Stan Grishin 901159b8c7 | 5 years ago | |
---|---|---|
.. | ||
README.md | 5 years ago | |
simple-adblock.conf | 5 years ago | |
simple-adblock.conf.update | 5 years ago | |
simple-adblock.hotplug | 5 years ago | |
simple-adblock.init | 5 years ago |
A simple DNSMASQ/Unbound-based AdBlocking service for OpenWrt/LEDE Project.
/etc/init.d/simple-adblock
file.dl
command if you want to force re-download of the list).dnsmasq.ipset
option.If you want a more robust AdBlocking, supporting free memory detection and complex block lists, supporting IDN, check out net/adblock
on GitHub/jsDelivr.
Service Status
Configuration - Basic Configuration
Configuration - Advanced Configuration
Whitelist and Blocklist Management
To download the hosts/domains files this service requires one of the following packages to be installed on your device: wget
or uclient-fetch
or curl
. If you want to download lists over HTTPS (recommended), you also need to install support for HTTPS/SSL downloads on your device. For most devices starting with OpenWrt 15.05.1 and up the following commands will install the minimal requirements:
opkg update; if ubus -S call system board | grep -q '15.05'; then
opkg install ca-certificates wget libopenssl; else
opkg install uclient-fetch libustream-mbedtls ca-bundle ca-certificates; fi
If you want to include some local files as the blocklists or whitelists, you need to install curl
:
opkg update; opkg install curl;
In order to actually block the ads, this service requires one of the following DNS resolvers to be installed on your router: dnsmasq
or dnsmasq-full
or unbound
. The dnsmasq
package is usually included in the default OpenWrt installation.
If you want to use the dnsmasq.ipset
option you need to install ipset
and dnsmasq-full
instead of the dnsmasq
. To do that, connect to your router via ssh and run the following command:
opkg update; cd /tmp/; opkg download dnsmasq-full; opkg install ipset;
opkg remove dnsmasq; opkg install /tmp/dnsmasq-full*; rm -f /tmp/dnsmasq-full*;
For IPv6 support additionally install ip6tables-mod-nat
and kmod-ipt-nat6
packages from Web UI or run the following in the command line:
opkg update; opkg install ip6tables-mod-nat kmod-ipt-nat6;
The coreutils-sort
is an optional, but recommended package as it speeds up sorting and removing duplicates from the merged list dramatically. If opkg complains that it can't install coreutils-sort
because /usr/bin/sort is already provided by busybox, you can run the following command:
opkg --force-overwrite install coreutils-sort
If you are running a development (trunk/snapshot) build of OpenWrt/LEDE Project on your router and your build is outdated (meaning that packages of the same revision/commit hash are no longer available and when you try to satisfy the requirements you get errors), please flash either current LEDE release image or current development/snapshot image.
Install simple-adblock
and luci-app-simple-adblock
packages from Web UI or run the following in the command line:
opkg update; opkg install simple-adblock luci-app-simple-adblock
If simple-adblock
and luci-app-simple-adblock
packages are not found in the official feed/repo for your version of OpenWrt/LEDE Project, you will need to add a custom repo to your router following instructions on GitHub/jsDelivr first.
Default configuration has the service disabled (use Web UI to enable/start service or run uci set simple-adblock.config.enabled=1; uci commit simple-adblock;
) and selected ad/malware lists suitable for routers with 64Mb RAM.
If your router has less then 64Mb RAM, edit the configuration file, located at /etc/config/simple-adblock
. The configuration file has lists in ascending order starting with smallest ones and each list has a preceding comment indicating its size, comment out or delete the lists you don't want or your router can't handle.
You can use Web UI (found in Services/Simple AdBlock) to add/remove/edit links to:
simple-adblock
on multiple routers and maintain one centralized whitelist which you can publish on a web-server.Please note that these lists must include either http://
or https://
(or, if curl
is installed the file://
) prefix. Some of the top block lists (both hosts files and domains lists) suitable for routers with at least 8MB RAM are used in the default simple-adblock
installation.
You can also use Web UI to add individual domains to be blocked or whitelisted.
If you want to use CLI to customize simple-adblock
config, refer to the Customization Settings section.
Once the service is enabled in the config file, run /etc/init.d/simple-adblock start
to start the service. Either /etc/init.d/simple-adblock restart
or /etc/init.d/simple-adblock reload
will only restart the service and/or re-download the lists if there were relevant changes in the config file since the last successful start. Had the previous start resulted in any error, either /etc/init.d/simple-adblock start
, /etc/init.d/simple-adblock restart
or /etc/init.d/simple-adblock reload
will attempt to re-download the lists.
If you want to force simple-adblock to re-download the lists, run /etc/init.d/simple-adblock dl
.
If you want to check if the specific domain (or part of the domain name) is being blocked, run /etc/init.d/simple-adblock check test-domain.com
.
In the Web UI the simple-adblock
settings are split into basic
and advanced
settings. The full list of configuration parameters of simple-adblock.config
section is:
Web UI Section | Parameter | Type | Default | Description |
---|---|---|---|---|
Basic | enabled | boolean | 0 | Enable/disable the simple-adblock service. |
Basic | verbosity | integer | 2 | Can be set to 0, 1 or 2 to control the console and system log output verbosity of the simple-adblock service. |
Basic | force_dns | boolean | 1 | Force router's DNS to local devices which may have different/hardcoded DNS server settings. If enabled, creates a firewall rule to intercept DNS requests from local devices to external DNS servers and redirect them to router. |
Basic | led | string | none | Use one of the router LEDs to indicate the AdBlocking status. |
Advanced | dns | string | dnsmasq.servers | DNS resolution option. See table below for addtional information. |
dns_instance | string | 0 | String of space-separated DNSMASQ instance numbers (or '*' for all) to be affected by the service. See table below for addtional information. | |
Advanced | ipv6_enabled | boolean | 0 | Add IPv6 entries to block-list if dnsmasq.addnhosts is used. This option is only visible in Web UI if the dnsmasq.addnhosts is selected as the DNS resolution option. |
Advanced | boot_delay | integer | 120 | Delay service activation for that many seconds on boot up. You can shorten it to 10-30 seconds on modern fast routers. Routers with built-in modems may require longer boot delay. |
Advanced | download_timeout | integer | 10 | Time-out downloads if no reply received within that many last seconds. |
Advanced | curl_retry | integer | 3 | If curl is installed and detected, attempt that many retries for failed downloads. |
Advanced | parallel_downloads | boolean | 1 | If enabled, all downloads are completed concurrently, if disabled -- sequentioally. Concurrent downloads dramatically speed up service loading. |
Advanced | debug | boolean | 0 | If enabled, output service full debug to /tmp/simple-adblock.log . Please note that the debug file may clog up the router's RAM on some devices. Use with caution. |
Advanced | allow_non_ascii | boolean | 0 | Enable support for non-ASCII characters in the final AdBlocking file. Only enable if your target service supports non-ASCII characters. If you enable this on the system where DNS resolver doesn't support non-ASCII characters, it will crash. Use with caution. |
Advanced | compressed_cache | boolean | 0 | Create compressed cache of the AdBlocking file in router's persistent memory. Only recommended to be used on routers with large ROM and/or routers with metered/flaky internet connection. |
whitelist_domain | list/string | List of white-listed domains. | ||
whitelist_domains_url | list/string | List of URL(s) to text files containing white-listed domains. Must include either http:// or https:// (or, if curl is installed the file:// ) prefix. Useful if you want to keep/publish a single white-list for multiple routers. |
||
blacklist_domains_url | list/string | List of URL(s) to text files containing black-listed domains. Must include either http:// or https:// (or, if curl is installed the file:// ) prefix. |
||
blacklist_hosts_url | list/string | List of URL(s) to hosts files containing black-listed domains. Must include either http:// or https:// (or, if curl is installed the file:// ) prefix. |
Currently supported options are:
Option | Explanation |
---|---|
dnsmasq.addnhosts |
Creates the DNSMASQ additional hosts file /var/run/simple-adblock.addnhosts and modifies DNSMASQ settings, so that DNSMASQ resolves all blocked domains to "local machine": 127.0.0.1. This option doesn't allow block-list optimization (by removing secondary level domains if the top-level domain is also in the block-list), so it results in a much larger block-list file, but, unlike other DNSMASQ-based options, it has almost no effect on the DNS look up speed. This option also allows quick reloads of DNSMASQ on block-list updates. This setting also allows you to configure which DNSMASQ instances would be affected by AdBlocking via dns_instance option. |
dnsmasq.conf |
Creates the DNSMASQ config file /var/dnsmasq.d/simple-adblock so that DNSMASQ replies with NXDOMAIN: "domain not found". This option allows the block-list optimization (by removing secondary level domains if the top-level domain is also in the block-list), resulting in the smaller block-list file. This option will slow down DNS look up speed somewhat. |
dnsmasq.ipset |
Creates the DNSMASQ ipset file /var/dnsmasq.d/simple-adblock.ipset and the firewall rule to reject the matching requests. This is the only option for AdBlocking if you're using a browser with DNS-over-HTTPS proxy built-in, like Mozilla Firefox or Google Chrome/Chromium. This option allows the block-list optimization (by removing secondary level domains if the top-level domain is also in the block-list), resulting in the smaller block-list file. This option requires you install dnsmasq-full and ipset as described here.PLEASE NOTE, that unlike other options which are truly domain name based blocking, this is essentially an IP address based blocking, ie: if you try to block google-analytics.com with this option, it may also block/break things like YouTube, Hangouts and other Google services if they share IP address(es) with google-analytics.com . |
dnsmasq.servers |
Creates the DNSMASQ servers file /var/run/simple-adblock.servers and modifies DNSMASQ settings so that DNSMASQ replies with NXDOMAIN: "domain not found". This option allows the block-list optimization (by removing secondary level domains if the top-level domain is also in the block-list), resulting in the smaller block-list file. This option will slow down DNS look up speed somewhat. This is a default setting as it results in the smaller block-file and allows quick reloads of DNSMASQ. This setting also allows you to configure which DNSMASQ instances would be affected by AdBlocking via dns_instance option. |
unbound.adb_list |
Creates the Unbound config file /var/lib/unbound/adb_list.simple-adblock so that Unbound replies with NXDOMAIN: "domain not found". This option allows the block-list optimization (by removing secondary level domains if the top-level domain is also in the block-list), resulting in the smaller block-list file. |
This service downloads (and processes in the background, removing comments and other useless data) lists of hosts and domains to be blocked, combines those lists into one big block list, removes duplicates and sorts it and then removes your whitelisted domains from the block list before converting to to DNSMASQ/Unbound-compatible file and restarting DNSMASQ/Unbound if needed. The result of the process is that DNSMASQ/Unbound return NXDOMAIN or 127.0.0.1 (depending on settings) for the blocked domains.
If you specify google.com
as a domain to be whitelisted, you will have access to google.com
, www.google.com
, analytics.google.com
, but not fake domains like email-google.com
or drive.google.com.verify.signin.normandeassociation.com
for example. If you only want to allow www.google.com
while blocking all other google.com
subdomains, just specify www.google.com
as domain to be whitelisted.
In general, whatever domain is specified to be whitelisted; it, along with with its subdomains will be whitelisted, but not any fake domains containing it.
For most of the DNS Resolution Options to work, your local LAN clients need to be set to use your router's DNS (by default 192.168.1.1
). The dnsmasq.addnhosts
is the only option which can help you block ads if your local LAN clients are NOT using your router's DNS. There are multiple ways your local LAN clients can be set to NOT use your router's DNS:
Hardcoded on the device. Some Android Lollipop 5.0 phones, some media-centric tablets and some streaming devices for example are known to have hardcoded DNS servers and they ignore your router's DNS settings. You can fix this by either:
simple-adblock
's force_dns
setting to override the hardcoded DNS on your device.Manually set on the device. Instead of setting your device to obtain the DNS settings via DHCP, you can set the DNS servers manually. There are some guides online which recommend manually changing the DNS servers on your computer to Google's (8.8.8.8) or Cloudflare's (1.1.1.1) or OpenDNS (208.67.222.222). You can fix this by either:
simple-adblock
's force_dns
setting to override the hardcoded DNS on your device.Sent to your device from router via DHCP Options. You can fix this by either:
/etc/config/dhcp
file.simple-adblock
's force_dns
setting to override the hardcoded DNS on your device.By using the DNS-over-TLS, DNS-over-HTTPS or DNSCrypt on your local device or (if supported) by browser on your local device. You can fix this only by:
https_dns_proxy
and luci-app-https_dns_proxy
packages for enabling DNS-over-HTTPS on your router.If you are running a wireguard "server" on your router and remote clients connect to it, the AdBlocking may not work properly for your remote clients until you add the following to /etc/network
(credit to dibdot):
config route
option interface 'wg0'
option target '192.168.1.0'
option netmask '255.255.255.0'
Please head to OpenWrt Forum for discussion of this package.
I'd like to thank everyone who helped create, test and troubleshoot this service. Special thanks to @hnyman for general package/luci guidance, @dibdot for general guidance and block-list optimization code, @ckuethe for the curl support, non-ASCII filtering and compressed cache code, @EricLuehrsen for the Unbound support information, @mushoz for performance testing and @phasecat for submitting various bugs and testing.