2016-05-13 07:54:20 +00:00
# dns based ad/abuse domain blocking
2015-10-27 23:02:23 +00:00
## Description
2016-12-19 19:11:25 +00:00
A lot of people already use adblocker plugins within their desktop browsers, but what if you are using your (smart) phone, tablet, watch or any other wlan gadget...getting rid of annoying ads, trackers and other abuse sites (like facebook ;-) is simple: block them with your router. When the dns server on your router receives dns requests, you will sort out queries that ask for the resource records of ad servers and return a simple 'NXDOMAIN'. This is nothing but **N**on-e**X**istent Internet or Intranet domain name, if domain name is unable to resolved using the dns server, a condition called the 'NXDOMAIN' occurred.
2015-10-27 23:02:23 +00:00
## Main Features
2017-11-04 13:00:20 +00:00
* support of the following domain blocklist sources (free for private usage, for commercial use please check their individual licenses):
2016-02-15 11:25:21 +00:00
* [adaway ](https://adaway.org )
2016-01-23 21:54:01 +00:00
* => infrequent updates, approx. 400 entries (enabled by default)
2017-02-04 20:32:50 +00:00
* [adguard ](https://adguard.com )
* => numerous updates on the same day, approx. 12.000 entries
2017-10-18 10:50:12 +00:00
* [bitcoin ](https://github.com/hoshsadiq/adblock-nocoin-list )
* => infrequent updates, approx. 15 entries
2016-04-30 20:18:25 +00:00
* [blacklist]()
* => static local blacklist, located by default in '/etc/adblock/adblock.blacklist'
2016-02-15 11:25:21 +00:00
* [disconnect ](https://disconnect.me )
2016-01-23 21:54:01 +00:00
* => numerous updates on the same day, approx. 6.500 entries (enabled by default)
2016-02-15 11:25:21 +00:00
* [dshield ](http://dshield.org )
2015-12-20 21:40:54 +00:00
* => daily updates, approx. 4.500 entries
2016-02-15 11:25:21 +00:00
* [feodotracker ](https://feodotracker.abuse.ch )
2015-12-17 10:49:31 +00:00
* => daily updates, approx. 0-10 entries
2016-07-28 20:29:46 +00:00
* [hphosts ](https://hosts-file.net )
2016-08-16 06:54:21 +00:00
* => monthly updates, approx. 50.000 entries
2016-02-15 11:25:21 +00:00
* [malwaredomains ](http://malwaredomains.com )
2015-12-20 21:40:54 +00:00
* => daily updates, approx. 16.000 entries
2016-02-15 11:25:21 +00:00
* [malwaredomainlist ](http://www.malwaredomainlist.com )
2016-01-23 21:54:01 +00:00
* => daily updates, approx. 1.500 entries
2016-02-15 11:25:21 +00:00
* [openphish ](https://openphish.com )
* => numerous updates on the same day, approx. 1.800 entries
2016-04-30 20:18:25 +00:00
* [ransomware tracker ](https://ransomwaretracker.abuse.ch )
* => daily updates, approx. 150 entries
2017-04-10 19:15:34 +00:00
* [reg_cn ](https://easylist-downloads.adblockplus.org/easylistchina+easylist.txt )
2017-04-04 12:15:30 +00:00
* => regional blocklist for China, daily updates, approx. 1.600 entries
2018-01-31 12:13:32 +00:00
* [reg_cz ](https://raw.githubusercontent.com/qxstyles/turris-hole-czech-block-list/master/turris-hole-czech-block-list )
* => regional blocklist for Czechia, maintained by Turris Omnia Users, infrequent updates, approx. 100 entries
2017-11-08 10:31:47 +00:00
* [reg_de ](https://easylist-downloads.adblockplus.org/easylistgermany+easylist.txt )
* => regional blocklist for Germany, daily updates, approx. 9.200 entries
2017-09-09 15:35:42 +00:00
* [reg_id ](https://easylist-downloads.adblockplus.org/abpindo+easylist.txt )
* => regional blocklist for Indonesia, daily updates, approx. 800 entries
2017-07-22 18:33:26 +00:00
* [reg_nl ](https://easylist-downloads.adblockplus.org/easylistdutch+easylist.txt )
* => regional blocklist for the Netherlands, weekly updates, approx. 1300 entries
2017-04-04 12:15:30 +00:00
* [reg_pl ](http://adblocklist.org )
* => regional blocklist for Poland, daily updates, approx. 50 entries
* [reg_ro ](https://easylist-downloads.adblockplus.org/rolist+easylist.txt )
* => regional blocklist for Romania, weekly updates, approx. 600 entries
* [reg_ru ](https://code.google.com/p/ruadlist )
* => regional blocklist for Russia, weekly updates, approx. 2.000 entries
2016-02-15 11:25:21 +00:00
* [shallalist ](http://www.shallalist.de ) (categories "adv" "costtraps" "spyware" "tracker" "warez" enabled by default)
2015-12-17 10:49:31 +00:00
* => daily updates, approx. 32.000 entries (a short description of all shallalist categories can be found [online ](http://www.shallalist.de/categories.html ))
2016-02-15 11:25:21 +00:00
* [spam404 ](http://www.spam404.com )
2015-12-17 10:49:31 +00:00
* => infrequent updates, approx. 5.000 entries
2016-03-08 21:48:00 +00:00
* [sysctl/cameleon ](http://sysctl.org/cameleon )
* => weekly updates, approx. 21.000 entries
2016-02-15 11:25:21 +00:00
* [whocares ](http://someonewhocares.org )
2015-12-20 21:40:54 +00:00
* => weekly updates, approx. 12.000 entries
2016-02-15 11:25:21 +00:00
* [winhelp ](http://winhelp2002.mvps.org )
2015-12-17 10:49:31 +00:00
* => infrequent updates, approx. 15.000 entries
2016-06-04 06:36:47 +00:00
* [winspy ](https://github.com/crazy-max/WindowsSpyBlocker )
2016-04-30 20:18:25 +00:00
* => infrequent updates, approx. 120 entries
2016-02-15 11:25:21 +00:00
* [yoyo ](http://pgl.yoyo.org/adservers )
2015-12-20 21:40:54 +00:00
* => weekly updates, approx. 2.500 entries (enabled by default)
2016-04-30 20:18:25 +00:00
* [zeus tracker ](https://zeustracker.abuse.ch )
2015-12-20 21:40:54 +00:00
* => daily updates, approx. 440 entries
2016-12-19 19:11:25 +00:00
* zero-conf like automatic installation & setup, usually no manual changes needed
* simple but yet powerful adblock engine: adblock does not use error prone external iptables rulesets, http pixel server instances and things like that
2017-11-04 13:00:20 +00:00
* supports five different dns backends / blocklist formats: dnsmasq, unbound, named (bind), kresd and dnscrypt-proxy
2018-01-10 18:33:42 +00:00
* supports six different download utilities: uclient-fetch, wget, curl, aria2c, wget-nossl, busybox-wget
2018-01-31 12:13:32 +00:00
* Really fast downloads & list processing as they are handled in parallel as background jobs in a configurable 'Download Queue'
2017-11-04 13:00:20 +00:00
* provides 'http only' mode without installed ssl library for all non-SSL blocklist sources
2017-09-09 15:35:42 +00:00
* supports a wide range of router modes, even AP modes are supported
2016-01-23 21:54:01 +00:00
* full IPv4 and IPv6 support
2018-01-31 12:13:32 +00:00
* provides top level domain compression ('tld compression'), this feature removes thousands of needless host entries from the blocklist and lowers the memory footprint for the dns backend
2017-11-04 13:00:20 +00:00
* blocklist source parsing by fast & flexible regex rulesets
* overall duplicate removal in central blocklist 'adb_list.overall'
2016-04-30 20:18:25 +00:00
* additional whitelist for manual overrides, located by default in /etc/adblock/adblock.whitelist
2017-11-04 13:00:20 +00:00
* quality checks during blocklist update to ensure a reliable dns backend service
2016-12-19 19:11:25 +00:00
* minimal status & error logging to syslog, enable debug logging to receive more output
2017-04-10 19:15:34 +00:00
* procd based init system support (start/stop/restart/reload/suspend/resume/query/status)
2017-09-09 15:35:42 +00:00
* procd network interface trigger support or classic time based startup
2018-01-31 12:13:32 +00:00
* keep the dns cache intact after adblock processing (currently supported by unbound, named and kresd)
2017-12-02 17:39:03 +00:00
* conditional dns backend restarts by old/new blocklist comparison with sha256sum (default) or md5sum
2017-11-04 13:00:20 +00:00
* suspend & resume adblock actions temporarily without blocklist reloading
2017-09-09 15:35:42 +00:00
* output comprehensive runtime information via LuCI or via 'status' init command
2017-01-23 18:03:41 +00:00
* query function to quickly identify blocked (sub-)domains, e.g. for whitelisting
2017-09-09 15:35:42 +00:00
* strong LuCI support
2017-04-25 20:42:12 +00:00
* optional: force dns requests to local resolver
* optional: force overall sort / duplicate removal for low memory devices (handle with care!)
2017-11-04 13:00:20 +00:00
* optional: automatic blocklist backup & restore, they will be used in case of download errors or during startup in backup mode
* optional: 'backup mode' to re-use blocklist backups during startup, get fresh lists only via reload or restart action
2018-01-31 12:13:32 +00:00
* optional: 'Jail' blocklist generation which builds an additional list (/tmp/adb_list.jail) to block access to all domains except those listed in the whitelist file. You can use this restrictive blocklist manually e.g. for guest wifi or kidsafe configurations
2017-12-28 16:55:49 +00:00
* optional: send notification emails in case of a processing error or if the overall domain count is ≤ 0
2018-01-31 12:13:32 +00:00
* optional: add new adblock sources on your own, see example below
2015-10-27 23:02:23 +00:00
## Prerequisites
2018-01-31 12:13:32 +00:00
* [OpenWrt ](https://openwrt.org ), tested with the stable release series (17.01.x) and with the latest OpenWrt snapshot
2017-02-04 20:32:50 +00:00
* a usual setup with an enabled dns backend at minimum - dump AP modes without a working dns backend are _not_ supported
2017-04-10 19:15:34 +00:00
* a download utility:
* to support all blocklist sources a full version (with ssl support) of 'wget', 'uclient-fetch' with one of the 'libustream-*' ssl libraries, 'aria2c' or 'curl' is required
2017-09-09 15:35:42 +00:00
* for limited devices with real memory constraints, adblock provides also a 'http only' option and supports wget-nossl and uclient-fetch (without libustream-ssl) as well
2017-01-23 18:03:41 +00:00
* for more configuration options see examples below
2015-10-27 23:02:23 +00:00
2017-09-09 15:35:42 +00:00
## Installation & Usage
* install 'adblock' (_opkg install adblock_)
2018-01-31 12:13:32 +00:00
* at minimum configure the appropriate dns backend ('dnsmasq' by default), the donwload utility and enable the adblock service in _/etc/config/adblock_
2017-04-10 19:15:34 +00:00
* control the adblock service manually with _/etc/init.d/adblock_ start/stop/restart/reload/suspend/resume/status or use the LuCI frontend
2016-01-23 21:54:01 +00:00
2016-02-21 15:14:14 +00:00
## LuCI adblock companion package
2017-11-04 13:00:20 +00:00
* for easy management of the various blocklist sources and all other adblock options you should use the provided LuCI frontend
2016-04-30 20:18:25 +00:00
* install 'luci-app-adblock' (_opkg install luci-app-adblock_)
* the application is located in LuCI under 'Services' menu
2016-02-21 15:14:14 +00:00
2016-01-23 21:54:01 +00:00
## Tweaks
2017-04-10 19:15:34 +00:00
* **runtime information:** the adblock status is available via _/etc/init.d/adblock status_ (see example below)
2017-02-04 20:32:50 +00:00
* **debug logging:** for script debugging please set the config option 'adb\_debug' to '1' and check the runtime output with _logread -e "adblock"_
2018-01-31 12:13:32 +00:00
* **storage expansion:** to process and store all blocklist sources at once it might helpful to enlarge your temp directory with a swap partition => see [OpenWrt Wiki ](https://wiki.openwrt.org/doc/uci/fstab ) for further details
2017-04-04 12:15:30 +00:00
* **add white- / blacklist entries:** add domain white- or blacklist entries to always-allow or -deny certain (sub) domains, by default both lists are empty and located in _/etc/adblock_ . Please add one domain per line - ip addresses, wildcards & regex are _not_ allowed (see example below)
2017-11-04 13:00:20 +00:00
* **backup & restore blocklists:** enable this feature, to restore automatically the latest compressed backup of your blocklists in case of any processing error (e.g. a single blocklist source is not available during update). Please use an (external) solid partition and _not_ your volatile router temp directory for this
2018-01-31 12:13:32 +00:00
* **download queue size:** for further download & list processing performance improvements you can raise the 'adb\_maxqueue' value, e.g. '8' or '16' should be safe
2016-12-19 19:11:25 +00:00
* **scheduled list updates:** for a scheduled call of the adblock service add an appropriate crontab entry (see example below)
2018-01-31 12:13:32 +00:00
* **change startup behaviour:** by default the startup will be triggered by the 'wan' procd interface trigger. Choose 'none' to disable automatic startups, 'timed' to use a classic timeout (default 30 sec.) or select another trigger interface
2016-12-19 19:11:25 +00:00
* **suspend & resume adblocking:** to quickly switch the adblock service 'on' or 'off', simply use _/etc/init.d/adblock [suspend|resume]_
2018-01-31 12:13:32 +00:00
* **domain query:** to query the active blocklist for a certain domain, please use the LuCI frontend or run _/etc/init.d/adblock query `<DOMAIN>`_ (see example below)
2017-11-04 13:00:20 +00:00
* **add new list sources:** you could add new blocklist sources on your own via uci config, all you need is a source url and an awk one-liner (see example below)
2016-12-19 19:11:25 +00:00
* **disable active dns probing in windows 10:** to prevent a yellow exclamation mark on your internet connection icon (which wrongly means connected, but no internet), please change the following registry key/value from "1" to "0" _HKLM\SYSTEM\CurrentControlSet\Services\NlaSvc\Parameters\Internet\EnableActiveProbing_
2015-10-27 23:02:23 +00:00
2016-02-15 11:25:21 +00:00
## Further adblock config options
2018-01-10 18:33:42 +00:00
* usually the pre-configured adblock setup works quite well and no manual overrides are needed
* the following options apply to the 'global' config section:
2017-09-09 15:35:42 +00:00
* adb\_enabled => main switch to enable/disable adblock service (default: '0', disabled)
2016-12-19 19:11:25 +00:00
* adb\_debug => enable/disable adblock debug output (default: '0', disabled)
2018-01-10 18:33:42 +00:00
* adb\_fetchutil => name of the used download utility: 'uclient-fetch', 'wget', 'curl', 'aria2c', 'wget-nossl'. 'busybox' (default: 'uclient-fetch')
* adb\_fetchparm => special config options for the download utility (default: not set)
2017-09-09 15:35:42 +00:00
* adb\_dns => select the dns backend for your environment: 'dnsmasq', 'unbound', 'named', 'kresd' or 'dnscrypt-proxy' (default: 'dnsmasq')
* adb\_dnsdir => target directory for the generated blocklist 'adb_list.overall' (default: not set, use dns backend default)
* adb\_trigger => set the startup trigger to a certain interface, to 'timed' or to 'none' (default: 'wan')
2018-01-10 18:33:42 +00:00
* the following options apply to the 'extra' config section:
2018-01-31 12:13:32 +00:00
* adb\_triggerdelay => additional trigger delay in seconds before adblock processing begins (int/default: '2')
* adb\_forcedns => force dns requests to local resolver (bool/default: '0', disabled)
* adb\_forcesrt => force overall sort on low memory devices with less than 64 MB RAM (bool/default: '0', disabled)
* adb\_backup_mode => do not automatically update blocklists during startup, use backups instead (bool/default: '0', disabled)
* adb\maxqueue => size of the download queue to handle downloads & list processing in parallel (int/default: '4')
* adb\_jail => builds an additional 'Jail' list (/tmp/adb_list.jail) to block access to all domains except those listed in the whitelist file (bool/default: '0', disabled)
* adb\_dnsflush => flush DNS cache after adblock processing, i.e. enable the old restart behavior (bool/default: '0', disabled)
* adb\_notify => send notification emails in case of a processing error or if the overall domain count is ≤ 0 (bool/default: '0', disabled)
* adb\_notifycnt => Raise minimum domain count email notification trigger (int/default: '0')
2015-11-20 17:29:32 +00:00
2016-04-30 20:18:25 +00:00
## Examples
2017-12-28 16:55:49 +00:00
**change default dns backend to 'unbound':**
2017-09-15 12:51:14 +00:00
2017-12-28 16:55:49 +00:00
Adblock deposits the final blocklist 'adb_list.overall' in '/var/lib/unbound' where unbound can find them in its jail.
To preserve the DNS cache after adblock processing you need to install 'unbound-control'.
2017-06-26 18:58:29 +00:00
2017-12-28 16:55:49 +00:00
**change default dns backend to 'named' (bind):**
2017-09-15 12:51:14 +00:00
2017-12-28 16:55:49 +00:00
Adblock deposits the final blocklist 'adb_list.overall' in '/var/lib/bind'.
To preserve the DNS cache after adblock processing you need to install & configure 'bind-rdnc'.
To use the blocklist please modify '/etc/bind/named.conf':
2017-09-15 12:51:14 +00:00
< pre > < code >
2017-11-04 13:00:20 +00:00
in the 'options' namespace add:
2017-06-26 18:58:29 +00:00
response-policy { zone "rpz"; };
and at the end of the file add:
zone "rpz" {
type master;
2017-11-04 13:00:20 +00:00
file "/var/lib/bind/adb_list.overall";
2017-06-26 18:58:29 +00:00
allow-query { none; };
allow-transfer { none; };
};
2016-06-28 19:22:44 +00:00
< / code > < / pre >
2017-12-28 16:55:49 +00:00
**change default dns backend to 'kresd':**
The knot-resolver (kresd) is only available on Turris Omnia devices.
Adblock deposits the final blocklist 'adb_list.overall' in '/etc/kresd', no further configuration needed.
**change default dns backend to 'dnscrypt-proxy':**
2017-09-15 12:51:14 +00:00
2017-12-28 16:55:49 +00:00
The required 'blacklist' option of dnscrypt-proxy is not enabled by default, because the package will be compiled without plugins support.
2018-01-31 12:13:32 +00:00
Take a custom OpenWrt build with plugins support to use this feature. Adblock deposits the final blocklist 'adb_list.overall' in '/tmp'.
2017-12-28 16:55:49 +00:00
To use the blocklist please modify '/etc/config/dnscrypt-proxy' per instance:
2017-09-15 12:51:14 +00:00
< pre > < code >
2017-12-28 16:55:49 +00:00
list blacklist 'domains:/tmp/adb_list.overall'
2017-09-09 15:35:42 +00:00
< / code > < / pre >
2017-12-28 16:55:49 +00:00
**enable email notification via msmtp:**
2017-09-15 12:51:14 +00:00
2017-12-28 16:55:49 +00:00
To use the email notification you have to install & configure the package 'msmtp'.
Modify the file '/etc/msmtprc':
2017-09-15 12:51:14 +00:00
< pre > < code >
2017-12-28 16:55:49 +00:00
[...]
defaults
auth on
tls on
tls_certcheck off
timeout 5
syslog LOG_MAIL
[...]
account adb_notify
host smtp.gmail.com
port 587
from dev.adblock@gmail.com
user dev.adblock
password xxx
2017-08-04 09:01:15 +00:00
< / code > < / pre >
2017-12-28 16:55:49 +00:00
Edit the file '/etc/adblock/adblock.notify' and change at least the 'mail_receiver'.
Finally make this file executable via 'chmod' and test it directly. If no more errors come up you can comment 'mail_debug', too.
2017-08-04 09:01:15 +00:00
2017-04-10 19:15:34 +00:00
**receive adblock runtime information:**
2017-12-28 16:55:49 +00:00
2016-12-19 19:11:25 +00:00
< pre > < code >
2017-06-26 18:58:29 +00:00
/etc/init.d/adblock status
2017-04-10 19:15:34 +00:00
::: adblock runtime information
2017-09-09 15:35:42 +00:00
+ adblock_status : enabled
2018-01-31 12:13:32 +00:00
+ adblock_version : 3.5.0
+ overall_domains : 102324 (normal mode)
+ fetch_utility : /usr/bin/wget (built-in)
2017-09-09 15:35:42 +00:00
+ dns_backend : kresd (/etc/kresd)
2018-01-31 12:13:32 +00:00
+ last_rundate : 30.01.2018 21:24:11
+ system_release : Turris Omnia, OpenWrt omnia 15.05/3.9.4
2016-12-19 19:11:25 +00:00
< / code > < / pre >
2017-01-05 09:25:02 +00:00
**cronjob for a regular block list update (/etc/crontabs/root):**
2017-12-28 16:55:49 +00:00
2016-04-30 20:18:25 +00:00
< pre > < code >
2017-06-09 18:19:56 +00:00
0 06 * * * /etc/init.d/adblock reload
2016-04-30 20:18:25 +00:00
< / code > < / pre >
2017-01-05 09:25:02 +00:00
**blacklist entry (/etc/adblock/adblock.blacklist):**
2017-12-28 16:55:49 +00:00
2016-04-30 20:18:25 +00:00
< pre > < code >
ads.example.com
2016-05-23 19:17:23 +00:00
2016-06-12 16:53:51 +00:00
This entry blocks the following (sub)domains:
2016-05-23 19:17:23 +00:00
http://ads.example.com/foo.gif
http://server1.ads.example.com/foo.gif
https://ads.example.com:8000/
2016-06-12 16:53:51 +00:00
This entry does not block:
2016-05-23 19:17:23 +00:00
http://ads.example.com.ua/foo.gif
http://example.com/
2016-04-30 20:18:25 +00:00
< / code > < / pre >
2017-01-05 09:25:02 +00:00
**whitelist entry (/etc/adblock/adblock.whitelist):**
2017-12-28 16:55:49 +00:00
2016-04-30 20:18:25 +00:00
< pre > < code >
2016-06-12 16:53:51 +00:00
here.com
2017-11-04 13:00:20 +00:00
This entry removes the following (sub)domains from the blocklist:
2016-06-12 16:53:51 +00:00
maps.here.com
here.com
This entry does not remove:
where.com
www.adwhere.com
2016-04-30 20:18:25 +00:00
< / code > < / pre >
2017-12-28 16:55:49 +00:00
**query the active blocklist for a certain (sub-)domain, e.g. for whitelisting:**
2017-12-02 17:39:03 +00:00
2017-11-04 13:00:20 +00:00
The query function checks against the submitted (sub-)domain and recurses automatically to the upper top level domain. For every (sub-)domain it returns the first ten relevant results.
2016-12-23 06:15:11 +00:00
< pre > < code >
2017-11-04 13:00:20 +00:00
/etc/init.d/adblock query www.example.google.com
2018-01-31 12:13:32 +00:00
::: results for domain 'www.example.google.com'
2017-09-09 15:35:42 +00:00
- no match
2018-01-31 12:13:32 +00:00
::: results for domain 'example.google.com'
2017-09-09 15:35:42 +00:00
- no match
2018-01-31 12:13:32 +00:00
::: results for domain 'google.com'
+ ads.google.com
+ adservices.google.com
+ adwords.google.com
+ ampcid.google.com
2017-11-04 13:00:20 +00:00
+ analytics.google.com
2018-01-31 12:13:32 +00:00
+ gg.google.com
+ google.com.analytics.kdgsrltkcun.com
2017-11-04 13:00:20 +00:00
+ googleadapis.l.google.com
2018-01-31 12:13:32 +00:00
+ id.google.com
+ pagead-googlehosted.l.google.com
+ [...]
2016-12-23 06:15:11 +00:00
< / code > < / pre >
2017-12-28 16:55:49 +00:00
**add a new blocklist source:**
2017-12-02 17:39:03 +00:00
2017-11-04 13:00:20 +00:00
1. the easy way ...
example: https://easylist-downloads.adblockplus.org/rolist+easylist.txt
Adblock already supports an easylist source, called 'reg_ru'. To add the additional local easylist as a new source, copy the existing config source section and change only
2016-05-02 17:43:46 +00:00
the source name, the url and the description - that's all!
2017-11-04 13:00:20 +00:00
< pre > < code >
config source 'reg_ro'
2016-05-02 17:43:46 +00:00
option enabled '0'
option adb_src 'https://easylist-downloads.adblockplus.org/rolist+easylist.txt'
2018-01-31 12:13:32 +00:00
option adb_src_rset 'BEGIN{FS=\"[|^]\"}/^\|\|([^([:space:]|#|\*|\/).]+\.)+[[:alpha:]]+\^("\\\$third-party")?$/{print tolower(\$3)}'
2017-11-04 13:00:20 +00:00
option adb_src_desc 'focus on romanian ads plus generic easylist additions, weekly updates, approx. 9.400 entries'
< / code > < / pre >
2016-05-02 17:43:46 +00:00
2017-11-04 13:00:20 +00:00
2. a bit harder ...
To add a really new source with different domain/host format you have to write a suitable awk one-liner on your own, so basic awk skills are needed. As a starting point check the already existing awk rulesets 'adb_src_rset' in the config file, probably you need only small changes for your individual list. Download the desired list and test your new awk string locally. The output result should be a sequential list with one domain/host per line - nothing more. If your awk one-liner works quite well, add a new source section to the adblock config file and test the new source.
2016-05-02 17:43:46 +00:00
2016-02-15 11:25:21 +00:00
## Support
2017-03-25 20:49:44 +00:00
Please join the adblock discussion in this [forum thread ](https://forum.lede-project.org/t/adblock-2-x-support-thread/507 ) or contact me by mail < dev @ brenken . org >
2015-11-20 17:29:32 +00:00
2016-01-23 21:54:01 +00:00
## Removal
2016-04-30 20:18:25 +00:00
* stop all adblock related services with _/etc/init.d/adblock stop_
* optional: remove the adblock package (_opkg remove adblock_)
2015-11-20 17:29:32 +00:00
2015-10-27 23:02:23 +00:00
Have fun!
Dirk