Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Unbound DNS Blacklist (vermaden.wordpress.com)
21 points by vermaden on Nov 17, 2020 | hide | past | favorite | 19 comments


For blocking I use Pi-hole https://pi-hole.net/ and unbound. I like the simple interface of the the Pi-Hole, point it to the locally running unbound which is configured to use several DoH providers I trust.


Thanks for PI-HOLE suggestion, pity its not available for FreeBSD, but still nice project.


It’s just based on dnsmasqd which I’m fairly sure is on FreeBSD. You can configure it yourself.

https://github.com/alblue/dnsmasq-example


Well, since its main use case is with a stand-alone Raspberry Pi, this shouldn’t be too much of an issue. Just treat it as an appliance, like a router.


I use Unbound in a similar way, although I return 0.0.0.0 rather than NXDOMAIN. Don't really know why I decided to go that route, but when I was setting my Unbound server up I'd read how quad 0's was the pi-hole's preferred setting [0]. Seems the articles' script would accept such a setup too, via the ${TYPE} parameter (or maybe a slight rewrite of the `echo` later on there).

[0] https://docs.pi-hole.net/ftldns/blockingmode/


Not sure which one is safer but I have read in many places that using NXDOMAIN is a lot faster then 127.0.0.1/0.0.0.0 because with NXDOMAIN you get 'fail' instantly while with 127.0.0.1/0.0.0.0 you need to wait for connection timeout.

Thanks for the link, will look into it.


I do the same for the same reasons, pi-hole docs recommends 0.0.0.0.

I am wondering if you have multiple resolvers set up on a client, if you receive an nxdomain response if it will attempt another resolver? Which wouldn’t be what you want to happen with a block list.


>if you receive an nxdomain response if it will attempt another resolver?

That's exactly why, for example Firefox queries CloudFlare's DoH if it gets an NXDOMAIN[1]

[1] https://github.com/AdguardTeam/AdGuardHome/issues/1914


I do not use DoH and have it disabled in Firefox with network.trr.mode=5 in about:config page as described in the link [1] below.

[1] https://support.mozilla.org/en-US/kb/firefox-dns-over-https

This way I get best of both worlds. Speed with NXDOMAIN and lack of needless CloudFlare DoH requests.

Hope that helps.


I configured Firefox to use my local DoH server instead. That way I don't have to fight against DoH, I get the (few) benefits of ESNI and can still choose what my upstream servers will be. Your solution is also good and it is what we configured at work (through group policies). You or someone else reading may find this[1] and this[2] useful.

[1] https://github.com/mozilla/policy-templates#dnsoverhttps

[2] https://cloud.google.com/docs/chrome-enterprise/policies/?po...


Thanks for pointing this out, I will dig more into this.


Thank you.

So for the purposes of adblocking you do not want to use NXDOMAIN and prefer returning 0.0.0.0.


This doesn't happen when DoH is disabled in Firefox right?


I don't know, I'm not the one who reported that issue and I use a local DoH server, that way I make sure that when Firefox uses DoH I still have full control over it.


I used to do something like this with knot-resolver, but now I just use NextDNS. It's really nice to have separate profiles so that my IoT devices get extremely strict blocking, while my personal devices can be slightly more lax to avoid false positives.


Sucks that this wants to nuke your existing config, when you could just include the blacklist.


I did not had any earlier config so I started fresh but nothing stops you from using just the script for generating additional *.conf file for your current unbound(8) setup.


huh? Script just writes to `/var/unbound/conf.d/blacklist.conf`


May I suggest changing the title to Blocklist?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: