You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

365 lines
22 KiB

  1. # DNS based ad/abuse domain blocking
  2. ## Description
  3. A lot of people already use adblocker plugins within their desktop browsers, but what if you are using your (smart) phone, tablet, watch or any other (wlan) gadget!? Getting rid of annoying ads, trackers and other abuse sites (like facebook) is simple: block them with your router. When the DNS server on your router receives DNS requests, you will sort out queries that ask for the resource records of ad servers and return a simple 'NXDOMAIN'. This is nothing but **N**on-e**X**istent Internet or Intranet domain name, if domain name is unable to resolved using the DNS server, a condition called the 'NXDOMAIN' occurred.
  4. ## Main Features
  5. * support of the following domain blocklist sources (free for private usage, for commercial use please check their individual licenses):
  6. * [adaway](https://adaway.org)
  7. * => infrequent updates, approx. 400 entries (enabled by default)
  8. * [adguard](https://adguard.com)
  9. * => numerous updates on the same day, approx. 12.000 entries
  10. * [bitcoin](https://github.com/hoshsadiq/adblock-nocoin-list)
  11. * => infrequent updates, approx. 15 entries
  12. * [blacklist]()
  13. * => static local blacklist, located by default in `/etc/adblock/adblock.blacklist`
  14. * [disconnect](https://disconnect.me)
  15. * => numerous updates on the same day, approx. 6.500 entries (enabled by default)
  16. * [dshield](http://dshield.org)
  17. * => daily updates, approx. 4.500 entries
  18. * [hphosts](https://hosts-file.net)
  19. * => monthly updates, approx. 50.000 entries
  20. * [malwaredomains](http://malwaredomains.com)
  21. * => daily updates, approx. 16.000 entries
  22. * [malwaredomainlist](http://www.malwaredomainlist.com)
  23. * => daily updates, approx. 1.500 entries
  24. * [openphish](https://openphish.com)
  25. * => numerous updates on the same day, approx. 1.800 entries
  26. * [ransomware tracker](https://ransomwaretracker.abuse.ch)
  27. * => daily updates, approx. 150 entries
  28. * [reg_cn](https://easylist-downloads.adblockplus.org/easylistchina+easylist.txt)
  29. * => regional blocklist for China, daily updates, approx. 1.600 entries
  30. * [reg_cz](https://raw.githubusercontent.com/qxstyles/turris-hole-czech-block-list/master/turris-hole-czech-block-list)
  31. * => regional blocklist for Czechia, maintained by Turris Omnia Users, infrequent updates, approx. 100 entries
  32. * [reg_de](https://easylist-downloads.adblockplus.org/easylistgermany+easylist.txt)
  33. * => regional blocklist for Germany, daily updates, approx. 9.200 entries
  34. * [reg_id](https://easylist-downloads.adblockplus.org/abpindo+easylist.txt)
  35. * => regional blocklist for Indonesia, daily updates, approx. 800 entries
  36. * [reg_nl](https://easylist-downloads.adblockplus.org/easylistdutch+easylist.txt)
  37. * => regional blocklist for the Netherlands, weekly updates, approx. 1300 entries
  38. * [reg_pl](http://adblocklist.org)
  39. * => regional blocklist for Poland, daily updates, approx. 50 entries
  40. * [reg_ro](https://easylist-downloads.adblockplus.org/rolist+easylist.txt)
  41. * => regional blocklist for Romania, weekly updates, approx. 600 entries
  42. * [reg_ru](https://code.google.com/p/ruadlist)
  43. * => regional blocklist for Russia, weekly updates, approx. 2.000 entries
  44. * [shallalist](http://www.shallalist.de) (categories "adv" "costtraps" "spyware" "tracker" "warez" enabled by default)
  45. * => daily updates, approx. 32.000 entries (a short description of all categories can be found [online](http://www.shallalist.de/categories.html))
  46. * [spam404](http://www.spam404.com)
  47. * => infrequent updates, approx. 5.000 entries
  48. * [sysctl/cameleon](http://sysctl.org/cameleon)
  49. * => weekly updates, approx. 21.000 entries
  50. * [ut_capitole](https://dsi.ut-capitole.fr/blacklists) (categories "cryptojacking" "ddos" "malware" "phishing" "warez" enabled by default)
  51. * => daily updates, approx. 64.000 entries (a short description of all categories can be found [online](https://dsi.ut-capitole.fr/blacklists/index_en.php))
  52. * [whocares](http://someonewhocares.org)
  53. * => weekly updates, approx. 12.000 entries
  54. * [winhelp](http://winhelp2002.mvps.org)
  55. * => infrequent updates, approx. 15.000 entries
  56. * [winspy](https://github.com/crazy-max/WindowsSpyBlocker)
  57. * => infrequent updates, approx. 120 entries
  58. * [yoyo](http://pgl.yoyo.org/adservers)
  59. * => weekly updates, approx. 2.500 entries (enabled by default)
  60. * zero-conf like automatic installation & setup, usually no manual changes needed
  61. * simple but yet powerful adblock engine: adblock does not use error prone external iptables rulesets, http pixel server instances and things like that
  62. * support four different DNS backends: `dnsmasq`, `unbound`, `named` (bind) and `kresd`
  63. * support two different DNS blocking variants: `nxdomain` (default, supported by all backends), `null` (supported only by `dnsmasq`)
  64. * support six different download utilities: `uclient-fetch`, `wget`, `curl`, `aria2c`, `wget-nossl`, `busybox-wget`
  65. * fast downloads & list processing as they are handled in parallel running background jobs (see 'Download Queue')
  66. * provide `http only` mode without installed ssl library for all non-SSL blocklist sources
  67. * support a wide range of router modes, even AP modes are supported
  68. * full IPv4 and IPv6 support
  69. * provide top level domain compression (`tld compression`), this feature removes thousands of needless host entries from the blocklist and lowers the memory footprint for the DNS backend
  70. * provide a 'DNS File Reset', where the final DNS blockfile will be purged after DNS backend loading to save storage space
  71. * blocklist source parsing by fast & flexible regex rulesets
  72. * overall duplicate removal in central blocklist `adb_list.overall`
  73. * additional blacklist for manual overrides, located by default in `/etc/adblock/adblock.blacklist` or in LuCI
  74. * additional whitelist for manual overrides, located by default in `/etc/adblock/adblock.whitelist` or in LuCI
  75. * quality checks during blocklist update to ensure a reliable DNS backend service
  76. * minimal status & error logging to syslog, enable debug logging to receive more output
  77. * procd based init system support (`start/stop/restart/reload/suspend/resume/query/status`)
  78. * procd network interface trigger support or classic time based startup
  79. * keep the DNS cache intact after adblock processing (currently supported by unbound, named and kresd)
  80. * suspend & resume adblock actions temporarily without blocklist reloading
  81. * provide comprehensive runtime information via LuCI or via `status` init command
  82. * provide a detailed DNS Query Report with DNS related information about client requests, top (blocked) domains and more
  83. * provide a query function to quickly identify blocked (sub-)domains, e.g. for whitelisting. This function is also able to search in adblock backups and black-/whitelist, to get back the set of blocking lists sources for a certain domain
  84. * option to force DNS requests to the local resolver
  85. * automatic blocklist backup & restore, these backups will be used in case of download errors and during startup
  86. * send notification E-Mails in case of a processing error or if the overall domain count is ≤ 0
  87. * add new adblock sources on your own, see example below
  88. * strong LuCI support for all options
  89. ## Prerequisites
  90. * [OpenWrt](https://openwrt.org), tested with the stable release series (19.07) and with the latest snapshot
  91. * a usual setup with an enabled DNS backend at minimum - dump AP modes without a working DNS backend are _not_ supported
  92. * a download utility:
  93. * to support all blocklist sources a full version (with ssl support) of `wget`, `uclient-fetch` with one of the `libustream-*` ssl libraries, `aria2c` or `curl` is required
  94. * for limited devices with real memory constraints, adblock provides also a `http only` option and supports `wget-nossl` and `uclient-fetch` (without `libustream-ssl`) as well
  95. * for more configuration options see examples below
  96. * E-Mail notification (optional): for E-Mail notification support you need the additional `msmtp` package
  97. * DNS Query Report (optional): for this detailed report you need the additional package `tcpdump` or `tcpdump-mini`
  98. ## Installation & Usage
  99. * install `adblock` (`opkg install adblock`)
  100. * at minimum configure the appropriate DNS backend (`dnsmasq` by default), the download utility and enable the adblock service in `/etc/config/adblock`
  101. * control the adblock service manually with `/etc/init.d/adblock` `start/stop/restart/reload/suspend/resume/status` or use the LuCI frontend
  102. ## LuCI adblock companion package
  103. * it's strongly recommended to use the LuCI frontend to easily configure all powerful aspects of adblock
  104. * install `luci-app-adblock` (`opkg install luci-app-adblock`)
  105. * the application is located in LuCI under the `Services` menu
  106. ## Tweaks
  107. * **runtime information:** the adblock status is available via `/etc/init.d/adblock status` (see example below)
  108. * **debug logging:** for script debugging please set the config option `adb\_debug` to `1` and check the runtime output with `logread -e "adblock"`
  109. * **storage expansion:** to process and store all blocklist sources at once it might be helpful to enlarge your temp directory with a swap partition => see [OpenWrt Wiki](https://openwrt.org/docs/guide-user/storage/fstab) for further details
  110. * **coreutils sort:** To speedup adblock processing in particular with many enabled blocklist sources it's recommended to install the additional package `coreutils-sort`
  111. * **add white- / blacklist entries:** add domain black- or whitelist entries to always-deny or -allow certain (sub) domains, by default both lists are empty and located in `/etc/adblock`. Please add one domain per line - ip addresses, wildcards & regex are _not_ allowed (see example below). You need to refresh your blocklists after changes to these static lists.
  112. * **download queue size:** for further download & list processing performance improvements you can raise the `adb\_maxqueue` value, e.g. `8` or `16` should be safe
  113. * **scheduled list updates:** for a scheduled call of the adblock service add an appropriate crontab entry (see example below)
  114. * **change startup behaviour:** by default the startup will be triggered by the `wan` procd interface trigger. Choose `none` to disable automatic startups, `timed` to use a classic timeout (default 30 sec.) or select another trigger interface
  115. * **suspend & resume adblocking:** to quickly switch the adblock service `on` or `off`, simply use `/etc/init.d/adblock [suspend|resume]`
  116. * **domain query:** to query the active blocklist for a certain domain, please use the LuCI frontend or run _/etc/init.d/adblock query `<DOMAIN>`_ (see example below)
  117. * **add new list sources:** you could add new blocklist sources on your own via uci config, all you need is a source url and an awk one-liner (see example below)
  118. ## Further adblock config options
  119. * usually the pre-configured adblock setup works quite well and no manual overrides are needed
  120. * the following options apply to the `global` config section:
  121. * `adb\_enabled` => main switch to enable/disable adblock service (default: `0`, disabled)
  122. * `adb\_dns` => select the DNS backend for your environment: `dnsmasq`, `unbound`, `named` or `kresd` (default: `dnsmasq`)
  123. * `adb\_dnsvariant` => select the blocking variant: `nxdomain` (default, supported by all backends), `null (IPv4)` and `null (IPv4/IPv6)` both options are only supported by `dnsmasq`
  124. * `adb\_fetchutil` => name of the used download utility: `uclient-fetch`, `wget`, `curl`, `aria2c`, `wget-nossl` or `busybox` (default: `uclient-fetch`)
  125. * `adb\_fetchparm` => special config options for the download utility (default: not set)
  126. * `adb\_trigger` => set the startup trigger to a certain interface, to `timed` or to `none` (default: `wan`)
  127. * the following options apply to the `extra` config section:
  128. * `adb\_debug` => enable/disable adblock debug output (default: `0`, disabled)
  129. * `adb\_nice` => set the nice level of the adblock process and all sub-processes (int/default: `0`, standard priority)
  130. * `adb\_forcedns` => force DNS requests to local resolver (bool/default: `0`, disabled)
  131. * `adb\_maxqueue` => size of the download queue to handle downloads & list processing in parallel (int/default: `8`)
  132. * `adb\_dnsfilereset` => the final DNS blockfile will be purged after DNS backend loading to save storage space (bool/default: `false`, disabled)
  133. * `adb\_report` => enable the background tcpdump gathering process to provide a detailed DNS Query Report (bool/default: `0`, disabled)
  134. * `adb\_repdir` => target directory for DNS related report files generated by tcpdump (default: `/tmp`)
  135. * `adb\_backupdir` => target directory for adblock backups (default: `/tmp`)
  136. * `adb\_mail` => send notification E-Mails in case of a processing errors or if the overall domain count is &le; 0 (bool/default: `0`, disabled)
  137. * `adb\_mreceiver` => receiver address for adblock notification E-Mails (default: not set)
  138. * the following options could be added via "Additional Field" in LuCI and apply to the `extra` config section as well:
  139. * `adb\_dnsdir` => target directory for the generated blocklist `adb_list.overall` (default: not set, use DNS backend default)
  140. * `adb\_blacklist` => full path to the static blacklist file (default: `/etc/adblock/adblock.blacklist`)
  141. * `adb\_whitelist` => full path to the static whitelist file (default: `/etc/adblock/adblock.whitelist`)
  142. * `adb\_triggerdelay` => additional trigger delay in seconds before adblock processing begins (int/default: `2`)
  143. * `adb\_maxtld` => disable the tld compression, if the number of blocked domains is greater than this value (int/default: `100000`)
  144. * `adb\_portlist` => space separated list of fw ports which should be redirected locally (default: `53 853 5353`)
  145. * `adb\_dnsinotify` => disable adblock triggered restarts and the 'DNS File Reset' for DNS backends with autoload features (bool/default: `false`, disabled)
  146. * `adb\_dnsflush` => flush DNS cache after adblock processing, i.e. enable the old restart behavior (bool/default: `0`, disabled)
  147. * `adb\_repiface` => reporting interface used by tcpdump, set to `any` for multiple interfaces (default: `br-lan`)
  148. * `adb\_replisten` => space separated list of reporting port(s) used by tcpdump (default: `53`)
  149. * `adb\_repchunkcnt` => report chunk count used by tcpdump (default: `5`)
  150. * `adb\_repchunksize` => report chunk size used by tcpdump in MB (int/default: `1`)
  151. * `adb\_msender` => sender address for adblock notification E-Mails (default: `no-reply@adblock`)
  152. * `adb\_mtopic` => topic for adblock notification E-Mails (default: `adblock notification`)
  153. * `adb\_mprofile` => mail profile used in `msmtp` for adblock notification E-Mails (default: `adb_notify`)
  154. * `adb\_mcnt` => raise the minimum domain count E-Mmail notification trigger (int/default: `0`)
  155. ## Examples
  156. **change default DNS backend to `unbound`:**
  157. Adblock deposits the final blocklist `adb_list.overall` in `/var/lib/unbound` where unbound can find them in its jail, no further configuration needed.
