On 4/25/19, David Wright <deb...@lionunicorn.co.uk> wrote: > On Wed 24 Apr 2019 at 14:29:00 (-0400), Lee wrote: >> On 4/24/19, David Wright <deb...@lionunicorn.co.uk> wrote: >> > On Tue 23 Apr 2019 at 10:38:41 (-0400), Lee wrote: >> >> On 4/22/19, David Wright <deb...@lionunicorn.co.uk> wrote: >> >> > On Sun 21 Apr 2019 at 20:30:53 (-0700), pe...@easthope.ca wrote: >> >> >> From: David Wright <deb...@lionunicorn.co.uk> >> >> >> Date: Sun, 21 Apr 2019 16:13:11 -0500 >> >> >> > Does the behaviour reported in your OP cause you *great* concern? >> >> >> >> >> >> No. Just wastes time. Opening a simple local HTML home page >> >> >> requires >> >> >> roughly a minute rather than roughly a second. >> >> > >> >> > I tend to forget that, because my /etc/hosts file has ~14000 lines, >> >> > pages appear a lot faster here. >> >> >> >> Have you looked at bind's dns rpz? >> > >> > Just now. >> > >> >> http://zytrax.com/books/dns/ch7/rpz.html >> >> It lets you do things like >> >> *.2o7.net CNAME . >> >> *.doubleclick.net CNAME . >> >> >> >> to block entire domains instead of having to list each and every >> >> hostname in the domain. >> >> >> >> And you can log what is blocked/allowed to make troubleshooting easier >> > >> > It might be a good *mechanism* for the diversion itself, but AFAICT >> > it's aimed at the *policy* implementers rather than the end-user. >> >> Just out of curiosity - do you think pi-hole is aimed at policy >> implementers or end users? > > I don't know about their policies, or whether they have any. I've not > found any description of how you would configure it, only how you > install it. Do they provide blacklists?
It looks like they give you a default list of lists that you can modify: https://github.com/pi-hole/pi-hole/blob/master/automated%20install/basic-install.sh#L1181 > It's also not clear to me where I should install it to. My router > uses the Google nameservers, and all my machines have the router > as their nameserver. The router is the only part of the network > that's always up and running. I have a server that I leave running all the time; reconfigure your router to use your dns server instead of google, add a firewall rule to block all outgoing tcp/udp traffic to port 53 except from the server & you're done. > But let me explain what I mean by those terms I used earlier: > > Mechanism: Any method of modifying the result of trying to resolve > foo.bar to an IP address, irrespective of the specific domainnames > which somebody has to give to it. My mechanism is resolving to > localhost. > > Policy implementers: The people who make the decisions about which > domainnames should have their resolution modified. If you look > through the reference I gave for the source of my /etc/hosts, you > can see their policies listed as comments bracketing the sections, > and they are: > > #<shock-sites> > #<shortcut-examples> > #<hijack-sites> > #<spyware-sites> > #<maybe-spy> > #<malware-sites> > #<doubleclick-sites> > #<intellitxt-sites> > #<red-sheriff-sites> > #<cydoor-sites> > #<2o7-sites> > #<oewabox-sites> > #<ad-sites> > #<maybe-ads> > #<canvass-fingerprinting-sites> > #<evercookies-sites> > #<yahoo-ad-sites> > #<hitbox-sites> > #<extreme-dm-sites> > #<realmedia-sites> > #<fastclick-sites> > #<belo-interactive-sites> > #<popup-traps> > #<ecard-scam-sites> > #<IVW-sites> > #<wiki-spam-sites> > #<Windows10> > > End-users: The people whose browsing experience are improved by > the policies selected, and implemented using the chosen mechanism. > >> > The value I get from Dan Pollock is the list of sites rather than the >> > most elegant mechanism for handling that list. Looking at the comments >> > in the list, and by comparing evolving versions, it does appear that >> > Dan actively "opens holes" where people report interference or >> > difficulties using certain legitimate sites. But the holes get opened only after someone reports a problem. If you're using a host file, how do you figure out which host name(s) being blocked are causing the problem? I never figured out an easy way to troubleshoot hostfiles & switched to something that logged what all was blocked and allowed. >> > Finally, I wouldn't know where to start to compile a list of sites >> > like that. >> >> https://dnsrpz.info/ >> If you're a business, you can buy access to an rpz feed. > > I'm not, but I take it that different feeds have different policies on > which sites to include, and come at different prices. > >> If you're a [home?] network admin it's simple enough to enable logging >> & see what all is allowed that you'd rather have blocked. And/or grab >> things like Dan Pollock's list and turn them into an rpz file. > > Frankly, I don't want to be bothered with processing the list. That makes it easy then, stay with what you've got :) Regards, Lee