Skip to content

Latest commit

 

History

History
108 lines (75 loc) · 5.1 KB

README.md

File metadata and controls

108 lines (75 loc) · 5.1 KB

Commonly white listed domains for Pi-Hole (Compatible with Pi-Hole Docker Image).

A robust collection of commonly white listed websites borrowed from various sources including Pi-Hole subreddit, Pi-Hole forum, Pi-Hole github repository and more! Add these domains to your Pi-Hole setup by running a script or manually and make your setup trouble-free!

Want to report a new domain? Want to report existing one? Feel free to file an issue.


Main features:

  • The entire repo is curated.
  • New domains are added frequently.
  • Supports Pi-Hole Docker installation.
  • Comes with a shell script i.e you can add all domains automatically at an instant.
  • If you are a beginner to Pi-Hole, adding these sites resolves many problems.

Description

whitelist.txt
This file contain domains that are safe to whitelist i.e it does not contain any tracking or advertising sites. Adding this file fixes many problems like YouTube watch history, videos on news sites and so on...

Installation and Usage

For Pi-hole in Docker installations

  • First, make sure to clone the repository into a location that is accessible by your Pi-hole Docker' container, i.e. do a git clone https://github.com/Freekers/whitelist.git in one of your volume mounts.
  • Next, make sure to make the script executable using sudo chmod +x whitelist.sh
  • Finally, setup a cronjob using crontab -e and add the following line:
    0 0 * * * docker exec -d pihole '/opt/whitelist/scripts/whitelist.sh'

This will sync your whitelist with the one from the repository every day at midnight. Make sure to adjust the command to reflect your setup, i.e. change the container name and path to the script.

For native/normal Pi-hole installations

git clone https://github.com/anudeepND/whitelist.git
cd whitelist/scripts
sudo chmod +x whitelist.sh
sudo ./whitelist.sh

Note: You don't have to clone the repo every time you want to update whitelist file. Navigate to whitelist/scripts and run the script again sudo ./whitelist.sh

It's recommended to setup a cronjob to keep your whitelist in sync with the one from the repository. To do so, run crontab -e and add the following line: 0 0 * * * '/opt/whitelist/scripts/whitelist.sh'
This will sync your whitelist with the one from the repository every day at midnight. Make sure to adjust the path to where you cloned the script.

How do I determine an ad domain?

Adam:ONE Assistant (Previously known as DNSthingy

This browser extension will list all of the domains that are queried when a web page is loaded. You can often look at the list of domains and cherry pick the ones that appear to be ad-serving domains.

Using inbuilt Developer tool

For Chrome ctrl+shift+I will land you in Developer tools menu.

Using an Android app

Net Guard is an Android app that can be used to monitor any specific apps, works on unrooted devices too.


Licence

MIT License

Copyright (c) 2019 Anudeep ND <[email protected]>

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.