I'm trying to use the blocklist available at https://hole.cert.pl/domains/v2/domains.txt (also https://hole.cert.pl/domains/v2/domains_hosts.txt in hosts format) with Unbound - it is ignored despite using the correct settings. Check hosts version of the blocklist to understand why I've used this exact destination IP.
How are you testing? What leads you to believe that it's not working?
In regards to your destination IP, what are you expecting to accomplish?
I'm testing by using dig (eg. dig @routerIP notwanted.domain), it should resolve to a predefined IP (as shown on screenshot) effectively blocking that domain. That's what blocklists are for, right?
IPlease read my original post again, it'll clarify everything. By blocking selected domains (or actually redirecting them to "wrong" IP, as shown on screenshot) instead of allowing access to malicious service, let's say a web page something else will be provided by a non-malicious server. Very simple solution.
Neither this response nor your original post have clarified anything. What benefit are you expecting to see from returning a "wrong" IP instead of just blocking the request?
Quote from: CJ on March 18, 2024, 04:45:22 pmNeither this response nor your original post have clarified anything. What benefit are you expecting to see from returning a "wrong" IP instead of just blocking the request?DNS bases ad blockers frequently return e.g. 0.0.0.0 for a blocked FQDN.
What do they think they're getting by using a random IP
Quote What do they think they're getting by using a random IPnot random. it is possible to specify the desired ip address which, for example, will lead to a page explaining the reason for the blocking (and collect statistics )
tested with https://hole.cert.pl/domains/v2/domains.txt works
And none of that was clear from the OP, hence why I had originally asked.