Open sarciszewski opened 9 years ago
I think this is potentially a cool idea for something on a client-side machine. I think it's not appropriate for the router to silently change DNS service for two reasons:
"I think this is potentially a cool idea for something on a client-side machine." Yeah, but I suck at writing desktop software. :(
While transparent fallback may not be appropriate on router, see what can be done on router to address this problem. Combine resolution of this issue with #282 .
The ISP for Orlando, FL is BrightHouse, and some of my hacker friends tell me they like to block port 53 (DNS) whenever they observe "strange traffic" from one of their customers. This interferes even with people using OpenDNS or Google's DNS server.
I would like to propose a feature to help with mitigating this sort of malicious ISP behavior (though, I will say this now, I do not have the knowledge of how exactly to implement it, but I'm willing to help with possible): If DNS queries fail consistently for 30 seconds, fallback to tunneling DNS queries over...
Questions:
Thanks in advance.