New feature request.
I would really like to run a DNS sinkhole on a router. These are awesomely powerful security tools…
New feature request.
I would really like to run a DNS sinkhole on a router. These are awesomely powerful security tools…
Glancing through the links how is that different from transparently proxying all DNS traffic to the router local resolver and creating static entries for malicious domains that point to a machine you control? You could write an external script that downloads what they refer to as ‘sinkhole lists’ from the net and implements them via the API as a scheduled task.
All in all though if you’re going to be running a significant number of DNS lookups against such a sinkhole that would be best to do on a dedicated machine.
Haven’t we already established that MT DNS cannot handle large number of static entries: ![]()
http://forum.mikrotik.com/t/ad-blocking-hosts-file/34766/1
DNS sinkhole list is 20k entries long…
So maybe the request should be better DNS servier in ROS ![]()
Yes we established that 20,000 entries causes collapse. There is also a problem parsing as I remember. Getting the list into the correct form is a issue as well.
I would -really- like more access to the *nix directly. That would solve a lot of issues. Even allow 3rd party plug ins ? That would be a major cool feature.
Yes we 100% need a better DNS server. DNSMasq is good.
I doubt that’s going to happen, unfortunately.
Maybe KVM or a metarouter? Or a centralized BIND system all your routers can transparently redirect DNS to?