著者: Didier Kryn 日付: To: dng 題目: Re: [DNG] hijacking resolv.conf - possible fix?
Le 23/03/2025 à 15:52, tito via Dng a écrit : > On Sun, 23 Mar 2025 15:32:47 +0100
> Didier Kryn <kryn@???> wrote:
>
>> Le 22/03/2025 à 17:07, tito via Dng a écrit :
>>> It is possible to run a private dns server that queries the root servers
>>> directly e.g. unbound that caches the results and refreshs them.
>>> This allows also to filter adservers and malware servers at the dns level.
>> Thanks Tito; that makes sense.
>>
>> -- DIdier
>>
> Hi,
> I have a few scripts I use to create a local data file for unbound for ad filtering and
> root hints refreshing, if there is any interest or the unbound config file I use.
Good to know, but, for the moment I don't consider yet it deserves
the burden to install and maintain my own DNS and, why not VPN. And I'm
happy with resolv.conf. On Android, the Duckduckgo browser installs a
VPN to block ads and tracking, but on Linux you need to do it yourself
and there's a limit to what I want to fill my head with.
On the other hand, if there existed some HTTP server able to fake
cloudfront without actually checking the permissivity of the browser
about stealing private data, I would happily install a DNS to redirect
these requests.