Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
@A-C-E Will be open source soon. The code might be ugly and I'm not a node hero but I think the world needs things like this. Not praising myself but I do think things like these should be available.
Will be on GitLab though. -
@linuxxx awesome how much you progressed since yesterday 😄, are you planning on adding a panel too? I was thinking adding one to my version whenever I get to it, similar to pi-hole, where you can see the stats with a graph, add new black and whitelist items and more, that way I might be able to finally also try some node framework (sailsjs?) or have a run with express again 😊
-
@JoshBent Yes want to do that too! Actually found a usable php DNS resolver and will try to implement that one first 😊
-
This is the one i made last night if anybody wants it. https://gitlab.com/paranoidsecurity...
-
@Jilano doesn't matter to me. Only took me 3 hours to make it an 2 and a half of that was making interfaces for it and making it easily extendable
-
Hmm...
Now all somebody has to do is take this project a bit to far and create a PiHole alternative for it... -
@linuxxx well, I'd be glad to help build a front-end for it.
Not sure if you agree with it since it might get to heavy for it's purpose, but we could use something like CakePHP for that so everything will be using an...
*scrapes thoat*
EM VEE CEE!
This tiny project is awesome. Thanks to @JoshBent (who partly got it from another repo as well) for providing a basic DNS server with hardcoded blacklisting functionality and thanks to @PerfectAsshole for correcting my mysql syntax I was stuck on for way too long.
I've now got this fucker to read blacklisted words from a redis list into an array which checks every requested domain to see if it matches. If yes, it proxies it through to another DNS server and if not, it'll log the requested domain to a mysql database and prints is as blocked onto the terminal.
If the domain matches any host from a service known to be integrated within a mass surveillance network, it also prints this out to thy terminal.
It's working yay! Gonna keep working on it today.
rant