专属域名
文档搜索
轩辕助手
Run助手
邀请有礼
返回顶部
快速返回页面顶部
收起
收起工具栏
轩辕镜像 官方专业版
轩辕镜像 官方专业版轩辕镜像 官方专业版官方专业版
首页个人中心搜索镜像

交易
充值流量我的订单
工具
提交工单镜像收录一键安装
Npm 源Pip 源Homebrew 源
帮助
常见问题
其他
关于我们网站地图

官方QQ群: 1072982923

热门搜索:openclaw🔥nginx🔥redis🔥mysqlopenjdkcursorweb2apimemgraphzabbixetcdubuntucorednsjdk
powerdns

chrisss404/powerdns

chrisss404

PowerDNS dnsdist, recursor, authoritative, and admin interface. Supports DNSCrypt, DoH, and DoT.

4 次收藏下载次数: 0状态:社区镜像维护者:chrisss404仓库类型:镜像最近更新:12 天前
使用轩辕镜像,把时间还给真正重要的事。点击查看
镜像简介版本下载
使用轩辕镜像,把时间还给真正重要的事。点击查看

Introduction

Get your own secure nameserver up and running within minutes, using this dockerized installation of the PowerDNS nameserver.

Source code of PowerDNS here: https://github.com/PowerDNS/pdns

Private Recursor

Simple example of an ad blocking private recursor that is listening for DNSCrypt and DNS-over-TLS (DoT) queries. Easy setup for any desktop OS using https://github.com/jedisct1/***/wiki/Installation#os-specific-instructions and Android 9 has native support for DoT.

Create private-recursor.yml like this:

version: '2.1'

services:

  gateway:
    image: jwilder/nginx-proxy:alpine
    volumes:
      - "/var/run/docker.sock:/tmp/docker.sock:ro"
      - "/etc/nginx/vhost.d"
      - "/usr/share/nginx/html"
      - "/etc/nginx/certs"
    ports:
      - "80:80"

  letsencrypt:
    image: jrcs/letsencrypt-nginx-proxy-companion:latest
    volumes:
      - "/var/run/docker.sock:/var/run/docker.sock:ro"
    volumes_from:
      - gateway

  dnsdist:
    image: chrisss404/powerdns:latest-dnsdist
    environment:
      - VIRTUAL_HOST=dot.example.com
      - VIRTUAL_PORT=9999
      - LETSENCRYPT_EMAIL=***
      - LETSENCRYPT_HOST=dot.example.com
      - DNSDIST_DNSCRYPT=yes
      - DNSDIST_DNS_OVER_TLS=yes
      - DNSDIST_DNS_OVER_TLS_DOMAIN=dot.example.com
    volumes:
      - "./blacklist.txt:/etc/dnsdist/blacklist.txt:ro"
    volumes_from:
      - gateway:ro
    networks:
      - recursor
    ports:
      - "853:853/tcp"
      - "8443:8443/udp"
      - "8443:8443/tcp"

  recursor:
    image: chrisss404/powerdns:latest-recursor
    sysctls:
      - net.ipv6.route.max_size=***
    networks:
      recursor:
        ipv4_address: 172.31.117.117

networks:
  recursor:
    ipam:
      driver: default
      config:
        - subnet: "172.31.117.0/24"

Create blacklist.txt like this:

googleadservices.com
...

Then you can do the following:

# start secure recursor (restart dnsdist after the let's encrypt certificate is created)
docker-compose -f private-recursor.yml up

# get DNSCrypt provider public key fingerprint
docker-compose -f private-recursor.yml exec dnsdist dnsdist -e 'printDNSCryptProviderFingerprint("/var/lib/dnsdist/providerPublic.key")'

# create DNS stamp using python dnsstamps library or visit [***]
dnsstamp.py dnscrypt -s -a 1.2.3.4:8443 -n 2.dnscrypt-cert.example.com -k 2251:468C:FE4C:C39F:9DF3:C2BA:7C95:ED8F:94F6:06BC:7A24:0493:D168:DE9E:7682:E8AD

Connect using DNSCrypt Proxy

  • Install dnscrypt proxy as described https://github.com/jedisct1/***/wiki/Installation#os-specific-instructions.
  • Configure dnscrypt proxy to use previously created dnsstamp, e.g.: vim /etc//.toml
diff
-server_names = ['cisco', 'cloudflare']
+server_names = ['example']

[static]
+  [static.'example']
+  stamp = 'sdns://AQEAAAAAAAAADDEuMi4zLjQ6ODQ0MyAiUUaM_kzDn53zwrp8le2PlPYGvHokBJPRaN6edoLorRsyLmRuc2NyeXB0LWNlcnQuZXhhbXBsZS5jb20'

Connect using Android

  • Go to Settings > Network & Internet > Advanced > Private DNS > Private DNS provider hostname
  • Enter DoT hostname: dot.example.com

https://raw.githubusercontent.com/chrisss404/powerdns/master/android-dot.png

Private Authoritative Server

Simple example of full powerdns stack including private authoritative nameserver and admin interface for editing DNS records.

Create private-authoritative.yml like this:

version: '2.1'

services:

  admin:
    image: chrisss404/powerdns:latest-admin
    depends_on:
      - admin-db
      - authoritative
    environment:
      - ADMIN_PDNS_API_KEY=api-secret-authoritative
      - ADMIN_USER_PASSWORD=very-secret
    networks:
      - admin-db
      - authoritative
    ports:
      - "80:3031"

  admin-db:
    image: postgres:12.1-alpine
    environment:
      - POSTGRES_DB=pda
      - POSTGRES_INITDB_ARGS=--data-checksums
      - POSTGRES_PASSWORD=pda
      - POSTGRES_USER=pda
    networks:
      - admin-db

  authoritative:
    image: chrisss404/powerdns:latest-authoritative
    depends_on:
      - authoritative-db
    environment:
      - AUTHORITATIVE_API=yes
      - AUTHORITATIVE_API_KEY=api-secret-authoritative
      - AUTHORITATIVE_WEBSERVER=yes
      - AUTHORITATIVE_WEBSERVER_PASSWORD=web-secret-authoritative
    networks:
      authoritative:
        ipv4_address: 172.31.118.118
      authoritative-db:
    ports:
      - "8081:8081/tcp"

  authoritative-db:
    image: postgres:12.1-alpine
    environment:
      - POSTGRES_DB=pdns
      - POSTGRES_INITDB_ARGS=--data-checksums
      - POSTGRES_PASSWORD=pdns
      - POSTGRES_USER=pdns
    networks:
      - authoritative-db

  dnsdist:
    image: chrisss404/powerdns:latest-dnsdist
    environment:
      - DNSDIST_API_KEY=api-secret-dnsdist
      - DNSDIST_PLAIN=yes
      - DNSDIST_QUIET=no
      - DNSDIST_WEBSERVER=yes
      - DNSDIST_WEBSERVER_PASSWORD=web-secret-dnsdist
    networks:
      - recursor
    ports:
      - "1053:53/tcp"
      - "1053:53/udp"
      - "8083:8083/tcp"

  recursor:
    image: chrisss404/powerdns:latest-recursor
    environment:
      - RECURSOR_API_KEY=api-secret-recursor
      - RECURSOR_DNSSEC=validate
      - RECURSOR_FORWARD_ZONES=sys=172.31.118.118
      - RECURSOR_QUIET=no
      - RECURSOR_TRUST_ANCHORS=sys=54970 13 1 27efe1c1a790c3cbb43b947d6d6dfac62507097e
      - RECURSOR_WEBSERVER=yes
      - RECURSOR_WEBSERVER_PASSWORD=web-secret-recursor
    sysctls:
      - net.ipv6.route.max_size=***
    networks:
      recursor:
        ipv4_address: 172.31.117.117
      authoritative:
    ports:
      - "8082:8082/tcp"

networks:
  admin-db:
  authoritative:
    ipam:
      driver: default
      config:
        - subnet: "172.31.118.0/24"
  authoritative-db:
  recursor:
    ipam:
      driver: default
      config:
        - subnet: "172.31.117.0/24"

