Skip to content

Latest commit

 

History

History
68 lines (49 loc) · 2.44 KB

README.md

File metadata and controls

68 lines (49 loc) · 2.44 KB

unhBlock

Block ads, malware, tracking + more on systems running Unbound as a resolver.

unhBlock

This project is based on UnboundBL and like it depends on Unbound DNS to blackhole undesired content. unhBlock has been written with maintainability in mind.

Current Features

  • Add, download and parse blocklist URLs
  • Add, download and parse whitelist URLs
  • Redirect to user defined IP address (i.e. pixelserv)
  • Redirect to user defined CNAME record (i.e. pixelserv)
  • Confirm valid Unbound configuration
  • Optionally reload Unbound configuration

Installation

OPNsense

Use OPNsense branch.

  1. Drop unhBlock in /usr/home
  2. Drop sample action file in /usr/local/opnsense/service/conf/actions
  3. Edit action definition as needed
  4. Drop blacklist sources file in var/unhBlock/
  5. Drop whiltelist sources file in /var/unhBlock
  6. Reload configd service configd restart
  7. Test action configctl unhBlock start

Recommended configuration

For best results redirect all domains found in blocklists to a host on your network using a PixelServ via the -b/--blackhole flag. Optionally redirect unwanted traffic employing a CNAME record via --type CNAME option and parameter.

For my own personal configuration, I redirect all traffic to a PixelServ that is reachable only via a Traefik router to support SSL. Feel free to inspect the [sample service file][pixel-service] and Traefik config.

Sample Lists

The sample lists in this repository were created based user recommendations.

License

BSD-3-Clause

Author Information

Carlos Hernandez | e-mail