-
Notifications
You must be signed in to change notification settings - Fork 2
/
aliases.list
104 lines (91 loc) · 3.37 KB
/
aliases.list
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
# ALIASES
# =======
# Syntax:
# for aliases: <domain-name> = <target>
# for generator aliases: /<regex>/ = <generated-target>
# for forwarding: <domain-name> > <ip>[,<another-ip>...]
# for ttl-override: <domain-name> ! <ttl>
# for search-domain: <domain-name> *
# Where domain-name is a FQDN and target is a FQDN, IP-Address, Return-Code or Op-Code.
# Aliases cannot point to other aliases and are concidered WHITELISTed entries (not forwards)
# Generated targets can contain backreferences in the regex used to match query.
# Aliases are only applied on requests/queries.A
# Instead of names/ip's as target, you can also used return-codes or op-codes.
# Return-Codes: NODATA, NOTAUTH, NXDOMAIN and REFUSED
# Op-Codes: PASSTHRU (Whitelist) or RANDOM (Generate random IP anwer for A/AAAA and random names for CNAME requests)
# SafeSearch Google
#www.google.com=forcesafesearch.google.com
#www.google.fr=forcesafesearch.google.com
#www.google.nl=forcesafesearch.google.com
#/^www\.google\.(.*)$/=forcesafesearch.google.com
# SafeSearch Bing
#www.bing.com=strict.bing.com
#/^www\.bing\.(.*)$/=strict.bing.com
# SafeSearch YouTube
#www.youtube.com=restrictmoderate.youtube.com
#m.youtube.com=restrictmoderate.youtube.com
#youtubei.googleapis.com=restrictmoderate.youtube.com
#youtube.googleapis.com=restrictmoderate.youtube.com
#www.youtube-nocookie.com=restrictmoderate.youtube.com
# Lockdown NTP
pool.ntp.org=europe.pool.ntp.org
time.google.com=europe.pool.ntp.org
time.apple.com=europe.pool.ntp.org
# Forwarding example
#local>192.168.1.1
#1.1.10.in-addr.arpa>192.168.1.1@53
#1.16.172.in-addr.arpa>192.168.1.1@53
#1.168.192.in-addr.arpa>192.168.1.1@53
#frutch>192.168.1.1
#google.com>8.8.8.8@53,8.8.4.4@53
#chrisbuijs.com>9.9.9.9@53,149.112.112.112@53
# LocalHost
localhost=127.0.0.1
# Redirect Example
#walled.garden.redirect=192.168.1.250
#blocked.eero.com=172.16.1.1
# TTL override
#frutch!3600
#1.1.10.in-addr.arpa!3600
#1.16.172.in-addr.arpa!3600
#1.168.192.in-addr.arpa!3600
iotcplatform.com!3600
# Generator examples
/^([0-9]+)\.([0-9]+)\.([0-9]+)\.([0-9]+)$/=\1.\2.\3.\4
#/^([0-9]+)\.([0-9]+)\.([0-9]+)\.([0-9]+)\.in-addr\.arpa$/=rev-ipv4.\4.\3.\2.\1.invalid
#/^([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.([0-9a-f])\.ip6\.arpa$/=rev-ipv6.\32\31\30\29.\28\27\26\25.\24\23\22\21.\20\19\18\17.\16\15\14\13.\12\11\10\9.\8\7\6\5.\4\3\2\1.invalid
# Search domain
#frutch*
corp*
example*
home*
host*
invalid*
lan*
local*
localdomain*
localhost*
router*
test*
workgroup*
# Test examples
#chrisbuijs.com!666
#chrisbuijs.com>9.9.9.9,149.112.112.112
#test1.chrisbuijs.com=whahahaha.dahgfdg.tralalala
#test2.chrisbuijs.com=www.googleapis.com
#test3.chrisbuijs.com=4.3.2.1
#test4.chrisbuijs.com=NXDOMAIN
#test5.chrisbuijs.com=REFUSED
#test9.chrisbuijs.com=www.xs4all.nl
#www.test5.chrisbuijs.com=1.2.3.4
#company.com=REFUSED
#www.company.com=PASSTHRU
#test.company.com=www.googleapis.com
#.!99999999
test.chrisbuijs.com=RANDOM
chrisbuijs.com!5
#ibm.com<www.google.com
#xs4all.nl<192.168.1.1
#/^(.*\.)((?!(in-addr|ip6)).)*\.arpa$/=blackhole.invalid
#/^(.*)\.(in-addr|ip6)\.arpa$/=\1.blackhole.invalid
# <EOF>