# These domains belong to silly network appliances or captive portals that # wish to perform DNS hijacking instead of just using IP addresses. The # server is https://dns0.eu/zero and hopefully rejects upstream queries # should the domains become malicious. # Pv6 is not specified since I don't think the silly devices support that. server: # Quad9 says pointless performance impact on forwarders. # https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/#disable-qname-minimization qname-minimisation: no forward-zone: name: "router.asus.com" forward-tls-upstream: no forward-addr: 193.110.81.9 forward-addr: 185.253.5.9 forward-zone: name: "tplinkrepeater.net" forward-tls-upstream: no forward-addr: 193.110.81.9 forward-addr: 185.253.5.9 # Netgear forward-zone: name: "mywifiext.net" forward-tls-upstream: no forward-addr: 193.110.81.9 forward-addr: 185.253.5.9 forward-zone: name: "norwegianwifi.com" forward-tls-upstream: no forward-addr: 193.110.81.9 forward-addr: 185.253.5.9 # vim: filetype=unbound.conf