Total Pageviews

Monday 17 July 2017

知名度大且好使的DNS

使用免费DNS解析服务除了去掉了运营商的各种广告,
还有个最大的好处就是不会重定或者过滤用户所访问的地址,
这样就防止了很多网站被电信、网通劫持,网友应该养成不使用默认DNS的习惯。

    几个国外免费公共DNS解析服务器

 Google


    IPv4 地址  8.8.8.8               8.8.4.4 
    IPv6 地址  2001:4860:4860::8888      2001:4860:4860::8844
                 位置:加利福尼亚             官网: 点击前往



 OpenDNS

以下为OpenDNS的免费DNS解析服务器:
  • 208.67.222.222 (Resolver1.OpenDNS.com)
  • 208.67.220.220 (Resolver2.OpenDNS.com)
  • 208.67.222.220 (Resolver3.OpenDNS.com)
  • 208.67.220.222 (Resolver4.OpenDNS.com)
以下为Family Shield Servers。可以阻挡成人网站和含有恶意软件网站:
  • 208.67.222.123 (resolver1-fs.opendns.com)
  • 208.67.220.123 (resolver2-fs.opendns.com)
以下为提供IPv6的DNS服务,处于实验性质:
  • 2620:0:ccc::2
  • 2620:0:ccd::2                   官网: 点击前往 


   

DNS.WATCH 


            一个简约的第三方DNS服务,让你知道什么是快速和未经审查的互联网!
由于该服务相信DNS中立,你可以肯定的是所有的查询得出正确的地方,
不会有入侵参与没有审查。不说废话。只是DNS。


我们的DNS服务器
我们正在操作下面的DNS解析器。我们所有的解析器可以免费使用。
  V4:  84.200.69.80    84.200.70.40
  V6:  2001:1608:10:25 :: 1c04:B12F   2001:1608:10:25 :: 9249:d69b      官网:点击前往

 Level 3 美国跨国通信公司


209.244.0.3           209.244.0.4  官网:点击前往


 DNS Advantage (NeuStar科技公司提供


156.154.70.1         156.154.71.1   官网: 点击前往




SafeDNS
是由一群IT和安全专业人员组成的技术初创。
我们打​​算在广泛的市场和客户建立和发展高级Web过滤解决方案。
我们的目的是创造新一代的安全和负担
得起的网页过滤产品。



   195.46.39.39   195.46.39.40  官网:点击前往




GreenTeamDNS
互联网提供解决方案,使安全上网

81.218.119.11      209.88.198.133   
官网:点击前往





Verizon (美国最大的无线电信运营商) 


   4.2.2.1                  4.2.2.1     官网: 点击前往

 

SmartViper  

           
  208.76.50.50   208.76.51.51  位置:佛罗里达州坦帕市   
官网: 点击前往


 OpenNIC    

(开放的,民主的,无审查的DNS提供商)

   

  离您最近的OpenNIC DNS服务器是...点击查处




one dns 

oneDNS是定位小众用户的精品公共DNS服务) 

112.124.47.27

南方首选/北方备用
114.215.126.16
北方首选/南方备用

                                官网: 点击前往

  

Norton ConnectSafe


 (一个免费的公共DNS服务,通过Symantec提供。

声称可以提供更快速,更可靠的网络浏览体验,同时阻止不良网站 )


ipv4:

Norton ConnectSafe 1     198.153.192.40     198.153.194.40
 Norton ConnectSafe 2     198.153.192.50    198.153.194.50
 Norton ConnectSafe 3    198.153.192.60    198.153.194.60

策略A - 安全 此策略将阻止所有网站托管恶意软件,钓鱼网站和诈骗网站。 199.85.126.10  199.85.127.10
策略B - 安全+色情 除了阻止不安全的网站,这一政策也阻止访问包含色情内容的网站。 199.85.126.20 199.85.127.20
政策Ç - 安全+色情+非家庭友善 这项政策是非常适合有小孩的家庭。阻止不安全的网站和色情网站。 199.85.126.30 199.85.127.30
   官网:
https://dns.norton.com/


Hurricane Electric

Hurricane Electric总部位于加利福尼亚州弗里蒙特,
运营着自己的全球性IPv4和IPv6网络,
被视为全球最大的IPv6骨干网(根据所连接网络的数量衡量)。
在其全球网络中,
Hurricane Electric拥有连接至90个主要交换点
以及与超过3,600个不同网络交换流量。
Hurricane Electric采用了一种具有弹性的光纤拓扑结构,
在北美拥有至少四个冗余路径,
在美国
和欧洲之间拥有两个独立的路径,并且在欧洲和亚洲拥有环网。Hurricane Electric
通过以太网速度在10 Gbps至100 Gbps的相同连接
提供IPv4和IPv6传输解决方案。


  74.82.42.42      官网:点击前往



censurfridns.dk

   89.233.43.71    91.239.100.100  官网:点击前往




 

Comodo Secure DNS 

(科摩多集团 一个信息安全公司.SSL证书最大的发行商,专注于计算机和网络的安全性)

它的快速和容易改变到科摩多安全DNS。无需下载,它是完全免费的。 
  8.20.247.20  8.26.56.20   官网:点击前往


 Dyndns

(美国Dynamic Network Services(Dyn)公司是致力于DNS、域名注册、网络流量和品质监测等领域的产品与解决方案提供商)


216.146.35.35           216.146.36.36   官网: 点击


freedns

自由冲浪。没有DNS重定向。
没有记录。网站的无堵塞。 
37.235.1.174

37.235.1.177       官网 :点击前往

  

     HelloDNS 
(HelloDNS是由专业云服务供应商HelloVM提供的智能公众DNS服务,
能够有效加快各类网站的访问,
并加速Facebook、Twitter、Google等国外网站访问,Origin等网站下载速度。无广告、无劫持,
所有网站均解析到最快的官方服务器上,保障所有解析的数据安全)
         

主用DNS:   66.249.73.233     备用DNS:182.254.185.148 官网: 点击前往

 


 OpenerDNS-开门

(是面向国内普通互联网用户开放的"高速 安全 免费"的域名解析服务器)



内部地址 
       北京及周边地区:182.92.131.150  
       南方地区(特别是长城宽带:121.40.145.73 
     测试地址:        面向北方联通用户地址:114.215.109.81        面向南方电信用户地址: 42.159.244.2 
       官网:点击前往(已墙)                 

  

Yandex.ru

俄罗斯最大的搜索引擎Yandex.ru, 提供免费的DNS服务。Yandex拥有位于不同的城市和国家的超过80个DNS服务器,

当你访问一个域名的时候,Yandex会自动甄别和筛选筛选最接近你的服务器来解析域名,从而达到快速稳定的访问。)


   Basic模式(快速), 首选DNS服务器:77.88.8.8 备用DNS服务器:77.88.8.1
   Safe模式(安全), 首选DNS服务器:77.88.8.88 备用DNS服务器:77.88.8.2,  
   Family模式(家庭), 首选DNS服务器:77.88.8.7 备用DNS服务器:77.88.8.3              官方:点击前往

ClearCloud     

           ClearCloud 会帮你检查电脑试图访问每个的网站地址,不论是浏览互联网、点击  一个电子邮件中的链接,
或一个程式偷偷地试图与服务器交换信息或更新内容,  都会通知你。如果你想在DNS解析时就要一个稳健安全保护,
免受恶意软件影响,那么ClearCloud DNS就提供这样的服务。在钓鱼网站、恶意软件、木马程序等影响到你电脑安全前
就会被ClearCloud DNS阻止。更难以置信的是,你可能还不知道你的电脑是试图访问一些不良网站时,
ClearCloud却能立即阻止你电脑的链接,可以防止潜在的危害,这在祖国大陆由为重要。 
   首选DNS服务器:74.118.212.1       备用DNS服务器:74.118.212.2   官网:点击前往(已关)参考


FoolDNS  

      如果你担忧隐私被窃,那么FoolDNS就是给你这方面的保护.可以为你阻挡90%的网上广告,
删除信息记录程序,避免暴露自己的点击习惯,这此服务都是完全免费的.当然它也提供对钓鱼网站和恶意软件保护。
  首选DNS服务器:87.118.111.215       备用DNS服务器:81.174.67.134  官网:点击前往



DNS resolver  

   如果输入网址拼写错误和不存在时,你不喜欢被DNS解析器以任何方式“劫持”,那么DNSResolvers很适合你。它提供纯净的DNS解析。
 首选DNS服务器:205.210.42.205       备用DNS服务器:64.68.200.200  官网:点击前往

tunlr.com
       连接到互联网的每一个设备具有一个用于识别它的物理位置的地址。网站和流媒体服务使用这个地址来限制你的设备。 
随着Tunlr,您可以访问我们的地址在您想要的内容可用的网络。简单地改变你的DNS设置Tunlr和虚拟位置的世界
将是只需一次点击即可。它就是这么简单!     首选DNS服务器:199.167.30.144    备用DNS服务器:149.154.158.186  
官网:点击前往



V2EX DNS 

是一个可以帮助你获得更快 App Store 下载

速度的 DNS 服务器
在 London 的主服务器:


 178.79.131.110        199.91.73.222        官网:点击前往


台灣 Hinet 

中華電信HiNet網路服務入口,台灣最大ISP,提供寬頻上網,光世代(光纖)、ADSL服務,及信箱、新聞、hichannel、Xuite等生活娛樂資訊。 

DNS 伺服器: 168.95.1.1    168.95.192.1

--------------

https://www.zhihu.com/question/32229915
http://archive.is/oQWB2
----------
related post: http://briteming.blogspot.com/2012/10/dns.html
-----------
Best DNS: The Best Free DNS Servers提供最好最全的免费DNS

Providers     Primary DNS     Secondary DNS     Server Location
         
OpenDNS     208.67.222.222     208.67.220.220     San Antonio, Texas, USA

Level3     209.244.0.3     209.244.0.4     Diamond Bar, California, USA
DNS Advantage     156.154.70.1     156.154.71.1     Sterling, Virginia, USA
Verizon     4.2.2.1     4.2.2.2     Routing to nearest Level3 nodes
SmartViper     208.76.50.50     208.76.51.51     Birminghan, Alabama & Tampa, Florida USA
Google     8.8.8.8     8.8.4.4  
DNS.WATCH     84.200.69.80     84.200.70.40  
Comodo Secure DNS     8.26.56.26     8.20.247.20  
OpenDNS Home     208.67.222.222     208.67.220.220  
DNS Advantage     156.154.70.1     156.154.71.1  
Norton ConnectSafe     199.85.126.10     199.85.127.10  
GreenTeamDNS     81.218.119.11     209.88.198.133  
SafeDNS     195.46.39.39     195.46.39.40  
OpenNIC     107.150.40.234     50.116.23.211  
Dyn     216.146.35.35     216.146.36.36  
FreeDNS     37.235.1.174     37.235.1.177  
censurfridns.dk     89.233.43.71     91.239.100.100  
Hurricane Electric     74.82.42.42      
puntCAT     109.69.8.51      
FoeBuD e.V.     85.214.73.63         Deutschland
German Privacy Foundation e.V.     87.118.100.175         Deutschland
German Privacy Foundation e.V.     94.75.228.29         Deutschland
German Privacy Foundation e.V.     85.25.251.254         Deutschland
German Privacy Foundation e.V.     62.141.58.13         Deutschland
Chaos Computer Club Berlin     213.73.91.35         Deutschland
ClaraNet     212.82.225.7         Deutschland
ClaraNet     212.82.226.212         Deutschland
OpenDNS     208.67.222.222         USA
OpenDNS     208.67.220.220         USA
OpenNIC     58.6.115.42         Australien
OpenNIC     58.6.115.43         Australien
OpenNIC     119.31.230.42         Australien
OpenNIC     200.252.98.162         Brasilien
OpenNIC     217.79.186.148         Deutschland
OpenNIC     81.89.98.6         Deutschland
OpenNIC     78.159.101.37         Deutschland
OpenNIC     203.167.220.153         Neuseeland
OpenNIC     82.229.244.191         Frankreich
OpenNIC     82.229.244.191         Tschechien
OpenNIC     216.87.84.211         USA
OpenNIC             USA
OpenNIC             USA
OpenNIC     66.244.95.20         USA
OpenNIC             USA
OpenNIC     207.192.69.155         USA
OpenNIC     72.14.189.120         USA
DNS Advantage     156.154.70.1         USA
DNS Advantage     156.154.71.1         USA
Comodo Secure DNS     156.154.70.22         USA
Comodo Secure DNS     156.154.71.22         USA
PowerNS     194.145.226.26         Deutschland
PowerNS     77.220.232.44         Deutschland
ValiDOM     78.46.89.147         Deutschland
ValiDOM     88.198.75.145         Deutschland
JSC Marketing     216.129.251.13         USA
JSC Marketing     66.109.128.213         USA
Cisco Systems     171.70.168.183         USA
Cisco Systems     171.69.2.133         USA
Cisco Systems     128.107.241.185         USA
Cisco Systems     64.102.255.44         USA
DNSBOX     85.25.149.144         Deutschland
DNSBOX     87.106.37.196         Deutschland
Christoph Hochstätter     209.59.210.167         USA
Christoph Hochstätter     85.214.117.11         Deutschland
privat     83.243.5.253         Deutschland
privat     88.198.130.211         Deutschland
privat (i-root.cesidio.net, cesidio root included)     92.241.164.86         Rußland
privat     85.10.211.244         Deutschland

The Domain Name System (DNS) is a hierarchical distributed naming system for some resource, services, or computers on a private network or the web. It links domain names assigned to all the participating things and various advice. Most conspicuously, it interprets domain names, which people can easily memorize, to the numeric IP addresses required for the goal of apparatus and computer services world-wide. The Domain Name System is a critical part of most Internet services‘ functionality as it’s the primary directory service of the Internet.

The Domain Name System spreads the duty of assigning domain names by designating authorized name servers for every domain name and mapping those names. Authorized name servers are delegated to lead to their domain names that were supported, and could delegate power over sub domains to other name servers. This mechanism supplies distributed and fault tolerant service and was made to prevent the dependence on a principal database that is single.

The Domain Name System additionally defines the technical functionality which will be at its heart. It defines the DNS protocol, a comprehensive specification of data communication exchanges and the data structures used in DNS, within the Internet Protocol Suite. Historically, other directory services preceding DNS are not scalable to big or global directories as they were initially according to text files, conspicuously the HOSTS.TXT resolver. DNS continues to be in extensive use.

The web keeps two principal namespaces, the domain name hierarchy[1] as well as the Internet Protocol (IP) address spaces.[2] The Domain Name System keeps the domain name hierarchy and offers translation services between it as well as the address spaces. Internet name servers and a communication protocol execute the Domain Name System.[3] A DNS name server is a server that stores the DNS records to get a website name; a DNS name server reacts with responses to queries against its database.

The most frequent forms of records saved in the DNS database are those coping with a DNS zone’s ability power (SOA), IP addresses (A and AAAA), SMTP mail exchangers (MX), name servers (NS), pointers for reverse DNS lookups (PTR), and domain name aliases (CNAME). Although not meant to be a general purpose database, DNS can save records for other kinds of data for either automatic machine lookups for things or for human queries like responsible individual (RP) records. To get an entire listing of DNS record types, start to see the set of DNS record types. DNS has additionally seen use in fighting unsolicited e-mail (junk) by employing a realtime blackhole list saved in a DNS database. For general purpose uses or whether for Internet naming, the DNS database is kept in a zone file that was ordered.

Function

An often-used analogy to spell out the Domain Name System is the fact that it functions as the telephone book by interpreting individual-friendly computer hostnames. As an example , the domain name www.example.com translates to the addresses 93.184.216.119 (IPv4) and 2606:2800:220:6d:26bf:1447:1097:aa7 (IPv6). Unlike a phone book, the DNS could be instantly upgraded, enabling the place on the network to alter without changing the end users, who continue to make use of the exact same host name of a service. Users benefit from this when they use significant Uniform Resource Locators (URLs), without needing to understand how the services are really located by the computer and e-mail addresses.
History

Using a more straightforward, more memorable name in place of the numeric address of a host goes back to the ARPANET age. The Stanford Research Institute (now SRI International) kept a text file named HOSTS.TXT that mapped host names to the numeric addresses of computers on the ARPANET. Host operators got copies of the master file.[4][5] The rapid growth of the emerging network needed an automated system for keeping the host names and addresses.

The Domain Name System was designed by Paul Mockapetris in 1983 in the University of California, Irvine, and composed the initial execution from UCLA in the request. The Internet Engineering Task Force released the first specifications in RFC 882 and RFC 883 in November 1983, for naming Internet hosts, that have stayed the standard.[citation needed]

In 1984, four UC Berkeley pupils–Douglas Terry, Mark Painter, David Riggle, and Songnian Zhou–wrote the initial Unix name server execution, called the Berkeley Internet Name Domain (BIND) Server.[6] In 1985, Kevin Dunlap of DEC significantly revised the DNS implementation. Mike Karels, Phil Almquist, and Paul Vixie have maintained BIND since then.[7] BIND was ported to the Windows NT platform in the early 1990s. BIND was widely distributed, particularly and is the most commonly used DNS applications online.[7]

In November 1987, RFC 1034[1] and RFC 1035[3] superseded the 1983 DNS specifications. Several added Request for Opinions have proposed extensions to the central DNS protocols.

Security problems

Initially, security concerns are not important design factors for DNS software or some applications for deployment on the Internet that is first, as the network had not been open for involvement from the public. But the growth of the world wide web to the commercial sector altered the conditions for security measures.

Malicious users found and used several susceptibility problems. One problem is DNS cache poisoning, where data is dispersed to caching resolvers under the pretense of being a source server that is important, thus polluting the data store with long expiration times and possibly bogus information (time to live). Later, valid program requests could be redirected to network hosts controlled with malicious purpose.

DNS answers are not signed, leading to many strike possibilities; the Domain Name System Security Extensions (DNSSEC) change DNS to include support for answers that are signed. DNSCurve continues to be suggested instead to DNSSEC. Other extensions, for example TSIG, add support for cryptographic authentication between peers that are trusted and can be used to authorize dynamic update operations or zone transport.

Some domain names can be utilized to attain effects that were spoofing. As an example, paypal.com and paypa1.com are different names, yet users might not be able differentiate them in a graphical user interface according to an individual ’s preferred typeface. In several fonts the numeral 1 as well as the letter l appear even indistinguishable or quite similar. This issue is critical in systems that support internationalized domain names, since many character codes may seem indistinguishable on computer screens that are typical. This susceptibility is sometimes used [19]

Techniques including forward-confirmed reverse DNS may also be utilized to validate DNS results.
Domain name registration

The privilege to make use of a site name is delegated by domain name registrars which are accredited by the Internet Corporation for Assigned Names and Numbers (ICANN) or other organizations like OpenNIC, which are charged with supervising number systems and the name of the world wide web. As well as ICANN, each top-level domain (TLD) serviced and is kept by an administrative organization, running a registry. There is a registry responsible for keeping the database of names registered within the TLD it manages. The registry releases the advice using the WHOIS protocol a particular service, and receives enrollment information from every domain name registrar authorized to assign names in the accompanying TLD.

ICANN releases the entire list of domain name registrars and TLD registries. Registrant advice related to domain names is kept in a web-based database reachable with the WHOIS service. For most of the more than 290 country code top-level domains (ccTLDs), the domain registries keep the WHOIS (Registrant, name servers, expiration dates, etc.) advice. For example, DENIC, Germany NIC, holds the DE domain name data. Since about 2001, most gTLD (Generic top-level domain) registries have embraced this so called thick registry strategy, i.e. keeping the WHOIS data in essential registries instead of registrar databases.

For NET domain names and COM, there is a thin registry version used. The domain registry (e.g., VeriSign) holds essential WHOIS data (i.e., registrar and name servers, etc.) You can discover the detailed WHOIS (registrant, name servers, expiry dates, etc.) at the registrars.

Some domain name registries, frequently called network information centres (NIC), additionally function to end users as registrars. The leading generic top-level domain registries, for example for the domains COM, NET, ORG, INFORMATION, make use of a registry-registrar model comprising many domain name registrars.[20][21] In this approach to control, the registry simply handles the domain name database as well as the relationship with all the registrars. The registrants (users) are customers in certain situations through added levels of resellers.

No comments:

Post a Comment