Package Details: grimd-git r163.533e0e4-1

Git Clone URL: https://aur.archlinux.org/grimd-git.git (read-only, click to copy)
Package Base: grimd-git
Description: Fast dns proxy that can run anywhere, built to black-hole internet advertisements and malware servers
Upstream URL: https://github.com/looterz/grimd
Licenses: MIT
Conflicts: grimd
Provides: grimd
Submitter: erkexzcx
Maintainer: None
Last Packager: erkexzcx
Votes: 1
Popularity: 0.000000
First Submitted: 2020-06-06 12:16 (UTC)
Last Updated: 2020-06-06 12:16 (UTC)

Dependencies (2)

Required by (0)

Sources (5)

Pinned Comments

erkexzcx commented on 2020-06-06 12:34 (UTC) (edited on 2020-06-06 12:47 (UTC) by erkexzcx)

When first installed, start & stop grimd to generate initial config file:

# systemctl start grimd.service
# systemctl stop grimd.service

Then edit it:

# vim /etc/grimd/grimd.toml

Finally start & enable the service:

# systemctl enable --now grimd.service

Since regular system user grimd is used, you cannot open ports 0-1024, but since you are going to use 53 anyway, I suggest changing it to 5533 and using this iptable rule to redirect traffic:

iptables -t nat -I PREROUTING -p tcp --dport 53 -j REDIRECT --to-ports 5533
iptables -t nat -I PREROUTING -p udp --dport 53 -j REDIRECT --to-ports 5533

Latest Comments

erkexzcx commented on 2020-06-06 12:55 (UTC)

My favourite blocklist:

# list of sources to pull blocklists from, stores them in ./sources
sources = [
"http://sysctl.org/cameleon/hosts",
"https://dbl.oisd.nl/",
"https://mirror1.malwaredomains.com/files/justdomains",
"https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt",
"https://raw.githubusercontent.com/erkexzcx/disconnectme-pihole/master/services_Advertising.txt",
"https://raw.githubusercontent.com/erkexzcx/disconnectme-pihole/master/services_Analytics.txt",
"https://raw.githubusercontent.com/erkexzcx/disconnectme-pihole/master/services_Cryptomining.txt",
"https://raw.githubusercontent.com/erkexzcx/disconnectme-pihole/master/services_Fingerprinting.txt",
"https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt",
"https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt",
"https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist"
]

erkexzcx commented on 2020-06-06 12:34 (UTC) (edited on 2020-06-06 12:47 (UTC) by erkexzcx)

When first installed, start & stop grimd to generate initial config file:

# systemctl start grimd.service
# systemctl stop grimd.service

Then edit it:

# vim /etc/grimd/grimd.toml

Finally start & enable the service:

# systemctl enable --now grimd.service

Since regular system user grimd is used, you cannot open ports 0-1024, but since you are going to use 53 anyway, I suggest changing it to 5533 and using this iptable rule to redirect traffic:

iptables -t nat -I PREROUTING -p tcp --dport 53 -j REDIRECT --to-ports 5533
iptables -t nat -I PREROUTING -p udp --dport 53 -j REDIRECT --to-ports 5533