You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

315 lines
18 KiB

  1. # dns based ad/abuse domain blocking
  2. ## Description
  3. A lot of people already use adblocker plugins within their desktop browsers, but what if you are using your (smart) phone, tablet, watch or any other wlan gadget...getting rid of annoying ads, trackers and other abuse sites (like facebook ;-) is simple: block them with your router. When the dns server on your router receives dns requests, you will sort out queries that ask for the resource records of ad servers and return a simple 'NXDOMAIN'. This is nothing but **N**on-e**X**istent Internet or Intranet domain name, if domain name is unable to resolved using the dns server, a condition called the 'NXDOMAIN' occurred.
  4. ## Main Features
  5. * support of the following domain block list sources (free for private usage, for commercial use please check their individual licenses):
  6. * [adaway](https://adaway.org)
  7. * => infrequent updates, approx. 400 entries (enabled by default)
  8. * [adguard](https://adguard.com)
  9. * => numerous updates on the same day, approx. 12.000 entries
  10. * [bitcoin](https://github.com/hoshsadiq/adblock-nocoin-list)
  11. * => infrequent updates, approx. 15 entries
  12. * [blacklist]()
  13. * => static local blacklist, located by default in '/etc/adblock/adblock.blacklist'
  14. * [disconnect](https://disconnect.me)
  15. * => numerous updates on the same day, approx. 6.500 entries (enabled by default)
  16. * [dshield](http://dshield.org)
  17. * => daily updates, approx. 4.500 entries
  18. * [feodotracker](https://feodotracker.abuse.ch)
  19. * => daily updates, approx. 0-10 entries
  20. * [hphosts](https://hosts-file.net)
  21. * => monthly updates, approx. 50.000 entries
  22. * [malwaredomains](http://malwaredomains.com)
  23. * => daily updates, approx. 16.000 entries
  24. * [malwaredomainlist](http://www.malwaredomainlist.com)
  25. * => daily updates, approx. 1.500 entries
  26. * [openphish](https://openphish.com)
  27. * => numerous updates on the same day, approx. 1.800 entries
  28. * [ransomware tracker](https://ransomwaretracker.abuse.ch)
  29. * => daily updates, approx. 150 entries
  30. * [reg_cn](https://easylist-downloads.adblockplus.org/easylistchina+easylist.txt)
  31. * => regional blocklist for China, daily updates, approx. 1.600 entries
  32. * [reg_id](https://easylist-downloads.adblockplus.org/abpindo+easylist.txt)
  33. * => regional blocklist for Indonesia, daily updates, approx. 800 entries
  34. * [reg_nl](https://easylist-downloads.adblockplus.org/easylistdutch+easylist.txt)
  35. * => regional blocklist for the Netherlands, weekly updates, approx. 1300 entries
  36. * [reg_pl](http://adblocklist.org)
  37. * => regional blocklist for Poland, daily updates, approx. 50 entries
  38. * [reg_ro](https://easylist-downloads.adblockplus.org/rolist+easylist.txt)
  39. * => regional blocklist for Romania, weekly updates, approx. 600 entries
  40. * [reg_ru](https://code.google.com/p/ruadlist)
  41. * => regional blocklist for Russia, weekly updates, approx. 2.000 entries
  42. * [securemecca](http://www.securemecca.com)
  43. * => infrequent updates, approx. 25.000 entries
  44. * [shallalist](http://www.shallalist.de) (categories "adv" "costtraps" "spyware" "tracker" "warez" enabled by default)
  45. * => daily updates, approx. 32.000 entries (a short description of all shallalist categories can be found [online](http://www.shallalist.de/categories.html))
  46. * [spam404](http://www.spam404.com)
  47. * => infrequent updates, approx. 5.000 entries
  48. * [sysctl/cameleon](http://sysctl.org/cameleon)
  49. * => weekly updates, approx. 21.000 entries
  50. * [whocares](http://someonewhocares.org)
  51. * => weekly updates, approx. 12.000 entries
  52. * [winhelp](http://winhelp2002.mvps.org)
  53. * => infrequent updates, approx. 15.000 entries
  54. * [winspy](https://github.com/crazy-max/WindowsSpyBlocker)
  55. * => infrequent updates, approx. 120 entries
  56. * [yoyo](http://pgl.yoyo.org/adservers)
  57. * => weekly updates, approx. 2.500 entries (enabled by default)
  58. * [zeus tracker](https://zeustracker.abuse.ch)
  59. * => daily updates, approx. 440 entries
  60. * zero-conf like automatic installation & setup, usually no manual changes needed
  61. * simple but yet powerful adblock engine: adblock does not use error prone external iptables rulesets, http pixel server instances and things like that
  62. * supports five different dns backends / block list formats: dnsmasq, unbound, named (bind), kresd and dnscrypt-proxy
  63. * automatically selects uclient-fetch or wget as download utility (other tools like curl or aria2c are supported as well)
  64. * provides 'http only' mode without installed ssl library for all non-SSL block list sources
  65. * supports a wide range of router modes, even AP modes are supported
  66. * full IPv4 and IPv6 support
  67. * provides top level domain compression ('tld compression'), this feature removes thousands of needless host entries from the block list and lowers the memory footprint for the dns backends
  68. * each block list source will be updated and processed separately
  69. * block list source parsing by fast & flexible regex rulesets
  70. * overall duplicate removal in central block list (adb_list.overall)
  71. * additional whitelist for manual overrides, located by default in /etc/adblock/adblock.whitelist
  72. * quality checks during block list update to ensure a reliable dns backend service
  73. * minimal status & error logging to syslog, enable debug logging to receive more output
  74. * procd based init system support (start/stop/restart/reload/suspend/resume/query/status)
  75. * procd network interface trigger support or classic time based startup
  76. * suspend & resume adblock actions temporarily without block list reloading
  77. * output comprehensive runtime information via LuCI or via 'status' init command
  78. * query function to quickly identify blocked (sub-)domains, e.g. for whitelisting
  79. * strong LuCI support
  80. * optional: force dns requests to local resolver
  81. * optional: force overall sort / duplicate removal for low memory devices (handle with care!)
  82. * optional: 'manual mode' to re-use blocklist backups during startup, get fresh lists only via manual reload or restart action
  83. * optional: automatic block list backup & restore, they will be used in case of download errors or during startup in manual mode
  84. * optional: add new adblock sources on your own via uci config
  85. ## Prerequisites
  86. * [LEDE project](https://www.lede-project.org), tested with latest stable release (LEDE 17.01) and with current LEDE snapshot
  87. * a usual setup with an enabled dns backend at minimum - dump AP modes without a working dns backend are _not_ supported
  88. * a download utility:
  89. * to support all blocklist sources a full version (with ssl support) of 'wget', 'uclient-fetch' with one of the 'libustream-*' ssl libraries, 'aria2c' or 'curl' is required
  90. * for limited devices with real memory constraints, adblock provides also a 'http only' option and supports wget-nossl and uclient-fetch (without libustream-ssl) as well
  91. * for more configuration options see examples below
  92. ## Installation & Usage
  93. * install 'adblock' (_opkg install adblock_)
  94. * at minimum configure the appropriate dns backend ('dnsmasq' by default) and enable the adblock service in _/etc/config/adblock_
  95. * control the adblock service manually with _/etc/init.d/adblock_ start/stop/restart/reload/suspend/resume/status or use the LuCI frontend
  96. ## LuCI adblock companion package
  97. * for easy management of the various block list sources and all other adblock options you should use the provided LuCI frontend
  98. * install 'luci-app-adblock' (_opkg install luci-app-adblock_)
  99. * the application is located in LuCI under 'Services' menu
  100. ## Tweaks
