Make your own Adblocking VPN
This is a how to guide to creating your own VPN server that also blocks malicious domains to enhance your security and privacy while browsing.
How does this work?
Quite simply, this guide will set you up with a Linux server that runs OpenVPN, with Dnsmasq, with a modified hosts file that routes offending sites to 0.0.0.0.
You will need a Debian/CentOS/Ubuntu server to run your OpenVPN server on.
If you don't have one, you can get a low-cost VPS from a provider like Bandwagon Host
Disclaimer: Wherever you get a server from, be sure you're obeying their TOS. I'm not responsible for anything you do from following this guide.
- Get OpenVPN installed on your server. For this, we will use Nyr's fantastic OpenVPN installer script
Follow the instructions to get it set up, it should take about 1 minute
It will generate an .ovpn file that you will use to connect to the VPN with your client. We'll need this later on, so feel free to SCP it to your client machine.
- Now we're going to overwrite our
hostsfile to route malicious domains to
0.0.0.0by using StevenBlack's amazing hosts project.
- Install Dnsmasq
- We need to edit the dnsmasq config file to do a few things:
- Edit the OpenVPN config file to resolve dhcp through dnsmasq
- Create a crontab entry that updates your hosts file every night at midnight:
- Restart the services
- At this point, we have an OpenVPN server routing traffic through Dnsmasq, which is checking our hosts file for malicious hosts, and falling back to a DNS provider for non-malicious hosts. Using the
.ovpnfile from earlier, you can now connect to the VPN from your client.
Thanks to the thoughtful work on Nyr, we can just use their script from the first step to manage users. It will detect that OpenVPN is already installed and prompt you to Add a new User, Removing existing user, or Remove OpenVPN completely: