My favourite blocklist:
# list of sources to pull blocklists from, stores them in ./sources
sources = [
"http://sysctl.org/cameleon/hosts",
"https://dbl.oisd.nl/",
"https://mirror1.malwaredomains.com/files/justdomains",
"https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt",
"https://raw.githubusercontent.com/erkexzcx/disconnectme-pihole/master/services_Advertising.txt",
"https://raw.githubusercontent.com/erkexzcx/disconnectme-pihole/master/services_Analytics.txt",
"https://raw.githubusercontent.com/erkexzcx/disconnectme-pihole/master/services_Cryptomining.txt",
"https://raw.githubusercontent.com/erkexzcx/disconnectme-pihole/master/services_Fingerprinting.txt",
"https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt",
"https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt",
"https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist"
]
Pinned Comments
erkexzcx commented on 2020-06-06 12:34 (UTC) (edited on 2020-06-06 12:47 (UTC) by erkexzcx)
When first installed, start & stop
grimd
to generate initial config file:Then edit it:
Finally start & enable the service:
Since regular system user
grimd
is used, you cannot open ports 0-1024, but since you are going to use53
anyway, I suggest changing it to5533
and using this iptable rule to redirect traffic: