-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
||*.* rule does not block everything #2521
Comments
Could you please give some examples of these domains? |
I disable collection of TV info from my Firestick with ADB and therefore I no longer get attempts to resolve those bogus domains, but the info comes from the well-known Perfy's Smart TV Block List - https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/regex.list , which has some examples of the domains I describe. |
But I don't know if port scanning attempts ever reach me in regards to this block list - https://raw.githubusercontent.com/gwarser/filter-lists/master/lan-block.txt . I only know it is a relatively new thing and you can find the report about eBay performing such scans here - https://www.ghacks.net/2020/05/25/ebay-is-port-scanning-your-system-when-you-load-the-webpage/ . |
The thing is On the other hand, an invalid domain name in a DNS query most likely means a bug in the software and not some sinister plan to avoid blocking. |
Thanks! It was my mistake not to realize AdGuard automatically blocked those bogus domains with NXDomain, even if the default rule was Null IP. Related entries weren't labeled as blocked, but as resolved with NXDomain. An example of such a bogus domain was "vdukhmtl". Firestick was the only device to use them each time it was connected to a new TV. |
Hmm, so it's a valid domain name after all, just the top-level domain. You'd need to use Btw, these may be random domain names that Android checks on network change. |
To the best of my knowledge, such non-standard requests can't be blocked with |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Problem Description
||. rule is supposed to block all domains, but it doesn't. For example, to block bogus Smart TV domains, you also need to add /^[a-z]{7,15}$/ .
That also makes me wonder whether ||. and /^[a-z]{7,15}$/ disallow port scanning that use similar syntax - https://raw.githubusercontent.com/gwarser/filter-lists/master/lan-block.txt . If not, then a feature to disallow local port scanning should be included.
Proposed Solution
"Block All Domains" button in "Block Services" would be great!
Alternatives Considered
The text was updated successfully, but these errors were encountered: