parent
72ef19f4d8
commit
27d2e8367f
|
@ -75,7 +75,7 @@ require_dnssec = false
|
||||||
# Server must not log user queries (declarative)
|
# Server must not log user queries (declarative)
|
||||||
require_nolog = true
|
require_nolog = true
|
||||||
|
|
||||||
# Server must not enforce its own blacklist (for parental control, ads blocking...)
|
# Server must not enforce its own blocklist (for parental control, ads blocking...)
|
||||||
require_nofilter = true
|
require_nofilter = true
|
||||||
|
|
||||||
# Server names to avoid even if they match all criteria
|
# Server names to avoid even if they match all criteria
|
||||||
|
@ -275,7 +275,7 @@ log_files_max_backups = 1
|
||||||
|
|
||||||
## Note: if you are using dnsmasq, disable the `dnssec` option in dnsmasq if you
|
## Note: if you are using dnsmasq, disable the `dnssec` option in dnsmasq if you
|
||||||
## configure dnscrypt-proxy to do any kind of filtering (including the filters
|
## configure dnscrypt-proxy to do any kind of filtering (including the filters
|
||||||
## below and blacklists).
|
## below and blocklists).
|
||||||
## You can still choose resolvers that do DNSSEC validation.
|
## You can still choose resolvers that do DNSSEC validation.
|
||||||
|
|
||||||
|
|
||||||
|
@ -298,7 +298,7 @@ block_undelegated = true
|
||||||
|
|
||||||
|
|
||||||
## TTL for synthetic responses sent when a request has been blocked (due to
|
## TTL for synthetic responses sent when a request has been blocked (due to
|
||||||
## IPv6 or blacklists).
|
## IPv6 or blocklists).
|
||||||
|
|
||||||
reject_ttl = 600
|
reject_ttl = 600
|
||||||
|
|
||||||
|
@ -444,10 +444,10 @@ cache_neg_max_ttl = 600
|
||||||
|
|
||||||
|
|
||||||
######################################################
|
######################################################
|
||||||
# Pattern-based blocking (blacklists) #
|
# Pattern-based blocking (blocklists) #
|
||||||
######################################################
|
######################################################
|
||||||
|
|
||||||
## Blacklists are made of one pattern per line. Example of valid patterns:
|
## Blocklists are made of one pattern per line. Example of valid patterns:
|
||||||
##
|
##
|
||||||
## example.com
|
## example.com
|
||||||
## =example.com
|
## =example.com
|
||||||
|
@ -456,20 +456,20 @@ cache_neg_max_ttl = 600
|
||||||
## ads*.example.*
|
## ads*.example.*
|
||||||
## ads*.example[0-9]*.com
|
## ads*.example[0-9]*.com
|
||||||
##
|
##
|
||||||
## Example blacklist files can be found at https://download.dnscrypt.info/blacklists/
|
## Example blocklist files can be found at https://download.dnscrypt.info/blacklists/
|
||||||
## A script to build blacklists from public feeds can be found in the
|
## A script to build blocklists from public feeds can be found in the
|
||||||
## `utils/generate-domains-blacklists` directory of the dnscrypt-proxy source code.
|
## `utils/generate-domains-blacklists` directory of the dnscrypt-proxy source code.
|
||||||
|
|
||||||
[blacklist]
|
[blocked_names]
|
||||||
|
|
||||||
## Path to the file of blocking rules (absolute, or relative to the same directory as the config file)
|
## Path to the file of blocking rules (absolute, or relative to the same directory as the config file)
|
||||||
|
|
||||||
# blacklist_file = 'blacklist.txt'
|
# blocked_names_file = 'blocked-names.txt'
|
||||||
|
|
||||||
|
|
||||||
## Optional path to a file logging blocked queries
|
## Optional path to a file logging blocked queries
|
||||||
|
|
||||||
# log_file = 'blocked.log'
|
# log_file = 'blocked-names.log'
|
||||||
|
|
||||||
|
|
||||||
## Optional log format: tsv or ltsv (default: tsv)
|
## Optional log format: tsv or ltsv (default: tsv)
|
||||||
|
@ -479,25 +479,25 @@ cache_neg_max_ttl = 600
|
||||||
|
|
||||||
|
|
||||||
###########################################################
|
###########################################################
|
||||||
# Pattern-based IP blocking (IP blacklists) #
|
# Pattern-based IP blocking (IP blocklists) #
|
||||||
###########################################################
|
###########################################################
|
||||||
|
|
||||||
## IP blacklists are made of one pattern per line. Example of valid patterns:
|
## IP blocklists are made of one pattern per line. Example of valid patterns:
|
||||||
##
|
##
|
||||||
## 127.*
|
## 127.*
|
||||||
## fe80:abcd:*
|
## fe80:abcd:*
|
||||||
## 192.168.1.4
|
## 192.168.1.4
|
||||||
|
|
||||||
[ip_blacklist]
|
[blocked_ips]
|
||||||
|
|
||||||
## Path to the file of blocking rules (absolute, or relative to the same directory as the config file)
|
## Path to the file of blocking rules (absolute, or relative to the same directory as the config file)
|
||||||
|
|
||||||
# blacklist_file = 'ip-blacklist.txt'
|
# blocked_ips_file = 'blocked-ips.txt'
|
||||||
|
|
||||||
|
|
||||||
## Optional path to a file logging blocked queries
|
## Optional path to a file logging blocked queries
|
||||||
|
|
||||||
# log_file = 'ip-blocked.log'
|
# log_file = 'blocked-ips.log'
|
||||||
|
|
||||||
|
|
||||||
## Optional log format: tsv or ltsv (default: tsv)
|
## Optional log format: tsv or ltsv (default: tsv)
|
||||||
|
@ -507,25 +507,25 @@ cache_neg_max_ttl = 600
|
||||||
|
|
||||||
|
|
||||||
######################################################
|
######################################################
|
||||||
# Pattern-based whitelisting (blacklists bypass) #
|
# Pattern-based allowlisting (blocklists bypass) #
|
||||||
######################################################
|
######################################################
|
||||||
|
|
||||||
## Whitelists support the same patterns as blacklists
|
## Allowlists support the same patterns as blocklists
|
||||||
## If a name matches a whitelist entry, the corresponding session
|
## If a name matches a allowlist entry, the corresponding session
|
||||||
## will bypass names and IP filters.
|
## will bypass names and IP filters.
|
||||||
##
|
##
|
||||||
## Time-based rules are also supported to make some websites only accessible at specific times of the day.
|
## Time-based rules are also supported to make some websites only accessible at specific times of the day.
|
||||||
|
|
||||||
[whitelist]
|
[allowed_names]
