adblock: update 2.5.1
[feed/packages.git] / net / adblock / files / README.md
1 # dns based ad/abuse domain blocking
2
3 ## Description
4 A lot of people already use adblocker plugins within their desktop browsers, but what if you are using your (smart) phone, tablet, watch or any other wlan gadget...getting rid of annoying ads, trackers and other abuse sites (like facebook ;-) is simple: block them with your router. When the dns server on your router receives dns requests, you will sort out queries that ask for the resource records of ad servers and return a simple 'NXDOMAIN'. This is nothing but **N**on-e**X**istent Internet or Intranet domain name, if domain name is unable to resolved using the dns server, a condition called the 'NXDOMAIN' occurred.
5
6 ## Main Features
7 * support of the following domain block list sources (free for private usage, for commercial use please check their individual licenses):
8 * [adaway](https://adaway.org)
9 * => infrequent updates, approx. 400 entries (enabled by default)
10 * [adguard](https://adguard.com)
11 * => numerous updates on the same day, approx. 12.000 entries
12 * [blacklist]()
13 * => static local blacklist, located by default in '/etc/adblock/adblock.blacklist'
14 * [disconnect](https://disconnect.me)
15 * => numerous updates on the same day, approx. 6.500 entries (enabled by default)
16 * [dshield](http://dshield.org)
17 * => daily updates, approx. 4.500 entries
18 * [feodotracker](https://feodotracker.abuse.ch)
19 * => daily updates, approx. 0-10 entries
20 * [hphosts](https://hosts-file.net)
21 * => monthly updates, approx. 50.000 entries
22 * [malwaredomains](http://malwaredomains.com)
23 * => daily updates, approx. 16.000 entries
24 * [malwaredomainlist](http://www.malwaredomainlist.com)
25 * => daily updates, approx. 1.500 entries
26 * [openphish](https://openphish.com)
27 * => numerous updates on the same day, approx. 1.800 entries
28 * [palevo tracker](https://palevotracker.abuse.ch)
29 * => daily updates, approx. 15 entries
30 * [ransomware tracker](https://ransomwaretracker.abuse.ch)
31 * => daily updates, approx. 150 entries
32 * [reg_ch](https://easylist-downloads.adblockplus.org/easylistchina+easylist.txt)
33 * => regional blocklist for China, daily updates, approx. 1.600 entries
34 * [reg_pl](http://adblocklist.org)
35 * => regional blocklist for Poland, daily updates, approx. 50 entries
36 * [reg_ro](https://easylist-downloads.adblockplus.org/rolist+easylist.txt)
37 * => regional blocklist for Romania, weekly updates, approx. 600 entries
38 * [reg_ru](https://code.google.com/p/ruadlist)
39 * => regional blocklist for Russia, weekly updates, approx. 2.000 entries
40 * [securemecca](http://www.securemecca.com)
41 * => infrequent updates, approx. 25.000 entries
42 * [shallalist](http://www.shallalist.de) (categories "adv" "costtraps" "spyware" "tracker" "warez" enabled by default)
43 * => daily updates, approx. 32.000 entries (a short description of all shallalist categories can be found [online](http://www.shallalist.de/categories.html))
44 * [spam404](http://www.spam404.com)
45 * => infrequent updates, approx. 5.000 entries
46 * [sysctl/cameleon](http://sysctl.org/cameleon)
47 * => weekly updates, approx. 21.000 entries
48 * [whocares](http://someonewhocares.org)
49 * => weekly updates, approx. 12.000 entries
50 * [winhelp](http://winhelp2002.mvps.org)
51 * => infrequent updates, approx. 15.000 entries
52 * [winspy](https://github.com/crazy-max/WindowsSpyBlocker)
53 * => infrequent updates, approx. 120 entries
54 * [yoyo](http://pgl.yoyo.org/adservers)
55 * => weekly updates, approx. 2.500 entries (enabled by default)
56 * [zeus tracker](https://zeustracker.abuse.ch)
57 * => daily updates, approx. 440 entries
58 * zero-conf like automatic installation & setup, usually no manual changes needed
59 * simple but yet powerful adblock engine: adblock does not use error prone external iptables rulesets, http pixel server instances and things like that
60 * automatically selects dnsmasq or unbound as dns backend
61 * automatically selects uclient-fetch or wget as download utility (other tools like curl or aria2c are supported as well)
62 * automatically supports a wide range of router modes, even AP modes are supported
63 * full IPv4 and IPv6 support
64 * supports tld compression (top level domain compression), this feature removes thousands of needless host entries from the block lists and lowers the memory footprint for the dns backends
65 * each block list source will be updated and processed separately
66 * block list source parsing by fast & flexible regex rulesets
67 * overall duplicate removal in separate block lists
68 * additional whitelist for manual overrides, located by default in /etc/adblock/adblock.whitelist
69 * quality checks during block list update to ensure a reliable dns backend service
70 * minimal status & error logging to syslog, enable debug logging to receive more output
71 * procd based init system support (start/stop/restart/reload/suspend/resume/query)
72 * procd based hotplug support, the adblock start will be solely triggered by network interface triggers
73 * suspend & resume adblock actions temporarily without block list reloading
74 * runtime information via ubus service call
75 * query function to quickly identify blocked (sub-)domains, e.g. for whitelisting
76 * optional: automatic block list backup & restore, backups will be (de-)compressed and restored on the fly in case of any runtime error
77 * optional: add new adblock sources on your own via uci config
78
79 ## Prerequisites
80 * [LEDE project](https://www.lede-project.org), tested with latest stable release (LEDE 17.01) and with current LEDE snapshot
81 * a usual setup with an enabled dns backend at minimum - dump AP modes without a working dns backend are _not_ supported
82 * a download utility: full versions (with ssl support) of 'wget', 'uclient-fetch', 'aria2c' or 'curl' are supported
83 * LEDE 17.01 or LEDE snapshot: use built-in 'uclient-fetch' or download & install the external 'wget' package
84 * for more configuration options see examples below
85
86 ## OpenWrt / LEDE trunk Installation & Usage
87 * install 'adblock' (_opkg install adblock_) and that's it - the adblock start will be automatically triggered by procd interface triggers
88 * start/stop/restart/reload/suspend/resume the adblock service manually with _/etc/init.d/adblock_
89 * enable/disable your favored block list sources in _/etc/config/adblock_ - 'adaway', 'disconnect' and 'yoyo' are enabled by default
90
91 ## LuCI adblock companion package
92 * for easy management of the various block list sources and all other adblock options you can also use a nice & efficient LuCI frontend
93 * install 'luci-app-adblock' (_opkg install luci-app-adblock_)
94 * the application is located in LuCI under 'Services' menu
95 * _Thanks to Hannu Nyman for this great adblock LuCI frontend!_
96
97 ## Tweaks
98 * **runtime information:** the adblock status is available via ubus service call (see example below)
99 * **debug logging:** for script debugging please set the config option 'adb\_debug' to '1' and check the runtime output with _logread -e "adblock"_
100 * **storage expansion:** to process and store all block list sources at once it might helpful to enlarge your temp directory with a swap partition => see [openwrt wiki](https://wiki.openwrt.org/doc/uci/fstab) for further details
101 * **add white- / blacklist entries:** add domain white- or blacklist entries to always-allow or -deny certain (sub) domains, by default both lists are empty and located in _/etc/adblock_. Please add one domain per line - ip addresses, wildcards & regex are _not_ allowed (see example below)
102 * **backup & restore block lists:** enable this feature, to restore automatically the latest compressed backup of your block lists in case of any processing error (e.g. a single block list source is not available during update). Please use an (external) solid partition and _not_ your volatile router temp directory for this
103 * **scheduled list updates:** for a scheduled call of the adblock service add an appropriate crontab entry (see example below)
104 * **restrict procd interface trigger:** restrict the procd interface trigger to a (list of) certain interface(s) (default: wan). To disable it at all, remove all entries
105 * **suspend & resume adblocking:** to quickly switch the adblock service 'on' or 'off', simply use _/etc/init.d/adblock [suspend|resume]_
106 * **domain query:** to query the active block lists for a specific domain, please run _/etc/init.d/adblock query `<DOMAIN>`_ (see example below)
107 * **divert dns requests:** to force dns requests to your local dns resolver add an appropriate firewall rule (see example below)
108 * **add new list sources:** you could add new block list sources on your own via uci config, all you need is a source url and an awk one-liner (see example below)
109 * **disable active dns probing in windows 10:** to prevent a yellow exclamation mark on your internet connection icon (which wrongly means connected, but no internet), please change the following registry key/value from "1" to "0" _HKLM\SYSTEM\CurrentControlSet\Services\NlaSvc\Parameters\Internet\EnableActiveProbing_
110
111 ## Further adblock config options
112 * usually the pre-configured adblock setup works quite well and no manual config overrides are needed, all listed options apply to the 'global' config section:
113 * adb\_enabled => main switch to enable/disable adblock service (default: '1', enabled)
114 * adb\_debug => enable/disable adblock debug output (default: '0', disabled)
115 * adb\_iface => set the procd interface trigger to a (list of) lan / wan interface(s) (default: 'wan')
116 * adb\_fetch => full path to a different download utility, see example below (default: not set, use wget)
117 * adb\_fetchparm => options for the download utility, see example below (default: not set, use wget options)
118
119 ## Examples
120 **change default dns backend to 'unbound':**
121 <pre><code>
122 Adblock detects the presence of an active unbound dns backend and the block lists will be automatically pulled in by unbound.
123 The adblock script deposits the sorted and filtered block lists in '/var/lib/unbound' where unbound can find them in its jail.
124 If you use manual configuration for unbound, then just include the following line in your 'server:' clause:
125
126 include: "/var/lib/unbound/adb_list.*"
127 </code></pre>
128
129 **configuration for different download utilities:**
130 <pre><code>
131 wget (default):
132 option adb_fetch="/usr/bin/wget"
133 option adb_fetchparm="--no-config --quiet --no-cache --no-cookies --max-redirect=0 --timeout=10 --no-check-certificate -O"
134
135 aria2c:
136 option adb_fetch '/usr/bin/aria2c'
137 option adb_fetchparm '-q --timeout=10 --allow-overwrite=true --auto-file-renaming=false --check-certificate=false -o'
138
139 uclient-fetch:
140 option adb_fetch '/bin/uclient-fetch'
141 option adb_fetchparm '-q --timeout=10 --no-check-certificate -O'
142
143 curl:
144 option adb_fetch '/usr/bin/curl'
145 option adb_fetchparm '-s --connect-timeout 10 --insecure -o'
146 </code></pre>
147
148 **receive adblock runtime information via ubus:**
149 <pre><code>
150 ubus call service get_data '{"name":"adblock"}
151 This will output the active block lists and other runtime information as JSON, e.g.:
152 {
153 "adblock": {
154 "adblock": {
155 "active_lists": [
156 {
157 "reg_pl": "45",
158 "blacklist": "144",
159 "winspy": "138",
160 "adaway": "379",
161 "zeus": "399",
162 "reg_ro": "656",
163 "reg_ch": "1631",
164 "yoyo": "2320",
165 "reg_ru": "2397",
166 "ransomware": "1681",
167 "disconnect": "5157",
168 "adguard": "12799"
169 }
170 ],
171 "adblock_version": "2.5.1",
172 "blocked_domains": "27746",
173 "dns_backend": "dnsmasq",
174 "last_rundate": "04.04.2017 11:02:40",
175 "system": "LEDE Reboot SNAPSHOT r3904-c3778f2647"
176 }
177 }
178 }
179 </code></pre>
180
181 **cronjob for a regular block list update (/etc/crontabs/root):**
182 <pre><code>
183 0 06 * * * /etc/init.d/adblock start
184 </code></pre>
185
186 **blacklist entry (/etc/adblock/adblock.blacklist):**
187 <pre><code>
188 ads.example.com
189
190 This entry blocks the following (sub)domains:
191 http://ads.example.com/foo.gif
192 http://server1.ads.example.com/foo.gif
193 https://ads.example.com:8000/
194
195 This entry does not block:
196 http://ads.example.com.ua/foo.gif
197 http://example.com/
198 </code></pre>
199
200 **whitelist entry (/etc/adblock/adblock.whitelist):**
201 <pre><code>
202 here.com
203
204 This entry removes the following (sub)domains from the block lists:
205 maps.here.com
206 here.com
207
208 This entry does not remove:
209 where.com
210 www.adwhere.com
211 </code></pre>
212
213 **query active block lists for a certain (sub-)domain, e.g. for whitelisting:**
214 <pre><code>
215 /etc/init.d/adblock query example.www.doubleclick.net
216 ::: distinct results for domain 'example.www.doubleclick.net'
217 no match
218 ::: distinct results for domain 'www.doubleclick.net'
219 adb_list.sysctl : www.doubleclick.net
220 ::: distinct results for domain 'doubleclick.net'
221 adb_list.adaway : ad-g.doubleclick.net
222 adb_list.securemecca : 1168945.fls.doubleclick.net
223 adb_list.sysctl : 1435575.fls.doubleclick.net
224 adb_list.whocares : 3ad.doubleclick.net
225
226 The query function checks against the submitted (sub-)domain and recurses automatically to the upper top level domain(s).
227 For every domain it returns the overall count plus a distinct list of active block lists with the first relevant result.
228 In the example above whitelist "www.doubleclick.net" to free the submitted domain.
229 </code></pre>
230
231 **divert dns requests to local dns resolver in /etc/config/firewall:**
232 <pre><code>
233 config redirect
234 option name 'Divert DNS'
235 option src 'lan'
236 option proto 'tcp udp'
237 option src_dport '53'
238 option dest_port '53'
239 option target 'DNAT'
240 </code></pre>
241
242 **add a new block list source:**
243 <pre><code>
244 1. the easy way ...
245 example: https://easylist-downloads.adblockplus.org/rolist+easylist.txt
246 adblock already supports an easylist source, called 'ruadlist'. To add the additional local easylist
247 as a new source, copy the existing config source 'ruadlist' section and change only
248 the source name, the url and the description - that's all!
249
250 config source 'rolist'
251 option enabled '0'
252 option adb_src 'https://easylist-downloads.adblockplus.org/rolist+easylist.txt'
253 option adb_src_rset '{FS=\"[|^]\"} \$0 ~/^\|\|([A-Za-z0-9_-]+\.){1,}[A-Za-z]+\^$/{print tolower(\$3)}'
254 option adb_src_desc 'focus on romanian ad related domains plus generic easylist additions, weekly updates, approx. 600 entries'
255
256 2. a bit harder ...
257 to add a really new source with different domain/host format you have to write a suitable
258 awk one-liner on your own, so basic awk skills are needed. As a starting point check the already
259 existing awk strings (adb_src_rset) in adblock config, maybe you need only small changes for your individual list.
260 Download the desired list and test your new awk string locally with:
261 cat new.list | awk 'fs__individual search__search core__result'
262 'fs' => field separator (optional)
263 'individual search' => individual search part to filter out needless list information
264 'search core' => always '([A-Za-z0-9_-]+\.){1,}[A-Za-z]+', this is part of all list sources and should be unchanged
265 'result' => always '{print tolower(\$n)}', only the output column 'n' may vary
266 the output result should be a sequential list with one domain/host per line - nothing more.
267
268 If your awk one-liner works quite well, add a new source section in adblock config and test your new source
269 </code></pre>
270
271 ## Support
272 Please join the adblock discussion in this [forum thread](https://forum.lede-project.org/t/adblock-2-x-support-thread/507) or contact me by mail <dev@brenken.org>
273
274 ## Removal
275 * stop all adblock related services with _/etc/init.d/adblock stop_
276 * optional: remove the adblock package (_opkg remove adblock_)
277
278 Have fun!
279 Dirk