DNS Guide for .fur

.fur DNS Servers

165.140.124.3

165.140.124.5

Updating your DNS Settings

Windows

Open your Settings, and navigate to Network & Internet
Find and open your “Ethernet” or “Wireless” settings, depending on which you’re using.
Locate IPv4 DNS Servers, and edit them with the above values. You can find our IPv6 ones here.
Apply any changes and close your settings.

MacOS

Open your System Preferences, and navigate to Network.
Select the active network, usually highlighted in blue, and click Advanced.
Find DNS at the top and press the + to add a server, removing the rest.
Apply and test your settings.

Linux

Google the instructions for your specific distro and networking daemon, as these instructions vary vastly.
Generally speaking though, most systems will have an
/etc/resolv.conf file.
Modify the nameserver values in it, save, and test your config.

Test your settings!

You can test your settings by navigating to https://dot.fur/

Configure TLS for HTTPS

Read before continuing!

Before continuing with this TLS guide, please scroll up and choose an TLS certiciate provider (ideally both) and download their certificates.

Windows

Download the CA certificate file provided by the authority.
Once downloaded, double-click the file to open it, then select the Install Certificate option.
Choose to place the certificate in the Trusted Root Certification Authorities store, and follow the prompts to complete the installation.

MacOS

Download the CA certificate file provided by the authority.
Open the file, which will launch the Keychain Access application.
In the dialog that appears, select System as the destination keychain, then click Add.
After adding the certificate, right-click on it within Keychain Access and choose Get Info.
Under the Trust section, set "When using this certificate" to Always Trust.

Linux

Google the instructions for your specific distro and networking daemon, as these instructions vary vastly.
Generally speaking though, you should copy the certificate to /usr/local/share/ca-certificates/ (Debian-based systems) or /etc/pki/ca-trust/source/anchors/ (Red Hat-based systems).
After copying, update the certificate store by running sudo update-ca-certificates (Debian-based) or sudo update-ca-trust (Red Hat-based).