You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

303 lines
17 KiB

  1. # dns based ad/abuse domain blocking
  2. ## Description
  3. A lot of people already use adblocker plugins within their desktop browsers, but what if you are using your (smart) phone, tablet, watch or any other wlan gadget...getting rid of annoying ads, trackers and other abuse sites (like facebook ;-) is simple: block them with your router. When the dns server on your router receives dns requests, you will sort out queries that ask for the resource records of ad servers and return a simple 'NXDOMAIN'. This is nothing but **N**on-e**X**istent Internet or Intranet domain name, if domain name is unable to resolved using the dns server, a condition called the 'NXDOMAIN' occurred.
  4. ## Main Features
  5. * support of the following domain block list sources (free for private usage, for commercial use please check their individual licenses):
  6. * [adaway](https://adaway.org)
  7. * => infrequent updates, approx. 400 entries (enabled by default)
  8. * [adguard](https://adguard.com)
  9. * => numerous updates on the same day, approx. 12.000 entries
  10. * [blacklist]()
  11. * => static local blacklist, located by default in '/etc/adblock/adblock.blacklist'
  12. * [disconnect](https://disconnect.me)
  13. * => numerous updates on the same day, approx. 6.500 entries (enabled by default)
  14. * [dshield](http://dshield.org)
  15. * => daily updates, approx. 4.500 entries
  16. * [feodotracker](https://feodotracker.abuse.ch)
  17. * => daily updates, approx. 0-10 entries
  18. * [hphosts](https://hosts-file.net)
  19. * => monthly updates, approx. 50.000 entries
  20. * [malwaredomains](http://malwaredomains.com)
  21. * => daily updates, approx. 16.000 entries
  22. * [malwaredomainlist](http://www.malwaredomainlist.com)
  23. * => daily updates, approx. 1.500 entries
  24. * [openphish](https://openphish.com)
  25. * => numerous updates on the same day, approx. 1.800 entries
  26. * [palevo tracker](https://palevotracker.abuse.ch)
  27. * => daily updates, approx. 15 entries
  28. * [ransomware tracker](https://ransomwaretracker.abuse.ch)
  29. * => daily updates, approx. 150 entries
  30. * [rolist/easylist](https://easylist-downloads.adblockplus.org/rolist+easylist.txt)
  31. * => weekly updates, approx. 600 entries
  32. * [ruadlist/easylist](https://code.google.com/p/ruadlist)
  33. * => weekly updates, approx. 2.000 entries
  34. * [securemecca](http://www.securemecca.com)
  35. * => infrequent updates, approx. 25.000 entries
  36. * [shallalist](http://www.shallalist.de) (categories "adv" "costtraps" "spyware" "tracker" "warez" enabled by default)
  37. * => daily updates, approx. 32.000 entries (a short description of all shallalist categories can be found [online](http://www.shallalist.de/categories.html))
  38. * [spam404](http://www.spam404.com)
  39. * => infrequent updates, approx. 5.000 entries
  40. * [sysctl/cameleon](http://sysctl.org/cameleon)
  41. * => weekly updates, approx. 21.000 entries
  42. * [whocares](http://someonewhocares.org)
  43. * => weekly updates, approx. 12.000 entries
  44. * [winhelp](http://winhelp2002.mvps.org)
  45. * => infrequent updates, approx. 15.000 entries
  46. * [winspy](https://github.com/crazy-max/WindowsSpyBlocker)
  47. * => infrequent updates, approx. 120 entries
  48. * [yoyo](http://pgl.yoyo.org/adservers)
  49. * => weekly updates, approx. 2.500 entries (enabled by default)
  50. * [zeus tracker](https://zeustracker.abuse.ch)
  51. * => daily updates, approx. 440 entries
  52. * zero-conf like automatic installation & setup, usually no manual changes needed
  53. * simple but yet powerful adblock engine: adblock does not use error prone external iptables rulesets, http pixel server instances and things like that
  54. * automatically selects dnsmasq or unbound as dns backend
  55. * automatically selects uclient-fetch or wget as download utility (other tools like curl or aria2c are supported as well)
  56. * automatically supports a wide range of router modes, even AP modes are supported
  57. * full IPv4 and IPv6 support
  58. * each block list source will be updated and processed separately
  59. * block list source parsing by fast & flexible regex rulesets
  60. * overall duplicate removal in separate block lists
  61. * additional whitelist for manual overrides, located by default in /etc/adblock/adblock.whitelist
