All Projects → gaenserich → Hostsblock

gaenserich / Hostsblock

an ad- and malware-blocking script for Linux

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Hostsblock

Docker Pxe
A virtualized implementation of PXE supported by DNSMasq
Stars: ✭ 72 (-64.88%)
Mutual labels:  dnsmasq
Elk Hole
elasticsearch, logstash and kibana configuration for pi-hole visualiziation
Stars: ✭ 136 (-33.66%)
Mutual labels:  dnsmasq
Dns Proxy
Simple DNS Proxy written in Node.JS. Override hosts, domains, or tlds. Redirect certain domains to different nameservers.
Stars: ✭ 165 (-19.51%)
Mutual labels:  dnsmasq
Devdns
Automagic Docker DNS for local development
Stars: ✭ 99 (-51.71%)
Mutual labels:  dnsmasq
Hosts Blocklists
Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage
Stars: ✭ 1,749 (+753.17%)
Mutual labels:  dnsmasq
Dns Zone Blacklist
This project generates dnsmasq, bind and unbound zone files to be used in DNS based AD Blockers.
Stars: ✭ 141 (-31.22%)
Mutual labels:  dnsmasq
Matchbox
Network boot and provision Fedora CoreOS and Flatcar Linux clusters
Stars: ✭ 956 (+366.34%)
Mutual labels:  dnsmasq
Genpac
PAC/Dnsmasq/Wingy file Generator, working with gfwlist, support custom rules.
Stars: ✭ 2,088 (+918.54%)
Mutual labels:  dnsmasq
Dnsmasq
全自动dnsmasq防DNS劫持及全面广告屏蔽脚本(ADSI)
Stars: ✭ 131 (-36.1%)
Mutual labels:  dnsmasq
Surge Rules
🦄 🎃 👻 Surge 规则集(DOMAIN-SET 和 RULE-SET),兼容 Surge for iOS 和 Surge for Mac 客户端。
Stars: ✭ 151 (-26.34%)
Mutual labels:  dnsmasq
Vagrant Dnsmasq
A Dnsmasq Vagrant plugin that manages the dnsmasq.conf file and /etc/resolver directory on your host system.
Stars: ✭ 102 (-50.24%)
Mutual labels:  dnsmasq
Glider
glider is a forward proxy with multiple protocols support, and also a dns/dhcp server with ipset management features(like dnsmasq).
Stars: ✭ 1,710 (+734.15%)
Mutual labels:  dnsmasq
Sysuv6 Dns
May be the best DNS in SYSU.
Stars: ✭ 142 (-30.73%)
Mutual labels:  dnsmasq
Selfhosted
rootless docker compose + traefik
Stars: ✭ 97 (-52.68%)
Mutual labels:  dnsmasq
Dnsmasqweb
基于DNSmasq的DNS解析、以及DHCP地址分配系统
Stars: ✭ 166 (-19.02%)
Mutual labels:  dnsmasq
G2w.online
域名已被DNS污染,水表已拆
Stars: ✭ 49 (-76.1%)
Mutual labels:  dnsmasq
Adblocking Vpn
🔒 Create your own VPN server that blocks malicious domains to enhance your security and privacy
Stars: ✭ 139 (-32.2%)
Mutual labels:  dnsmasq
Rpi Pxe Server
setup a Raspberry Pi as an PXE-Server
Stars: ✭ 197 (-3.9%)
Mutual labels:  dnsmasq
Config
Various program configuration files and scripts
Stars: ✭ 173 (-15.61%)
Mutual labels:  dnsmasq
Piadvanced
This started as a custom install for my pihole!
Stars: ✭ 144 (-29.76%)
Mutual labels:  dnsmasq

Hostsblock

An ad- and malware-blocking utility for POSIX systems

Contents

  1. Description: Features
  2. Installation: Dependencies, Arch Linux, Other POSIX
  3. Configuration: Edit hostsblock.conf, Enable Timer, Enable Postprocessing
  4. Usage: Configuring sudo, Manual Usage, UrlCheck Usage (examples)
  5. FAQ
  6. News & Bugs: Upgrading to 0.999.8
  7. License

Description

Hostsblock is a POSIX-compatible script designed to take advantage of the /etc/hosts file to provide system-wide blocking of internet advertisements, malicious domains, trackers, and other undesirable content.

To do so, it downloads a configurable set of blocklists and processes their entries into a single HOSTS file.

Hostsblock also provides a command-line utility that allows you to configure how individual websites and any other domains contained in that website are handled.

Features

  • Enhanced security - Runs as an unprivileged user instead of root. New: Includes systemd service files that heavily sandbox the background process.

  • System-wide blocking - All non-proxied connections use the HOSTS file (Proxied connections can be modified to use the HOSTS file)

  • Compression-friendly - Can download and process zip- and 7zip-compressed files automatically. (Provided that unzip and p7zip are installed)

  • Non-interactive - Can be run as a periodic background job without needing user interaction.

  • Extensive configurability - Allows for custom deny & allow listing, redirection, post-processing scripting (now provided via systemd configuration), etc.

  • Bandwith-efficient - Only downloads blocklists that have been changed, using http compression when available.

  • Resource-efficient - Only processes blocklists when changes are registered.

  • High performance blocking - Only when using dns caching.

  • Redirection capability - Enchances security by combating DNS cache poisoning.

  • Extensive choice of blocklists included - Allowing the user to choose how much or how little is blocked/redirected.

Installation

Dependencies

  • curl
  • A POSIX environment (which should already be in place on most Linux, *BSD, and macOS environments, including the following commands: sh (e.g. bash or dash, chmod, cksum, cp, cut, file, find, grep, id, mkdir, mv, rm, sed, sort, tee, touch, tr, wc, and xargs.

Optional dependencies for additional features

  • sudo to enable the user-friendly wrapper script (highly recommended)

Unarchivers to use archive blocklists instead of plain text:

  • unzip (for zip archives)
  • p7zip (for 7z archives) must include either 7z, 7za, or 7zr executables!

A DNS caching daemon to help speed up DNS resolutions:

If you use 127.0.0.1 as your blocking redirect address (redirecturl in hostsblock.conf), a pseudo-server that serves blank pages to remove boilerplate page and speed up page resolution on blocked domains:

Note that the default configuration gets no benefit from having a pseudo-server

Arch Linux

If you have yaourt installed: yaourt -S hostsblock or yaourt -S hostsblock-git

Or use one of the AUR packages: hostsblock, hostsblock-git

Don't forget to enable and start the systemd timer by running this:

$ sudo systemctl enable --now hostsblock.timer

For Other POSIX Flavors and Distros

The Best and Easiest Way

Please check with your distribution to see if a package is available. If there is not, ask for it or contribute your own!

If you are a package maintainer, let me know so that I can post the instructions here.

The Easy Way

First download the archive here or with curl like so: curl -O "https://github.com/gaenserich/hostsblock/archive/master.zip"

Unzip the archive, e.g. unzip hostsblock-master.zip

Execute the install.sh script as root, which will guide you through installation.

Configuration

By default, the configuration files are included in the /var/lib/hostsblock/config.examples/ directory. Copy them over to /var/lib/hostsblock/ to customize your setup.

Editing hostsblock.conf

Most of the hostsblock configuration is done in the hostsblock.conf. This file is commented really well, so please read through it before first use:

# CACHE DIRECTORY. Directory where blocklists will be downloaded and stored.

#cachedir="$HOME/cache" # DEFAULT


# WORK DIRECTORY. Temporary directory where interim files will be unzipped and
# # processed. This directory will be deleted after hostsblock completes.
#
# #tmpdir="/tmp/hostsblock" # DEFAULT

# FINAL HOSTSFILE. Final hosts file that combines together all downloaded blocklists.

#hostsfile="$HOME/hosts.block" # DEFAULT


# REDIRECT URL. IP address to which blocked hosts will be redirect, either 0.0.0.0 or
# 127.0.0.1. This replaces any entries to 0.0.0.0 and 127.0.0.1. If you run a
# pixelserver such as pixelserv or kwakd, it is advisable to use 127.0.0.1.

