Fast and lightweight DNS proxy as ad-blocker for local network with many features
Go to file
Dimitri Herzog 3ab5d13e63
added license text
2020-01-13 21:57:57 +01:00
.github/workflows added codecov analysis 2020-01-12 22:58:56 +01:00
config initial commit 2020-01-12 18:23:35 +01:00
docs added badges 2020-01-13 21:53:32 +01:00
lists initial commit 2020-01-12 18:23:35 +01:00
resolver initial commit 2020-01-12 18:23:35 +01:00
server initial commit 2020-01-12 18:23:35 +01:00
testdata initial commit 2020-01-12 18:23:35 +01:00
util initial commit 2020-01-12 18:23:35 +01:00
.dockerignore initial commit 2020-01-12 18:23:35 +01:00
.gitignore added codecov analysis 2020-01-12 22:58:56 +01:00
.golangci.yml initial commit 2020-01-12 18:23:35 +01:00
Dockerfile initial commit 2020-01-12 18:23:35 +01:00
LICENSE added license text 2020-01-13 21:57:57 +01:00
Makefile added codecov analysis 2020-01-12 22:58:56 +01:00
config.yml initial commit 2020-01-12 18:23:35 +01:00
go.mod initial commit 2020-01-12 18:23:35 +01:00
go.sum initial commit 2020-01-12 18:23:35 +01:00
main.go initial commit 2020-01-12 18:23:35 +01:00

docs/README.md

GitHub Workflow Status GitHub Workflow Status GitHub go.mod Go version GitHub latest version Docker latest version GitHub Release Date Codecov Codacy grade

Blocky

Blocky is a DNS proxy for local network written in Go with following features:

  • Blocking of DNS queries with external lists (Ad-block) with whitelisting
    • Definition of black and white lists per client group (Kids, Smart home devices etc) -> for example: you can block some domains for you Kids and allow your network camera only domains from a whitelist
    • periodical reload of external black and white lists
  • Caching of DNS answers for queries -> improves DNS resolution speed and reduces amount of external DNS queries
  • Custom DNS resolution for certain domain names
  • Supports UDP, TCP and TCP over TLS DNS resolvers
  • Delegates DNS query to 2 external resolver from a list of configured resolvers, uses the answer from the fastest one -> improves you privacy and resolution time
  • Logging of all DNS queries per day / per client in a text file
  • Simple configuration in a single file
  • Only one binary in docker container, low memory footprint
  • Runs fine on raspbery pi

Installation and configuration

Create config.yml file with your configuration:

upstream:
    # these external DNS resolvers will be used. Blocky picks 2 random resolvers from the list for each query
    # format for resolver: net:host:port. net could be tcp, udp or tcp-tls. If port is empty, default port will be used (53 for udp and tcp, 853 for tcp-tls)
    externalResolvers:
      - udp:8.8.8.8
      - udp:8.8.4.4
      - udp:1.1.1.1
      - tcp-tls:1.0.0.1:853
  
# optional: custom IP address for domain name (with all sub-domains)
# example: query "printer.lan" or "my.printer.lan" will return 192.168.178.3
customDNS:
    mapping:
      printer.lan: 192.168.178.3

# optional: definition, which DNS resolver should be used for queries to the domain (with all sub-domains).
# Example: Query client.fritz.box will ask DNS server 192.168.178.1. This is necessary for local network, to resolve clients by host name
conditional:
    mapping:
      fritz.box: udp:192.168.178.1
  
# optional: use black and white lists to block queries (for example ads, trackers, adult pages etc.)
blocking:
    # definition of blacklist groups. Can be external link (http/https) or local file
    blackLists:
      ads:
        - https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
        - https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
        - https://mirror1.malwaredomains.com/files/justdomains
        - http://sysctl.org/cameleon/hosts
        - https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
        - https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
      special:
        - https://hosts-file.net/ad_servers.txt
    # definition of whitelist groups. Attention: if the same group has black and whitelists, whitelists will be used to disable particular blacklist entries. If a group has only whitelist entries -> this means only domains from this list are allowed, all other domains will be blocked
    whiteLists:
      ads:
        - whitelist.txt
    # definition: which groups should be appied for which client
    clientGroupsBlock:
      # default will be used, if no special definition for a client name exists
      default:
        - ads
        - special
      # use client name or ip address
      laptop.fritz.box:
        - ads
    # which response will be sent, if query is blocked:
    # zeroIp: 0.0.0.0 will be returned (default)
    # nxDomain: return NXDOMAIN as return code
    blockType: zeroIp
  
#optional: configuration of client name resolution
clientLookup:
    # this DNS resolver will be used to perform reverse DNS lookup (typically local router)
    upstream: udp:192.168.178.1
    # optional: some routers return multiple names for client (host name and user defined name). Define which single name should be used.
    # Example: take second name if present, if not take first name
    singleNameOrder:
      - 2
      - 1
  
# optional: write query information (question, answer, client, duration etc) to daily csv file
queryLog:
    # directory (should be mounted as volume in docker)
    dir: /logs
    # if true, write one file per client. Writes all queries to single file otherwise
    perClient: true
    # if > 0, deletes log files which are older than ... days
    logRetentionDays: 7
  
# Port, should be 53 (UDP and TCP)
port: 53
# Log level (one from debug, info, warn, error)
logLevel: info

Run with docker

Start docker container with following docker-compose.yml file:

version: "2.1"
services:
  blocky:
    image: spx01/blocky
    container_name: blocky
    restart: unless-stopped
    ports:
      - "53:53/tcp"
      - "53:53/udp"
    environment:
      - TZ=Europe/Berlin
    volumes:
      # config file
      - ./config.yml:/app/config.yml
      # write query logs in this directory. You can also use a volume
      - ./logs:/logs

Run standalone

Download binary file for your architecture, put it in one directory with config file. Please be aware, you must run the binary with root privileges if you want to use port 53 or 953.

Additional information

To print runtime configuration and statistics, you can send SIGUSR1 signal to running process: kill -s USR1 <PID> or docker kill -s SIGUSR1 blocky for docker setup