Go to file
2019-02-20 16:54:14 +03:00
client Added UpdateTopline component 2019-02-20 16:54:14 +03:00
dhcpd Demote some log.printf into log.tracef 2019-02-07 18:24:43 +03:00
dnsfilter Fix data race found by tests -- https://travis-ci.org/AdguardTeam/AdGuardHome/jobs/489674061#L970 2019-02-07 14:45:46 +03:00
dnsforward Activate DNS-over-TLS server when certificates, keys and ports are configured. 2019-02-15 16:28:28 +03:00
openapi Bump version to 0.92 2018-12-29 20:21:36 +03:00
scripts Added Traditional Chinese 2019-01-04 21:22:22 +03:00
.codecov.yml Added codecov, goreport 2019-01-25 20:13:57 +03:00
.gitattributes fix gh language 2018-10-17 13:14:45 +03:00
.gitignore add temporary packr output to gitignore 2019-02-15 16:28:28 +03:00
.golangci.yml ingnore Shutdown by golangci 2019-02-07 13:52:14 +03:00
.gometalinter.json Fix review comments 2019-02-11 14:22:36 +03:00
.travis.yml Merge master 2019-01-29 15:18:36 +03:00
app.go /tls/ -- prevent encryption errors when changing certificates mid-request 2019-02-19 17:52:19 +03:00
build_docker.sh Build latest from tag branch, edge from master 2019-02-11 15:10:36 +03:00
config.go /tls/ -- add internal usable flag to simplify logic when https needs to be booted up 2019-02-19 15:21:38 +03:00
control.go /tls/ -- move certificate logging to verbose 2019-02-20 12:32:10 +03:00
dhcp.go Fix review comments 2019-02-11 14:22:36 +03:00
dns.go /tls/configure and /tls/status -- now there's an explicit 'enabled' bool. 2019-02-15 16:28:28 +03:00
Docker.md Add exposed ports 2019-02-12 11:54:40 +03:00
Dockerfile Add exposed ports 2019-02-12 11:54:40 +03:00
Dockerfile.travis Add exposed ports 2019-02-12 11:54:40 +03:00
filter.go Lower down logging noise when idle. 2019-02-15 16:28:28 +03:00
go.mod go.mod -- update dnsproxy to v0.9.11 and it's dependencies 2019-02-15 16:28:26 +03:00
go.sum go.mod -- update dnsproxy to v0.9.11 and it's dependencies 2019-02-15 16:28:26 +03:00
helpers.go Add Access-Control-Allow-Origin: * header to postinstall wrapper 2019-02-20 10:40:18 +03:00
i18n.go gometalinter 2019-01-25 20:13:57 +03:00
issue_template.md Fix some UI issues, rename DNS->Home 2018-10-14 17:49:07 +03:00
LICENSE.txt Initial commit 2018-08-30 17:25:33 +03:00
Makefile Makefile -- no need for go get -d . anymore 2019-02-07 18:24:42 +03:00
README.md Add workdir to readme 2019-02-10 21:50:55 +03:00
release.sh release.sh -- don't require directory of this repo to be named specifically 2019-02-18 21:13:58 +03:00
service.go service properties to constants 2019-02-05 14:21:07 +03:00
syslog_others.go service properties to constants 2019-02-05 14:21:07 +03:00
syslog_windows.go service properties to constants 2019-02-05 14:21:07 +03:00
upgrade.go Fix #579 2019-02-10 20:47:43 +03:00
version.json Bump version to v0.92-hotfix2 2019-01-11 15:28:16 +03:00

 

AdGuard Home

Privacy protection center for you and your devices

Free and open source, powerful network-wide ads & trackers blocking DNS server.

AdGuard.com | Wiki | Reddit | Twitter | Telegram

Build status Code Coverage Go Report Card GolangCI Latest release



AdGuard Home

AdGuard Home is a network-wide software for blocking ads & tracking. After you set it up, it'll cover ALL your home devices, and you don't need any client-side software for that.

How does AdGuard Home work?

AdGuard Home operates as a DNS server that re-routes tracking domains to a "black hole," thus preventing your devices from connecting to those servers. It's based on software we use for our public AdGuard DNS servers -- both share a lot of common code.

How is this different from public AdGuard DNS servers?

Running your own AdGuard Home server allows you to do much more than using a public DNS server.

  • Choose what exactly will the server block or not block;
  • Monitor your network activity;
  • Add your own custom filtering rules;

In the future, AdGuard Home is supposed to become more than just a DNS server.

Installation

Mac

Download this file: AdGuardHome_v0.92-hotfix2_MacOS.zip, then unpack it and follow "How to run" instructions below.

Windows 64-bit

Download this file: AdGuardHome_v0.92-hotfix2_Windows.zip, then unpack it and follow "How to run" instructions below.

Linux 64-bit Intel

Download this file: AdGuardHome_v0.92-hotfix2_linux_amd64.tar.gz, then unpack it and follow "How to run" instructions below.

Linux 32-bit Intel

Download this file: AdGuardHome_v0.92-hotfix2_linux_386.tar.gz, then unpack it and follow "How to run" instructions below.

Raspberry Pi (32-bit ARM)

Download this file: AdGuardHome_v0.92-hotfix2_linux_arm.tar.gz, then unpack it and follow "How to run" instructions below.

How to update

We have not yet implemented an auto-update of AdGuard Home, but it is planned for future versions: #448.

At the moment, the update procedure is manual:

  1. Download the new AdGuard Home binary.
  2. Replace the old file with the new one.
  3. Restart AdGuard Home.

How to run

DNS works on port 53, which requires superuser privileges. Therefore, you need to run it with sudo in terminal:

sudo ./AdGuardHome

Now open the browser and navigate to http://localhost:3000/ to control your AdGuard Home service.

Running as a service

You can register AdGuard Home as a system service on Windows, Linux/(systemd | Upstart | SysV), and OSX/Launchd.

  • AdGuardHome -s install - install AdGuard Home as a system service.
  • AdGuardHome -s uninstall - uninstalls the AdGuard Home service.
  • AdGuardHome -s start - starts the service.
  • AdGuardHome -s stop - stops the service.
  • AdGuardHome -s restart - restarts the service.
  • AdGuardHome -s status - shows the current service status.

Logging

By default, the log is written to stderr when you run AdGuard Home as a console application.

If you run it as a service/daemon, the log output depends on the platform:

  • Linux: the log is written to syslog.
  • MacOS: the log is written to /var/log/AdGuardHome.*.log files.
  • Windows: the log is written to the Windows event log.

You can redefine this behavior in AdGuard Home configuration file (see below).

Command-line arguments

Here is a list of all available command-line arguments.

$ ./AdGuardHome --help
Usage:

./AdGuardHome [options]

Options:
  -c, --config                       path to the config file
  -w, --work-dir                     path to the working directory
  -h, --host                         host address to bind HTTP server on
  -p, --port                         port to serve HTTP pages on
  -s, --service                      service control action: status, install, uninstall, start, stop, restart
  -l, --logfile                      path to the log file. If empty, writes to stdout, if 'syslog' -- system log
  -v, --verbose                      enable verbose output
  --help                             print this help

Please note, that the command-line arguments override settings from the configuration file.

Running without superuser

You can run AdGuard Home without superuser privileges, but you need to either grant the binary a capability (on Linux) or instruct it to use a different port (all platforms).

Granting the CAP_NET_BIND_SERVICE capability (on Linux)

Note: using this method requires the setcap utility. You may need to install it using your Linux distribution's package manager.

To allow AdGuard Home running on Linux to listen on port 53 without superuser privileges, run:

sudo setcap CAP_NET_BIND_SERVICE=+eip ./AdGuardHome

Then run ./AdGuardHome as a unprivileged user.

Changing the DNS listen port

To configure AdGuard Home to listen on a port that does not require superuser privileges, edit AdGuardHome.yaml and find these two lines:

dns:
  port: 53

You can change port 53 to anything above 1024 to avoid requiring superuser privileges.

If the file does not exist, create it in the same folder, type these two lines down and save.

Additional configuration

Upon the first execution, a file named AdGuardHome.yaml will be created, with default values written in it. You can modify the file while your AdGuard Home service is not running. Otherwise, any changes to the file will be lost because the running program will overwrite them.

Settings are stored in YAML format, possible parameters that you can configure are listed below:

  • bind_host — Web interface IP address to listen on.
  • bind_port — Web interface IP port to listen on.
  • auth_name — Web interface optional authorization username.
  • auth_pass — Web interface optional authorization password.
  • dns — DNS configuration section.
    • bind_host - DNS interface IP address to listen on.
    • port — DNS server port to listen on.
    • protection_enabled — Whether any kind of filtering and protection should be done, when off it works as a plain dns forwarder.
    • filtering_enabled — Filtering of DNS requests based on filter lists.
    • blocked_response_ttl — For how many seconds the clients should cache a filtered response. Low values are useful on LAN if you change filters very often, high values are useful to increase performance and save traffic.
    • querylog_enabled — Query logging (also used to calculate top 50 clients, blocked domains and requested domains for statistical purposes).
    • ratelimit — DDoS protection, specifies in how many packets per second a client should receive. Anything above that is silently dropped. To disable set 0, default is 20. Safe to disable if DNS server is not available from internet.
    • ratelimit_whitelist — If you want exclude some IP addresses from ratelimiting but keep ratelimiting on for others, put them here.
    • refuse_any — Another DDoS protection mechanism. Requests of type ANY are rarely needed, so refusing to serve them mitigates against attackers trying to use your DNS as a reflection. Safe to disable if DNS server is not available from internet.
    • bootstrap_dns — DNS server used for initial hostname resolution in case if upstream server name is a hostname.
    • parental_sensitivity — Age group for parental control-based filtering, must be either 3, 10, 13 or 17 if enabled.
    • parental_enabled — Parental control-based DNS requests filtering.
    • safesearch_enabled — Enforcing "Safe search" option for search engines, when possible.
    • safebrowsing_enabled — Filtering of DNS requests based on safebrowsing.
    • upstream_dns — List of upstream DNS servers.
  • filters — List of filters, each filter has the following values:
    • enabled — Current filter's status (enabled/disabled).
    • url — URL pointing to the filter contents (filtering rules).
    • name — Name of the filter. If it's an adguard syntax filter it will get updated automatically, otherwise it stays unchanged.
    • last_updated — Time when the filter was last updated from server.
    • ID - filter ID (must be unique).
  • dhcp - Built-in DHCP server configuration.
    • enabled - DHCP server status.
    • interface_name - network interface name (eth0, en0 and so on).
    • gateway_ip - gateway IP address.
    • subnet_mask - subnet mask.
    • range_start - start IP address of the controlled range.
    • range_end - end IP address of the controlled range.
    • lease_duration - lease duration in seconds. If 0, using default duration (2 hours).
  • user_rules — User-specified filtering rules.
  • log_file — Path to the log file. If empty, writes to stdout, if syslog -- system log (or eventlog on Windows).
  • verbose — Enable our disables debug verbose output.

Removing an entry from settings file will reset it to the default value. Deleting the file will reset all settings to the default values.

How to build from source

Prerequisites

You will need:

You can either install it via the provided links or use brew.sh if you're on Mac:

brew install go node

Building

Open Terminal and execute these commands:

git clone https://github.com/AdguardTeam/AdGuardHome
cd AdGuardHome
make

Contributing

You are welcome to fork this repository, make your changes and submit a pull request — https://github.com/AdguardTeam/AdGuardHome/pulls

How to update translations

If you want to help with AdGuard Home translations, please learn more about translating AdGuard products here: https://kb.adguard.com/en/general/adguard-translations

Here is a direct link to AdGuard Home project: http://translate.adguard.com/collaboration/project?id=153384

Before updating translations you need to install dependencies:

cd scripts/translations
npm install

Create file oneskyapp.json in scripts/translations folder.

Example of oneskyapp.json

{
    "url": "https://platform.api.onesky.io/1/projects/",
    "projectId": <PROJECT ID>,
    "apiKey": <API KEY>,
    "secretKey": <SECRET KEY>
}

Upload translations

node upload.js

Download translations

node download.js

Reporting issues

If you run into any problem or have a suggestion, head to this page and click on the New issue button.

Acknowledgments

This software wouldn't have been possible without:

You might have seen that CoreDNS was mentioned here before — we've stopped using it in AdGuardHome. While we still use it on our servers for AdGuard DNS service, it seemed like an overkill for Home as it impeded with Home features that we plan to implement.

For a full list of all node.js packages in use, please take a look at client/package.json file.