#redirecturl="0.0.0.0" # DEFAULT


# HEAD FILE. File containing hosts file entries which you want at the beginning
# of the resultant hosts file, e.g. for loopback devices and IPv6 entries. Use
# your original /etc/hosts file here if you are writing your final blocklist to
# /etc/hosts so as to preserve your loopback devices. Give hostshead="0" to
# disable this feature. For those targeting /etc/hosts, it is advisable to copy
# their old /etc/hosts file to this file so as to preserve existing entries.

#hostshead="0" # DEFAULT


# DENYLISTED SUBDOMAINS. File containing specific subdomains to denylist which
# may not be in the downloaded denylists. Be sure to provide not just the
# domain, e.g. "google.com", but also the specific subdomain a la
# "adwords.google.com" without quotations.

#denylist="$HOME/deny.list" # DEFAULT


# ALLOWLIST. File containing the specific subdomains to allow through that may
# be blocked by the downloaded blocklists. In this file, put a space in front of
# a string in order to let through that specific site (without quotations), e.g.
# " www.example.com" will unblock "http://www.example.com" but not
# "http://subdomain.example.com". Leave no space in front of the entry to
# unblock all subdomains that contain that string, e.g. ".dropbox.com" will let
# through "www.dropbox.com", "dl.www.dropbox.com", "foo.dropbox.com",
# "bar.dropbox.com", etc.

#allowlist="$HOME/allow.list"


# CONNECT_TIMEOUT. Parameter passed to curl. Determines how long to try to
# connect to each blocklist url before giving up.

#connect_timeout=60 # DEFAULT


# RETRY. Parameter passed to curl. Number of times to retry connecting to
# each blocklist url before giving up.

#retry=0 # DEFAULT


# MAX SIMULTANEOUS DOWNLOADS. Hostsblock can check and download files in parallel.
# By default, it will attempt to check and download four files at a time.

#max_simultaneous_downloads=4 # DEFAULT


# BLOCKLISTS FILE. File containing URLs of blocklists to be downloaded,
# each on a separate line. Downloaded files may be either
# plaintext, zip, or 7z files. Hostsblock will automatically
# identify the file type.

#blocklists="$HOME/block.urls"


# REDIRECTLISTS FILE. File containing URLs of redirectlists to be downloaded,
# each on a separate line. Downloaded files may be either
# plaintext, zip, or 7z files. Hostsblock will automatically
# identify the file type.

#redirectlists="" # DEFAULT, otherwise "$HOME/redirect.urls"


# If you have any additional lists, please post a bug report to
# https://github.com/gaenserich/hostsblock/issues 

Enable the systemd service

Don't forget to enable and start the systemd timer with:

$ sudo systemctl enable --now hostsblock.timer

Configure Postprocessing

Hostsblock does not write to /etc/hosts or manipulate any DNS caching daemons anymore. Instead, it will just compile a hosts-formatted file to /var/lib/hostsblock/hosts.block. To make this file actually do work, you have one of two options:

OPTION 1: Using a DNS Caching Daemon (Here: dnsmasq)

Using a DNS caching daemon like dnsmasq offers better performance.

To use hostsblock together with dnsmasq, configure dnsmasq as DNS caching daemon. Please refer to your distribution's manual. For ArchLinux read the following: Wiki section.

After that, add the following line to dnsmasq.conf (usually under /etc/dnsmasq.conf) so that dnsmasq will reference the file:

addn-hosts=/var/lib/hostsblock/hosts.block

Enable and start hostsblock-dnsmasq-restart.path:

$ sudo systemctl enable --now hostsblock-dnsmasq-restart.path

This has systemd watch the target file /var/lib/hostsblock/hosts.block for changes and then restart dnsmasq whenever they are found.

OPTION 2: Copy /var/lib/hostsblock/hosts.block to /etc/hosts

It is possible to have systemd overwrite /etc/hosts with the generated file.

Configure hostshead= in hostsblock.conf to make sure you don't remove the default system loopback address(es), e.g.:

hostshead="/var/lib/hostsblock/hosts.head"

Then put your necessary loopback entries in /var/lib/hostsblock/hosts.head. For example, you can copy over your existing /etc/hosts to this file:

$ sudo cp /etc/hosts /var/lib/hostsblock/hosts.head
$ sudo chown hostsblock:hostsblock /var/lib/hostsblock/hosts.head
$ sudo chmod 600 /var/lib/hostsblock/hosts.head

Enable and start hostsblock-hosts-clobber.path:

$ sudo systemctl enable --now hostsblock-hosts-clobber.path

This has systemd watch the target file /var/lib/hostsblock/hosts.block for changes and then copy /var/lib/hostsblock/hosts.block to /etc/hosts.

