I use host files in the firewall (by using rules) to block malware/ads/hijacking ip addresses. So, instead of having lines like these:
www.malware.ru 127.0.0.1
www.fakebank.cn 0.0.0.0
Joined: 03 Jan 2010 Posts: 7568 Location: YWG, Canada
Posted: Thu Oct 25, 2018 9:00 Post subject:
iycgtptyarvg wrote:
tatsuya46 wrote:
iycgtptyarvg wrote:
So, just to get this clear:
I use host files in the firewall (by using rules) to block malware/ads/hijacking ip addresses. So, instead of having lines like these:
www.malware.ru 127.0.0.1
www.fakebank.cn 0.0.0.0
then only x.www.domain.cn is blocked, not somethingnotwww.domain.cn
So, how should my hosts file look like?
1.
/malware.cn/ NXDOMAIN
/fakebank.ru/ NXDOMAIN
2.
/malware.cn/
/fakebank.ru/
3.
/malware.cn/ 0.0.0.0
/fakebank.ru/ 0.0.0.0
4.
/malware.cn/ 127.0.0.1
/fakebank.ru/ 127.0.0.1
Which of them is correct? (sorry for perhaps being stupid)
2.
3 & 4 would work if there wasnt a space between the /0.0.0.0 or 127.0.0.1. if u use /0.0.0.0 ull need to have duplicate lines for each domain, with the second one having /:: if u want ipv6 coverage, meanwhile #2 with a single / at the end covers both ipv4 & ipv6. 127.0.0.1 i dont recommend cause it can cause long delays especially with https connections. cause a client device still sees a ping or response from localhost (127.0.0.1), but theres no web page content, so it keeps trying and trying till a timeout. when a device sees 0.0.0.0 or NXDOMAIN (single / at the end with nothing after it = NXDOMAIN) it knows to stop trying instantly _________________ LATEST FIRMWARE(S)
BrainSlayer wrote:
we just do it since we do not like any restrictions enforced by stupid cocaine snorting managers
Posted: Fri Apr 19, 2019 3:01 Post subject: Re: New Build - 10/10/2018 - r37305
Router Model: TP-LINK WR941ND V 3.6
Firmware [Beta 2018-10-10 Build 37305]
Status: Bricked
Reset: Hard Reset, Not Working
Errors: Blinking lights, Don´t Working after flashing