  62. * quality checks during block list update to ensure a reliable dns backend service
  63. * minimal status & error logging to syslog, enable debug logging to receive more output
  64. * procd based init system support (start/stop/restart/reload/suspend/resume)
  65. * procd based hotplug support, the adblock start will be triggered by interface triggers
  66. * suspend & resume adblock actions temporarily without block list reloading
  67. * runtime statistics via ubus service call
  68. * query function to quickly identify blocked (sub-)domains, e.g. for whitelisting
  69. * optional: automatic block list backup & restore, backups will be (de-)compressed and restored on the fly in case of any runtime error
  70. * optional: add new adblock sources on your own via uci config
  71. ## Prerequisites
  72. * [openwrt](https://openwrt.org), tested with latest stable release (Chaos Calmer) and with current trunk (Designated Driver)
  73. * [LEDE project](https://www.lede-project.org), tested with trunk > r98
  74. * a usual setup with an enabled dns backend at minimum - dump AP modes without a working dns backend are _not_ supported
  75. * a download utility: full versions (with ssl support) of 'wget', 'uclient-fetch', 'aria2c' or 'curl' are supported - the Chaos Calmer built-in busybox wget is not
  76. * Chaos Calmer: download & install the external 'wget' package
  77. * Designated Driver/Trunk: use built-in 'uclient-fetch' or download & install the external 'wget' package
  78. * for more configuration options see examples below
  79. ## OpenWrt / LEDE trunk Installation & Usage
  80. * install 'adblock' (_opkg install adblock_) and that's it - the adblock start will be automatically triggered by procd interface triggers
  81. * start/stop/restart/reload/suspend/resume the adblock service manually with _/etc/init.d/adblock_
  82. * enable/disable your favored block list sources in _/etc/config/adblock_ - 'adaway', 'disconnect' and 'yoyo' are enabled by default
  83. ## LuCI adblock companion package
  84. * for easy management of the various block list sources and options you can also use a nice & efficient LuCI frontend
  85. * install 'luci-app-adblock' (_opkg install luci-app-adblock_)
  86. * the application is located in LuCI under 'Services' menu
  87. * _Thanks to Hannu Nyman for this great adblock LuCI frontend!_
  88. ## Chaos Calmer installation notes
  89. * 'adblock' and 'luci-app-adblock' are _not_ available as .ipk packages in the Chaos Calmer download repository
  90. * download both packages from a development snapshot package directory:
  91. * for 'adblock' look [here](https://downloads.lede-project.org/snapshots/packages/x86_64/packages/)
  92. * for 'luci-app-adblock' look [here](https://downloads.lede-project.org/snapshots/packages/x86_64/luci/)
  93. * manually transfer the packages to your routers temp directory (with tools like _sshfs_ or _winscp_)
  94. * install the packages with _opkg install <...>_ as described above
  95. ## Tweaks
  96. * **status/runtime statistics:** the adblock status and runtime statistics are available via ubus service call (see example below)
  97. * **debug logging:** for script debugging please set the config option 'adb\_debug' to '1' and check the runtime output with _logread -e "adblock"_
  98. * **storage expansion:** to process and store all block list sources at once it might helpful to enlarge your temp directory with a swap partition => see [openwrt wiki](https://wiki.openwrt.org/doc/uci/fstab) for further details
  99. * **add white-/blacklist entries:** add domain white- or blacklist entries to always-allow or -deny certain (sub) domains, by default both lists are empty and located in _/etc/adblock_. Please add one domain per line - ip addresses, wildcards & regex are _not_ allowed (see example below)
  100. * **backup & restore block lists:** enable this feature, to restore automatically the latest compressed backup of your block lists in case of any processing error (e.g. a single block list source is not available during update). Please use an (external) solid partition and _not_ your volatile router temp directory for this
  101. * **scheduled list updates:** for a scheduled call of the adblock service add an appropriate crontab entry (see example below)
  102. * **restrict/disable procd interface trigger:** to restrict the procd interface trigger to a (list of) certain wan interface(s) or to disable it at all, set 'adb\_iface' to an existing interface like 'wan' or to a non-existing like 'false'
  103. * **suspend & resume adblocking:** to quickly switch the adblock service 'on' or 'off', simply use _/etc/init.d/adblock [suspend|resume]_
  104. * **domain query:** to query the active block lists for a specific domain, please run _/etc/init.d/adblock query `<DOMAIN>`_ (see example below)
  105. * **divert dns requests:** to force dns requests to your local dns resolver add an appropriate firewall rule (see example below)
  106. * **add new list sources:** you could add new block list sources on your own via uci config, all you need is a source url and an awk one-liner (see example below)
  107. * **disable active dns probing in windows 10:** to prevent a yellow exclamation mark on your internet connection icon (which wrongly means connected, but no internet), please change the following registry key/value from "1" to "0" _HKLM\SYSTEM\CurrentControlSet\Services\NlaSvc\Parameters\Internet\EnableActiveProbing_
  108. ## Further adblock config options
  109. * usually the pre-configured adblock setup works quite well and no manual config overrides are needed, all listed options apply to the 'global' config section:
  110. * adb\_enabled => main switch to enable/disable adblock service (default: '1', enabled)
  111. * adb\_debug => enable/disable adblock debug output (default: '0', disabled)
  112. * adb\_iface => restrict the procd interface trigger to a (list of) certain wan interface(s) or disable it at all (default: not set, disabled)
  113. * adb\_fetch => full path to a different download utility, see example below (default: not set, use wget)
  114. * adb\_fetchparm => options for the download utility, see example below (default: not set, use wget options)
  115. ## Examples
  116. **change default dns backend to 'unbound':**
  117. <pre><code>
  118. Adblock detects the presence of an active unbound dns backend and the block lists will be automatically pulled in by unbound.
  119. The adblock script deposits the sorted and filtered block lists in '/var/lib/unbound' where unbound can find them in its jail.
  120. If you use manual configuration for unbound, then just include the following line in your 'server:' clause:
  121. include: "/var/lib/unbound/adb_list.*"
  122. </code></pre>
  123. **configuration for different download utilities:**
  124. <pre><code>
  125. wget (default):
  126. option adb_fetch="/usr/bin/wget"
  127. option adb_fetchparm="--no-config --quiet --tries=1 --no-cache --no-cookies --max-redirect=0 --timeout=5 --no-check-certificate -O"
  128. aria2c:
  129. option adb_fetch '/usr/bin/aria2c'
  130. option adb_fetchparm '-q --max-tries=1 --timeout=5 --allow-overwrite=true --auto-file-renaming=false --check-certificate=false -o'
  131. uclient-fetch:
  132. option adb_fetch '/bin/uclient-fetch'
  133. option adb_fetchparm '-q --timeout=5 --no-check-certificate -O'
  134. curl:
  135. option adb_fetch '/usr/bin/curl'
  136. option adb_fetchparm '-s --retry 1 --connect-timeout 5 --insecure -o'
  137. </code></pre>
  138. **receive adblock statistics via ubus:**
  139. <pre><code>
  140. ubus call service list '{"name":"adblock_stats"}'
  141. This will output the active block lists and other runtime information as JSON, e.g.:
  142. {
  143. "adblock_stats": {
  144. "instances": {
  145. "statistics": {
  146. "running": false,
  147. "command": [
  148. ""
  149. ],
  150. "data": {
  151. "active_lists": [
  152. {
  153. "palevo": "14",
  154. "blacklist": "144",
  155. "winspy": "168",
  156. "zeus": "422",
  157. "adaway": "408",
  158. "rolist": "649",
  159. "malwarelist": "1219",
  160. "ransomware": "1495",
  161. "ruadlist": "1791",
  162. "yoyo": "2304",
  163. "openphish": "2139",
  164. "dshield": "154",
  165. "disconnect": "3176",
  166. "spam404": "6251",
  167. "adguard": "11081",
  168. "whocares": "11575",
  169. "winhelp": "10574",
  170. "malware": "13854",
  171. "sysctl": "8539",
  172. "securemecca": "9262",
  173. "shalla": "25358",
  174. "hphosts": "36256"
  175. }
  176. ],
  177. "adblock_version": "2.3.0",
  178. "blocked_domains": "146833",
  179. "dns_backend": "dnsmasq",
  180. "last_rundate": "04.02.2017 21:10:31",
  181. "system": "LEDE Reboot SNAPSHOT r3286-c980147527"
  182. }
  183. }
  184. }
  185. }
  186. }
  187. </code></pre>
  188. **cronjob for a regular block list update (/etc/crontabs/root):**
  189. <pre><code>
  190. 0 06 * * * /etc/init.d/adblock start
  191. </code></pre>
  192. **blacklist entry (/etc/adblock/adblock.blacklist):**
  193. <pre><code>
  194. ads.example.com
  195. This entry blocks the following (sub)domains:
  196. http://ads.example.com/foo.gif
  197. http://server1.ads.example.com/foo.gif
  198. https://ads.example.com:8000/
  199. This entry does not block:
  200. http://ads.example.com.ua/foo.gif
  201. http://example.com/
  202. </code></pre>
  203. **whitelist entry (/etc/adblock/adblock.whitelist):**
  204. <pre><code>
  205. here.com
  206. This entry removes the following (sub)domains from the block lists:
  207. maps.here.com
  208. here.com
  209. This entry does not remove:
  210. where.com
  211. www.adwhere.com
  212. </code></pre>
  213. **query active block lists for a certain (sub-)domain, e.g. for whitelisting:**
  214. <pre><code>
  215. /etc/init.d/adblock query example.www.doubleclick.net
  216. ::: distinct results for domain 'example.www.doubleclick.net'
  217. no match
  218. ::: distinct results for domain 'www.doubleclick.net'
  219. adb_list.sysctl : www.doubleclick.net
  220. ::: distinct results for domain 'doubleclick.net'
  221. adb_list.adaway : ad-g.doubleclick.net
  222. adb_list.securemecca : 1168945.fls.doubleclick.net
  223. adb_list.sysctl : 1435575.fls.doubleclick.net
  224. adb_list.whocares : 3ad.doubleclick.net
  225. The query function checks against the submitted (sub-)domain and recurses automatically to the upper top level domain(s).
  226. For every domain it returns the overall count plus a distinct list of active block lists with the first relevant result.
  227. In the example above whitelist "www.doubleclick.net" to free the submitted domain.
  228. </code></pre>
  229. **divert dns requests to local dns resolver in /etc/config/firewall:**
  230. <pre><code>
  231. config redirect
  232. option name 'Divert DNS'
  233. option src 'lan'
  234. option proto 'tcp udp'
  235. option src_dport '53'
  236. option dest_port '53'
  237. option target 'DNAT'
  238. </code></pre>
  239. **add a new block list source:**
  240. <pre><code>
  241. 1. the easy way ...
  242. example: https://easylist-downloads.adblockplus.org/rolist+easylist.txt
  243. adblock already supports an easylist source, called 'ruadlist'. To add the additional local easylist
  244. as a new source, copy the existing config source 'ruadlist' section and change only
  245. the source name, the url and the description - that's all!
  246. config source 'rolist'
  247. option enabled '0'
  248. option adb_src 'https://easylist-downloads.adblockplus.org/rolist+easylist.txt'
  249. option adb_src_rset '{FS=\"[|^]\"} \$0 ~/^\|\|([A-Za-z0-9_-]+\.){1,}[A-Za-z]+\^$/{print tolower(\$3)}'
  250. option adb_src_desc 'focus on romanian ad related domains plus generic easylist additions, weekly updates, approx. 600 entries'
  251. 2. a bit harder ...
  252. to add a really new source with different domain/host format you have to write a suitable
  253. awk one-liner on your own, so basic awk skills are needed. As a starting point check the already
  254. existing awk strings (adb_src_rset) in adblock config, maybe you need only small changes for your individual list.
  255. Download the desired list and test your new awk string locally with:
  256. cat new.list | awk 'fs__individual search__search core__result'
  257. 'fs' => field separator (optional)
  258. 'individual search' => individual search part to filter out needless list information
  259. 'search core' => always '([A-Za-z0-9_-]+\.){1,}[A-Za-z]+', this is part of all list sources and should be unchanged
  260. 'result' => always '{print tolower(\$n)}', only the output column 'n' may vary
  261. the output result should be a sequential list with one domain/host per line - nothing more.
  262. If your awk one-liner works quite well, add a new source section in adblock config and test your new source
  263. </code></pre>
  264. ## Support
  265. Please join the adblock discussion in this [forum thread](https://forum.openwrt.org/viewtopic.php?id=59803) or contact me by mail <dev@brenken.org>
  266. ## Removal
  267. * stop all adblock related services with _/etc/init.d/adblock stop_
  268. * optional: remove the adblock package (_opkg remove adblock_)
  269. Have fun!
  270. Dirk