Super #SEO #Spam Suppressor

Une liste noire anticapitaliste ciblant les sites web qui abusent des techniques de référencement naturel (SEO) pour inonder les résultats de recherche de données indésirables et de risques de sécurité : fausses informations, fermes de contenu, arnaques, usurpations d'identité, modes éphémères et bulles spéculatives (Web3 ou IA générative),
etc.....

#uBlacklist #AdBlockPlus #Hosts #Dnsmasq #pdnsd #Unbound #Fediverse

https://github.com/NotaInutilis/Super-SEO-Spam-Suppressor

GitHub - NotaInutilis/Super-SEO-Spam-Suppressor: An anticapitalist blocklist targeting websites abusing SEO tactics to spam web searches with data pollution and security risks: content farms, scrapers, copycats, generative AIs, scams, advertisements, malwares, and useless wasteful garbage in general. It is best used with uBlacklist.

An anticapitalist blocklist targeting websites abusing SEO tactics to spam web searches with data pollution and security risks: content farms, scrapers, copycats, generative AIs, scams, advertiseme...

GitHub

Switched from #ISC DHCP to #dnsmasq on #opnsense.

The transition wasn't very smooth as the update process disabled #ISC without enabling #dnsmasq so essentially you had to assign static ips to restore your setup after the update, yikes.

Anyway, now finally running a DHCP server that can do both ipv4 and ipv6 in a single process.

When upgrading #opnsense I would have really liked to know in advance that it would remove my DHCP static ips and remove the current DHCP server without automatically enabling the new #Dnsmasq server.

I've found this wasn't very clear in advance.

Both having to first create static routes to reconfigure as well as having to rebuild my ranges and static IPs from memory was a pity.

Having a single DHCP server do both the IPV4 and IPV6 in one overview is really nice though!

@vermaden it i amazing how light you can make many OSs. My #alpinelinux server on a RPi4 was 40MB running #dnsmasq #chrony. Since added #dnscrypt-proxy and #nut-server.
Simon Kelley released #Dnsmasq version 2.92. http://www.thekelleys.org.uk/dnsmasq/doc.html
Dnsmasq - network services for small networks.

@pid_eins this clearly conflicts with previous declaration systemd-resolved is stub only, not a server. I expect networkd would not recommend non-systemd implementations? I can see this as #Dnsmasq replacement. But Dnsmasq never was a DNS stub client. Does this introduce systemd-dhcpd? Is there a plan to reimplement also radvd?
Alright, I think I just got it fixed.
My wildcard entry in #dnsmasq appears to have had the wrong syntax. I corrected the syntax and now it's working again.
The confusing part of all of this is that I don't believe I touched the dnsmasq config when I set up #ipv6 on the other network... which means that it's been wrong for months,* if not over a year*, and everything was just working, regardless.
Somehow the addition of IPV6 must have disrupted whatever bizarre miracle had kept it working when it was only #ipv4.
@michal mě podráždilo povídání o #dnsmasq. Ano, Simon Kelley to provozuje na svém old school serveru. Není to taky žádný mladíček. Že běží bez služeb jakéhokoliv korporátu, včetně našeho, je dnes nezvyk. Ale není to tak, že by to dělal úplně sám. Já mám v Dnsmasq svoje commity, aniž bych měl právo zápisu. Přispěvatelů je celá řada, nejsem sám. Ale je nás víc, co ten kód zná a sleduje. To dokazuje třeba dispute nedávno přiřazeného CVE od lidí z Oraclu. Závěr byl prostě špatně.
🔥 Breaking News: To exploit these "shocking" #dnsmasq #vulnerabilities, simply replace config files! 🛠️🔧 Who knew #hacking required altering critical #system files? 🤔🙄 It's like discovering you need to open a door to enter a room! 🚪🔓
https://seclists.org/oss-sec/2025/q4/79 #news #cybersecurity #exploits #security #HackerNews #ngated
oss-sec: Re: Questionable CVE's reported against dnsmasq

Are these real CVEs? VulDB entries for dnsmasq rely on replacing config files

https://seclists.org/oss-sec/2025/q4/79

#HackerNews #CVE #Vulnerabilities #dnsmasq #VulDB #SecurityIssues #ConfigFiles

oss-sec: Re: Questionable CVE's reported against dnsmasq