-
-
Notifications
You must be signed in to change notification settings - Fork 157
/
Copy patha — AdGuard Home Miscellaneous.txt
127 lines (119 loc) · 4.69 KB
/
a — AdGuard Home Miscellaneous.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
[Adblock Plus 3.6]
! Title: 🏘 Semi-public stuff for Dandelion Sprout's Official DNS Server
! Version: 12December2024v1
! Homepage: https://github.com/DandelionSprout/adfilt/blob/master/Wiki/General-info.md#-english
! Description: Spun off from a.txt when I began placing public scrutiny on myself and my DNS server, as I didn't intend for some of the entries in it to be blocked by DNS server users that weren't myself, and I didn't except even hardcore tech experts to know that "$document" meant that the entries didn't apply to the server.
!#if !env_mv3
!#if !ext_ubol
!#if !adguard_ext_android_cb
! ———Applies to public users:———
! Syncing allowlist with that of AdGuard:
@@||settings.crashlytics.com^
@@||app-measurement.com^
@@||mobileapptracking.com^
@@||pixapi.net^
! Aims to prevent having NTP timesync requests go into (or within) the GFW:
|cn.pool.ntp.org^$dnsrewrite=tw.pool.ntp.org
|0.cn.pool.ntp.org^$dnsrewrite=0.tw.pool.ntp.org
|1.cn.pool.ntp.org^$dnsrewrite=1.tw.pool.ntp.org
|2.cn.pool.ntp.org^$dnsrewrite=2.tw.pool.ntp.org
|3.cn.pool.ntp.org^$dnsrewrite=3.tw.pool.ntp.org
|ntp.msn.cn|$dnsrewrite=tw.pool.ntp.org
|ntp1.aliyun.com|$dnsrewrite=1.tw.pool.ntp.org
|ntp2.aliyun.com|$dnsrewrite=2.tw.pool.ntp.org
|ntp.aliyun.com|$dnsrewrite=tw.pool.ntp.org
|ntp.sjtu.edu.cn|$dnsrewrite=3.tw.pool.ntp.org
! ———May apply to public users once I figure out the best ways to do so:———
yahoo.com$ctag=device_tv
! Test to avoid game patches/updates on the go
||sun.hac.lp1.d4c.nintendo.net^$ctag=user_regular
||scsi-download.lp1.scsi.srv.nintendo.net^$ctag=user_regular
! ———Intended to apply to Dandelion Sprout's own personal units only:———
||google.com^$client='Imres LG 43UH603V 108cm-TV'
facebook.com$client='Imres LG 43UH603V 108cm-TV'
avs.na.amazonalexa.com$client='Imres Yamaha RX-V685'
! LG ads disqualified by Perflyst
||ngfts.lge.com^$client='Imres LG 43UH603V 108cm-TV'
! ———Carried over from «AdGuard Home Gradual Syntax Inclusion Test List»———
! This section contains a lot of syntaxes that currently disqualify their entire entries in AdGuard Home. When any of the entries do indeed block access to the very, very legitimate and reasonable Norwegian newssite NRK, they are removed from this section, and (if applicable) changes will be made to https://raw.githubusercontent.com/DandelionSprout/adfilt/master/AdGuard%20Home%20Compilation%20List/AGHtest.py to accomodate for the working entries.
||nrk.no^$1p
||nrk.no^$3p
||nrk.no^$all
||nrk.no^$document
||nrk.no^$dom
||nrk.no^$empty
||nrk.no^$first-party
||nrk.no^$font
||nrk.no^$frame
||nrk.no^$image
||nrk.no^$media
||nrk.no^$object
||nrk.no^$other
||nrk.no^$popunder
||nrk.no^$popup
||nrk.no^$script
||nrk.no^$stylesheet
||nrk.no^$subdocument
||nrk.no^$third-party
||nrk.no^$websocket
||nrk.no^$xhr
||nrk.no^$xmlhttprequest
||nrk.no^$~1p
||nrk.no^$~3p
||nrk.no^$~all
||nrk.no^$~document
||nrk.no^$~dom
||nrk.no^$~empty
||nrk.no^$~first-party
||nrk.no^$~frame
||nrk.no^$~popunder
||nrk.no^$~third-party
||nrk.no^$~xhr
/www.nrk.no^
//www.nrk.no^
^www.nrk.no^
! https://github.com/AdguardTeam/AdGuardHome/issues/1328 (Although it wasn't actually covered by the fix commit)
0 www.nrk.no
! https://github.com/AdguardTeam/AdGuardHome/issues/1249#issuecomment-573378507
https://www.nrk.no/
https://www.nrk.no
! RPZ
www.nrk.no CNAME .
! TPL
-d www.nrk.no
! MinerBlock
*://*.nrk.no/*
! dnsmasq
address=/www.nrk.no/127.0.0.1
server=/www.nrk.no/127.0.0.1
! hosts.deny
ALL: www.nrk.no
! BIND
zone "www.nrk.no" { type master; notify no; file "null.zone.file"; };
! PFblockerNG MS-1 https://gist.githubusercontent.com/BBcan177/bf29d47ea04391cb3eb0/raw/7290e0681bcd07415420b5c80a253652fd13f840/MS-1
95.101.142.17 # NRK
! ———AdGuard Home shows ASUS router addresses as NXDOMAIN for some reason———
192.168.1.1 router.asus.com
192.168.1.1 repeater.asus.com
@@||router.asus.com^$badfilter
!#if false
! ———Submit to Perflyst at some point———
!!!@@|localdomain|
! ———Incorrect syntaxes———
/^https://.*[/?].*$/$dnstype=A|AAAA
/^[1-9].*:\d{1,5},.*$/$dnstype=A|AAAA
! ———Handling LAN-specific domains, hoping that various devices can handle IP address redirections like these———
! https://github.com/AdguardTeam/AdGuardHome/discussions/2901#discussioncomment-11033278
|local|$dnsrewrite=127.0.0.1,dnstype=~AAAA|~CNAME
|local|$dnsrewrite=::1,dnstype=AAAA
|localdomain|$dnsrewrite=127.0.0.1,dnstype=~AAAA|~CNAME
|localdomain|$dnsrewrite=::1,dnstype=AAAA
! https://locall.host/localhost-localdomain/
|localhost|$dnsrewrite=127.0.0.1,dnstype=~AAAA|~CNAME
|localhost|$dnsrewrite=::1,dnstype=AAAA
|localhost.localdomain|$dnsrewrite=127.0.0.1,dnstype=~AAAA|~CNAME
|localhost.localdomain|$dnsrewrite=::1,dnstype=AAAA
!#endif
!#endif
!#endif
!#endif