From 9d5ea16f535bac3b147ce03feb2b86b7a19375b7 Mon Sep 17 00:00:00 2001 From: Pratik Lagaskar <pratik.lagaskar@mitaoe.ac.in> Date: Sat, 16 Jul 2022 18:51:39 +0000 Subject: [PATCH] instructions for checking blocker-state --- README.md | 20 +++++++++++++++++++- 1 file changed, 19 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 89a2c3b..d239ba6 100644 --- a/README.md +++ b/README.md @@ -68,7 +68,8 @@ go mod tidy ``` If go.mod and go.sum are missing from the cloned repository, then: ``` -go mod init [module-path] +# go mod init [module-path] +go mod init main ``` ## Build & Run <a name="Build & Run"></a> @@ -78,11 +79,28 @@ go mod init [module-path] go build ``` An executable binary file would be generated for the library. +In Windows, a executable named- main.exe would be created. ``` # executing the binary +main.exe +``` +This would start the network wide DNS-level blocker on port 53. + +## Test the blocker <a name="Test"></a> +To check if the blocker is blocking malicious domains from the provided blacklist, run **nslookup** command and see the response: ``` +# For example: 'adbuddiz.com' is one of the domain in the blacklist +nslookup -port=53 adbuddiz.com localhost +Server: UnKnown +Address: ::1 + +Non-authoritative answer: +Name: adbuddiz.com +Addresses: :: + 0.0.0.0 +``` ## Integration <a name="Integration"></a> To integrate the VPN-Hole Library with existing cross-platform applications, we will be using gomobile to compile and bind it. -- GitLab