![]() ☆ Enjoy custom ad blocking by replacing some ads with pictures of cats, dogs, and landscapes ☆ Backup and sync your whitelists and custom ad blocking rules across your Chrome profiles ☆ Customize your experience with filters, whitelists, dark mode, and other colorful themes ☆ Improve page load times and enjoy a faster Internet ☆ Browse safely by blocking malicious ads with malware, scams, and cryptocurrency miners ☆ Block third-party trackers and protect your privacy ☆ Block pop ups, ads, and annoying banners (even remove video ads!) on YouTube, Facebook, Twitch, and all your favorite sites AdBlock is the best ad blocker with over 60 million users, and one of the most popular Chrome extensions with over 350 million downloads! #Add to the advanced section of unbound in GUI (Save and reload) Sed -i - '/Site A/d' /var/unbound/conf.d/nf #These Seds not required if removing "Someone Who Cares" entry (comments cause issues) #Set permissions, not 100% sure this is actually required, and could add it to the actual script if it isĬhown unbound:unbound /var/unbound/conf.d/nf usr/local/bin/python2.7 /var/unbound/dns-unbound-blocklist-downloader.py Remove the "AdAway mobile ads" section as this is now dead by the look of things Sed -i - 's/\/usr\/sbin\/service unbound restart/\/usr\/local\/sbin\/unbound-control -c \/var\/unbound\/unbound\.conf reload/g' /var/unbound/dns-unbound-blocklist-downloader.py Sed -i - 's/local-blocking-data\.conf/99-local-blocking-data\.conf/g' /var/unbound/dns-unbound-blocklist-downloader.py Sed -i - 's/\/etc\/unbound\/'\/var\/unbound\/conf\.d\//g' /var/unbound/dns-unbound-blocklist-downloader.py #Update some of the variables to reflect the OPNSENSE locations But was thinking the lists in the script could be bought into the gui as options.Ĭurl -sS -L > /var/unbound/dns-unbound-blocklist-downloader.py Obviously work needs to be done on reporting and putting config into the gui (I'm not a developer so cant help out there). Ok, not the best but have done the following to get something basci working for me. Please make any comment that might save my future development time. With lying DNS, you can make sure that no-add, whatever using direct or proxy connection, goes through. ![]() I might be wrong, but I think this is the right approach until adds have publics IPs and not FQDN.įurthermore, when you think of proxy, you need to use a transparent-reverse one to make sure that all traffic actually goes through the proxy. ![]() The script works in conjunction with dnsmasq or unbound. This is why the DNS approach seems well enough. None of them are pointing to IPs either v4 or v6. At present (2017), all adds are pointing to full-qualified hostnames. This is how it is done in LEDE (OpenWRT reboot). I was wondering of a DNS alone approach (lying DNS), as it proves to works pretty with little computing burden. It is also possible to create a list of hosts and implement it at packet filtering level (pf). I understand that proxies already support banlists. This question is for development purpose, as I may be interesting in stepping in.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |