| blocklist.txt | ||
| experimental.txt | ||
| ip_cname.txt | ||
| LICENSE | ||
| README.md | ||
AdGuard Filter Lists: Aggressive Blocking and Caveats
This repository contains lists designed for blocking DNS queries, IP addresses, and specific connections. These lists are known for their aggressive approach towards network filtering, with the explicit intention of breaking unwanted connections or services.
Important Note:
The blocklists provided in this repository (namely blocklist.txt, experimental.txt, and ip_cname.txt) are intended to be highly intrusive by design. This means they may inadvertently break some functionalities or services on your network due to their aggressive nature. By using these lists, you acknowledge that the author is not responsible for any unintended consequences, including service disruptions or loss of functionality. These lists should only be utilized with a full understanding and acceptance of this fact.
List Descriptions:
-
blocklist.txt: A very aggressive list specifically aimed at preventing connections to U.S.-based servers and other applications that you may wish to restrict on your network. Due to its nature, it is likely to disrupt services if used without proper caution.
-
experimental.txt: This file contains experimental rules meant for testing purposes only. The rules are not recommended for general use as they represent raw and unrefined ideas intended for evaluation of their effects on the network behavior. Using this list in a production environment can lead to unexpected outcomes.
-
ip_cname.txt: A list designed to enable blocking of DNS and root DNS servers, even if these services are referenced through CNAME records to unknown domains. The application of such rules requires careful consideration as they can result in unintended blocks of legitimate traffic.
Usage:
These lists are intended for network administrators or users with advanced technical knowledge who understand the implications and potential side effects of using aggressive filtering methods. They should be used judiciously, ensuring that any disruption to critical services or applications is carefully evaluated against the benefits gained from the security improvements.
Caveats:
-
High Risk: These blocklists are designed for maximum security at the cost of potentially breaking some functionalities on your network. It's crucial to review each rule and assess its impact before implementation.
-
Not Suitable for Beginners: The use of these lists requires a high level of technical expertise and understanding of how DNS and network operations work. Users without extensive experience should not attempt to apply these rules without proper guidance.
-
Continuous Updates Needed: As new security threats emerge, these blocklists may require frequent updates. It is the user's responsibility to stay informed about any changes that might affect their network's configuration or performance.
Disclaimer: The repository provides a starting point for those seeking enhanced security through DNS filtering. However, the use of these lists is at your own risk, and the author will not be held accountable for any issues arising from their implementation. Always thoroughly test any modifications in a controlled environment before applying them to production networks.