Do you use one or several providers ?

Do you use it at Browser, Device/OS, Router level ?

What’s your configuration ?

  • Darkassassin07@lemmy.ca
    link
    fedilink
    English
    arrow-up
    8
    ·
    edit-2
    1 month ago

    Two piholes at home (redundancy). Those both translate all regular DNS requests to DoH using Cloudflared which rotate through 4 non-isp upstream DoH providers.

    The router is set to block all port 53 traffic from leaving the network and handout the 2 pihole IPs to dhcp clients for dns. If a LAN device wants regular dns, it MUST use the lan servers or it’ll get no response. (or it can use its own DoH setup and/or vpn out of the network). This enforces the ad/telemetry/malware blocking lists pihole uses without having to configure dns on everything.

    Those piholes also keep lists/records in sync using Gravity-Sync. Should I change ad lists or add/remove lan dns records, I don’t have to do it on both.

  • shortwavesurfer@lemmy.zip
    link
    fedilink
    arrow-up
    6
    ·
    1 month ago

    I use Control-D, both on Android, through DNS over TLS, and at the router level, so that I’m protected from ads and malware, no matter whether I’m on cellular data or on Wi-Fi.

  • ssm@lemmy.sdf.org
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    1 month ago

    /etc/unwind.conf

    block list "/var/db/unwind_blocklist"
    forwarder { X.X.X.X port X DoT X.X.X.X port X DoT }
    preference { DoT }
    

    unwind_blocklist is generated with this script I wrote:

    #!/bin/sh
    # Blocklists for unwind(8)
    
    blocklist=/var/db/unwind_blocklist
    [ ! -f $blocklist ] && \
            (umask 117; touch $blocklist && chgrp _unwind $blocklist)
    
    {
            ftp -V -o - \
                https://blocklistproject.github.io/Lists/alt-version/everything-nl.txt \
                http://winhelp2002.mvps.org/hosts.txt \
                http://sysctl.org/cameleon/hosts \
                https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt \
                https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt \
                https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/android-tracking.txt
            echo twitter.com
            echo www.twitter.com
            echo www.x.com
            echo x.com
            echo facebook.com
            echo www.facebook.com
    } | awk -safe '
            !/^M|#|(^|\.)[[:blank:]]*$|^definitely_not_porn$/ {       
                    if ($1 ~ /127\.0\.0\.1|0\.0\.0\.0/) {
                            $0 = $2
                    }
                    if ($0 ~ /[[:upper:]]/) {
                            print tolower($0)
                    } else {
                            print $0
                    }
            }
    ' | sort -u >$blocklist
    rcctl restart unwind
    

    Regenerates occasionally with cron.

  • Ransack3@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    1 month ago

    Pi-Hole using upstream Quad9 and Cloudflare, managed router redirect/blocking everything to Pi-Hole or no mans land, NextDNS out of the house for mobile devices or on WiFi I don’t control.

  • When using the network-wide VPN configuration of my firewall, I also use OPNSense to enforce that all devices connect to my self-hosted Pi-Hole, including redirecting DNS packets that are sent to DNS servers other than my Pi-Hole IP. There’s a pretty cool guide for this: https://forum.opnsense.org/index.php?topic=9245.0

    When running a VPN client on a device, I just use the VPN to manage DNS settings.
    Both Mullvad and IVPN have very solid DNS settings within their desktop clients. Proton VPN unfortunately lacks behind in this regard. That’s why I never use any Proton VPN clients on desktop, and rely on OPNSense, if I want to use Proton.

  • Em Adespoton@lemmy.ca
    link
    fedilink
    arrow-up
    2
    ·
    1 month ago

    I use a mix: I’ve got hardcoded hosts files, default third party DNS provider, DoH providers (different for each browser), a PiHole, and a VPN-based DNS resolver that I can run on a per-app basis.

    This way, I don’t trust a single provider to handle all my DNS traffic.

  • Reawake9179@lemmy.kde.social
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    1 month ago

    I use several providers as upstream for Adguard Home where my blocklists, regex blocks and DNS rewrites are. Via DNS-over-TLS URL for Android phones or DHCP with the IP of the DNS-server they get directed to it.

  • donkeystomple@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 month ago

    I use NextDNS. I use it network wide on my home internet and also have it installed on all my devices.

  • communism@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    1 month ago

    I just use Mullvad VPN’s default DNS servers (with ad blocking, tracker blocking, and malware blocking)

  • terminhell@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    1
    ·
    1 month ago

    DNS is handled by my rpi that’s running pi-hole and wireguard. It has static entries for quad nine and it’s secondaries. Router (generic rax10 Netgear, nothing fancy, and it’s not obnoxious like the nighthawks) DNS points to rpi.

    So any device, set with dhcp, will use that. One day I’ll have a opnsense or similar box to go even further.