aboutsummaryrefslogtreecommitdiff
path: root/net/adblock/files/README.md
diff options
context:
space:
mode:
authorDirk Brenken <dev@brenken.org>2016-05-23 21:17:23 +0200
committerDirk Brenken <dev@brenken.org>2016-05-24 01:50:48 +0200
commitbad84563dc511f25eb4390f4a74767c5ecfbaac1 (patch)
tree2b8edfdd23cc98f6d2e6d948d4aeeebcc5b0c2d8 /net/adblock/files/README.md
parent54b0115d2566038aca3fec0254e1d2735d7b952f (diff)
adblock: update 1.1.12
* change wget binary naming * change winspy source url * documentation update Signed-off-by: Dirk Brenken <dev@brenken.org>
Diffstat (limited to 'net/adblock/files/README.md')
-rw-r--r--net/adblock/files/README.md62
1 files changed, 44 insertions, 18 deletions
diff --git a/net/adblock/files/README.md b/net/adblock/files/README.md
index 06314fe34..4831d27db 100644
--- a/net/adblock/files/README.md
+++ b/net/adblock/files/README.md
@@ -39,7 +39,7 @@ A lot of people already use adblocker plugins within their desktop browsers, but
* => weekly updates, approx. 12.000 entries
* [winhelp](http://winhelp2002.mvps.org)
* => infrequent updates, approx. 15.000 entries
- * [winspy](https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/hostsBlockWindowsSpy.txt)
+ * [winspy](https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/hosts/windows10_spy.txt)
* => infrequent updates, approx. 120 entries
* [yoyo](http://pgl.yoyo.org/adservers)
* => weekly updates, approx. 2.500 entries (enabled by default)
@@ -102,6 +102,7 @@ A lot of people already use adblocker plugins within their desktop browsers, but
* **new list sources:** you could add new blocklist sources on your own via uci config, all you need is a source url and an awk one-liner (see example below)
* **AP mode:** in AP mode adblock uses automatically the local router ip as nullip address. To make sure that your LuCI interface will be still accessible, please change the local uhttpd instance to ports <> 80/443 (see example below)
* **debugging:** for script debugging please change the 'DEBUG' variable in the header of _/usr/bin/adblock-update.sh_ from '0' to '1' and start this script directly (without any parameters)
+* **disable active dns probing in windows:** to prevent a possible yellow exclamation mark on your internet connection icon (which wrongly means connected, but no internet), please change the following registry key/value from "1" to "0" _HKLM\SYSTEM\CurrentControlSet\Services\NlaSvc\Parameters\Internet\EnableActiveProbing_
## Further adblock config options
* usually the adblock autodetection works quite well and no manual config overrides are needed, all options apply to the 'global' config section:
@@ -126,29 +127,29 @@ A lot of people already use adblocker plugins within their desktop browsers, but
**example blacklist entry (/etc/adblock/adblock.blacklist):**
<pre><code>
ads.example.com
+
+This rule blocks:
+ http://ads.example.com/foo.gif
+ http://server1.ads.example.com/foo.gif
+ https://ads.example.com:8000/
+
+This rule doesn't block:
+ http://ads.example.com.ua/foo.gif
+ http://example.com/
</code></pre>
-This rule blocks:
-http://ads.example.com/foo.gif
-http://server1.ads.example.com/foo.gif
-https://ads.example.com:8000/
-
-This rule doesn't block:
-http://ads.example.com.ua/foo.gif
-http://example.com/
-
**example whitelist entry (/etc/adblock/adblock.whitelist):**
<pre><code>
analytics.com
+
+This rule removes _all_ domains from the blocklists with this string in it, i.e.:
+ google-analytics.com
+ ssl.google-analytics.com
+ api.gameanalytics.com
+ photos.daily-deals.analoganalytics.com
+ adblockanalytics.com
</code></pre>
-This rule removes _all_ domains from the blocklists with this string in it, i.e.:
- google-analytics.com
- ssl.google-analytics.com
- api.gameanalytics.com
- photos.daily-deals.analoganalytics.com
- adblockanalytics.com
-
**example uhttpd configuration in AP mode:**
<pre><code>
# configuration found in /etc/config/uhttpd
@@ -159,12 +160,37 @@ config uhttpd 'main'
list listen_https '0.0.0.0:445'
</code></pre>
+**example grep for blocked (sub-)domains in adblock source files:**
+<pre><code>
+grep "google-analytics.com" "/tmp/dnsmasq.d/adb_list"*
+
+This will output all matches with corresponding source files:
+ /tmp/dnsmasq.d/adb_list.winhelp:address=/ssl.google-analytics.com/192.0.2.1
+ /tmp/dnsmasq.d/adb_list.winhelp:address=/www.google-analytics.com/192.0.2.1
+ /tmp/dnsmasq.d/adb_list.yoyo:address=/google-analytics.com/192.0.2.1
+</code></pre>
+
+**example to find blocked domains on certain sites for whitelisting:**
+<pre><code>
+1. the easy way ...
+enable the network analysis builtins in chrome or firefox to identify domains
+which are redirected to the adblock null-ip (default 192.0.2.1), add these domains to your whitelist
+
+2. a bit harder ...
+enable 'Log queries' in the dnsmasq configuration (via LuCI Network => DHCP/DNS),
+ssh to your router and start tracing with 'logread -f -e "dnsmasq" -e "192.0.2.1"'
+switch to your client, access the relevant site and check all domains
+that are blocked/listed in logread, add these domains to your whitelist
+
+=> finally restart the adblock service (/etc/init.d/adblock restart) in both variants
+</code></pre>
+
**example to add a new blocklist source:**
<pre><code>
1. the easy way ...
example: https://easylist-downloads.adblockplus.org/rolist+easylist.txt
adblock already supports an easylist source, called 'ruadlist'. To add the additional local easylist
-as a new source, copy the existing config source 'ruadlist' section and change only
+as a new source, copy the existing config source 'ruadlist' section and change only
the source name, the url and the description - that's all!
config source 'rolist'