Then you can do the following:

# start powerdns stack
docker-compose -f private-authoritative.yml up

# send DNS queries
dig -p 1053 example.com

# PowerDNS admin interface
http://localhost:80

# PowerDNS authoritative stats
http://localhost:8081

# PowerDNS recursor stats
http://localhost:8082

# PowerDNS dnsdist stats
http://localhost:8083

Settings

Admin

Env-VariableDescription
ADMIN_DB_HOSTPostgres host (default: admin-db)
ADMIN_DB_NAMEPostgres database (default: pda)
ADMIN_DB_PASSPostgres password (default: pda)
ADMIN_DB_PORTPostgres port (default: 5432)
ADMIN_DB_USERPostgres username (default: pda)
ADMIN_PDNS_API_KEYPowerDNS API key (default: pdns)
ADMIN_PDNS_API_URLPowerDNS API URL (default: [***]
ADMIN_PDNS_VERSIONPowerDNS version number (default: 4.2.1)
ADMIN_SIGNUP_ENABLEDAllow users to sign up (default: no)
ADMIN_USER_EMAILEmail address of admin user (default: ***)
ADMIN_USER_FIRSTNAMEFirst name of admin user (default: Administrator)
ADMIN_USER_LASTNAMELast name of admin user (default: User)
ADMIN_USER_PASSWORDPassword of admin user (default: admin)

Authoritative

Env-VariableDescription
AUTHORITATIVE_ALLOW_AXFR_IPSAllow zonetransfers only to these subnets (default: 127.0.0.0/8,::1)
AUTHORITATIVE_ALLOW_NOTIFY_FROMAllow AXFR NOTIFY from these IP ranges (default: 0.0.0.0/0,::/0)
AUTHORITATIVE_APIEnable/disable the REST API (default: no)
AUTHORITATIVE_API_KEYStatic pre-shared authentication key for access to the REST API (default: pdns)
AUTHORITATIVE_API_READONLYDisallow data modification through the REST API when set (default: no)
AUTHORITATIVE_DB_HOSTPostgres host (default: authoritative-db)
AUTHORITATIVE_DB_NAMEPostgres database (default: pdns)
AUTHORITATIVE_DB_PASSPostgres password (default: pdns)
AUTHORITATIVE_DB_PORTPostgres port (default: 5432)
AUTHORITATIVE_DB_USERPostgres username (default: pdns)
AUTHORITATIVE_DEFAULT_KSK_ALGORITHMDefault KSK algorithm (default: ecdsa256)
AUTHORITATIVE_DEFAULT_KSK_SIZEDefault KSK size (default: 0)
AUTHORITATIVE_DEFAULT_PUBLISH_CDNSKEYDefault value for PUBLISH-CDNSKEY (default: )
AUTHORITATIVE_DEFAULT_PUBLISH_CDSDefault value for PUBLISH-CDS (default: )
AUTHORITATIVE_DEFAULT_ZSK_ALGORITHMDefault ZSK algorithm (default: )
AUTHORITATIVE_DEFAULT_ZSK_SIZEDefault ZSK size (default: 0)
AUTHORITATIVE_DIRECT_DNSKEYFetch DNSKEY, CDS and CDNSKEY RRs from backend during DNSKEY or CDS/CDNSKEY synthesis (default: no)
AUTHORITATIVE_DISABLE_AXFRDisable zonetransfers but do allow TCP queries (default: yes)
AUTHORITATIVE_DNAME_PROCESSINGIf we should support DNAME records (default: no)
AUTHORITATIVE_EXPAND_ALIASExpand ALIAS records (default: no)
AUTHORITATIVE_LOG_DNS_DETAILSIf PDNS should log DNS non-erroneous details (default: no)
AUTHORITATIVE_LOG_DNS_QUERIESIf PDNS should log all incoming DNS queries (default: no)
AUTHORITATIVE_LOGLEVELAmount of logging. Higher is more. Do not set below 3 (default: 4)
AUTHORITATIVE_MASTERAct as a master (default: no)
AUTHORITATIVE_MAX_TCP_CONNECTION_DURATIONMaximum time in seconds that a TCP DNS connection is allowed to stay open (default: 0)
AUTHORITATIVE_MAX_TCP_CONNECTIONSMaximum number of TCP connections (default: 20)
AUTHORITATIVE_QUERY_LOGGINGHint backends that queries should be logged (default: no)
AUTHORITATIVE_RECEIVER_THREADSDefault number of receiver threads to start (default: 1)
AUTHORITATIVE_RESOLVERUse this resolver for ALIAS and the internal stub resolver (default: no)
AUTHORITATIVE_RETRIEVAL_THREADSNumber of AXFR-retrieval threads for slave operation (default: 2)
AUTHORITATIVE_REUSEPORTEnable higher performance on compliant kernels by using SO_REUSEPORT allowing each receiver thread to open its own socket (default: no)
AUTHORITATIVE_SLAVEAct as a slave (default: no)
AUTHORITATIVE_SIGNING_THREADSDefault number of signer threads to start (default: 3)
AUTHORITATIVE_TCP_FAST_OPENEnable TCP Fast Open support on the listening sockets (default: 0)
AUTHORITATIVE_WEBSERVERStart a webserver for monitoring on port 8081 (default: no)
AUTHORITATIVE_WEBSERVER_PASSWORDPassword required for accessing the webserver (default: pdns)

Dnsdist

Env-VariableDescription
DNSDIST_API_KEYStatic pre-shared authentication key for access to the REST API (default: pdns)
DNSDIST_DNSCRYPTListen for DNSCrypt queries on port 8443 (default: no)
DNSDIST_DNSCRYPT_PROVIDER_NAMEDNSCrypt provider name (default: 2.dnscrypt-cert.example.com)
DNSDIST_DNS_OVER_HTTPSListen for DNS-over-HTTPS queries on port 443 (default: no)
DNSDIST_DNS_OVER_HTTPS_DOMAINDomain name of DNS server.
DNSDIST_DNS_OVER_HTTPS_PATHThe absolute URI path. (default: /dns-query)
DNSDIST_DNS_OVER_TLSListen for DNS-over-TLS queries on port 853 (default: no)
DNSDIST_DNS_OVER_TLS_DOMAINDomain name of DNS server.
DNSDIST_PLAINListen for plain DNS queries on port 53 (default: no)
DNSDIST_QUIETSuppress logging of questions and answers (default: no)
DNSDIST_WEBSERVERStart a webserver for REST API on port 8083 (default: no)
DNSDIST_WEBSERVER_PASSWORDPassword required for accessing the webserver (default: pdns)

Recursor

Env-VariableDescription
RECURSOR_ALLOW_FROMIf set, only allow these comma separated netmasks to recurse
RECURSOR_API_KEYStatic pre-shared authentication key for access to the REST API (default: pdns)
RECURSOR_API_READONLYDisallow data modification through the REST API when set (default: yes)
RECURSOR_DNSSECDNSSEC mode: off / process-no-validate (default) / process / log-fail / validate
RECURSOR_FORWARD_ZONESZones for which we forward queries, comma separated domain=ip pairs
RECURSOR_FORWARD_ZONES_RECURSEZones for which we forward queries with recursion bit, comma separated domain=ip pairs
RECURSOR_LOGLEVELAmount of logging. Higher is more. Do not set below 3 (default: 3)
RECURSOR_QUIETSuppress logging of questions and answers (default: no)
RECURSOR_TCP_FAST_OPENEnable TCP Fast Open support on the listening sockets, using the supplied numerical value as the queue size
RECURSOR_THREADSLaunch this number of threads
RECURSOR_TRUST_ANCHORSTrust anchors for private zones when using DNSSEC validation, comma separated domain=ds-key pairs
RECURSOR_WEBSERVERStart a webserver for REST API on port 8082 (default: no)
RECURSOR_WEBSERVER_PASSWORDPassword required for accessing the webserver (default: pdns)

查看更多 powerdns 相关镜像 →

powerdns/dnsdist-18 logo

powerdns/dnsdist-18

powerdns
PowerDNS DNSdist v1.8.x是一款功能强大的DNS负载均衡器,提供高性能DNS流量管理、负载均衡与流量控制功能,适用于DNS服务器集群的流量分配、优化及高可用性保障。
4 次收藏10万+ 次下载
1 年前更新
powerdns/pdns-recursor-48 logo

powerdns/pdns-recursor-48

powerdns
PowerDNS Recursor是一款高性能DNS递归解析服务器,支持DNSSEC、Lua脚本和多种后端,适用于构建可靠、可扩展的DNS解析基础设施,遵循GNU GPLv2许可。
1 次收藏10万+ 次下载
1 年前更新
powerdns/pdns-auth-49 logo

powerdns/pdns-auth-49

powerdns
PowerDNS Authoritative Server是一款功能强大的开源DNS权威服务器,支持多种后端(如MySQL、PostgreSQL、Bind),采用GPLv2许可,适用于构建可靠的域名解析服务。
4 次收藏10万+ 次下载
1 个月前更新
powerdns/dnsdist-19 logo

powerdns/dnsdist-19

powerdns
PowerDNS DNSdist是一款DNS流量管理工具,提供负载均衡、流量控制及安全防护功能,用于优化DNS服务性能与可用性。
2 次收藏10万+ 次下载
16 天前更新
powerdns/pdns-recursor-52 logo

powerdns/pdns-recursor-52

powerdns
PowerDNS Recursor v5.2.x 是一款高性能DNS递归服务器,能够高效处理DNS递归查询,提供可靠的域名解析服务,适用于各类网络环境。
10万+ 次下载
2 个月前更新
powerdns/pdns-recursor-49 logo

powerdns/pdns-recursor-49

powerdns
PowerDNS是一个开源DNS解决方案,包含权威服务器、递归解析器(Recursor)和dnsdist负载均衡器,支持多种后端与模块,适用于构建高性能、可扩展的DNS服务基础设施。
5万+ 次下载
1 年前更新

轩辕镜像配置手册

探索更多轩辕镜像的使用方法,找到最适合您系统的配置方式

Docker 配置

登录仓库拉取

通过 Docker 登录认证访问私有仓库

专属域名拉取

无需登录使用专属域名

K8s Containerd

Kubernetes 集群配置 Containerd

K3s

K3s 轻量级 Kubernetes 镜像加速

Dev Containers

VS Code Dev Containers 配置

Podman

Podman 容器引擎配置

Singularity/Apptainer

HPC 科学计算容器配置

其他仓库配置

ghcr、Quay、nvcr 等镜像仓库

Harbor 镜像源配置

Harbor Proxy Repository 对接专属域名

Portainer 镜像源配置

Portainer Registries 加速拉取

Nexus 镜像源配置

Nexus3 Docker Proxy 内网缓存

系统配置

Linux

在 Linux 系统配置镜像服务

Windows/Mac

在 Docker Desktop 配置镜像

MacOS OrbStack

MacOS OrbStack 容器配置

Docker Compose

Docker Compose 项目配置

NAS 设备

群晖

Synology 群晖 NAS 配置

飞牛

飞牛 fnOS 系统配置镜像

绿联

绿联 NAS 系统配置镜像

威联通

QNAP 威联通 NAS 配置

极空间

极空间 NAS 系统配置服务

网络设备

爱快路由

爱快 iKuai 路由系统配置

宝塔面板

在宝塔面板一键配置镜像

需要其他帮助?请查看我们的 常见问题Docker 镜像访问常见问题解答 或 提交工单

镜像拉取常见问题

使用与功能问题

配置了专属域名后,docker search 为什么会报错?

docker search 限制

Docker Hub 上有的镜像,为什么在轩辕镜像网站搜不到?

站内搜不到镜像

机器不能直连外网时,怎么用 docker save / load 迁镜像?

离线 save/load

docker pull 拉插件报错(plugin v1+json)怎么办?

插件要用 plugin install

WSL 里 Docker 拉镜像特别慢,怎么排查和优化?

WSL 拉取慢

轩辕镜像安全吗?如何用 digest 校验镜像没被篡改?

安全与 digest

第一次用轩辕镜像拉 Docker 镜像,要怎么登录和配置?

新手拉取配置

错误码与失败问题

docker pull 提示 manifest unknown 怎么办?

manifest unknown

docker pull 提示 no matching manifest 怎么办?

no matching manifest(架构)

镜像已拉取完成,却提示 invalid tar header 或 failed to register layer 怎么办?

invalid tar header(解压)

Docker pull 时 HTTPS / TLS 证书验证失败怎么办?

TLS 证书失败

Docker pull 时 DNS 解析超时或连不上仓库怎么办?

DNS 超时

Docker 拉取出现 410 Gone 怎么办?

410 Gone 排查

出现 402 或「流量用尽」提示怎么办?

402 与流量用尽

Docker 拉取提示 UNAUTHORIZED(401)怎么办?

401 认证失败

遇到 429 Too Many Requests(请求太频繁)怎么办?

429 限流

docker login 提示 Cannot autolaunch D-Bus,还算登录成功吗?

D-Bus 凭证提示

为什么会出现「单层超过 20GB」或 413,无法加速拉取?

413 与超大单层

账号 / 计费 / 权限

轩辕镜像免费版和专业版有什么区别?

免费版与专业版区别

轩辕镜像支持哪些 Docker 镜像仓库?

支持的镜像仓库

镜像拉取失败还会不会扣流量?

失败是否计费

麒麟 V10 / 统信 UOS 提示 KYSEC 权限不够怎么办?

KYSEC 拦截脚本

如何在轩辕镜像申请开具发票?

申请开票

怎么修改轩辕镜像的网站登录和仓库登录密码?

修改登录密码

如何注销轩辕镜像账户?要注意什么?

注销账户

配置与原理类

写了 registry-mirrors,为什么还是走官方或仍然报错?

mirrors 不生效

怎么用 docker tag 去掉镜像名里的轩辕域名前缀?

去掉域名前缀

如何拉取指定 CPU 架构的镜像(如 ARM64、AMD64)?

指定架构拉取

用轩辕镜像拉镜像时快时慢,常见原因有哪些?

拉取速度原因

查看全部问题→

用户好评

来自真实用户的反馈,见证轩辕镜像的优质服务

用户头像

oldzhang

运维工程师

Linux服务器

5

"Docker访问体验非常流畅,大镜像也能快速完成下载。"

轩辕镜像
镜像详情
...
chrisss404/powerdns
博客公告Docker 镜像公告与技术博客
热门镜像查看热门 Docker 镜像推荐
一键安装一键安装 Docker 并配置镜像源
镜像拉取问题咨询请 提交工单,官方技术交流群:1072982923。轩辕镜像所有镜像均来源于原始仓库,本站不存储、不修改、不传播任何镜像内容。
镜像拉取问题咨询请提交工单,官方技术交流群:。轩辕镜像所有镜像均来源于原始仓库,本站不存储、不修改、不传播任何镜像内容。
商务合作:点击复制邮箱
©2024-2026 源码跳动
商务合作:点击复制邮箱Copyright © 2024-2026 杭州源码跳动科技有限公司. All rights reserved.