You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

305 lines
17 KiB

  1. # dns based ad/abuse domain blocking
  2. ## Description
  3. A lot of people already use adblocker plugins within their desktop browsers, but what if you are using your (smart) phone, tablet, watch or any other wlan gadget...getting rid of annoying ads, trackers and other abuse sites (like facebook ;-) is simple: block them with your router. When the dns server on your router receives dns requests, you will sort out queries that ask for the resource records of ad servers and return a simple 'NXDOMAIN'. This is nothing but **N**on-e**X**istent Internet or Intranet domain name, if domain name is unable to resolved using the dns server, a condition called the 'NXDOMAIN' occurred.
  4. ## Main Features
  5. * support of the following domain block list sources (free for private usage, for commercial use please check their individual licenses):
  6. * [adaway](https://adaway.org)
  7. * => infrequent updates, approx. 400 entries (enabled by default)
  8. * [adguard](https://adguard.com)
  9. * => numerous updates on the same day, approx. 12.000 entries
  10. * [blacklist]()
  11. * => static local blacklist, located by default in '/etc/adblock/adblock.blacklist'
  12. * [disconnect](https://disconnect.me)
  13. * => numerous updates on the same day, approx. 6.500 entries (enabled by default)
  14. * [dshield](http://dshield.org)
  15. * => daily updates, approx. 4.500 entries
  16. * [feodotracker](https://feodotracker.abuse.ch)
  17. * => daily updates, approx. 0-10 entries
  18. * [hphosts](https://hosts-file.net)
  19. * => monthly updates, approx. 50.000 entries
  20. * [malwaredomains](http://malwaredomains.com)
  21. * => daily updates, approx. 16.000 entries
  22. * [malwaredomainlist](http://www.malwaredomainlist.com)
  23. * => daily updates, approx. 1.500 entries
  24. * [openphish](https://openphish.com)
  25. * => numerous updates on the same day, approx. 1.800 entries
  26. * [palevo tracker](https://palevotracker.abuse.ch)
  27. * => daily updates, approx. 15 entries
  28. * [ransomware tracker](https://ransomwaretracker.abuse.ch)
  29. * => daily updates, approx. 150 entries
  30. * [rolist/easylist](https://easylist-downloads.adblockplus.org/rolist+easylist.txt)
  31. * => weekly updates, approx. 600 entries
  32. * [ruadlist/easylist](https://code.google.com/p/ruadlist)
  33. * => weekly updates, approx. 2.000 entries
  34. * [securemecca](http://www.securemecca.com)
  35. * => infrequent updates, approx. 25.000 entries
  36. * [shallalist](http://www.shallalist.de) (categories "adv" "costtraps" "spyware" "tracker" "warez" enabled by default)
  37. * => daily updates, approx. 32.000 entries (a short description of all shallalist categories can be found [online](http://www.shallalist.de/categories.html))
  38. * [spam404](http://www.spam404.com)
  39. * => infrequent updates, approx. 5.000 entries
  40. * [sysctl/cameleon](http://sysctl.org/cameleon)
  41. * => weekly updates, approx. 21.000 entries
  42. * [whocares](http://someonewhocares.org)
  43. * => weekly updates, approx. 12.000 entries
  44. * [winhelp](http://winhelp2002.mvps.org)
  45. * => infrequent updates, approx. 15.000 entries
  46. * [winspy](https://github.com/crazy-max/WindowsSpyBlocker)
  47. * => infrequent updates, approx. 120 entries
  48. * [yoyo](http://pgl.yoyo.org/adservers)
  49. * => weekly updates, approx. 2.500 entries (enabled by default)
  50. * [zeus tracker](https://zeustracker.abuse.ch)
  51. * => daily updates, approx. 440 entries
  52. * zero-conf like automatic installation & setup, usually no manual changes needed
  53. * simple but yet powerful adblock engine: adblock does not use error prone external iptables rulesets, http pixel server instances and things like that
  54. * automatically selects dnsmasq or unbound as dns backend
  55. * automatically selects uclient-fetch or wget as download utility (other tools like curl or aria2c are supported as well)
  56. * automatically supports a wide range of router modes, even AP modes are supported
  57. * full IPv4 and IPv6 support
  58. * supports tld compression (top level domain compression), this feature removes thousands of needless host entries from the block lists and lowers the memory footprint for the dns backends
  59. * each block list source will be updated and processed separately
  60. * block list source parsing by fast & flexible regex rulesets
  61. * overall duplicate removal in separate block lists
  62. * additional whitelist for manual overrides, located by default in /etc/adblock/adblock.whitelist
  63. * quality checks during block list update to ensure a reliable dns backend service
  64. * minimal status & error logging to syslog, enable debug logging to receive more output
  65. * procd based init system support (start/stop/restart/reload/suspend/resume)
  66. * procd based hotplug support, the adblock start will be triggered by interface triggers
  67. * suspend & resume adblock actions temporarily without block list reloading
  68. * runtime statistics via ubus service call
  69. * query function to quickly identify blocked (sub-)domains, e.g. for whitelisting
  70. * optional: automatic block list backup & restore, backups will be (de-)compressed and restored on the fly in case of any runtime error
  71. * optional: add new adblock sources on your own via uci config
  72. ## Prerequisites
  73. * [openwrt](https://openwrt.org), tested with latest stable release (Chaos Calmer) and with current trunk (Designated Driver)
  74. * [LEDE project](https://www.lede-project.org), tested with trunk > r98
  75. * a usual setup with an enabled dns backend at minimum - dump AP modes without a working dns backend are _not_ supported
  76. * a download utility: full versions (with ssl support) of 'wget', 'uclient-fetch', 'aria2c' or 'curl' are supported - the Chaos Calmer built-in busybox wget is not
  77. * Chaos Calmer: download & install the external 'wget' package
  78. * Designated Driver/Trunk: use built-in 'uclient-fetch' or download & install the external 'wget' package
  79. * for more configuration options see examples below
  80. ## OpenWrt / LEDE trunk Installation & Usage
  81. * install 'adblock' (_opkg install adblock_) and that's it - the adblock start will be automatically triggered by procd interface triggers
  82. * start/stop/restart/reload/suspend/resume the adblock service manually with _/etc/init.d/adblock_
  83. * enable/disable your favored block list sources in _/etc/config/adblock_ - 'adaway', 'disconnect' and 'yoyo' are enabled by default
  84. ## LuCI adblock companion package
  85. * for easy management of the various block list sources and options you can also use a nice & efficient LuCI frontend
  86. * install 'luci-app-adblock' (_opkg install luci-app-adblock_)
  87. * the application is located in LuCI under 'Services' menu
  88. * _Thanks to Hannu Nyman for this great adblock LuCI frontend!_
  89. ## Chaos Calmer installation notes
  90. * 'adblock' and 'luci-app-adblock' are _not_ available as .ipk packages in the Chaos Calmer download repository
  91. * download both packages from a development snapshot package directory:
  92. * for 'adblock' look [here](https://downloads.lede-project.org/snapshots/packages/x86_64/packages/)
  93. * for 'luci-app-adblock' look [here](https://downloads.lede-project.org/snapshots/packages/x86_64/luci/)
  94. * manually transfer the packages to your routers temp directory (with tools like _sshfs_ or _winscp_)
  95. * install the packages with _opkg install <...>_ as described above
  96. ## Tweaks
  97. * **status/runtime statistics:** the adblock status and runtime statistics are available via ubus service call (see example below)
  98. * **debug logging:** for script debugging please set the config option 'adb\_debug' to '1' and check the runtime output with _logread -e "adblock"_
  99. * **storage expansion:** to process and store all block list sources at once it might helpful to enlarge your temp directory with a swap partition => see [openwrt wiki](https://wiki.openwrt.org/doc/uci/fstab) for further details
  100. * **add white-/blacklist entries:** add domain white- or blacklist entries to always-allow or -deny certain (sub) domains, by default both lists are empty and located in _/etc/adblock_. Please add one domain per line - ip addresses, wildcards & regex are _not_ allowed (see example below)
  101. * **backup & restore block lists:** enable this feature, to restore automatically the latest compressed backup of your block lists in case of any processing error (e.g. a single block list source is not available during update). Please use an (external) solid partition and _not_ your volatile router temp directory for this
  102. * **scheduled list updates:** for a scheduled call of the adblock service add an appropriate crontab entry (see example below)
  103. * **restrict/disable procd interface trigger:** to restrict the procd interface trigger to a (list of) certain wan interface(s) or to disable it at all, set 'adb\_iface' to an existing interface like 'wan' or to a non-existing like 'false'
  104. * **suspend & resume adblocking:** to quickly switch the adblock service 'on' or 'off', simply use _/etc/init.d/adblock [suspend|resume]_
  105. * **domain query:** to query the active block lists for a specific domain, please run _/etc/init.d/adblock query `<DOMAIN>`_ (see example below)
  106. * **divert dns requests:** to force dns requests to your local dns resolver add an appropriate firewall rule (see example below)
  107. * **add new list sources:** you could add new block list sources on your own via uci config, all you need is a source url and an awk one-liner (see example below)
  108. * **disable active dns probing in windows 10:** to prevent a yellow exclamation mark on your internet connection icon (which wrongly means connected, but no internet), please change the following registry key/value from "1" to "0" _HKLM\SYSTEM\CurrentControlSet\Services\NlaSvc\Parameters\Internet\EnableActiveProbing_
  109. ## Further adblock config options
  110. * usually the pre-configured adblock setup works quite well and no manual config overrides are needed, all listed options apply to the 'global' config section:
  111. * adb\_enabled => main switch to enable/disable adblock service (default: '1', enabled)
  112. * adb\_debug => enable/disable adblock debug output (default: '0', disabled)
  113. * adb\_iface => restrict the procd interface trigger to a (list of) certain wan interface(s) or disable it at all (default: not set, disabled)
  114. * adb\_fetch => full path to a different download utility, see example below (default: not set, use wget)
  115. * adb\_fetchparm => options for the download utility, see example below (default: not set, use wget options)
  116. * adb\_tldcomp => enable/disable tld compression (default: '1', enabled)
  117. ## Examples
  118. **change default dns backend to 'unbound':**
  119. <pre><code>
  120. Adblock detects the presence of an active unbound dns backend and the block lists will be automatically pulled in by unbound.
  121. The adblock script deposits the sorted and filtered block lists in '/var/lib/unbound' where unbound can find them in its jail.
  122. If you use manual configuration for unbound, then just include the following line in your 'server:' clause:
  123. include: "/var/lib/unbound/adb_list.*"
  124. </code></pre>
  125. **configuration for different download utilities:**
  126. <pre><code>
  127. wget (default):
  128. option adb_fetch="/usr/bin/wget"
  129. option adb_fetchparm="--no-config --quiet --no-cache --no-cookies --max-redirect=0 --timeout=10 --no-check-certificate -O"
  130. aria2c:
  131. option adb_fetch '/usr/bin/aria2c'
  132. option adb_fetchparm '-q --timeout=10 --allow-overwrite=true --auto-file-renaming=false --check-certificate=false -o'
  133. uclient-fetch:
  134. option adb_fetch '/bin/uclient-fetch'
  135. option adb_fetchparm '-q --timeout=10 --no-check-certificate -O'
  136. curl:
  137. option adb_fetch '/usr/bin/curl'
  138. option adb_fetchparm '-s --connect-timeout 10 --insecure -o'
  139. </code></pre>
  140. **receive adblock statistics via ubus:**
  141. <pre><code>
  142. ubus call service list '{"name":"adblock_stats"}'
  143. This will output the active block lists and other runtime information as JSON, e.g.:
  144. {
  145. "adblock_stats": {
  146. "instances": {
  147. "statistics": {
  148. "running": false,
  149. "command": [
  150. ""
  151. ],
  152. "data": {
  153. "active_lists": [
  154. {
  155. "palevo": "14",
  156. "blacklist": "144",
  157. "winspy": "168",
  158. "zeus": "422",
  159. "adaway": "408",
  160. "rolist": "649",
  161. "malwarelist": "1219",
  162. "ransomware": "1495",
  163. "ruadlist": "1791",
  164. "yoyo": "2304",
  165. "openphish": "2139",
  166. "dshield": "154",
  167. "disconnect": "3176",
  168. "spam404": "6251",
  169. "adguard": "11081",
  170. "whocares": "11575",
  171. "winhelp": "10574",
  172. "malware": "13854",
  173. "sysctl": "8539",
  174. "securemecca": "9262",
  175. "shalla": "25358",
  176. "hphosts": "36256"
  177. }
  178. ],
  179. "adblock_version": "2.3.0",
  180. "blocked_domains": "146833",
  181. "dns_backend": "dnsmasq",
  182. "last_rundate": "04.02.2017 21:10:31",
  183. "system": "LEDE Reboot SNAPSHOT r3286-c980147527"
  184. }
  185. }
  186. }
  187. }
  188. }
  189. </code></pre>
  190. **cronjob for a regular block list update (/etc/crontabs/root):**
  191. <pre><code>
  192. 0 06 * * * /etc/init.d/adblock start
  193. </code></pre>
  194. **blacklist entry (/etc/adblock/adblock.blacklist):**
  195. <pre><code>
  196. ads.example.com
  197. This entry blocks the following (sub)domains:
  198. http://ads.example.com/foo.gif
  199. http://server1.ads.example.com/foo.gif
  200. https://ads.example.com:8000/
  201. This entry does not block:
  202. http://ads.example.com.ua/foo.gif
  203. http://example.com/
  204. </code></pre>
  205. **whitelist entry (/etc/adblock/adblock.whitelist):**
  206. <pre><code>
  207. here.com
  208. This entry removes the following (sub)domains from the block lists:
  209. maps.here.com
  210. here.com
  211. This entry does not remove:
  212. where.com
  213. www.adwhere.com
  214. </code></pre>
  215. **query active block lists for a certain (sub-)domain, e.g. for whitelisting:**
  216. <pre><code>
  217. /etc/init.d/adblock query example.www.doubleclick.net
  218. ::: distinct results for domain 'example.www.doubleclick.net'
  219. no match
  220. ::: distinct results for domain 'www.doubleclick.net'
  221. adb_list.sysctl : www.doubleclick.net
  222. ::: distinct results for domain 'doubleclick.net'
  223. adb_list.adaway : ad-g.doubleclick.net
  224. adb_list.securemecca : 1168945.fls.doubleclick.net
  225. adb_list.sysctl : 1435575.fls.doubleclick.net
  226. adb_list.whocares : 3ad.doubleclick.net
  227. The query function checks against the submitted (sub-)domain and recurses automatically to the upper top level domain(s).
  228. For every domain it returns the overall count plus a distinct list of active block lists with the first relevant result.
  229. In the example above whitelist "www.doubleclick.net" to free the submitted domain.
  230. </code></pre>
  231. **divert dns requests to local dns resolver in /etc/config/firewall:**
  232. <pre><code>
  233. config redirect
  234. option name 'Divert DNS'
  235. option src 'lan'
  236. option proto 'tcp udp'
  237. option src_dport '53'
  238. option dest_port '53'
  239. option target 'DNAT'
  240. </code></pre>
  241. **add a new block list source:**
  242. <pre><code>
  243. 1. the easy way ...
  244. example: https://easylist-downloads.adblockplus.org/rolist+easylist.txt
  245. adblock already supports an easylist source, called 'ruadlist'. To add the additional local easylist
  246. as a new source, copy the existing config source 'ruadlist' section and change only
  247. the source name, the url and the description - that's all!
  248. config source 'rolist'
  249. option enabled '0'
  250. option adb_src 'https://easylist-downloads.adblockplus.org/rolist+easylist.txt'
  251. option adb_src_rset '{FS=\"[|^]\"} \$0 ~/^\|\|([A-Za-z0-9_-]+\.){1,}[A-Za-z]+\^$/{print tolower(\$3)}'
  252. option adb_src_desc 'focus on romanian ad related domains plus generic easylist additions, weekly updates, approx. 600 entries'
  253. 2. a bit harder ...
  254. to add a really new source with different domain/host format you have to write a suitable
  255. awk one-liner on your own, so basic awk skills are needed. As a starting point check the already
  256. existing awk strings (adb_src_rset) in adblock config, maybe you need only small changes for your individual list.
  257. Download the desired list and test your new awk string locally with:
  258. cat new.list | awk 'fs__individual search__search core__result'
  259. 'fs' => field separator (optional)
  260. 'individual search' => individual search part to filter out needless list information
  261. 'search core' => always '([A-Za-z0-9_-]+\.){1,}[A-Za-z]+', this is part of all list sources and should be unchanged
  262. 'result' => always '{print tolower(\$n)}', only the output column 'n' may vary
  263. the output result should be a sequential list with one domain/host per line - nothing more.
  264. If your awk one-liner works quite well, add a new source section in adblock config and test your new source
  265. </code></pre>
  266. ## Support
  267. Please join the adblock discussion in this [forum thread](https://forum.openwrt.org/viewtopic.php?id=59803) or contact me by mail <dev@brenken.org>
  268. ## Removal
  269. * stop all adblock related services with _/etc/init.d/adblock stop_
  270. * optional: remove the adblock package (_opkg remove adblock_)
  271. Have fun!
  272. Dirk