Network-wide ads & trackers blocking DNS server
Go to file
2018-12-06 00:29:38 +03:00
client Fixed filters table update on language change 2018-11-28 10:25:06 +03:00
dnsfilter dnsfilter -- add trace() 2018-12-05 16:57:21 +03:00
dnsforward Add support for bootstrapping upstream DNS servers by hostname. 2018-12-06 00:22:20 +03:00
scripts Add new languages 2018-11-26 15:00:56 +03:00
tests Initial commit 2018-08-30 17:25:33 +03:00
.gitattributes fix gh language 2018-10-17 13:14:45 +03:00
.gitignore Remove old entries from .gitignore 2018-12-05 19:26:54 +03:00
.travis.yml Travis -- separate js build time from go build time. 2018-11-29 15:05:29 +03:00
app.go stop DNS server properly when interrupted with ctrl+c, SIGTERM, SIGHUP or SIGQUIT 2018-12-05 16:57:21 +03:00
config.go config -- Avoid deleting existing dns section if someone removes schema_version from yaml file. 2018-12-06 00:29:38 +03:00
control.go Add support for bootstrapping upstream DNS servers by hostname. 2018-12-06 00:22:20 +03:00
dns.go Rename coredns.go to dns.go 2018-12-06 00:23:03 +03:00
Dockerfile.arm Bump version to 0.91 2018-11-27 12:44:37 +03:00
Dockerfile.linux Bump version to 0.91 2018-11-27 12:44:37 +03:00
Dockerfile.linux64 Bump version to 0.91 2018-11-27 12:44:37 +03:00
filter.go Fix engrish 2018-12-05 16:57:21 +03:00
go.mod Remove unused code. Goodbye CoreDNS. 2018-12-05 19:18:58 +03:00
go.sum Remove unused code. Goodbye CoreDNS. 2018-12-05 19:18:58 +03:00
helpers.go Fix gometalinter warnings 2018-11-28 13:38:19 +03:00
i18n.go Fix gometalinter warnings 2018-11-28 13:38:19 +03:00
issue_template.md Fix some UI issues, rename DNS->Home 2018-10-14 17:49:07 +03:00
LICENSE.txt Initial commit 2018-08-30 17:25:33 +03:00
Makefile Get rid of mentions of CoreDNS in code except for upgrading and in readme. Add config upgrade. 2018-12-05 21:08:43 +03:00
openapi.yaml Allow querying and changeing i18n language via API. 2018-11-21 20:44:20 +03:00
README.md Add support for bootstrapping upstream DNS servers by hostname. 2018-12-06 00:22:20 +03:00
upgrade.go config -- Avoid deleting existing dns section if someone removes schema_version from yaml file. 2018-12-06 00:29:38 +03:00
version.json Bump version to 0.91 2018-11-27 12:44:37 +03:00

 

AdGuard Home

Privacy protection center for you and your devices

Free and open source, powerful network-wide ads & trackers blocking DNS server.

AdGuard.com | Wiki | Reddit | Twitter

Build status Latest release



AdGuard Home

AdGuard Home is a network-wide software for blocking ads & tracking. After you set it up, it'll cover ALL your home devices, and you don't need any client-side software for that.

How does AdGuard Home work?

AdGuard Home operates as a DNS server that re-routes tracking domains to a "black hole," thus preventing your devices from connecting to those servers. It's based on software we use for our public AdGuard DNS servers -- both share a lot of common code.

How is this different from public AdGuard DNS servers?

Running your own AdGuard Home server allows you to do much more than using a public DNS server.

  • Choose what exactly will the server block or not block;
  • Monitor your network activity;
  • Add your own custom filtering rules;

In the future, AdGuard Home is supposed to become more than just a DNS server.

Installation

Mac

Download this file: AdGuardHome_v0.91_MacOS.zip, then unpack it and follow "How to run" instructions below.

Linux 64-bit Intel

Download this file: AdGuardHome_v0.91_linux_amd64.tar.gz, then unpack it and follow "How to run" instructions below.

Linux 32-bit Intel

Download this file: AdGuardHome_v0.91_linux_386.tar.gz, then unpack it and follow "How to run" instructions below.

Raspberry Pi (32-bit ARM)

Download this file: AdGuardHome_v0.91_linux_arm.tar.gz, then unpack it and follow "How to run" instructions below.

How to update

We have not yet implemented an auto-update of AdGuard Home, but it is planned for future versions: #448.

At the moment, the update procedure is manual:

  1. Download the new AdGuard Home binary.
  2. Replace the old file with the new one.
  3. Restart AdGuard Home.

How to run

DNS works on port 53, which requires superuser privileges. Therefore, you need to run it with sudo in terminal:

sudo ./AdGuardHome

Now open the browser and navigate to http://localhost:3000/ to control your AdGuard Home service.

Running without superuser

You can run AdGuard Home without superuser privileges, but you need to instruct it to use a different port rather than 53. You can do that by editing AdGuardHome.yaml and finding these two lines:

dns:
  port: 53

You can change port 53 to anything above 1024 to avoid requiring superuser privileges.

If the file does not exist, create it in the same folder, type these two lines down and save.

Additional configuration

Upon the first execution, a file named AdGuardHome.yaml will be created, with default values written in it. You can modify the file while your AdGuard Home service is not running. Otherwise, any changes to the file will be lost because the running program will overwrite them.

Settings are stored in YAML format, possible parameters that you can configure are listed below:

  • bind_host — Web interface IP address to listen on
  • bind_port — Web interface IP port to listen on
  • auth_name — Web interface optional authorization username
  • auth_pass — Web interface optional authorization password
  • dns — DNS configuration section
    • port — DNS server port to listen on
    • filtering_enabled — Filtering of DNS requests based on filter lists
    • safebrowsing_enabled — Filtering of DNS requests based on safebrowsing
    • safesearch_enabled — Enforcing "Safe search" option for search engines, when possible
    • parental_enabled — Parental control-based DNS requests filtering
    • parental_sensitivity — Age group for parental control-based filtering, must be either 3, 10, 13 or 17
    • querylog_enabled — Query logging (also used to calculate top 50 clients, blocked domains and requested domains for statistic purposes)
    • bootstrap_dns — DNS server used for initial hostname resolution in case if upstream server name is a hostname
    • upstream_dns — List of upstream DNS servers
  • filters — List of filters, each filter has the following values:
    • ID - filter ID (must be unique)
    • url — URL pointing to the filter contents (filtering rules)
    • enabled — Current filter's status (enabled/disabled)
  • user_rules — User-specified filtering rules

Removing an entry from settings file will reset it to the default value. Deleting the file will reset all settings to the default values.

How to build from source

Prerequisites

You will need:

You can either install it via the provided links or use brew.sh if you're on Mac:

brew install go node

Building

Open Terminal and execute these commands:

git clone https://github.com/AdguardTeam/AdGuardHome
cd AdGuardHome
make

Contributing

You are welcome to fork this repository, make your changes and submit a pull request — https://github.com/AdguardTeam/AdGuardHome/pulls

How to update translations

If you want to help with AdGuard Home translations, please learn more about translating AdGuard products here: https://kb.adguard.com/en/general/adguard-translations

Here is a direct link to AdGuard Home project: http://translate.adguard.com/collaboration/project?id=153384

Before updating translations you need to install dependencies:

cd scripts/translations
npm install

Create file oneskyapp.json in scripts/translations folder.

Example of oneskyapp.json

{
    "url": "https://platform.api.onesky.io/1/projects/",
    "projectId": <PROJECT ID>,
    "apiKey": <API KEY>,
    "secretKey": <SECRET KEY>
}

Upload translations

node upload.js

Download translations

node download.js

Reporting issues

If you run into any problem or have a suggestion, head to this page and click on the New issue button.

Acknowledgments

This software wouldn't have been possible without:

You might have seen that coredns was mentioned here before — we've stopped using it in AdGuardHome. While we still use it on our servers, it seemed like an overkill and it impeded with Home features that we wanted to implement.

For a full list of all node.js packages in use, please take a look at client/package.json file.