Usage

In its normal systemd-job configuration, hostsblock requires no interaction from the user aside from the steps above. If, however, you want to manually run the process, or to use the UrlCheck tool (hostsblock -c URL), you need to configure sudo:

Configuring sudo

Because hostsblock executes as a heavily sandboxed unpriviledged user (instead of root), you must configure sudo to allow other users to manually execute it.

To do so, edit sudoers by typing sudo visudo and add the following line to the end:

%hostsblock	ALL	=	(hostsblock)	NOPASSWD:	/usr/lib/hostsblock.sh

Add any users you want to be able to manually execute or use the urlcheck mode to the hostsblock group:

$ sudo gpasswd -a [MY USER NAME] hostsblock

The wrapper script installed in your PATH will automatically use sudo to execute the main script as the user hostsblock.

hostsblock [OPTION...] - download and combine HOSTS files

Without the -c URL option, hostsblock will check to see if its monitored blocklists have changed. If it detects changes (or if forced by the -u flag), it will download the changed blocklist(s) and recompile the target HOSTS file.

Help Options:
  -h                            Show help options

Options:
  -f CONFIGFILE         Specify an alternative configuration file
  -q                    Show only fatal errors
  -v                    Be verbose
  -d                    Be very verbose/debug
  -u                    Force hostsblock to update its target file

hostsblock [OPTION...] -c URL [COMMANDS...] - Manage how URL is handled

With the -c URL flag option, hostsblock can check and manipulate how it handles specific domains.

Note: The hostsblock-urlcheck symlink is now officially depreciated. Use hostsblock -c instead.

In addition to the above options, the following commands and subcommands can be used with hostsblock -c URL:

hostsblock -c URL (urlCheck) Commands:
  -s [-r -k]            State how hostblock modifies URL
  -b [-o -r]            Temporarily (un)block URL
  -e [-o -r -b]         Add/remove URL to/from denylist
  -a [-o -r -b]         Add/remove URL to/from allowlist
  -i [-o -r -k]         Interactively inspect URL

hostsblock -c URL Command Subcommands:
  -r                    COMMAND recurses to all domains on URL's page
  -k                    COMMAND recurses for all BLOCKED domains on page
  -o                    Perform opposite of COMMAND (e.g UNblock)
  -b                    With "-e", immediately block URL
                        With "-a", immediately unblock URL

Note that the -o subcommand turns a command into its opposite, e.g.

  • hostsblock -c URL -b -o unblocks URL
  • hostsblock -c URL -e -o removes URL from the denylist
  • hostsblock -c URL -a -o removes URL from the allowlist

Examples:

Once you have configured sudo, you can execute the following as any user in the hostsblock group:

See if "http://github.com/gaenserich/hostsblock" is blocked, denylisted, allowlisted, or redirected by hostsblock:
$ hostsblock -c "http://github.com/gaenserich/hostsblock" -s
Do the same thing for any of the sites referenced on this page:
$ hostsblock -c "http://github.com/gaenserich/hostsblock" -s -r
Do the same thing for any of the sites referenced on this page that are presently blocked:
$ hostsblock -c "http://github.com/gaenserich/hostsblock" -s -k
Block the domain containing "http://github.com/gaenserich/hostsblock" (that is, "github.com"):
$ hostsblock -c "http://github.com/gaenserich/hostsblock" -b

Note that "blocking" (and "unblocking", i.e. -b -o) a domain only works until the next time hostsblock refreshes /var/lib/hostsfile/hosts.block, unless you use a blocklist that does include it. To permanently block this domain, use the denylist (-e) command.

Permanently block (denylist) the domain containing "http://github.com/gaenserich/hostsblock" (that is, "github.com"):
$ hostsblock -c "http://github.com/gaenserich/hostsblock" -e

Note that "denylisting" on its own will not block the target domain until hostblock refreshes. You can combine both "blocking" and "denylisting" in one command, however:

Permanently and immediately block the domain containing "http://github.com/gaenserich/hostsblock" (that is, "github.com"):
$ hostsblock -c "http://github.com/gaenserich/hostsblock" -e -b
Temporarily unblock all blocked domains on "http://github.com/gaenserich/hostsblock" (helpful if the page isn't working quite right):
$ hostsblock -c "http://github.com/gaenserich/hostsblock" -b -o -k
Interactively scan through "http://github.com/gaenserich/hostsblock", prompting you if you want the domains referenced therein to be blocked, denylisted, or allowlisted
$ hostsblock -c "http://github.com/gaenserich/hostsblock" -i -r

FAQ

  • Why isn't it working with Chrome/Chromium?

    • Because they bypass the system's DNS settings and use their own.

    To force them to use the system's DNS settings, refer to this superuser.com question.

  • Hostsblock's systemd job fails with error "FAILED TO COMPILE BLOCK/REDIRECT ENTRIES FROM [...]" and leaves an empty hosts.block.new file.

    • You may have a blank line with a single space in your allowlist. Hostsblock matches that line with the space in between the IP address and the domain name that every single line has, i.e. it matches every single would-be entry in your target file. Remove the empty line, and hostsblock will function as expected.

News & Bugs

Upgrading to 0.999.8

For existing hostsblock users, please note the following changes in version 0.999.8:

Changes in hostsblock.conf

Due to the shift to POSIX-shell compatibility, the list of blocklists to be downloaded cannot be held in hostsblock.conf via the blocklists= parameter. Instead, this parameter contains the path to a file that contains the list of URLs, e.g. /var/lib/hostsblock/block.urls.

The new block.urls file is simply a newline separated list of URLs without quotations. Whitespace and text after # are ignored. An example block.urls file could look like this:

http://hosts-file.net/download/hosts.zip # General blocking meta-list
http://winhelp2002.mvps.org/hosts.zip

http://hostsfile.mine.nu/Hosts.zip

See the example block.urls in the /var/lib/hostsblock/config.examples directory for details.

No more postprocessing within script

Due to enhanced security and sandboxing, hostsblock no longer handles postprocessing on its own. Instead, users should use other systemd capabilities to replace the postprocess() {} functionality.

Hostsblock comes with systemd service files that replicate the most common scenarios. See the directions above for instructions on how to enable them.

Changes with sudo

sudo is no longer as widely used as before. The main systemd service no longer requires it. You only need it if you want to use the hostsblock -c URL (urlcheck) utility. See the above directions for details.

Other Caveats

  • The hostsblock-urlcheck symlink is depreciated. Please use hostsblock -c URL instead.
  • In UrlCheck mode, large hosts files will generate large temporary cache files that will eat up a lot of temporary storage. If you have a machine with little RAM (<6GB) and want to block a lot of domains, consider changing your $tmpdir to an HDD- or SSD-backed filesystem instead of the default tmpfs under /tmp.
  • UrlCheck mode will not be able to provide information on which blocklist blocked which domains anymore (annotation feature removed)
  • Hostsblock uses 0.0.0.0 as default redirection IP address instead of 127.0.0.1. 0.0.0.0 theoretically offers better performance without the need of a pseudo-server.

Other Changes from 0.999.7 to 0.999.8

Systemd Job Improvements
  • Systemd service now heavily hardened and sandboxed for enhanced security
  • Fixed simultaneous download feature so that it actually does what it is supposed to
  • Added processing support for source blocklists that just list domain names to be blocked, e.g. ads.google.com instead of 0.0.0.0 ads.google.com
  • Added support to read directly from zip and 7z files containing a single file without decompressing to a cache
  • Optimized filters used to process domains with improved throughput
  • If run with dash instead of bash, hostsblock has significant performance improvements
  • Removed annotation feature to reduce dependencies and overall processing demands
  • Vastly expanded list of potential blocklists (see block.urls)
POSIX-Compatibility Improvements
  • Supports POSIX shells (dash, ash, zsh) instead of just bash
  • Removed GNU-specific utilities, relies only on POSIX options
  • Should now run on *BSD and macOS (and perhaps even Android and iOS!) if proper POSIX environments are installed. UNTESTED
UrlCheck Mode Improvements

License

Hostsblock is licensed under GNU GPL

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].