Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Technitium MCP Securelist the DNS records for the home.lab zone"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
technitium-mcp-secure
A security-hardened Model Context Protocol (MCP) server for managing Technitium DNS Server via its HTTP API.
Built for use with Claude Code and other MCP-compatible clients.
Features
20 tools covering DNS zones, records, blocking, cache, settings, logs, and diagnostics
Input validation on all parameters (RFC 1035 domain checks, IP validation, enum allowlists)
HTTPS enforcement with explicit HTTP opt-in for local networks
Read-only mode to expose only safe query tools
Confirmation required for destructive operations (delete zone, delete record, flush cache)
Rate limiting with stricter limits on destructive operations
Audit logging as structured JSONL to stderr
Response sanitization to strip tokens, passwords, stack traces, and sensitive paths
Error sanitization to prevent credential/path leakage in error messages
Token file support for secure credential storage
Auth mutex to prevent concurrent authentication races
POST-only API calls to keep tokens out of query strings and server logs
Quick Start
Configuration
All configuration is via environment variables:
Variable | Required | Description |
| Yes | Server URL (e.g. |
| One of token/password | API token (preferred) |
| One of token/password | Path to file containing token (must be mode 0600) |
| One of token/password | Admin password (token is preferred) |
| No | Username (default: |
| No | Set |
| No | Set |
Authentication priority: TECHNITIUM_TOKEN > TECHNITIUM_TOKEN_FILE > TECHNITIUM_PASSWORD
Sensitive environment variables are cleared from process.env after being read.
Tools
Read-only (12 tools)
Tool | Description |
| Server version, uptime, forwarder config, failure rate |
| Query statistics with top clients/domains/blocked |
| Test DNS resolution via the server |
| List all configured zones |
| Zone DNSSEC, transfer, and notify settings |
| List records in a zone |
| List blocked domains |
| List allowed (whitelisted) domains |
| List cached zones |
| Full server settings |
| Query DNS logs with filters |
| List installed DNS apps |
Write (8 tools)
Tool | Description |
| Create a new DNS zone |
| Delete a zone (requires |
| Add a DNS record |
| Update an existing record |
| Delete a record (requires |
| Block a domain |
| Allow a domain (bypass block lists) |
| Flush DNS cache (requires |
Security
Generating an API Token
An API token is the recommended way to authenticate. Tokens avoid sending your admin password on every request and can be revoked independently.
Option A: Web Admin UI
Open the Technitium web admin (e.g.
http://your-server-ip:5380)Log in with your admin credentials
Go to Administration (gear icon, top right)
Scroll down to Sessions
Under Create API Token, enter a name (e.g.
mcp-server)Click Create
Copy the token value shown - this is the only time it will be displayed
Option B: API (curl)
Storing the token securely:
Local Network (HTTP)
If your Technitium server doesn't have TLS configured (common for LAN-only setups), you need to explicitly allow HTTP:
A warning will be logged to stderr reminding you that credentials are sent in plaintext.
Read-only Mode
For monitoring-only use cases, hide all write tools:
Rate Limits
Global: 100 requests/minute
Create/mutate operations: 10/minute
Delete/flush operations: 5/minute
Audit Log
All tool calls are logged as JSONL to stderr with timestamps, tool name, sanitized arguments, result status, and duration. Sensitive values (tokens, passwords) are redacted before logging.
Requirements
Node.js >= 18
Technitium DNS Server v14+
License
MIT