This package install the command line interface for Stubby. A future release will include a Graphical Interface to manage Stubby.
We consider Windows support for the Stubby CLI to be Beta at this time. It has been tested on Windows 10 and Windows 8. User testing reports, bug reports and patches/pull requests are all welcomed via github!
Download and run the installer: Stubby.msi
SHA256 Checksum: 9622299c86738859fdfe5fefbe08950612229a74b9b66069ee79658edf18e115
This installs the following files in C:\Program Files\Stubby\
This version of the installer is built from:
It is recommended to use the default configuration file provided which will use 'Strict' privacy mode and spread the DNS queries among several of the current DNS Privacy test servers. Note that this file contains both IPv4 and IPv6 addresses. It installed in "C:\Program Files\Stubby\stubby.yml"
More information on how to customise the configuration can be found here.
Simply invoke Stubby on the command line from a command prompt window (To get a command prompt go to the Windows search box and type 'cmd' and then choose the 'Command prompt' option)
The -l flag enables full logging. Alternatively a specific logging level can be controlled by using the -v flag (run '
- h' for details of available levels).
We are working on support for running Stubby as a service on Windows 10
A quick test can be done by opening a separate Command prompt window and using getdns_query (or your favourite DNS tool) on the loopback address:
You should see a status of GETDNS_RESPSTATUS_GOOD and and rcode of GETDNS_RCODE_NOERROR in the getdns_query output. You should also see a connection being made in the stubby logs.
Once this change is made all your DNS queries will be re-directed to Stubby and sent over TLS!
For Stubby to re-send outgoing DNS queries over TLS the recursive resolvers configured on your machine must be changed to send all the local queries to the loopback interface on which Stubby is listening.
In most cases your system will use the 'default' DNS servers that are provided by DHCP and using the two Powershell comands will be all you need. If you want to double check what servers you use then follow the instructions below to inspect your system settings. If you have reason to think your system uses custom servers it might be useful to note your existing default nameservers before making this change so you can use the same instructions to reset them!
To set you nameservers to use Stubby
In the command prompt window that appears type
to switch the system DNS resolvers to use Stubby.
Use the same command but with "C:\Program Files\Stubby\stubby_resetdns_windows.ps1" instead to switch back to the default DNS nameservers.
You can monitor the DNS traffic using Wireshark watching on port 853.
If you encounter problems reverse this change to restore your default settings (no DNS Privacy) by running
If you need to manually inspect or change your system revolvers on Windows through the GUI then do the following: