diff options
author | Dirk Brenken <dev@brenken.org> | 2016-05-23 21:17:23 +0200 |
---|---|---|
committer | Dirk Brenken <dev@brenken.org> | 2016-05-24 01:50:48 +0200 |
commit | bad84563dc511f25eb4390f4a74767c5ecfbaac1 (patch) | |
tree | 2b8edfdd23cc98f6d2e6d948d4aeeebcc5b0c2d8 /net/adblock/files/README.md | |
parent | 54b0115d2566038aca3fec0254e1d2735d7b952f (diff) |
adblock: update 1.1.12
* change wget binary naming
* change winspy source url
* documentation update
Signed-off-by: Dirk Brenken <dev@brenken.org>
Diffstat (limited to 'net/adblock/files/README.md')
-rw-r--r-- | net/adblock/files/README.md | 62 |
1 files changed, 44 insertions, 18 deletions
diff --git a/net/adblock/files/README.md b/net/adblock/files/README.md index 06314fe34..4831d27db 100644 --- a/net/adblock/files/README.md +++ b/net/adblock/files/README.md @@ -39,7 +39,7 @@ A lot of people already use adblocker plugins within their desktop browsers, but * => weekly updates, approx. 12.000 entries * [winhelp](http://winhelp2002.mvps.org) * => infrequent updates, approx. 15.000 entries - * [winspy](https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/hostsBlockWindowsSpy.txt) + * [winspy](https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/hosts/windows10_spy.txt) * => infrequent updates, approx. 120 entries * [yoyo](http://pgl.yoyo.org/adservers) * => weekly updates, approx. 2.500 entries (enabled by default) @@ -102,6 +102,7 @@ A lot of people already use adblocker plugins within their desktop browsers, but * **new list sources:** you could add new blocklist sources on your own via uci config, all you need is a source url and an awk one-liner (see example below) * **AP mode:** in AP mode adblock uses automatically the local router ip as nullip address. To make sure that your LuCI interface will be still accessible, please change the local uhttpd instance to ports <> 80/443 (see example below) * **debugging:** for script debugging please change the 'DEBUG' variable in the header of _/usr/bin/adblock-update.sh_ from '0' to '1' and start this script directly (without any parameters) +* **disable active dns probing in windows:** to prevent a possible yellow exclamation mark on your internet connection icon (which wrongly means connected, but no internet), please change the following registry key/value from "1" to "0" _HKLM\SYSTEM\CurrentControlSet\Services\NlaSvc\Parameters\Internet\EnableActiveProbing_ ## Further adblock config options * usually the adblock autodetection works quite well and no manual config overrides are needed, all options apply to the 'global' config section: @@ -126,29 +127,29 @@ A lot of people already use adblocker plugins within their desktop browsers, but **example blacklist entry (/etc/adblock/adblock.blacklist):** <pre><code> ads.example.com + +This rule blocks: + http://ads.example.com/foo.gif + http://server1.ads.example.com/foo.gif + https://ads.example.com:8000/ + +This rule doesn't block: + http://ads.example.com.ua/foo.gif + http://example.com/ </code></pre> -This rule blocks: -http://ads.example.com/foo.gif -http://server1.ads.example.com/foo.gif -https://ads.example.com:8000/ - -This rule doesn't block: -http://ads.example.com.ua/foo.gif -http://example.com/ - **example whitelist entry (/etc/adblock/adblock.whitelist):** <pre><code> analytics.com + +This rule removes _all_ domains from the blocklists with this string in it, i.e.: + google-analytics.com + ssl.google-analytics.com + api.gameanalytics.com + photos.daily-deals.analoganalytics.com + adblockanalytics.com </code></pre> -This rule removes _all_ domains from the blocklists with this string in it, i.e.: - google-analytics.com - ssl.google-analytics.com - api.gameanalytics.com - photos.daily-deals.analoganalytics.com - adblockanalytics.com - **example uhttpd configuration in AP mode:** <pre><code> # configuration found in /etc/config/uhttpd @@ -159,12 +160,37 @@ config uhttpd 'main' list listen_https '0.0.0.0:445' </code></pre> +**example grep for blocked (sub-)domains in adblock source files:** +<pre><code> +grep "google-analytics.com" "/tmp/dnsmasq.d/adb_list"* + +This will output all matches with corresponding source files: + /tmp/dnsmasq.d/adb_list.winhelp:address=/ssl.google-analytics.com/192.0.2.1 + /tmp/dnsmasq.d/adb_list.winhelp:address=/www.google-analytics.com/192.0.2.1 + /tmp/dnsmasq.d/adb_list.yoyo:address=/google-analytics.com/192.0.2.1 +</code></pre> + +**example to find blocked domains on certain sites for whitelisting:** +<pre><code> +1. the easy way ... +enable the network analysis builtins in chrome or firefox to identify domains +which are redirected to the adblock null-ip (default 192.0.2.1), add these domains to your whitelist + +2. a bit harder ... +enable 'Log queries' in the dnsmasq configuration (via LuCI Network => DHCP/DNS), +ssh to your router and start tracing with 'logread -f -e "dnsmasq" -e "192.0.2.1"' +switch to your client, access the relevant site and check all domains +that are blocked/listed in logread, add these domains to your whitelist + +=> finally restart the adblock service (/etc/init.d/adblock restart) in both variants +</code></pre> + **example to add a new blocklist source:** <pre><code> 1. the easy way ... example: https://easylist-downloads.adblockplus.org/rolist+easylist.txt adblock already supports an easylist source, called 'ruadlist'. To add the additional local easylist -as a new source, copy the existing config source 'ruadlist' section and change only +as a new source, copy the existing config source 'ruadlist' section and change only the source name, the url and the description - that's all! config source 'rolist' |