Hacker News new | past | comments | ask | show | jobs | submit login
NextDNS is my new favourite DNS service (angristan.xyz)
350 points by angristan on April 13, 2020 | hide | past | favorite | 122 comments



Been using NextDNS for a few months now, I cant even find a single flaw. DNS is fast, Both founder must be expert in networking, I have tried literally all the third party DNS services, Ad blocking or not and NextDNS is actually one of the best / fastest DNS services. And I often think of myself as having latency intolerance so it is very good. Despite what I thought 300,000 DNS queries/month was low it turns out I never exceeded that limit.

And its Dashboard / Control Panel, it is very fast, extremely responsive. Basically I love everything about NextDNS, from DNS Speed, Ease of use and Design. Anyone who want Ad blocking should give it a go.

Edit: Not affiliate with NextDNS, just personal opinion. Not sure why the downvote.


I've added my relatives to my NextDNS and have yet to receive a single complaint while blocking a whopping 25% of all requests. (Off course I turned off logging.) I'd be happy to pay them even for my limited number of requests.


You could be logging all DNS queries of your relatives by a single click of a button? Did you inform them of this possibility, just curious, not judging.


Logging is on by default and per system. So yes, that is definitely possible. The majority of users are my children so I don't feel the need to inform them and the SO was not fully informed other than "tell me if it breaks something".

It's a good question to reflect on though. If I install this at my parents should I tell them. The whole world is monitoring their DNS now and after this only (potentially) me and NextDNS.


Thanks for your reply. I usually cant inform my SO more anyway, simply not understanding the technical limitations or reasons for something, but I do always tell.

I'll be checking out nextDNS for sure, even though its just for seeing what its about etc.


It really isn't hard to provide "fast DNS". Most of the speed-ups come thanks to caching anyway.


> Most of the speed-ups come thanks to caching anyway.

I'm afraid you trivially dismiss how hard this is.

For e2e response times as low as 10s from any ___location, one needs a global footprint behind an anycast network. Both these things aren't easy to do (on your own), especially for something as ubiquitous as name resolution which needs near 100% uptime and consistently low latencies.

Fast isn't the only thing here though, nextdns provides custom configuration and logging over multiple endpoints (including ipv4) served from 33 points of presence. I'm sure keeping lights on with this setup gets tricky pretty quick, let alone implementing features at the pace that they have been. Romain Contepas and Olivier Poitrus are the only reasons nextdns is what it is-- They are world-class experts in building such systems.


> I'm afraid you trivially dismiss how hard this is.

I ask, in what world do you have "slow DNS"? The choices out there is ISP run which virtually always low latency, an anycast run service, or running your own.

I don't care what technology you throw at the problem or who designed it, there really isn't "slow DNS", just bad choices of DNS servers that incur a round-trip latency penalty. I will assert again what keeps DNS "fast" is the aggressive caching of responses.


I've had the complete opposite experience to the author w.r.t. PiHole and WireGuard.

I run a PiHole on my home network and it's also my WireGuard "server". I will concede am lucky enough to have static IPv4/IPv6 addresses on my home connection.

On my iOS devices I have two connections set up: one for "access to home + DNS", and the other for all traffic. When I'm on my home wifi the VPN connection is off, when I'm on cellular data the DNS is set to the PiHole, and when I'm on any other wifi I route all traffic via the VPN (all automatically via the WireGuard app).

For my other mobile devices... well, they're Linux, so I just set the DNS server correctly and leave WireGuard always connected. It's a UDP "connection" for crying out loud.

This all works flawlessly now to the point that my less technically-minded roommate has it set up on their phone, too: they can access the NAS all the time and ads are blocked in the web browser and in apps.


Can you describe in more detail the iOS configuration? This is basically what I've been wanting to do, but haven't found out how to get the experience right on my phone.


Happily.

I use the official WireGuard app from the app store. I have two connections configured.

Assume that the endpoint (i.e. server running wireguard on port 500) is 8.8.8.8:500, the IP of my iDevice on the VPN should be 192.128.1.254, my home LAN is 192.168.1.0/24, my PiHole is 192.168.1.2, and my home wifi SSID is Ycombinator.

Connection 1 is:

- Address(es): 192.168.1.254

- DNS Servers: 192.168.1.2

- Endpoint: 8.8.8.8:500

- Allowed IPs: 192.168.1.0/24

- On-demand activation:

-- Wifi: Off

-- Cellular: On

Connection 2 is:

- Address(es): 192.168.1.254

- DNS Servers: 192.168.1.2

- Endpoint: 8.8.8.8:500

- Allowed IPs: 192.168.1.0/24, 0.0.0.0/0

- On-demand activation:

- Wifi: On (Except 1 SSID: Ycombinator)

- Cellular: Off

If this isn't clear, I can post screenshots.


> Allowed IPs: 192.168.1.0/24, 0.0.0.0/0

Is this redundant, since 0.0.0.0 should include the 192.168.1.0/24 subnet? Not being a smart alec, I'm actually asking: I have an okay-ish understanding of networking stuff but not an expert.


Yes indeed, that’s how I have it setup. I have one WireGuard configuration on iOS, for both cellular and WiFi (except my home SSID). And it works like a charm.


> 192.168.1.0/24, 0.0.0.0/0

I believe his question was, for Allowed IPs, isn't including "192.168.1.0/24" explicitly redundant since you've also specified "0.0.0.0/0"?

The answer, by the way, is yes.


GP is correct. 0.0.0.0/0 is all possible IPv4 subnets.


pfSense + pfBlocker ~ OpenVPN because I'm pretty old - along with DNS over TLS & ICR what else.

Sidebar: I also have a copy of my desktop Firefox hosted as a RemoteApp on a Win10Ent VM, for the odd time I need remote access to a credentialed account while I'm away.


I like remote FF setup. Any comment on Earn it act?


My comment on the Earn-it act is it's the natural outcome of unqualified US voters choosing unqualified politicians, thanks to largely inept news coverage.

Or if you want something more topic specific, Feinstein co-sponsors it so we can fully assume it elevates the whims of The State over the welfare of us.


I’ve got Pi-Hole and PiVPN with WireGuard setup as well, however not the two part like yours - I only turn on VPN on my iOS devices as needed, have you setup yours to auto connect based on name WiFi SSID? If so how?


The Wireguard app allows you to set up On-Demand connections with a whitelist (or blacklist) of SSIDs.


That’s amazing! Here is the setting for others who didn’t know[0]

[0] https://imgur.com/a/lXXppBq


Only on iOS. :(


Because it's an iOS feature which it's exposing.


I do the same thing with Wireguard. I have a "LAN" which consists of my workstation, 2 dedis, random VMs on demand, iPhone, iPad, home devices and two resolvers, one of which is a PiHole.

It's a spectacular experience when it comes to accessing all your stuff without multiple logins (since none of it is exposed to the internet) and Wireguard is blazing fast.


"I will concede am lucky enough to have static IPv4/IPv6 addresses on my home connection."

A while back, some HN commenters in a Wireguard thread tried to argue that all home connections have static IP addresses, or at least ones that do not change frequently enough to be an issue. If I had a static IP address I, too, would consider myself lucky.


Why not use use a dynamic dns service? My router updates my VPN's dns entry automatically at cloudflare when it gets a new up. Everything works like magic just like the previous poster's setup, except without a static home ip.


Many ISPs, particular in EMEA, don't even hand out public IP addresses to their customers; cf. CGNAT [0]. End users, at home, will get RFC1918 or RFC6598 IPs from their provider.

While they could still use a dynamic DNS service, the public IP that it sees will actually be a public IP address that is shared by many customers.

---

[0]: https://en.wikipedia.org/wiki/Carrier-grade_NAT


This works for me, my Pi has a little script to get public IP and update DNS. The rare IP switch at home is updated in 10 minutes. Bonus the endpoint is in my ___domain.


Many mobile devices don't permit setting a hostname for DNS provider.


It's hostname for VPN endpoint not DNS.


Sadly I had battery drain issues with WireGuard on Android. That's why I'm content enough with the native DoT feature.


Were you using the userspace implementation or kernel-mode? Kernel mode is supposed to increase performance and reduce battery draw.

Perhaps a kernel is available for your device, or you can look at building and contributing one if not!

What device do you have?


A lot of people who erroneously turn on PersistentKeepalive on their phones wind up with battery drain for clear reasons. Mobile phone users very much should not be using PersistentKeepalive.


Same with iOS. The battery drain was significant enough to make my phone hot even when the screen was off.


The app has a logging facility.

I'm not affiliated with the WireGuard project, but I would appreciate it if you could encounter the issue again, and then submit an account of your experience and the logs from your device.


I have not experienced this on my (older) iPhone, and my Wireguard VPN is always on (to Mullvad).


I use WG and pihole myself, but that is not an appropriate solution for my family and non-techie friends.


One thing that gives me some confidence in NextDNS is that they have joined Mozilla's Trusted Recursive Resolver program.

Choosing it within Firefox's setting won't enable any of the filtering the article mentions, though. You need a custom config for that.

https://blog.mozilla.org/blog/2019/12/17/firefox-announces-n...

https://wiki.mozilla.org/Security/DOH-resolver-policy


Also, one extra nice thing about using NextDNS via DoH (as you would with Firefox) is that now everything except the fact you're talking to NextDNS is concealed from eavesdroppers even if you do have custom config.

If you use other methods, NextDNS needs to figure out which custom config is yours, and there's no way to hide that from an eavesdropper (at least not yet). For example with DoT the customisation is hidden as a server name, and travels plaintext in SNI during TLS connection.

But with DoH that indication is in the URL path component, which is just more encrypted data in DoH and so an eavesdropper can no more discover which (if any) customisation you use than they can discover my Hacker News password when I log in here.


I tried NextDNS out recently, and had a few technical questions about how it was interacting with some specialised DNS software I was testing. I clicked the livechat button on the website and was connected within seconds to someone who understood DNS at the protocol level. It was... unexpected and amazing.


Same. I got on the chat, which was answered by Romain (one of the founders), to request them to add yhosts [0] to the blocklists, and it was in production in less than 10 mins.

[0] yhosts (https://github.com/nextdns/metadata/blob/master/privacy/bloc...) blocks most tracking domains belonging to various Chinese OEMs that weren't in other blocklists.


Now THAT is the most impressive thing I have heard about them.


For now. That level of support is inevitable for a small startup and generally unsustainable beyond that stage.


NextDNS is great for all my devices. let's me access Handshake domains easily from https://dns.live

The default blacklist for NextDNS is really good too; stops a lot of Windows phone home stuff too, and can easily see all that.

Don't add a bunch of blacklists though or websites break


What are Handshake domains?


Crypto secured domains, I assume. First google result is namebase, which is a familiar name in such a field. https://www.namebase.io/




I'm fairly well-versed in DNS, and aware of Handshake protocol as well, but I have absolutely no idea what DNS.live is about.


I went over their site. I'm a big fan of the nextdns project and the handshake project. DNS.live is a hub that lists top sites hosted with the TLDS from Handshake and offers free stuff. Basically the Handshake gTLD directory to make it easy to check out other people's sites as decentralized DNS evolves and see when names become available.

Websites instead of being http://whatever.com are just http://whatever/

It offers free free NS Hosting, free web hosting, free blog hostting, and free URL redirection for Handshake.org TLDs. No account is required (as per their website): https://dns.live/hosting.html

is the free hosting link

To learn more about it they have a start page: https://dns.live/start.html

And here are two excellent turorials on it: https://www.namebase.io/blog/how-to-access-handshake-domains... and from Namebase.io (the ONLY TLD auction) has a good write up on NextDNS and how to get it going: https://www.namebase.io/blog/how-to-access-handshake-domains...

Namebase.io is like the auction system to obtain the domains, dns.live lists them and offer hosting

For me I just enabled Nextdns on all my devices and checked the handshake slider so I can see websites like http://ix

Regular dns works as it should and it blocks trackers etc.


Looks like Namebase requires ID verification before you can bid on a ___domain. Sounds like the new DNS is going to be even worse than the current one.


No sir, only if you want to transfer assets or get USD etc. You can bid still.

From their restrictions page: Due to regulatory reasons in the US (we're not happy about it either), Namebase accounts are restricted in functionality until they have successfully been verified. Once an account has been verified, it'll be able to:

    Trade on Namebase Pro (non-US only)
    Withdraw HNS (non-US only)
    Buy and Sell HNS with BTC (global)
    Buy and Sell HNS with USD (US only)
Before an account has successfully verified, it'll still be able to:

    Transfer HNS into its cloud wallet
    Bid on Handshake names
    Withdraw Handshake names


Thanks, I noticed that just before reading your comment. I guess I can get HNS on another site and send it to them without verifying, thanks.


Hi I'm the CEO of Namebase. You're right that's the best way to bid anonymously on Namebase right now. We're also going to add the ability to bid anonymously directly on Namebase. The account verification is only required for purchasing HNS which we need to do due to regulatory restrictions in the US.


That makes sense, though I wouldn't expect it to be required when buying HNS with BTC. I signed up for the airdrop so I got a bunch of HNS I can play with, thanks.


> Despite how much I like Cloudflare and this specific service, I want to block trackers at the DNS level. 1.1.1.1 is probably the most reliable and fastest resolver there is on earth, but that does not fit my use case either.

Isn't this a bit poorly timed, considering the recent Cloudflare DNS announcement?

> In the coming months, we will provide the ability to define additional configuration settings for 1.1.1.1 for Families. This will include options to create specific whitelists and blacklists of certain sites. You will be able to set the times of the day when categories, such as social media, are blocked and get reports on your household's Internet usage.

https://blog.cloudflare.com/introducing-1-1-1-1-for-families...


I doubt they're going to support adblocking as a first class citizen.


Why? Their business model doesn't involve advertising at all.


Yeah. No. Many advertisers rely on Cloudflare. If Cloudflare would choose to block ads, I'd imagine that lots of folks would ditch them and use some other DNS provider instead.


CloudFlare's blocking appears to be focused on, say, gay rights groups, while allowing access to StormFront.

I'm not sure that fits the needs of OP, or indeed most families.


https://blog.cloudflare.com/the-mistake-that-caused-1-1-1-3-...

They made a mistake, promptly realized it, put fixes in place, and updated their procedures. Then, their CEO wrote a post apologizing. Whatever your view is on Cloudflare, it is not fair to say that they didn't react properly to this specific issue and I don't think it is fair to criticize them (again, for this specific issue).


I've started using NextDns on my phone (Android) for its simplicity and thoroughness.

One of the harder parts about DNS based blocking is that it's significantly more effort to unblock something like clicks from tracked deals sites than ublock browser extension.

For my routers, I'm mostly happy with last week's announced 1.1.1.2 malware blocking from Cloudflare.


NextDNS is also my new favorite DNS service - especially since they've been supporting Handshake name resolution at the click of a button since March 20th. [1]

[1] https://twitter.com/nextdnsio/status/1241178358257455104


Sorry for being naïve: What is handshake-dns useful for-- is it like dnscrypt? Is it mainstream enough to matter yet?


Handshake is an attempt to decentralize DNS root domains. It isn't mainstream enough to matter yet. I'm pretty excited about it though :)

You can read more at https://handshake.org/


I'm hosting my own DNS server with DoT/DoH as reverse proxy of PiHole server. The latency might not as impressive as NextDNS' (7~10ms on my phone via TMobile), and I can have full control of the stack.

https://github.com/yegle/your-dns


> The latency might not as impressive as NextDNS'...

For just DoH and low latencies, see Stackpath: https://news.ycombinator.com/item?id=19514791

With fly.io, one could run DoT, too: https://fly.io/docs/app-guides/run-a-private-dns-over-https-... (that's a tutorial on DoH, though).

I use Cloudflare Workers (their generous free-tier covers 3 devices worth DNS queries, with much room to spare), but the 128MiB RAM limit restricts the number of domains in my blocklists: https://news.ycombinator.com/item?id=22208988


Started using NextDNS a week ago and it's quite good so far. One of my concerns was how hard it would be to debug websites/services that stop working but it their logging being instant made it superbly easy. I can turn on logging, go to the website/app that doesn't work correctly, go right back to the NextDNS logs to see the requests instantly. You can then filter for the blocked ones too.


I tested the ipv6 latency to nextdns https://my.nextdns.io and opennic https://servers.opennic.org –– I'm impressed with the newcomer, with 21㎳ median it's very close to the 17㎳ median I currently enjoy.


This looks great, but unfortunately CloudFlare has 1ms ping for me but NextDNS has 50ms. I'm not quite sure how it can reply in 1ms, but that's what I'm getting.


1 ms... Do you live in their datacenter? I sadly don't even get that kinda RTT inside my own house.


Let's flex then...

  PING 1.1.1.1 (1.1.1.1) 56(84) bytes of data.
  64 bytes from 1.1.1.1: icmp_req=1 ttl=58 time=0.661 ms
  64 bytes from 1.1.1.1: icmp_req=2 ttl=58 time=0.638 ms
  64 bytes from 1.1.1.1: icmp_req=3 ttl=58 time=0.615 ms
  64 bytes from 1.1.1.1: icmp_req=4 ttl=58 time=0.654 ms
Fiber connection by Init7, Switzerland


I don't either, that's why I'm puzzled. Here's my traceroute:

https://www.pastery.net/zppyhe/

I do have a fiber connection to my ISP, but still, 1 ms is pretty low. I wonder if something else is replying, but I tried 1.1.1.2 as well and the latency is the same.


Greece is a hard place for many to serve, not a big internet hub. Evidently CloudFlare has servers there, and transit with Cogent too.


Yeah, definitely. I'm surprised CloudFlare has servers near here, if anything.


Nice! Your ISP is good, too. Mine bounces me at least 4 or 5 times before actually going towards the destination.


I like them a lot, they're a small local ISP that does fiber to the home. I just wish they supported IPv6.


Have you tried running an actual DNS query against 1.1.1.1? Some ISP were known to filter/blackhole/reroute 1.1.1.1: https://blog.cloudflare.com/fixing-reachability-to-1-1-1-1-g... maybe you're concerned. Otherwise, that's a pretty insane latency!


I use it as my DNS server, so it's working fine, but that's a good idea. Unfortunately, my home router intercepts all DNS queries and reroutes them to its own dnsmasq (which forwards to 1.1.1.1), so I can't do a proper benchmark unless I disable it.

I do wonder what's going on, but here's my traceroute to 1.1.1.1:

https://www.pastery.net/zppyhe/

EDIT: I disabled my DNS interception and it looks like I do, indeed, get 1 ms latency:

https://www.pastery.net/bykmcp/


Interesting. Looks like I have the same thing going on at home, because I have 2.8 ms to 1.0.0.1 and 0.5 ms (!) to 1.1.1.1: https://i.imgur.com/5qpMbuh.png. Both answer to DNS queries, though.


For me it's not so bad, just 10ms, but my ping to Google and CloudFlare DNS is 0.8ms.

The weird thing is that on their front page they claim to have a PoP in Zürich, the nearest city, yet my traffic is going via DE-CIX. My ISP (AS13030) even peers with Misaka Network (AS57695), which appears to be their backend.


I get 1ms to both.

NextDNS will hopefully keep rolling out new sites.


NextDNS is excellent, I have my family and non-techie friends using it. Personally I just wireguard to my home network and use pihole.

Hopefully Windows, Linux, iOS, and MacOS natively support DoH soon. It's a pain setting up proxies.

Even worse, iOS forces you to use a fake VPN to change DNS servers at all on cellular!


I was pleasntly surprised and happy to see that I could use this service or Cloudflare on the latest version of Android natively by just typing in a URL into the settings rather than having to install a 3rd party app!


> Even worse, iOS forces you to use a fake VPN to change DNS servers at all on cellular!

This is a major pain point for me - I'm trying to use both NextDNS and Tailscale on my iPhone SE 2016, and confirmed that they clash with each other. :(


Surrendering our DNS traffic to few massively centralized services is even worse than to local ISPs.


Have you checked out Handshake? It's a new experimental protocol that's trying to decentralize DNS https://handshake.org


I switched from pointing various things to cloudflare to simply using NextDNS a while ago, and it's just excellent. The onboarding flow was way faster and easier than I thought it would be (fantastic setup documentation). Configurations are really great for customization at per-device granularity. Extremely slick and fast web UI. Great DNS latency + performance overall.

I was planning on setting up my own recursive resolver one day (tm) but NextDNS really just makes everything so seamless + easy.


And I'm impressed at the speed they're implementing new things I didn't even know I wanted (Handshake TLD, more blocklists, etc)


I've been using NextDNS on my laptop, two phones, and a tablet for months now, after hearing about it from a poster here on HN.

Love it. I'm just worried that there is something a bit more nefarious going on. If you're not paying, you're the product being sold.

Are we still just in the 'growth and acquire' phase here, where paid subscriptions will eventually be required?


NextDNS works great for me, I use it as a second layer to ublock origin and it still catches things.

Only downside I have is when something does break, and it happens occasionally, I have to whitelist the ___domain on their dashboard. You can only whitelist the ___domain for all requests, which is not what I would like. Would prefer to whitelist it on a specific page and for a temporary time.

Otherwise when something break I have to go to their dashboard, whitelist the ___domain, use the website and then go back and blacklist it again.

Would be nice if they had a browser extension that can do that in the browser without having to go to their dashboard


I deployed NextDNS for my family months ago. The Handshake resolver locked in NextDNS for my home network. I've been considering setting up PiHole as well — Handshake resolution would lock that in.


Interesting - just found weird behaviour in pihole. It's asking upstream to resolve "pi.hole" according to nextdns. That shouldn't be happening


Check /etc/pihole/local.list

It should have something like

    x.x.x.x pi.hole
where x.x.x.x is your pihole's local ip.


It's in a docker container so any changes will just get wiped on next version upgrade. I just checked and it does have the right IP in it though (IP of device hosting pihole). So doesn't seem to be obviously misconfigured. Weird.

.hole doesn't seem to be a valid TLD so not much of a security risk


also a fan of NextDNS. i have been using the service for a few weeks, since i saw them mentioned on twitter. looks like the aggregate number of queries from the many devices on my home network will exceed 300,000 per month, so i am happy to start paying as soon as they start charging.


It really is incredible, first time I couldn't think of any improvements a product could add


Support is also great. It accidentally a Dutch government website (probably had reasons) it was fixed < 24 h after my email.

I think its brilliant. Using client side ad-blockers on shitty hardware [to make things less slow] adds a good bit of overhead.


We use NextDNS to access Handshake ___domain names and it's been working great. The privacy features are great too, although email links sometimes don't work because of them (more of a feature than a bug imo).


PiHole at it's core is easy access to a bunch of blocklists. Why not just run a local resolver and import the blocklists if your usecase is mobile and you don't want to vpn your traffic?


I’ve moved from a local resolver with regular block list updating to NextDNS - here’s why I’d recommend it over a diy solution:

1. Easy to turn on and off. My block lists were pretty aggressive and worked beautifully 90% of the time. However, occasionally I’d need to hit a site that was registered in a list that wasn’t immediately obvious. The O’Reilly site is (was) a good example - they were loading a script on their login page at one point that failed because I’d blocked the source. I’ve encountered other site that fail in similar ways. Being able to temporarily disable adblocking (OSX via the app) is tremendously convenient.

2. The blacklists and blocking categories offered by NextDNS are at least as good as what I’d managed to pull together (I was pretty proud of mine), they update frequently, and again it’s very easy to opt-in/opt-out

3. CName cloaking - unless you update your own lists very frequently, there’s a good chance you won’t be as effective at catching third-party trackers masquerading as first parties.

I had fun running a local resolver and updating it from various block list sources with a cron job. I’d add new entries manually as I encountered them, but after a while it got old. Additionally, I wanted the same protection outside of my network. The same setup on a FreeBSD droplet worked well, but was more maintenance. NextDNS does at least as good a job, and it’s way more convenient.


I am using this on and off. I have some trouble with its adblocknig etc.

Some apps and some sites do not work well.

You could easily say that this is due to the pages or app itself and I agree. Still. I have to use some of them.


> Some apps and some sites do not work well.

You might have enabled some pretty aggressive blocklists with nextdns. If you can't be bothered, Adguard DNS is more accommodating but configuration-less, give it a try [0].

As for sites, I use startpage's anonymous-view [1] or brow.sh [2] at times.

[0] https://news.ycombinator.com/item?id=18788410

[1] https://www.startpage.com/en/anonymous-view/

[2] https://news.ycombinator.com/item?id=17487552


I've been using DNS Made Easy for some years now, can someone who knows both, fill me in on the main differences? Any need to change?


DNS Made Easy (Which, by the way, is great and fast, although I'm using HE for some domains) is for your domains.

NextDNS is for your devices. Is a DNS provider for your network and devices that allows you to block ads, custom configs and the like. Seems an advanced version of what OpenDNS used to offer back in the day (not sure if they still do it after Cisco acquisition).


Thanks that helped!


What a great write up. If they can get over the technical fear for the average user this is a huge idea and the price is fair.


I'll give a try :) but it's a little bit suspicious that there is not a single bad comment about NextDNS......


Doesn't seem to be catching much that uBlock and pihole aren't. 0.07%. Not super surprising I guess

edit...and noscript


There are multiple blocklists you can enable.


Yeah I don't think it's a flaw with NextDNS. Just means my existing setup is already doing a decent job. Another layer is always good though

I did have a look at additional blocking lists on there though - some good options there. Added "Block Child Sexual Abuse Material" and gambling.


How do ads get blocked in the DNS level?


When the browser tries to load an ad, let's say from "ads.com", the DNS service responds to that ___domain with 0.0.0.0, which prevents the ad from loading. You enable lists to customize which domains should be considered ad domains and can optionally blacklist other domains.


Are any ad networks bypassing this yet by serving ads from a static IP?


IP lookups for known ad-serving domains are instead given a bad response or an IP of a (local) address showing a block page / no response.


can pdnsd (persistent/cache) work with nextdns ?


It's also fairly easy to run your own recursive resolver in case you don't want to use an external DNS service. I use Unbound and ad-blocking lists and it works great.


wow this is great! Now I want Apple to acquire them and provide this natively on the iPhone.


I've not used it, but Adguard also has an ad blocking DNS[0].

[0] https://adguard.com/en/adguard-dns/overview.html


Used Adguard for about 2.5 years, and literally switched to NextDNS yesterday after reading this article. I've got a blog post about DNS ad-blocking [0], updating stuff now and then. I hope it points out some of the different features and reasons to use one over the other. Let me know what you think!

[0] https://www.calebyers.com/blog/dns-ad-blocking.html


You've not read the article either. Author was using adguard dns for a year before switching out


Adguard DNS works fine out of the box, but you can't configure it and more importantly have no way to whitelist sites. If you block ads you _will_ have page damage and no way to fix it with that service. Nextdns solves that problem.




Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: