shell-things/etc/unbound/unbound.conf.d/please-hijack-me.conf

37 lines
1.0 KiB
Plaintext

# These domains belong to silly network appliances or captive portals that
# wish to perform DNS hijacking instead of just using IP addresses. The
# server is Quad9 default and hopefully rejects upstream queries
# should the domains become malicious.
# Pv6 is not specified since I don't think the silly devices support that.
server:
# Quad9 says pointless performance impact on forwarders.
# https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/#disable-qname-minimization
qname-minimisation: no
forward-zone:
name: "router.asus.com"
forward-tls-upstream: no
forward-addr: 149.112.112.112
forward-addr: 9.9.9.9
forward-zone:
name: "tplinkrepeater.net"
forward-tls-upstream: no
forward-addr: 149.112.112.112
forward-addr: 9.9.9.9
# Netgear
forward-zone:
name: "mywifiext.net"
forward-tls-upstream: no
forward-addr: 149.112.112.112
forward-addr: 9.9.9.9
forward-zone:
name: "norwegianwifi.com"
forward-tls-upstream: no
forward-addr: 149.112.112.112
forward-addr: 9.9.9.9
# vim: filetype=unbound.conf