN.

    • @MarkusSimpson
      @MarkusSimpson 2 месяца назад +1

      ​@@AwesomeOpenSourcedo you have an explainer video showing how to replicate this? 🙃

  • @Mikesco3
    @Mikesco3 2 месяца назад +2

    Great video!
    Pro tip, when you're setting assigning the users permissions, you can skip the second Brian, (if you just have `chmod -R brian: ` it will assume the second Brian, however, don't forget the colon ( : )

  • @goodcitizen4587
    @goodcitizen4587 2 месяца назад +1

    Cool! And thanks for the show notes for reference.

  • @Damien-km1vl
    @Damien-km1vl 2 месяца назад +1

    Great product that I use even when on move thanks to DoH

  • @christophergeorgiades1386
    @christophergeorgiades1386 2 месяца назад +5

    Wouldn't the connection between the proxy manager and technitium still be unenecrypted? Unless they are running on the same computer (or at least same datacenter) all that traffic is being deencrypted after it passes through nginx and is just plaintext as it passes in the backend there.

    • @J.erem.y
      @J.erem.y 2 месяца назад +1

      Exactly why I came to the comments.

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад

      It would, and apologies, I explained in another comment as well, but on my production system I proxy through my VPN, so only the proxy is exposed on port 80 and 443, and the Name Servers are only exposing port 53 to the internet.

  • @gfbardski
    @gfbardski Месяц назад +1

    Great video! Thanks mate. I got one question. Do you as the owner of ns1 ans ns2 have any control over the requests that arrive from the Internet in terms of load balancing? Suppose I'd like to serve 80% of all the DNS requests via ns1 and the rest via ns2 - or is it entirely up to the Internet forwarders (like google, cloudflare, quad9, etc.) which auth dns they choose to forward the request to?

    • @AwesomeOpenSource
      @AwesomeOpenSource  Месяц назад +1

      I actually haven't looked into it from that perspective. I'd think if ns1 was unavailable, due to load or otherwise, the fallback would be ns2 automatically, and so on.

  • @J.erem.y
    @J.erem.y 2 месяца назад +4

    Your proxy is still going out over the internet with normal http to your ns1. You only added ssl to your proxy not to the actual server...

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад +1

      You are right. I should have said, I setup my proxy to route to my production DNS servers over my Wireguard VPN. So you hit the proxy through the internet, then it proxies that traffic over the VPN to the server's WebGUI. I only left port 53 exposed to the internet so it can function as a Name Server properly.

    • @DarthDweeb
      @DarthDweeb 2 месяца назад

      @@AwesomeOpenSource I know that you will probably think that I am trying to rip on your videos, but I promise that I love your content. You should probably show or explain the VPN in your video. The way you describe this in your video makes it sound like your connection to the name server is magically encrypted. If someone didn't know better they would think they have a secure/encrypted connection because their local browser says so. In this example you even pointed your NPM to the public IP of your DigitalOcean VPS servers. If someone followed this as a guide they would have their Authoritative DNS exposed for anyone to grab their credentials.

  • @sirrobertdowneysenior8080
    @sirrobertdowneysenior8080 2 месяца назад +1

    Thank you.

  • @Robertjaymercer
    @Robertjaymercer 2 месяца назад +1

    Thank you very much for that video, always good content on your channel!
    May I ask, I use Namecheap and can t find IDP on the DNS section. Can I continu without it for the ns2?

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад +1

      If you were just looking at my list, those are just subdomains I personally have setup for my domain, you could have any subdomains like wiki.yourdomain.com, or specialmedia.yourdomain.com. You probably won't have one called IDP unless you followed one of my other videos and created it off of that.

    • @Robertjaymercer
      @Robertjaymercer 2 месяца назад

      @@AwesomeOpenSource oh okay thank you sir!

  • @ramanshaan7566
    @ramanshaan7566 2 месяца назад +2

    hey Brian / Others .. does anyone know how we can add 2FA to nginx NPM homepage ? cheers and thanks

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад

      You could put something like Authentik in frong of it, but then you'd have 2 logins for it, first Authentik with 2FA, then NPM. That's the only way that I know of.

  • @MaddMo
    @MaddMo Месяц назад

    can someone please show me how you would point traffic to a domain controller in your environment? Having issues with Conditional Forwarders not working.

  • @omarsh2169
    @omarsh2169 2 месяца назад +1

    I enjoyed the video! I still didn’t like the last part where you advised the reverse proxy to point to your dns servers for the management.
    You mentioned using reverse proxy with encryption to make sure no sniffing is happening between client and server which is completely correct! But still useless.
    The fact that the reverse proxy rules are advised to point to http plain text on the other servers is dangerous!
    You will also need to have at least self signed certificates between your servers or simply use internal networking!
    If you are going to use the open network with public IPs between server and proxy ! Don’t make it as done in the video without a VPN, https or internal networking ! It’s a going to be dangerous otherwise, which will allow man in the middle attack.

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад +1

      I should have been more clear with that. I set that up on my production systems inside my VPN, so my reverse proxy only uses my VPN network to reach the DNS servers. Still encrypted.

    • @Glatze603
      @Glatze603 2 месяца назад +2

      This should be explained in the video, too 👍

  • @docmalitt
    @docmalitt 2 месяца назад +1

    Dear @AwesomeOpenSource I have a question probably (very loosely) not much related with DNS. I have few students from time I taught IT in school in Africa and some of them want (well one of them) to open the grocery store but can't pay for windows Accounting/Inventory apps... so i though of FOSS and just wanted to ask if you might know any app that I can recommend and show them... or just to mix couple of previously mentioned like Invoice Ninja and... can't remember any other but will try to find. Thx and sorry for constant barrage of questions.

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад

      Sure there are several Open Source Point of Sale solutions, or POS. Definitely check into those. They'll likely have one that would fit their needs nicely.

    • @docmalitt
      @docmalitt 2 месяца назад

      @@AwesomeOpenSource Thank you so much. Mostly I needed the proper name to start researching. It has been ages since I've volunteered there and once ex student has reached out, I couldn't remember anything other than I had found some windows "shop app" (well, now I know it's POS) that fell from some Pirate ship sailing Tanganyika Lake. It was time in my life I didn't even use Linux on daily basis and FOSS could have been an exotic animal as far as my knowledge went. Again, thx for all your help and - thx for the video... goes without mentioning.

  • @cougarmain
    @cougarmain 2 месяца назад +1

    Do you know of any DDNS self hosted solution?

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад

      I've looked for this for a while. The closest I found was to register my own domain with a registrar that has an API and a docker container for updating the public IP. Register your domain, go through the setup for the docker container and run it locally in your network. It will then update your public IP if it changes using the registrar's API.

  • @C0sm1c.n00dle
    @C0sm1c.n00dle 2 месяца назад +1

    Do you need droplet service for this to work?

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад

      No, you can use anyone you want. If you have a static public IP on your own internet connection, you can fun it there as well, but you'll need to open port 53 on your firewall and forward it to the server running Technitium. Additionally, if you only run it on 1 IP, then you lose redundancy.

  • @makkanftw
    @makkanftw 2 месяца назад +4

    3:09 unblurred personal details

  • @80robina
    @80robina 2 месяца назад +1

    Will this block RUclips ads, if not what software does

    • @ramanshaan7566
      @ramanshaan7566 2 месяца назад

      Have you checked Adguard Home docker ?

    • @80robina
      @80robina 2 месяца назад +1

      @@ramanshaan7566 can you run it on opnsense

    • @80robina
      @80robina 2 месяца назад +1

      @@ramanshaan7566 it says DNS level blocking can't block RUclips ads it says to use a content blocking proxy

    • @geogmz8277
      @geogmz8277 2 месяца назад +1

      Adguard Home, but not all of them but it does has significant reduction. Many people recommend PiHole but I have tried both and not sure what's the secret but Ad Guard does a better job.

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад

      I don't think DNS blocking really helps with RUclips ads. I believe there are browser plugins that can help, but Google is working to get around those as well.

  • @G-3-A-R-Z
    @G-3-A-R-Z 2 месяца назад +1

    DO is a bit slow on the CPU. Just an opinion.

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад +1

      I feel like ti performs quite well. Have only tried Vultr and SSDNodes, but DO and Vultr seemed comparable to me, and DO was much faster than SSDNodes. I think it's the type of VM they are setting up.

    • @G-3-A-R-Z
      @G-3-A-R-Z 2 месяца назад

      @@AwesomeOpenSource Thanks for that information. I will use it to make decisions later. This show has really helped me beef up my home lab. Thanks

  • @doomalsodoom3605
    @doomalsodoom3605 2 месяца назад +1

    You left your personal info unblurred at 3:08

    • @AwesomeOpenSource
      @AwesomeOpenSource  2 месяца назад +1

      @@doomalsodoom3605 thanks. I’m obviously terrible at this.

    • @guacfiend
      @guacfiend 2 месяца назад +2

      @@AwesomeOpenSource hurts my soul that people will take advantage of that information when you're simply trying to educate us for free. Thank you for everything Brian.

    • @comosaycomosah
      @comosaycomosah 2 месяца назад

      ​@@AwesomeOpenSourceyou're actually great at this man! Mistakes happen tho appreciate your content and do what you need to be safe!

  • @kristof9497
    @kristof9497 2 месяца назад +1

    Thank You.