dave14305
Part of the Furniture
Only took 100 days for anyone to notice that. If I had a $1,000,000...As you wish. Barenaked Lady it is, then.
Only took 100 days for anyone to notice that. If I had a $1,000,000...As you wish. Barenaked Lady it is, then.
Only took 100 days for anyone to notice that. If I had a $1,000,000...
I've updated v3.15b, so hopefully it should no longer attempt to migrate non-existent 'server=/' directives, but I personally hadn't noticed
so I suspect the unbound directive currently generated for the above is also garbage but non fatal,Code:address=/use-application-dns.net/
EDIT: see Mozilla Canary Domain
I suspect it should be converted to
Code:local-zone: "use-application-dns.net" always_nxdomain
You should leave a real DNS server in WAN DNS. Unbound_manager will take care of pointing dns to unbound behind the scenes. I’m afraid your router won’t boot properly with your current WAN DNS settings.
Count for what? That seems to be instructing you how to point your custom domain name to a new authoritative nameserver. Not related to defining a WAN DNS server for the router to use.Do these count?
View attachment 23571
My surprise is because I don't use Firefox, nor do I reside in the USA.Yup that's to disable DoH on Firefox. Merlin gave us that tip early out to ensure browsers respect our DNS servers
So, might be good to check if unbound has DoH bypass enabled and if the record exists already....
Perhaps my question is, how do I switch to Advanced Mode after installing Unbound via AMTM under the default Easy Mode?Is there a way to create/add to a Ad Block whitelist via the AMTM-Unbound menu?
Perhaps my question is, how do I switch to Advanced Mode after installing Unbound via AMTM under the default Easy Mode?
See the links on the very first post (Easy and Advanced).
Sent from my iPhone using Tapatalk
Thanks. Not exactly end-user ready, but that's really not the criticism (or bitching) it may seem. I appreciate the many scripts that coders are writing to compliment RMerlin's firmware, and am using many of them.https://github.com/MartineauUK/Unbo...-the-commandline-the-default-is-advanced-mode
Sent from my iPhone using Tapatalk
On a side note, has anyone tested/quantified the actual negative performance impact of "log-queries:yes" and "log-replies:yes"?
I use the "scribe" integration from the unbound_manager script which uncomments both lines, however the NLnet unbound manual has an ominous warning for both: "Note that it takes time to print these lines which makes the server (significantly) slower." I've tried both commenting/uncommenting these two lines out of my unbound.conf but didn't really notice any difference in speed/responsiveness either way...
I'm happy to help test and report back the results, but I'd need some guidance from this group on the best way to do a true "apples to apples" test between the two configurations.
Edit #1: I'm especially curious now that verbosity defaults to 0 instead of 1
Edit #2: The Unbound UI tab has a section that requires "log-replies:yes" as well, which was the initial impetus for this question
FIX: '8 -Install YouTube Video Ad blocker' generates error 'Ad Block' related message if the install is actually ABORTed/declined
ADD:: 'dnsmasq disable' bypass dnsmasq now migrates '/etc /hosts' and both 'dnsmasq.conf' 'server=/' and 'address=/' directives
ADD: 'dnsmasq' revert to Primary LAN DNS now reinstates Diversion if available
CHANGE: 'Easy' menu mode now visually separates (by column) optional features and colour codes them to enhance at-a-glance status.
1 = Update unbound files and configuration 5 = Uninstall Ad and Tracker blocker (Ad Block)
2 = Remove unbound/unbound_manager 6 = Uninstall Graphical Statistics GUI Add-on TAB
3 = Stop unbound 7 = Enable DNS Firewall
4 = Show unbound statistics 8 = Uninstall YouTube Ad blocker
? = About Configuration
v = View ('/opt/var/lib/unbound/'unbound.conf)
e = Exit Script [?]
E:Option ==>
his release fixes CVE-2020-12662 and CVE-2020-12663.
Bug Fixes:
- CVE-2020-12662 Unbound can be tricked into amplifying an incoming
query into a large number of queries directed to a target.
- CVE-2020-12663 Malformed answers from upstream name servers can be
used to make Unbound unresponsive.
It could be months before OpenWRT/Entware makes it available. I decided to get "wild" (relative to my usual excitement level) and compiled unbound 1.10.1 from source on an idle Raspberry Pi. Super easy.Unbound 1.10.1. was released.
Source: https://github.com/NLnetLabs/unbound/releases/tag/release-1.10.1
Changelog:
Code:his release fixes CVE-2020-12662 and CVE-2020-12663. Bug Fixes: - CVE-2020-12662 Unbound can be tricked into amplifying an incoming query into a large number of queries directed to a target. - CVE-2020-12663 Malformed answers from upstream name servers can be used to make Unbound unresponsive.
There's an advanced menu option for that.Can we configure unbound, so it does DoT? (ISP cannot intercept DNS queries?)
Source: https://openwrt.org/docs/guide-user/services/dns/dot_unbound
There is? How?There's an advanced menu option for that.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!