Is public-dns.info still actively updated? Any alternative?

Started by Mpegger, November 30, 2025, 08:39:01 PM

Previous topic - Next topic
Looking at the list, I am not so sure. When you use an IP list, it might be safe to do so - with a wildcard list, I am unsure.

Take cubedns.com (or ptentially, any DoH service that uses only one dot in their name): they have their website on the same URL (and IP). Then again, by blocking port 443 - which you must, it will not work, anyway. At least, you could send them an E-Mail, I guess ;-)

Cloudflare was savvy enough to use a separate domain for DNS.

It is interesting what you can find when you block these things:

- I found HomeAssistant OS using Cloudflare despite being told to use my internal DNS (there is a trick to disable that: https://kcore.org/2022/08/12/hass-disable-fallback-dns/).
- Also, I caught some of my IoT devices using external NTP services - this included Apple TVs. By redirecting to the local NTP, I could make that go away.

On the other hand, I never trusted those anyway, hence why they are on a separate VLAN.
Intel N100, 4* I226-V, 2* 82559, 16 GByte, 500 GByte NVME, ZTE F6005

1100 down / 800 up, Bufferbloat A+

I am pondering adding the linked "dibdot" IP lists to my global IP based blocklist rules. I'll give it a try, I guess.

For domain based blocking I use AGH and mostly Hagezi's lists.
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

@meyergru
I block QUIC totally by blocking all UDP traffic on ports 80 and 443.
Deciso dec3840: EPYC 3101, 16GB RAM, 512GB SSD
Deciso dec3850: EPYC 3201, 16GB RAM, 256GB SSD

In that case you are losing potential speed on many modern websites.
Intel N100, 4* I226-V, 2* 82559, 16 GByte, 500 GByte NVME, ZTE F6005

1100 down / 800 up, Bufferbloat A+

I didn't even know that DoH used that many ports. I thought it was just the typical 80 and 433. I'll give it a whirl and see how it work on my network. Thanks.