  101. * **runtime information:** the adblock status is available via _/etc/init.d/adblock status_ (see example below)
  102. * **debug logging:** for script debugging please set the config option 'adb\_debug' to '1' and check the runtime output with _logread -e "adblock"_
  103. * **storage expansion:** to process and store all block list sources at once it might helpful to enlarge your temp directory with a swap partition => see [openwrt wiki](https://wiki.openwrt.org/doc/uci/fstab) for further details
  104. * **add white- / blacklist entries:** add domain white- or blacklist entries to always-allow or -deny certain (sub) domains, by default both lists are empty and located in _/etc/adblock_. Please add one domain per line - ip addresses, wildcards & regex are _not_ allowed (see example below)
  105. * **backup & restore block lists:** enable this feature, to restore automatically the latest compressed backup of your block lists in case of any processing error (e.g. a single block list source is not available during update). Please use an (external) solid partition and _not_ your volatile router temp directory for this
  106. * **scheduled list updates:** for a scheduled call of the adblock service add an appropriate crontab entry (see example below)
  107. * **change startup behaviour:** by default the startup will be triggered by the 'wan' procd interface trigger. Choose 'none' to disable automatic startups, 'timed' to use a classic timeout (default 30 sec.) or select another trigger interface.
  108. * **suspend & resume adblocking:** to quickly switch the adblock service 'on' or 'off', simply use _/etc/init.d/adblock [suspend|resume]_
  109. * **domain query:** to query the active block list for a specific domain, please run _/etc/init.d/adblock query `<DOMAIN>`_ (see example below)
  110. * **add new list sources:** you could add new block list sources on your own via uci config, all you need is a source url and an awk one-liner (see example below)
  111. * **disable active dns probing in windows 10:** to prevent a yellow exclamation mark on your internet connection icon (which wrongly means connected, but no internet), please change the following registry key/value from "1" to "0" _HKLM\SYSTEM\CurrentControlSet\Services\NlaSvc\Parameters\Internet\EnableActiveProbing_
  112. ## Further adblock config options
  113. * usually the pre-configured adblock setup works quite well and no manual config overrides are needed, all listed options apply to the 'global' config section:
  114. * adb\_enabled => main switch to enable/disable adblock service (default: '0', disabled)
  115. * adb\_debug => enable/disable adblock debug output (default: '0', disabled)
  116. * adb\_dns => select the dns backend for your environment: 'dnsmasq', 'unbound', 'named', 'kresd' or 'dnscrypt-proxy' (default: 'dnsmasq')
  117. * adb\_dnsdir => target directory for the generated blocklist 'adb_list.overall' (default: not set, use dns backend default)
  118. * adb\_trigger => set the startup trigger to a certain interface, to 'timed' or to 'none' (default: 'wan')
  119. * adb\_triggerdelay => additional trigger delay in seconds before adblock processing begins (default: '1')
  120. * adb\_fetch => full path to a dedicated download utility, see example below (default: not set, use wget default)
  121. * adb\_fetchparm => options for the download utility, see example below (default: not set, use wget default options)
  122. * adb\_forcedns => force dns requests to local resolver (default: '0', disabled)
  123. * adb\_forcesrt => force overall sort on low memory devices with less than 64 MB RAM (default: '0', disabled)
  124. * adb\_manmode => do not automatically update block lists during startup, use backups instead (default: '0', disabled)
  125. ## Examples
  126. **change default dns backend to 'unbound':**
  127. Adblock deposits the sorted and filtered block list (adb_list.overall) in '/var/lib/unbound' where unbound can find them in its jail.
  128. If you use manual configuration for unbound, then just include the following line in your 'server' clause:
  129. <pre><code>
  130. include: "/var/lib/unbound/adb_list.overall"
  131. </code></pre>
  132. **change default dns backend to 'named' (bind):**
  133. Adblock deposits the sorted and filtered block list (adb_list.overall) in '/var/lib/bind' where bind can find them.
  134. To use the block list please modify the following bind configuration files:
  135. <pre><code>
  136. change '/etc/bind/named.conf', in the 'options' namespace add:
  137. response-policy { zone "rpz"; };
  138. and at the end of the file add:
  139. zone "rpz" {
  140. type master;
  141. file "/etc/bind/db.rpz";
  142. allow-query { none; };
  143. allow-transfer { none; };
  144. };
  145. create the new file '/etc/bind/db.rpz' and add:
  146. $TTL 2h
  147. $ORIGIN rpz.
  148. @ SOA localhost. root.localhost. (1 6h 1h 1w 2h)
  149. NS localhost.
  150. $INCLUDE /var/lib/bind/adb_list.overall
  151. </code></pre>
  152. **change default dns backend to 'kresd':**
  153. The knot-resolver (kresd) is only available on turris omnia devices. Currently there's no package for kresd in the official LEDE / OpenWrt package repository.
  154. Adblock deposits the sorted and filtered block list (adb_list.overall) in '/etc/kresd' where kresd can find them.
  155. To use the block list please create/modify the following kresd configuration files:
  156. <pre><code>
  157. TurrisOS > 3.6:
  158. edit '/etc/config/resolver' and change / uncomment the following options:
  159. forward_upstream '0'
  160. list rpz_file '/etc/kresd/adb_list.overall'
  161. TurrisOS < 3.6:
  162. edit '/etc/config/resolver' and change / uncomment the following options:
  163. forward_upstream '0'
  164. option include_config '/etc/kresd/custom.conf'
  165. create '/etc/kresd/custom.conf' and add:
  166. policy.add(policy.rpz(policy.DENY, '/etc/kresd/adb_list.overall'))
  167. policy.add(policy.all(policy.FORWARD({'8.8.8.8', '8.8.4.4'})))
  168. </code></pre>
  169. **change default dns backend to 'dnscrypt-proxy':**
  170. Adblock deposits the sorted and filtered block list (adb_list.overall) by default in '/tmp' where DNSCrypt-Proxy can find them.
  171. The blacklist option is not supported by default, because DNSCrypt-Proxy is compiled without plugins support.
  172. Take a custom LEDE build with plugins support to use this feature:
  173. <pre><code>
  174. edit '/etc/config/dnscrypt-proxy' and add the following option per dnscrypt-proxy instance:
  175. list blacklist 'domains:/tmp/adb_list.overall'
  176. </code></pre>
  177. **configuration for different download utilities:**
  178. <pre><code>
  179. wget (default):
  180. option adb_fetch '/usr/bin/wget'
  181. option adb_fetchparm '--quiet --no-cache --no-cookies --max-redirect=0 --timeout=10 --no-check-certificate -O'
  182. aria2c:
  183. option adb_fetch '/usr/bin/aria2c'
  184. option adb_fetchparm '-q --timeout=10 --allow-overwrite=true --auto-file-renaming=false --check-certificate=false -o'
  185. uclient-fetch:
  186. option adb_fetch '/bin/uclient-fetch'
  187. option adb_fetchparm '-q --timeout=10 --no-check-certificate -O'
  188. curl:
  189. option adb_fetch '/usr/bin/curl'
  190. option adb_fetchparm '-s --connect-timeout 10 --insecure -o'
  191. </code></pre>
  192. **receive adblock runtime information:**
  193. <pre><code>
  194. /etc/init.d/adblock status
  195. ::: adblock runtime information
  196. + adblock_status : enabled
  197. + adblock_version : 3.0.0
  198. + blocked_domains : 37406
  199. + fetch_utility : wget (built-in)
  200. + dns_backend : kresd (/etc/kresd)
  201. + last_rundate : 08.09.2017 21:21:21
  202. + system_release : OpenWrt omnia 15.05
  203. </code></pre>
  204. **cronjob for a regular block list update (/etc/crontabs/root):**
  205. <pre><code>
  206. 0 06 * * * /etc/init.d/adblock reload
  207. </code></pre>
  208. **blacklist entry (/etc/adblock/adblock.blacklist):**
  209. <pre><code>
  210. ads.example.com
  211. This entry blocks the following (sub)domains:
  212. http://ads.example.com/foo.gif
  213. http://server1.ads.example.com/foo.gif
  214. https://ads.example.com:8000/
  215. This entry does not block:
  216. http://ads.example.com.ua/foo.gif
  217. http://example.com/
  218. </code></pre>
  219. **whitelist entry (/etc/adblock/adblock.whitelist):**
  220. <pre><code>
  221. here.com
  222. This entry removes the following (sub)domains from the block list:
  223. maps.here.com
  224. here.com
  225. This entry does not remove:
  226. where.com
  227. www.adwhere.com
  228. </code></pre>
  229. **query active block list for a certain (sub-)domain, e.g. for whitelisting:**
  230. <pre><code>
  231. /etc/init.d/adblock query example.www.doubleclick.net
  232. root@turris:~# /etc/init.d/adblock query example.www.doubleclick.net
  233. ::: max. ten results for domain 'example.www.doubleclick.net'
  234. - no match
  235. ::: max. ten results for domain 'www.doubleclick.net'
  236. - no match
  237. ::: max. ten results for domain 'doubleclick.net'
  238. + doubleclick.net
  239. The query function checks against the submitted (sub-)domain and recurses automatically to the upper top level domain.
  240. For every (sub-)domain it returns the first ten relevant results.
  241. In the example above whitelist "doubleclick.net" to free the submitted domain.
  242. </code></pre>
  243. **add a new block list source:**
  244. <pre><code>
  245. 1. the easy way ...
  246. example: https://easylist-downloads.adblockplus.org/rolist+easylist.txt
  247. adblock already supports an easylist source, called 'ruadlist'. To add the additional local easylist
  248. as a new source, copy the existing config source 'ruadlist' section and change only
  249. the source name, the url and the description - that's all!
  250. config source 'rolist'
  251. option enabled '0'
  252. option adb_src 'https://easylist-downloads.adblockplus.org/rolist+easylist.txt'
  253. option adb_src_rset '{FS=\"[|^]\"} \$0 ~/^\|\|([A-Za-z0-9_-]+\.){1,}[A-Za-z]+\^$/{print tolower(\$3)}'
  254. option adb_src_desc 'focus on romanian ad related domains plus generic easylist additions, weekly updates, approx. 600 entries'
  255. 2. a bit harder ...
  256. to add a really new source with different domain/host format you have to write a suitable
  257. awk one-liner on your own, so basic awk skills are needed. As a starting point check the already
  258. existing awk strings (adb_src_rset) in adblock config, maybe you need only small changes for your individual list.
  259. Download the desired list and test your new awk string locally with:
  260. cat new.list | awk 'fs__individual search__search core__result'
  261. 'fs' => field separator (optional)
  262. 'individual search' => individual search part to filter out needless list information
  263. 'search core' => always '([A-Za-z0-9_-]+\.){1,}[A-Za-z]+', this is part of all list sources and should be unchanged
  264. 'result' => always '{print tolower(\$n)}', only the output column 'n' may vary
  265. the output result should be a sequential list with one domain/host per line - nothing more.
  266. If your awk one-liner works quite well, add a new source section in adblock config and test your new source
  267. </code></pre>
  268. ## Support
  269. Please join the adblock discussion in this [forum thread](https://forum.lede-project.org/t/adblock-2-x-support-thread/507) or contact me by mail <dev@brenken.org>
  270. ## Removal
  271. * stop all adblock related services with _/etc/init.d/adblock stop_
  272. * optional: remove the adblock package (_opkg remove adblock_)
  273. Have fun!
  274. Dirk