2024-09-13 07:52:44 +02:00
|
|
|
# These domains belong to silly network appliances or captive portals that
|
|
|
|
# wish to perform DNS hijacking instead of just using IP addresses. The
|
|
|
|
# server is https://dns0.eu/zero and hopefully rejects upstream queries
|
|
|
|
# should the domains become malicious.
|
|
|
|
# Pv6 is not specified since I don't think the silly devices support that.
|
|
|
|
server:
|
|
|
|
# Quad9 says pointless performance impact on forwarders.
|
|
|
|
# https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/#disable-qname-minimization
|
|
|
|
qname-minimisation: no
|
|
|
|
|
|
|
|
forward-zone:
|
2024-09-19 08:13:29 +02:00
|
|
|
name: "router.asus.com"
|
2024-09-13 07:52:44 +02:00
|
|
|
forward-tls-upstream: no
|
|
|
|
forward-addr: 193.110.81.9
|
|
|
|
forward-addr: 185.253.5.9
|
|
|
|
|
|
|
|
forward-zone:
|
2024-09-19 08:13:29 +02:00
|
|
|
name: "tplinkrepeater.net"
|
2024-09-13 07:52:44 +02:00
|
|
|
forward-tls-upstream: no
|
|
|
|
forward-addr: 193.110.81.9
|
|
|
|
forward-addr: 185.253.5.9
|
|
|
|
|
|
|
|
# Netgear
|
|
|
|
forward-zone:
|
2024-09-19 08:13:29 +02:00
|
|
|
name: "mywifiext.net"
|
2024-09-13 07:52:44 +02:00
|
|
|
forward-tls-upstream: no
|
|
|
|
forward-addr: 193.110.81.9
|
|
|
|
forward-addr: 185.253.5.9
|
|
|
|
|
|
|
|
forward-zone:
|
2024-09-19 08:13:29 +02:00
|
|
|
name: "norwegianwifi.com"
|
2024-09-13 07:52:44 +02:00
|
|
|
forward-tls-upstream: no
|
|
|
|
forward-addr: 193.110.81.9
|
|
|
|
forward-addr: 185.253.5.9
|
|
|
|
|
|
|
|
# vim: filetype=unbound.conf
|