fast dns proxy that can run anywhere, built to black-hole internet advertisements and malware servers
go get github.com/looterz/grimd
or download one of thereleases
if grimd.toml is not found, it will be generated for you, below is the default configuration
# list of sources to pull blocklists from sources = [ "http://mirror1.malwaredomains.com/files/justdomains", "https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts", "http://sysctl.org/cameleon/hosts", "https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist", "https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt", "https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt", "http://hosts-file.net/ad_servers.txt", "https://raw.githubusercontent.com/quidsup/notrack/master/trackers.txt" ] # location of the log file log = "grimd.log" # what kind of information should be logged, 0 = errors and important operations, 1 = dns queries, 2 = debug loglevel = 0 # address to bind to for the DNS server bind = "0.0.0.0:53" # address to bind to for the API server api = "127.0.0.1:8080" # ipv4 address to forward blocked queries to nullroute = "0.0.0.0" # ipv6 address to forward blocked queries to nullroutev6 = "0:0:0:0:0:0:0:0" # nameservers to forward queries to nameservers = ["188.8.131.52:53", "184.108.40.206:53"] # concurrency interval for lookups in miliseconds interval = 200 # query timeout for dns lookups in seconds timeout = 5 # cache entry lifespan in seconds expire = 600 # cache capacity, 0 for infinite maxcount = 0 # question cache capacity, 0 for infinite but not recommended (this is used for storing logs) questioncachecap = 5000 # manual blocklist entries blocklist =  # manual whitelist entries whitelist = [ "getsentry.com", "www.getsentry.com" ]
requires golang 1.6, you build grimd like any other golang application, for example to build for linux x64
env GOOS=linux GOARCH=amd64 go build -v github.com/looterz/grimd
grimd exposes a restful json api by default on the local interface, allowing you to build web applications that visualize requests, blocks and the cache.reaper is the default grimd web frontend, and will likely get a makeover when the Buoy framework releases later this year.
incoming requests spawn a goroutine and are served concurrently, and the block cache resides in-memory to allow for rapid lookups, allowing grimd to serve thousands of queries at once while maintaining a memory footprint of under 15mb for 100,000 blocked domains!
below is a grimd.service example for use with systemd which updates the blocklists every time it starts
[Unit] Description=grimd dns proxy Documentation=https://github.com/looterz/grimd After=network.target [Service] User=root WorkingDirectory=/root/grim LimitNOFILE=4096 PIDFile=/var/run/grimd/grimd.pid ExecStart=/root/grim/grimd -update Restart=always StartLimitInterval=30 [Install] WantedBy=multi-user.target
转载本站任何文章请注明：转载至神刀安全网，谢谢神刀安全网 » Introducing grimd: lightning fast golang dns proxy for blocking ads