Fonts: - Replace Google Fonts CDN with self-hosted woff2 (73KB, 5 files) - Serve fonts from API server via include_bytes! (dashboard works offline) - Proxy error pages use system fonts (zero external deps when DNS is broken) - Fix Instrument Serif font-weight: use 400 (only available weight) instead of synthetic bold 600/700 Proxy: - Styled "Blocked by Numa" page when blocked domain hits the proxy (was confusing "not a .numa domain" error) - Extract shared error_page() template for 403 + 404 pages (deduplicate ~160 lines of CSS) TLS: - Add wildcard SAN *.numa to cert — unregistered .numa domains get valid HTTPS (styled 404 without cert warning) Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Numa
DNS you own. Everywhere you go.
A portable DNS resolver in a single binary. Block ads on any network, name your local services (frontend.numa), and override any hostname with auto-revert — all from your laptop, no cloud account or Raspberry Pi required.
Built from scratch in Rust. Zero DNS libraries. RFC 1035 wire protocol parsed by hand. One ~8MB binary, no PHP, no web server, no database — everything is embedded.
Quick Start
# Install (pick one)
brew install razvandimescu/tap/numa
cargo install numa
curl -fsSL https://raw.githubusercontent.com/razvandimescu/numa/main/install.sh | sh
# Run (port 53 requires root)
sudo numa
# Try it
dig @127.0.0.1 google.com # ✓ resolves normally
dig @127.0.0.1 ads.google.com # ✗ blocked → 0.0.0.0
Open the dashboard: http://numa.numa (or http://localhost:5380)
Or build from source:
git clone https://github.com/razvandimescu/numa.git && cd numa
cargo build --release
sudo ./target/release/numa
Why Numa
- Local service proxy —
https://frontend.numainstead oflocalhost:5173. Auto-generated TLS certs, WebSocket support for HMR. Like/etc/hostsbut with auto TLS, a REST API, LAN discovery, and auto-revert. - Path-based routing —
app.numa/api → :5001,app.numa/auth → :5002. Route URL paths to different backends with optional prefix stripping. Like nginx location blocks, zero config files. - LAN service discovery — Numa instances on the same network find each other automatically via mDNS. Access a teammate's
api.numafrom your machine. Opt-in via[lan] enabled = true. - Developer overrides — point any hostname to any IP, auto-reverts after N minutes. REST API with 25+ endpoints. Built-in diagnostics:
curl localhost:5380/diagnose/example.comtells you exactly how any domain resolves. - DNS-over-HTTPS — upstream queries encrypted via DoH. Your ISP sees HTTPS traffic, not DNS queries. Set
address = "https://9.9.9.9/dns-query"in[upstream]or any DoH provider. - Ad blocking that travels with you — 385K+ domains blocked via Hagezi Pro. Works on any network: coffee shops, hotels, airports.
- Sub-millisecond caching — cached lookups in 0ms. Faster than any public resolver.
- Live dashboard — real-time stats, query log, blocking controls, service management. LAN accessibility badges show which services are reachable from other devices.
- macOS + Linux —
numa installconfigures system DNS,numa service startruns as launchd/systemd service.
Local Service Proxy
Name your local dev services with .numa domains:
curl -X POST localhost:5380/services \
-H 'Content-Type: application/json' \
-d '{"name":"frontend","target_port":5173}'
open http://frontend.numa # → proxied to localhost:5173
- HTTPS with green lock — auto-generated local CA + per-service TLS certs
- WebSocket — Vite/webpack HMR works through the proxy
- Health checks — dashboard shows green/red status per service
- LAN sharing — services bound to
0.0.0.0are automatically discoverable by other Numa instances on the network. Dashboard shows "LAN" or "local only" per service. - Path-based routing — route URL paths to different backends:
[[services]] name = "app" target_port = 3000 routes = [ { path = "/api", port = 5001 }, { path = "/auth", port = 5002, strip = true }, ]app.numa/api/users → :5001/api/users,app.numa/auth/login → :5002/login(stripped) - Persistent — services survive restarts
- Or configure in
numa.toml:
[[services]]
name = "frontend"
target_port = 5173
LAN Service Discovery
Run Numa on multiple machines. They find each other automatically:
Machine A (192.168.1.5) Machine B (192.168.1.20)
┌──────────────────────┐ ┌──────────────────────┐
│ Numa │ mDNS │ Numa │
│ services: │◄───────────►│ services: │
│ - api (port 8000) │ discovery │ - grafana (3000) │
│ - frontend (5173) │ │ │
└──────────────────────┘ └──────────────────────┘
From Machine B:
dig @127.0.0.1 api.numa # → 192.168.1.5
curl http://api.numa # → proxied to Machine A's port 8000
Enable LAN discovery:
numa lan on
Or in numa.toml:
[lan]
enabled = true
Uses standard mDNS (_numa._tcp.local on port 5353) — compatible with Bonjour/Avahi, silently dropped by corporate firewalls instead of triggering IPS alerts.
Hub mode — don't want to install Numa on every machine? Run one instance as a shared DNS server and point other devices to it:
# On the hub machine, bind to LAN interface
[server]
bind_addr = "0.0.0.0:53"
# On other devices, set DNS to the hub's IP
# They get .numa resolution, ad blocking, caching — zero install
How It Compares
| Pi-hole | AdGuard Home | NextDNS | Cloudflare | Numa | |
|---|---|---|---|---|---|
| Local service proxy | No | No | No | No | .numa + HTTPS + WS |
| Path-based routing | No | No | No | No | Prefix match + strip |
| LAN service discovery | No | No | No | No | mDNS, opt-in |
| Developer overrides | No | No | No | No | REST API + auto-expiry |
| Encrypted upstream (DoH) | No (needs cloudflared) | Yes | Cloud only | Cloud only | Native, single binary |
| Portable (travels with laptop) | No (appliance) | No (appliance) | Cloud only | Cloud only | Single binary |
| Zero config | Complex | Docker/setup | Yes | Yes | Works out of the box |
| Ad blocking | Yes | Yes | Yes | Limited | 385K+ domains |
| Data stays local | Yes | Yes | Cloud | Cloud | 100% local |
How It Works
Query → Overrides → .numa TLD → Blocklist → Local Zones → Cache → Upstream
No DNS libraries — no hickory-dns, no trust-dns. The wire protocol — headers, labels, compression pointers, record types — is parsed and serialized by hand. Runs on tokio + axum, async per-query task spawning.
Roadmap
- DNS proxy core — forwarding, caching, local zones
- Developer overrides — REST API with auto-expiry
- Ad blocking — 385K+ domains, live dashboard, allowlist
- System integration — macOS + Linux, launchd/systemd, Tailscale/VPN auto-discovery
- Local service proxy —
.numadomains, HTTP/HTTPS proxy, auto TLS, WebSocket - Path-based routing — URL prefix routing with optional strip, REST API
- LAN service discovery — mDNS auto-discovery (opt-in), cross-machine DNS + proxy
- DNS-over-HTTPS — encrypted upstream via DoH (Quad9, Cloudflare, any provider)
- pkarr integration — self-sovereign DNS via Mainline DHT (15M nodes)
- Global
.numanames — self-publish, DHT-backed, first-come-first-served
License
MIT
