[Privoxy-users] Privoxy-users Digest, Vol 17, Issue 3

Lee ler762 at gmail.com
Mon Nov 6 19:49:54 UTC 2017


On 11/6/17, Robert Klemme <rklemme at klemmeconsulting.com> wrote:
> Thanks Lee for the excellent explanation.
>
> I have created block lists in this manner before and they work great.
>
> I was trying to come up with a way to use a wildcard or some regex solution
> to block anything "tile" related.  It seems like either "tile" or "
> tile-x.com" is usually involved.

.tile.  (leading and trailing period) will block anything with .tile.
in the name; problem is that also blocks things like
a.tile.openstreetmap.org

> I won't be able to catch them all and I cannot find a list of all of these
> hosts.  I know they only downside to this is there might be false positives
> but I am willing to give it a shot.

Something else to consider would be running your own DNS recursive
resolver & blocking things there.

Short story is that I wanted DNSSEC & my isp doesn't do that.  So I
intalled bind as a recursive resolver on my PC and a nice side effect
is that DNS lookups are logged and it's real easy to block things - eg
this bit in named.conf
  zone "telemetry.microsoft.com" { type master; notify no; file
"ZONES/null.zone"; };
blocks everything in the telemetry.microsoft.com zone

> Then I can search the log files for blocks related to this and we can
> create the first ever "Live Tile" blocklist and share it on Git.  I would
> love that!
>
> Also, I didn't have to set my Windows 10 PC to use the proxy the way you
> mentioned. I have Privoxy setup in all of the browsers and somehow the OS
> is pulling it from there. Seems to be working?!

Good to know.  I wasn't sure if setting the proxy in ms edge would
tell the system to proxy everything or just edge traffic.

Regards,
Lee


More information about the Privoxy-users mailing list