# DNS based ad/abuse domain blocking ## Description A lot of people already use adblocker plugins within their desktop browsers, but what if you are using your (smart) phone, tablet, watch or any other (wlan) gadget!? Getting rid of annoying ads, trackers and other abuse sites (like facebook) is simple: block them with your router. When the DNS server on your router receives DNS requests, you will sort out queries that ask for the resource records of ad servers and return a simple 'NXDOMAIN'. This is nothing but **N**on-e**X**istent Internet or Intranet domain name, if domain name is unable to resolved using the DNS server, a condition called the 'NXDOMAIN' occurred. ## Main Features * Support of the following fully pre-configured domain blocklist feeds (free for private usage, for commercial use please check their individual licenses) | Feed | Enabled | Size | Focus | Information | | :------------------ | :-----: | :--- | :--------------- | :-------------------------------------------------------------------------------- | | 1Hosts | | VAR | compilation | [Link](https://github.com/badmojr/1Hosts) | | adguard | x | L | general | [Link](https://adguard.com) | | adguard_tracking | x | L | tracking | [Link](https://github.com/AdguardTeam/cname-trackers) | | android_tracking | | S | tracking | [Link](https://github.com/Perflyst/PiHoleBlocklist) | | andryou | | L | compilation | [Link](https://gitlab.com/andryou/block/-/blob/master/readme.md) | | anti_ad | | L | compilation | [Link](https://github.com/privacy-protection-tools/anti-AD/blob/master/README.md) | | anudeep | | M | compilation | [Link](https://github.com/anudeepND/blacklist) | | bitcoin | | S | mining | [Link](https://github.com/hoshsadiq/adblock-nocoin-list) | | certpl | x | L | phishing | [Link](https://cert.pl/en/warning-list/) | | cpbl | | XL | compilation | [Link](https://github.com/bongochong/CombinedPrivacyBlockLists) | | disconnect | | S | general | [Link](https://disconnect.me) | | divested | | XXL | compilation | [Link](https://divested.dev/pages/dnsbl) | | doh_blocklist | | S | doh_server | [Link](https://github.com/dibdot/DoH-IP-blocklists) | | firetv_tracking | | S | tracking | [Link](https://github.com/Perflyst/PiHoleBlocklist) | | games_tracking | | S | tracking | [Link](https://www.gameindustry.eu) | | hagezi | | VAR | compilation | [Link](https://github.com/hagezi/dns-blocklists) | | hblock | | XL | compilation | [Link](https://hblock.molinero.dev) | | ipfire_dbl | | VAR | compilation | [Link](https://www.ipfire.org/dbl) | | oisd_big | | XXL | general | [Link](https://oisd.nl) | | oisd_nsfw | | XXL | porn | [Link](https://oisd.nl) | | oisd_nsfw_small | | M | porn | [Link](https://oisd.nl) | | oisd_small | | L | general | [Link](https://oisd.nl) | | phishing_army | | S | phishing | [Link](https://phishing.army) | | smarttv_tracking | | S | tracking | [Link](https://github.com/Perflyst/PiHoleBlocklist) | | spam404 | | S | general | [Link](https://github.com/Dawsey21) | | stevenblack | | VAR | compilation | [Link](https://github.com/StevenBlack/hosts) | | stopforumspam | | S | spam | [Link](https://www.stopforumspam.com) | | utcapitole | | VAR | general | [Link](https://dsi.ut-capitole.fr/blacklists/index_en.php) | | wally3k | | S | compilation | [Link](https://firebog.net/about) | | whocares | | M | general | [Link](https://someonewhocares.org) | | winspy | | S | win_telemetry | [Link](https://github.com/crazy-max/WindowsSpyBlocker) | | yoyo | | S | general | [Link](https://pgl.yoyo.org/adservers) | * List of supported and fully pre-configured adblock sources, already active sources are pre-selected. To avoid OOM errors, please do not select too many lists! List size information with the respective domain ranges as follows: • S (-10k), M (10k-30k) and L (30k-80k) should work for 128 MByte devices • XL (80k-200k) should work for 256-512 MByte devices • XXL (200k-) needs more RAM and Multicore support, e.g. x86 or raspberry devices • VAR (50k-900k) variable size depending on the selection * Zero-conf like automatic installation & setup, usually no manual changes needed * Simple but yet powerful adblock engine: adblock does not use error prone external iptables rulesets, http pixel server instances and things like that * Supports six different DNS backend formats: dnsmasq, unbound, named (bind), kresd, smartdns or raw (e.g. used by dnscrypt-proxy) * Supports three different SSL-enabled download utilities: uclient-fetch, full wget or curl * Supports SafeSearch for google, bing, brave, duckduckgo, yandex, youtube and pixabay * Fast downloads & list processing as they are handled in parallel running background jobs with multicore support * The download engine supports ETAG headers to download only updated feeds * Supports a wide range of router modes, even AP modes are supported * Full IPv4 and IPv6 support * Provides top level domain compression ('tld compression'), this feature removes thousands of needless host entries from the blocklist and lowers the memory footprint for the DNS backend * Provides a 'DNS Blocklist Shift', where the generated final DNS blocklist is moved to the backup directory and only a soft link to this file is set in memory. As long as your backup directory is located on an external drive, you should activate this option to save valuable RAM. * Feed parsing by a very fast & secure domain validator, all domain rules and feed information are placed in an external JSON file ('/etc/adblock/adblock.feeds') * Overall duplicate removal in generated blocklist file 'adb_list.overall' * Additional local allowlist for manual overrides, located in '/etc/adblock/adblock.allowlist' (only exact matches). * Additional local blocklist for manual overrides, located in '/etc/adblock/adblock.blocklist' * Implements firewall‑based DNS Control to force DNS interfaces/ports and to redirect to external unfiltered/filtered DNS server * Includes firewall‑based Remote DNS Allow, a CGI-Interface to allow certain MACs temporary bypass the local adblock DNS * Supports firewall‑based temporary DNS Bridging, to ensure a Zero‑Downtime during adblock-related DNS Restarts * Connection checks during blocklist update to ensure a reliable DNS backend service * Minimal status & error logging to syslog, enable debug logging to receive more output * Procd based init system support ('start', 'stop', 'restart', 'reload', 'enable', 'disable', 'running', 'status', 'suspend', 'resume', 'query', 'report') * Auto-Startup via procd network interface trigger or via classic time based startup * Suspend & Resume adblock temporarily without blocklist re-processing * Provides comprehensive runtime information * Provides a detailed DNS Query Report with DNS related information about client requests, top (blocked) domains and more * Provides a powerful query function to quickly find blocked (sub-)domains, e.g. to allow certain domains * Implements a jail mode - only domains on the allowlist are permitted, all other DNS requests are rejected * Automatic blocklist backup & restore, these backups will be used in case of download errors and during startup * Send notification E-Mails, see example configuration below * Add new adblock feeds on your own with the 'Custom Feed Editor' in LuCI or via CLI, see example below * Strong LuCI support, all relevant options are exposed to the web frontend ## Prerequisites * **[OpenWrt](https://openwrt.org)**, latest stable release 24.x or a development snapshot * A usual setup with a working DNS backend * A download utility with SSL support: 'wget', 'uclient-fetch' with one of the 'libustream-*' ssl libraries or 'curl' is required * A certificate store such as 'ca-bundle' or 'ca-certificates', as adblock checks the validity of the SSL certificates of all download sites by default * For E-Mail notifications you need to install and setup the additional 'msmtp' package * For DNS reporting you need to install the additional package 'tcpdump-mini' or 'tcpdump' **Please note:** * Devices with less than 128MB of RAM are **_not_** supported * For performance reasons, adblock depends on gnu sort and gawk * Before update from former adblock releases please make a backup of your local allow- and blocklists. In the latest adblock 4.4.x these lists have been renamed to '/etc/adblock/adblock.allowlist' and '/etc/adblock/adblock.blocklist'. There is no automatic content transition to the new files. * The uci configuration of adblock is automatically migrated during package installation via the uci-defaults mechanism using a housekeeping script ## Installation & Usage * Make a backup and update your local opkg/apk repository * Install the LuCI companion package 'luci-app-adblock' which also installs the main 'adblock' package as a dependency * Enable the adblock system service (System -> Startup) and enable adblock itself (adblock -> General Settings) * It's strongly recommended to use the LuCI frontend to easily configure all aspects of adblock, the application is located in LuCI under the 'Services' menu * It is also strongly recommended to configure a ‘Startup Trigger Interface’ to ensure automatic adblock startup on WAN-ifup events during boot or reboot of your router ## Adblock CLI interface * The most important adblock functions are accessible via CLI as well. ``` ~# /etc/init.d/adblock Syntax: /etc/init.d/adblock [command] Available commands: start Start the service stop Stop the service restart Restart the service reload Reload configuration files (or restart if service does not implement reload) enable Enable service autostart disable Disable service autostart enabled Check if service is started on boot suspend Suspend adblock processing resume Resume adblock processing query Query active blocklists and backups for a specific domain report [|||] Print DNS statistics running Check if service is running status Service status trace Start with syscall trace info Dump procd service info ``` ## Adblock Config Options * Usually the auto pre-configured adblock setup works quite well and no manual overrides are needed | Option | Default | Description/Valid Values | | :------------------- | :--------------------------------- | :------------------------------------------------------------------------------------------------- | | adb_enabled | 1, enabled | set to 0 to disable the adblock service | | adb_feedfile | /etc/adblock/adblock.feeds | full path to the used adblock feed file | | adb_dns | -, auto-detected | 'dnsmasq', 'unbound', 'named', 'kresd', 'smartdns' or 'raw' | | adb_cores | -, auto-detected | limit the cpu cores used by adblock to save RAM | | adb_fetchcmd | -, auto-detected | 'uclient-fetch', 'wget' or 'curl' | | adb_fetchparm | -, auto-detected | manually override the config options for the selected download utility | | adb_fetchinsecure | 0, disabled | don't check SSL server certificates during download | | adb_trigger | -, not set | trigger network interface or 'not set' to use a time-based startup | | adb_triggerdelay | 5 | additional trigger delay in seconds before adblock processing begins | | adb_debug | 0, disabled | set to 1 to enable the debug output | | adb_nicelimit | 0, standard prio. | valid nice level range 0-19 of the adblock processes | | adb_dnsshift | 0, disabled | shift the blocklist to the backup directory and only set a soft link to this file in memory | | adb_dnsdir | -, auto-detected | path for the generated blocklist file 'adb_list.overall' | | adb_dnstimeout | 20 | timeout in seconds to wait for a successful DNS backend restart | | adb_dnsinstance | 0, first instance | set the relevant dnsmasq backend instance used by adblock | | adb_dnsflush | 0, disabled | set to 1 to flush the DNS Cache before & after adblock processing | | adb_lookupdomain | localhost | domain to check for a successful DNS backend restart | | adb_report | 0, disabled | set to 1 to enable the background tcpdump gathering process for reporting | | adb_map | 0, disabled | enable a GeoIP Map with blocked domains | | adb_reportdir | /tmp/adblock-report | path for DNS related report files | | adb_repiface | -, auto-detected | name of the reporting interface or 'any' used by tcpdump | | adb_repport | 53 | list of reporting port(s) used by tcpdump | | adb_repchunkcnt | 5 | report chunk count used by tcpdump | | adb_repchunksize | 1 | report chunk size used by tcpdump in MB | | adb_represolve | 0, disabled | resolve reporting IP addresses using reverse DNS (PTR) lookups | | adb_tld | 1, enabled | set to 0 to disable the top level domain compression (tld) function | | adb_basedir | /tmp | path for all adblock related runtime operations, e.g. downloading, sorting, merging etc. | | adb_backupdir | /tmp/adblock-backup | path for adblock backups | | adb_safesearch | 0, disabled | enforce SafeSearch for google, bing, brave, duckduckgo, yandex, youtube and pixabay | | adb_safesearchlist | -, not set | limit SafeSearch to certain provider (see above) | | adb_mail | 0, disabled | set to 1 to enable notification E-Mails in case of a processing errors | | adb_mailreceiver | -, not set | receiver address for adblock notification E-Mails | | adb_mailsender | no-reply@adblock | sender address for adblock notification E-Mails | | adb_mailtopic | adblock notification | topic for adblock notification E-Mails | | adb_mailprofile | adb_notify | mail profile used in 'msmtp' for adblock notification E-Mails | | adb_jail | 0 | jail mode - only domains on the allowlist are permitted, all other DNS requests are rejected | | adb_nftforce | 0, disabled | redirect all local DNS queries from specified LAN zones to the local DNS resolver | | adb_nftdevforce | -, not set | firewall LAN Devices/VLANs that should be forced locally | | adb_nftportforce | -, not set | firewall ports that should be forced locally | | adb_nftallow | 0, disabled | routes MACs or interfaces to an unfiltered external DNS resolver, bypassing local adblock | | adb_nftmacallow | -, not set | listed MAC addresses will always use the configured unfiltered DNS server | | adb_nftdevallow | -, not set | entire interfaces or VLANs will be routed to the unfiltered DNS server | | adb_allowdnsv4 | -, not set | external IPv4 DNS resolver applied to MACs and interfaces using the unfiltered DNS policy | | adb_allowdnsv6 | -, not set | external IPv6 DNS resolver applied to MACs and interfaces using the unfiltered DNS policy | | adb_nftremote | 0, disabled | routes MACs to an unfiltered external DNS resolver, bypassing local adblock | | adb_nftmacremote | -, not set | Allows listed MACs to remotely access an unfiltered external DNS resolver, bypassing local adblock | | adb_nftremotetimeout | 15 | Time limit in minutes for remote DNS access of the listed MAC addresses | | adb_remotednsv4 | -, not set | external IPv4 DNS resolver applied to MACs using the unfiltered remote DNS policy | | adb_remotednsv6 | -, not set | external IPv6 DNS resolver applied to MACs using the unfiltered remote DNS policy | | adb_nftblock | 0, disabled | routes MACs or interfaces to a filtered external DNS resolver, bypassing local adblock | | adb_nftmacblock | -, not set | listed MAC addresses will always use the configured filtered DNS server | | adb_nftdevblock | -, not set | entire interfaces or VLANs will be routed to the filtered DNS server | | adb_blockdnsv4 | -, not set | external IPv4 DNS resolver applied to MACs and interfaces using the filtered DNS policy | | adb_blockdnsv6 | -, not set | external IPv6 DNS resolver applied to MACs and interfaces using the filtered DNS policy | | adb_nftbridge | -, not set | enables a temporary DNS bridge to an external DNS resolver during local DNS restarts | | adb_bridgednsv4 | -, not set | external IPv4 DNS resolver used during bridging | | adb_bridgednsv6 | -, not set | external IPv6 DNS resolver used during bridging | ## Examples **Change the DNS backend to 'unbound':** No further configuration is needed, adblock deposits the final blocklist 'adb_list.overall' in '/var/lib/unbound' by default. To preserve the DNS cache after adblock processing please install the additional package 'unbound-control'. **Change the DNS backend to 'bind':** Adblock deposits the final blocklist 'adb_list.overall' in '/var/lib/bind' by default. To preserve the DNS cache after adblock processing please install the additional package 'bind-rdnc'. To use the blocklist please modify '/etc/bind/named.conf': ``` in the 'options' namespace add: response-policy { zone "rpz"; }; and at the end of the file add: zone "rpz" { type master; file "/var/lib/bind/adb_list.overall"; allow-query { none; }; allow-transfer { none; }; }; ``` **Change the DNS backend to 'kresd':** Adblock deposits the final blocklist 'adb_list.overall' in '/tmp/kresd', no further configuration needed. **Change the DNS backend to 'smartdns':** No further configuration is needed, adblock deposits the final blocklist 'adb_list.overall' in '/tmp/smartdns' by default. **Service status output:** In LuCI you'll see the realtime status in the 'Runtime' section on the overview page. To get the status in the CLI, just call _/etc/init.d/adblock status_ or _/etc/init.d/adblock status\_service_: ``` ~# /etc/init.d/adblock status ::: adblock runtime information + adblock_status : enabled + frontend_ver : 4.5.2-r1 + backend_ver : 4.5.2-r1 + blocked_domains : 753 951 + active_feeds : 1hosts, adguard, adguard_tracking, bitcoin, certpl, doh_blocklist, hagezi, ipfire_dbl, phishing_army, smarttv_tracking, stevenblack, winspy + dns_backend : unbound (1.24.2-r1), /mnt/data/adblock/backup, 297.66 MB + run_ifaces : trigger: wan, report: br-lan + run_information : base: /mnt/data/adblock, dns: /var/lib/unbound, backup: /mnt/data/adblock/backup, report: /mnt/data/adblock/report, error: /mnt/data/adblock/adb_error.log + run_flags : shift: ✔, custom feed: ✘, ext. DNS (std/prot/remote/bridge): ✘/✔/✔/✔, force: ✔, flush: ✘, tld: ✔, search: ✘, report: ✔, mail: ✔, jail: ✘ + last_run : mode: restart, 2026-03-01T06:20:27+01:00, duration: 0m 24s, 1342.71 MB available + system_info : cores: 4, fetch: curl, Bananapi BPI-R3, mediatek/filogic, OpenWrt SNAPSHOT (r33197-cf4cd07777) ``` ## Best practise and tweaks **Recommendation for low memory systems** adblock uses RAM by design and avoids writing to flash. On devices with 128–256 MB RAM, you can reduce memory pressure with the following optimizations: * use external storage: point 'adb_basedir', 'adb_backupdir' and 'adb_reportdir' to an USB drive or SSD * limit CPU processing to one core: set 'adb_cores' to '1' to reduce peak memory usage during feed processing * enable blocklist shifting: activate 'adb_dnsshift' to store the blocklist in the backup directory on a USB stick and only create a symlink in RAM. * Firewall DNS redirection: use nftables based DNS routing to external filtered DNS serves and only use a minimal set of local blocklists **Sensible choice of blocklists** The following feeds are just my personal recommendation as an initial setup: * 'adguard', 'adguard_tracking' and 'certpl' In total, this feed selection blocks about 280K domains. It may also be useful to include compilations like hagezi, stevenblack or oisd. Please note: don't just blindly activate too many feeds at once, sooner or later this will lead to OOM conditions. **DNS reporting, enable the GeoIP Map** adblock includes a powerful reporting tool on the DNS Report tab which shows the latest DNS statistics generated by tcpdump. To get the latest statistics always press the "Refresh" button. In addition to a tabular overview adblock reporting includes a GeoIP map in a modal popup window/iframe that shows the geolocation of your own uplink addresses (in green) and the locations of blocked domains in red. To enable the GeoIP Map set the following option in "Advanced Report Settings" config tab: * set 'adb_map' to '1' to include the external components listed below and activate the GeoIP map To make this work, adblock uses the following external components: * [Leaflet](https://leafletjs.com/) is a lightweight open-source JavaScript library for interactive maps * [OpenStreetMap](https://www.openstreetmap.org/) provides the map data under an open-source license * [CARTO basemap styles](https://github.com/CartoDB/basemap-styles) based on [OpenMapTiles](https://openmaptiles.org/schema) * The free and quite fast [IP Geolocation API](https://ip-api.com/) to resolve the required IP/geolocation information (max. 45 blocked Domains per request) **External adblock test** In addition to the built‑in DNS reporting and GeoIP map, adblock users can verify the effectiveness of their configuration with an external test page. The [Adblock Test](https://adblock.turtlecute.org/) provides a simple way to check whether your current adblock setup is working as expected. It loads a series of test elements (ads, trackers, and other resources) and reports whether they are successfully blocked by your configuration. The test runs entirely in the browser and does not require additional configuration. For best results, open the page in the same environment where adblock is active and review the results displayed. **Firewall‑Based DNS Control** adblock provides several advanced firewall‑integrated features that allow you to enforce DNS policies directly at the network layer. These mechanisms operate independently of the local DNS resolver and ensure that DNS traffic follows your filtering rules, even when clients attempt to bypass them. * unfiltered external DNS Routing: routes DNS queries from selected devices or interfaces to an external unfiltered DNS resolver * filtered external DNS Routing: routes DNS queries from selected devices or interfaces to an external filtered DNS resolver * force DNS: blocks or redirects all external DNS traffic to ensure that clients use the local resolver The DNS routing allows you to apply external DNS (unfiltered and/or filtered) to specific devices or entire network segments. DNS queries from these targets are transparently redirected to a chosen external resolver (IPv4 and/or IPv6): * MAC‑based targeting for individual devices * Interface/VLAN targeting for entire segments * separate IPv4/IPv6 resolver selection * transparent DNS redirection without client‑side configuration This mode is ideal for guest networks, IoT devices, or environments where certain clients require stricter/lesser DNS filtering. force DNS ensures that all DNS traffic on your network by specific devices or entire network segments is processed by the local resolver. Any attempt to use external DNS servers is blocked or redirected. * blocks external DNS on port 53 and redirects DNS queries to the local resolver when appropriate * also prevents DNS bypassing by clients with hardcoded DNS settings on other ports, e.g. on port 853 This mode guarantees that adblock’s filtering pipeline is always applied. adblock's firewall rules are based on nftables in a separate isolated nftables table (inet adblock) and chains (prerouting), with MAC addresses stored in a nftables set. The configuration is carried out centrally in LuCI on the ‘Firewall Settings’ tab in adblock. **Remote DNS Allow (Temporary MAC‑Based Bypass)** This additional firewall feature lets selected client devices temporarily bypass local DNS blocking and use an external, unfiltered DNS resolver. It is designed for situations where a device needs short‑term access to content normally blocked by the adblock rules. A lightweight CGI endpoint handles the workflow: * the client opens the URL, e.g. https://\cgi-bin/adblock (preferably transferred via QR code shown in LuCI) * the script automatically detects the device’s MAC address * if the MAC is authorized, the script displays the current status: * not in the nftables set → option to request a temporary allow (“Renew”) * already active → shows remaining timeout * when renewing, the CGI adds the MAC to an nftables Set with a per‑entry timeout The CGI interface is mobile‑friendly and includes a LuCI‑style loading spinner during the renew process, giving immediate visual feedback while the nftables entry is created. All operations are atomic and safe even when multiple devices renew access in parallel. **Temporary DNS Bridging (Zero‑Downtime during DNS Restarts)** Adblock can optionally enable a temporary DNS bridging mode to avoid DNS downtime during DNS backend restarts. When this feature is enabled, all DNS queries from LAN clients are briefly redirected to an external fallback resolver until the local DNS backend becomes available again. This ensures that DNS resolution continues to work seamlessly for all clients, even while adblock reloads blocklists or restarts the DNS service. Just set the options 'adb_nftbridging', 'adb_bridgednsv4' and 'adb_bridgednsv6' accordingly. **Jail mode (allowlist-only):** Enforces a strict allowlist‑only DNS policy in which only domains listed in the allowlist file are resolved, while every other query is rejected. This mode is intended for highly restrictive environments and depends on a carefully maintained allowlist, typically managed manually. **Enable E-Mail notification via 'msmtp':** To use the email notification you have to install & configure the package 'msmtp'. Modify the file '/etc/msmtprc':

[...]
defaults
auth            on
tls             on
tls_certcheck   off
timeout         5
syslog          LOG_MAIL
[...]
account         adb_notify
host            smtp.gmail.com
port            587
from            dev.adblock@gmail.com
user            dev.adblock
password        xxx
Finally enable E-Mail support, add a valid E-Mail receiver address in LuCI and setup an appropriate cron job. **Automatic adblock feed updates and E-Mail reports** For a regular, automatic update of the used feeds or other regular adblock tasks set up a cron job. In LuCI you find the cron settings under 'System' => 'Scheduled Tasks'. On the command line the cron file is located at '/etc/crontabs/root': Example 1 ``` # update the adblock feeds every morning at 4 o'clock 00 04 * * * /etc/init.d/adblock reload ``` Example 2 ``` # update the adblock feeds every hour 0 */1 * * * /etc/init.d/adblock reload ``` Example 3 ``` # send an adblock E-Mail report every morning at 3 o'clock 00 03 * * * /etc/init.d/adblock report mail ``` **Change/add adblock feeds** The adblock blocklist feeds are stored in an external JSON file '/etc/adblock/adblock.feeds'. All custom changes should be stored in an external JSON file '/etc/adblock/adblock.custom.feeds' (empty by default). It's recommended to use the LuCI based Custom Feed Editor to make changes to this file. A valid JSON source object contains the following information, e.g.: ``` [...] "stevenblack": { "url": "https://raw.githubusercontent.com/StevenBlack/hosts/master/", "rule": "feed 0.0.0.0 2", "size": "VAR", "descr": "compilation" }, [...] ``` Add an unique feed name (no spaces, no special chars) and make the required changes: adapt at least the URL, check/change the rule, the size and the description for a new feed. The rule consist of max. 4 individual, space separated parameters: 1. type: always 'feed' (required) 2. prefix: an optional search term (a string literal, no regex) to identify valid domain list entries, e.g. '0.0.0.0' 3. column: the domain column within the feed file, e.g. '2' (required) 4. separator: an optional field separator, default is the character class '[[:space:]]' **Enable debug mode** Adblock provides an optional debug mode that writes diagnostic information to the system log and captures internal error output in a dedicated error logfile - by default located in the adblock base directory as '/tmp/adb_error.log'. The log file is automatically cleared at the beginning of each run. Under normal conditions, all error messages are discarded to keep regular runs clean and silent. To enable debug mode, set the option 'adb_debug' to '1'. When enabled, the script produces significantly more log output to assist with troubleshooting. ## Support Please join the adblock discussion in this [forum thread](https://forum.openwrt.org/t/adblock-support-thread/507) or contact me by mail ## Removal Stop all adblock related services with _/etc/init.d/adblock stop_ and remove the adblock package if necessary. ## Donations You like this project - is there a way to donate? Generally speaking "No" - I have a well-paying full-time job and my OpenWrt projects are just a hobby of mine in my spare time. If you still insist to donate some bucks ... * I would be happy if you put your money in kind into other, social projects in your area, e.g. a children's hospice * Let's meet and invite me for a coffee if you are in my area, the “Markgräfler Land” in southern Germany or in Switzerland (Basel) * Send your money to my [PayPal account](https://www.paypal.me/DirkBrenken) and I will collect your donations over the year to support various social projects in my area No matter what you decide - thank you very much for your support! Have fun! Dirk