|
||||||
|
|
||||||
## Path to the file of whitelisting rules (absolute, or relative to the same directory as the config file)
|
## Path to the file of allowlisting rules (absolute, or relative to the same directory as the config file)
|
||||||
|
|
||||||
# whitelist_file = 'whitelist.txt'
|
# allowed_names_file = 'allowed-names.txt'
|
||||||
|
|
||||||
|
|
||||||
## Optional path to a file logging whitelisted queries
|
## Optional path to a file logging allowlisted queries
|
||||||
|
|
||||||
# log_file = 'whitelisted.log'
|
# log_file = 'allowed-names.log'
|
||||||
|
|
||||||
|
|
||||||
## Optional log format: tsv or ltsv (default: tsv)
|
## Optional log format: tsv or ltsv (default: tsv)
|
||||||
|
@ -539,10 +539,10 @@ cache_neg_max_ttl = 600
|
||||||
##########################################
|
##########################################
|
||||||
|
|
||||||
## One or more weekly schedules can be defined here.
|
## One or more weekly schedules can be defined here.
|
||||||
## Patterns in the name-based blocklist can optionally be followed with @schedule_name
|
## Patterns in the name-based blocked_names file can optionally be followed with @schedule_name
|
||||||
## to apply the pattern 'schedule_name' only when it matches a time range of that schedule.
|
## to apply the pattern 'schedule_name' only when it matches a time range of that schedule.
|
||||||
##
|
##
|
||||||
## For example, the following rule in a blacklist file:
|
## For example, the following rule in a blocklist file:
|
||||||
## *.youtube.* @time-to-sleep
|
## *.youtube.* @time-to-sleep
|
||||||
## would block access to YouTube during the times defined by the 'time-to-sleep' schedule.
|
## would block access to YouTube during the times defined by the 'time-to-sleep' schedule.
|
||||||
##
|
##
|
||||||
|
@ -593,7 +593,7 @@ cache_neg_max_ttl = 600
|
||||||
## An example of a remote source from https://github.com/DNSCrypt/dnscrypt-resolvers
|
## An example of a remote source from https://github.com/DNSCrypt/dnscrypt-resolvers
|
||||||
|
|
||||||
[sources.'public-resolvers']
|
[sources.'public-resolvers']
|
||||||
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/public-resolvers.md', 'https://download.dnscrypt.info/resolvers-list/v2/public-resolvers.md']
|
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/public-resolvers.md', 'https://download.dnscrypt.info/resolvers-list/v3/public-resolvers.md']
|
||||||
cache_file = 'public-resolvers.md'
|
cache_file = 'public-resolvers.md'
|
||||||
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
|
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
|
||||||
prefix = ''
|
prefix = ''
|
||||||
|
@ -601,7 +601,7 @@ cache_neg_max_ttl = 600
|
||||||
## Anonymized DNS relays
|
## Anonymized DNS relays
|
||||||
|
|
||||||
[sources.'relays']
|
[sources.'relays']
|
||||||
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/relays.md', 'https://download.dnscrypt.info/resolvers-list/v2/relays.md']
|
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/relays.md', 'https://download.dnscrypt.info/resolvers-list/v3/relays.md']
|
||||||
cache_file = 'relays.md'
|
cache_file = 'relays.md'
|
||||||
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
|
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
|
||||||
refresh_delay = 72
|
refresh_delay = 72
|
||||||
|
@ -619,7 +619,7 @@ cache_neg_max_ttl = 600
|
||||||
## This is a subset of the `public-resolvers` list, so enabling both is useless
|
## This is a subset of the `public-resolvers` list, so enabling both is useless
|
||||||
|
|
||||||
# [sources.'parental-control']
|
# [sources.'parental-control']
|
||||||
# urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/parental-control.md', 'https://download.dnscrypt.info/resolvers-list/v2/parental-control.md']
|
# urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/parental-control.md', 'https://download.dnscrypt.info/resolvers-list/v3/parental-control.md']
|
||||||
# cache_file = 'parental-control.md'
|
# cache_file = 'parental-control.md'
|
||||||
# minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
|
# minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
|
||||||
|
|
||||||
|
@ -656,6 +656,7 @@ fragments_blocked = ['cisco', 'cisco-ipv6', 'cisco-familyshield', 'cisco-familys
|
||||||
# property set to the path to a root CRT file can be added to a server entry.
|
# property set to the path to a root CRT file can be added to a server entry.
|
||||||
|
|
||||||
[doh_client_x509_auth]
|
[doh_client_x509_auth]
|
||||||
|
|
||||||
#
|
#
|
||||||
# creds = [
|
# creds = [
|
||||||
# { server_name='myserver', client_cert='client.crt', client_key='client.key' }
|
# { server_name='myserver', client_cert='client.crt', client_key='client.key' }
|
||||||
|
@ -746,5 +747,5 @@ skip_incompatible = false
|
||||||
[static]
|
[static]
|
||||||
|
|
||||||
# [static.'myserver']
|
# [static.'myserver']
|
||||||
# stamp = 'sdns:AQcAAAAAAAAAAAAQMi5kbnNjcnlwdC1jZXJ0Lg'
|
# stamp = 'sdns://AQcAAAAAAAAAAAAQMi5kbnNjcnlwdC1jZXJ0Lg'
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue