V2EX = way to explore
V2EX 是一个关于分享和探索的地方
Sign Up Now
For Existing Member  Sign In
KingFong
3.83D

QuanX 的 DNS 劫持导致调试和 dig 模式下拿不到真实的 IP

  •  
  •   KingFong ·
    PRO
    · Dec 8, 2023 · 1344 views
    This topic created in 885 days ago, the information mentioned may be changed or developed.

    如图所示,工作需要,经常会用 chrome 的 F12 调试模式来看目标服务器的地址,但是由于默认一直开着 QuanX ,它会把所有的域名劫持到 198.18.*.*上面。

    然后用系统的 dig 命令也会,所有的域名都是 198.18.*.*这样的。除非手动指定,例如 dig @114.114.114.114

    请问有什么配置,可以让 quanx 正常工作,且这两个地方得到的解析地址也是现实正确的?

    2 replies    2023-12-08 16:19:15 +08:00
    pinkbook
        1
    pinkbook  
       Dec 8, 2023   ❤️ 1
    dns_exclusion_list =
    配置文件中这个参数后面域名好像不走 fake-ip 模式
    pinkbook
        2
    pinkbook  
       Dec 8, 2023
    @pinkbook #1 示例文件中解释如下:
    The dns_exclusion_list contains the domains that disabled the placeholder IP(198.18.0.0/15) mapping mechanism. Domains that are not in the dns_exclusion_list have the placeholder IP mapping mechanism enabled and have the so called "resolve-on-remote" effect. The DNS query for domains in the dns_exclusion_list may or may not follow the settings in [dns] section.
    About   ·   Help   ·   Advertise   ·   Blog   ·   API   ·   FAQ   ·   Solana   ·   5603 Online   Highest 6679   ·     Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 · 35ms · UTC 08:25 · PVG 16:25 · LAX 01:25 · JFK 04:25
    ♥ Do have faith in what you're doing.