  158. To preserve the DNS cache after adblock processing you need to install `unbound-control`.
  159. **change default DNS backend to `named` (bind):**
  160. Adblock deposits the final blocklist `adb_list.overall` in `/var/lib/bind`.
  161. To preserve the DNS cache after adblock processing you need to install & configure `bind-rdnc`.
  162. To use the blocklist please modify `/etc/bind/named.conf`:
  163. * in the `options` namespace add:
  164. ```
  165. response-policy { zone "rpz"; };
  166. ```
  167. * and at the end of the file add:
  168. ```
  169. zone "rpz" {
  170. type master;
  171. file "/var/lib/bind/adb_list.overall";
  172. allow-query { none; };
  173. allow-transfer { none; };
  174. };
  175. ```
  176. **change default DNS backend to `kresd`:**
  177. The knot-resolver (kresd) is only available on Turris Omnia devices.
  178. Adblock deposits the final blocklist `adb_list.overall` in `/etc/kresd`, no further configuration needed.
  179. **enable E-Mail notification via msmtp:**
  180. To use the email notification you have to install & configure the package `msmtp`.
  181. Modify the file `/etc/msmtprc`:
  182. ```
  183. [...]
  184. defaults
  185. auth on
  186. tls on
  187. tls_certcheck off
  188. timeout 5
  189. syslog LOG_MAIL
  190. [...]
  191. account adb_notify
  192. host smtp.gmail.com
  193. port 587
  194. from dev.adblock@gmail.com
  195. user dev.adblock
  196. password xxx
  197. ```
  198. Finally enable E-Mail support and add a valid E-Mail address in LuCI.
  199. **receive adblock runtime information:**
  200. ```
  201. /etc/init.d/adblock status
  202. ::: adblock runtime information
  203. + adblock_status : enabled
  204. + adblock_version : 3.8.0
  205. + overall_domains : 48359
  206. + fetch_utility : /bin/uclient-fetch (libustream-ssl)
  207. + dns_backend : dnsmasq, /tmp
  208. + dns_variant : null (IPv4/IPv6), true
  209. + backup_dir : /mnt/data/adblock
  210. + last_rundate : 15.08.2019 08:43:16
  211. + system_release : GL.iNet GL-AR750S, OpenWrt SNAPSHOT r10720-ccb4b96b8a
  212. ```
  213. **receive adblock DNS Query Report information:**
  214. ```
  215. /etc/init.d/adblock report
  216. :::
  217. ::: Adblock DNS-Query Report
  218. :::
  219. + Start ::: 2018-12-19, 16:29:40
  220. + End ::: 2018-12-19, 16:45:08
  221. + Total ::: 42
  222. + Blocked ::: 17 (40.48 %)
  223. :::
  224. ::: Top 10 Clients
  225. + 32 ::: 101.167.1.103
  226. + 10 ::: abc1:abc1:abc0:0:abc1:abcb:abc5:abc3
  227. :::
  228. ::: Top 10 Domains
  229. + 7 ::: dns.msftncsi.com
  230. + 4 ::: forum.openwrt.org
  231. + 2 ::: outlook.office365.com
  232. + 1 ::: www.google.com
  233. + 1 ::: www.deepl.com
  234. + 1 ::: safebrowsing.googleapis.com
  235. + 1 ::: play.googleapis.com
  236. + 1 ::: odc.officeapps.live.com
  237. + 1 ::: login.microsoftonline.com
  238. + 1 ::: test-my.sharepoint.com
  239. :::
  240. ::: Top 10 Blocked Domains
  241. + 4 ::: nexus.officeapps.live.com
  242. + 4 ::: mobile.pipe.aria.microsoft.com
  243. + 3 ::: watson.telemetry.microsoft.com
  244. + 2 ::: v10.events.data.microsoft.com
  245. + 2 ::: settings-win.data.microsoft.com
  246. + 2 ::: nexusrules.officeapps.live.com
  247. [...]
  248. ```
  249. **cronjob for a regular block list update (`/etc/crontabs/root`):**
  250. ```
  251. 0 06 * * * /etc/init.d/adblock reload
  252. ```
  253. **blacklist entry (`/etc/adblock/adblock.blacklist`):**
  254. ```
  255. ads.example.com
  256. This entry blocks the following (sub)domains:
  257. http://ads.example.com/foo.gif
  258. http://server1.ads.example.com/foo.gif
  259. https://ads.example.com:8000/
  260. This entry does not block:
  261. http://ads.example.com.ua/foo.gif
  262. http://example.com/
  263. ```
  264. **whitelist entry (`/etc/adblock/adblock.whitelist`):**
  265. ```
  266. here.com
  267. This entry removes the following (sub)domains from the blocklist:
  268. maps.here.com
  269. here.com
  270. This entry does not remove:
  271. where.com
  272. www.adwhere.com
  273. ```
  274. **query the active blocklist, the backups and black-/whitelist for a certain (sub-)domain, e.g. for whitelisting:**
  275. The query function checks against the submitted (sub-)domain and recurses automatically to the upper top level domain. For every (sub-)domain it returns the first ten relevant results.
  276. ```
  277. /etc/init.d/adblock query google.com
  278. :::
  279. ::: results for domain 'google.com' in active blocklist
  280. :::
  281. + adservice.google.com
  282. + adservice.google.com.au
  283. + adservice.google.com.vn
  284. + adservices.google.com
  285. + analytics.google.com
  286. + googleadapis.l.google.com
  287. + pagead.l.google.com
  288. + partnerad.l.google.com
  289. + ssl-google-analytics.l.google.com
  290. + video-stats.video.google.com
  291. + [...]
  292. :::
  293. ::: results for domain 'google.com' in backups and black-/whitelist
  294. :::
  295. + adb_list.adguard.gz partnerad.l.google.com
  296. + adb_list.adguard.gz googleadapis.l.google.com
  297. + adb_list.adguard.gz ssl-google-analytics.l.google.com
  298. + adb_list.adguard.gz [...]
  299. + adb_list.disconnect.gz pagead.l.google.com
  300. + adb_list.disconnect.gz partnerad.l.google.com
  301. + adb_list.disconnect.gz video-stats.video.google.com
  302. + adb_list.disconnect.gz [...]
  303. + adb_list.whocares.gz video-stats.video.google.com
  304. + adb_list.whocares.gz adservice.google.com
  305. + adb_list.whocares.gz adservice.google.com.au
  306. + adb_list.whocares.gz [...]
  307. + adb_list.yoyo.gz adservice.google.com
  308. + adb_list.yoyo.gz analytics.google.com
  309. + adb_list.yoyo.gz pagead.l.google.com
  310. + adb_list.yoyo.gz [...]
  311. ```
  312. **add a new blocklist source:**
  313. 1. the easy way ...
  314. example: https://easylist-downloads.adblockplus.org/rolist+easylist.txt
  315. Adblock already supports an easylist source, called 'reg_ru'. To add the additional local easylist as a new source, copy the existing config source section and change only
  316. the source name, the url and the description - that's all!
  317. ```
  318. config source 'reg_ro'
  319. option enabled '0'
  320. option adb_src 'https://easylist-downloads.adblockplus.org/rolist+easylist.txt'
  321. option adb_src_rset 'BEGIN{FS=\"[|^]\"}/^\|\|([^([:space:]|#|\*|\/).]+\.)+[[:alpha:]]+\^("\\\$third-party")?$/{print tolower(\$3)}'
  322. option adb_src_desc 'focus on romanian ads plus generic easylist additions, weekly updates, approx. 9.400 entries'
  323. ```
  324. 2. a bit harder ...
  325. To add a really new source with different domain/host format you have to write a suitable awk one-liner on your own, so basic awk skills are needed. As a starting point check the already existing awk rulesets `adb_src_rset` in the config file, probably you need only small changes for your individual list. Download the desired list and test your new awk string locally. The output result should be a sequential list with one domain/host per line - nothing more. If your awk one-liner works quite well, add a new source section to the adblock config file and test the new source.
  326. ## Support
  327. Please join the adblock discussion in this [forum thread](https://forum.openwrt.org/t/adblock-support-thread/507) or contact me by mail <dev@brenken.org>
  328. Have fun!
  329. Dirk