What's new

pixelserv pixelserv - A Better One-pixel Webserver for Adblock

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

amtm still offers rc3?
kvic added a new script by a different name to install rc4, and amtm only looks for the normal install-beta.sh. I'm waiting until the source code is posted on GitHub since I'd like to see how Pixelserv-tls is handling the YouTube URLs and what purpose the libcurl serves.
 
For RC 4, YouTube blocking notes:

“You must point "manifest.googlevideo.com" to IP address of pixelserv-tls in order to experience the new way of blocking YouTube ads.”

How do I go about doing this? Do I need to do this within dnsmasq?
 
For RC 4, YouTube blocking notes:

“You must point "manifest.googlevideo.com" to IP address of pixelserv-tls in order to experience the new way of blocking YouTube ads.”

How do I go about doing this? Do I need to do this within dnsmasq?
You can add it to the blacklist if you use Diversion.
 
It looks like the "manifest.google.com" method is taken from this reddit post. Don't know if kvic has performed extensive test with that method to deploy it to public. Because the reddit guide is NOT to block that subdomain, but assign it to the IP of the server located near you.

I tried the reddit method, and it looks like YT ads have been reduced.

EDIT: Ah, maybe what kvic recommends is, add the subdomain to the blacklist of Diversion, so that it will be redirected to pixelserv-tls server, and pixelserv-tls will process something specifically for this subdomain.
 
Last edited:
I wonder what magic @kvic has built into 2.2.1-rc4:
Whatever it is, my RT-AC86U does not like it. :oops: I did install libcurl too, now I'm back to rc3, no more errors. :cool:

Code:
Dec  5 14:33:23 Diversion: created br0:pixelserv-tls 192.168.1.2, from /opt/etc/init.d/S80pixelserv-tls
Dec  5 14:33:23 pixelserv-tls[5999]: 128 uts, 1 log, 1 kcc, 2 kmx, 2.00 kvg, 2 krq, 4 req, 400 avg, 408 rmx, 4 tav, 8 tmx, 2 slh, 0 slm, 0 sle, 1 slc, 0 slu, 3 v13, 0 v12, 0 v10, 0 uca, 0 ucb, 0 uce, 0 ush, 255 sct, 2 sch, 0 scm, 0 scp, 4 sst, 0 ssh, 0 ssm, 0 ssp, 0 nfe, 0 gif, 0 ico, 0 txt, 0 jpg, 1 png, 0 swf, 1 sta, 0 stt, 0 ufe, 0 opt, 0 pst, 0 hed, 0 rdr, 0 nou, 0 pth, 0 204, 0 bad, 1 tmo, 1 cls, 0 cly, 0 clt, 0 err
Dec  5 14:33:23 pixelserv-tls[6250]: pixelserv-tls 2.2.1-rc.4 (compiled: Dec  5 2018 22:24:53 flags: tfo no_tls1_3) options: 192.168.1.2
Dec  5 14:33:23 Entware (aarch64-k3.10): Started pixelserv-tls (Diversion) from
Dec  5 14:33:24 pixelserv-tls[6250]: Listening on :192.168.1.2:443
Dec  5 14:33:24 pixelserv-tls[6250]: Listening on :192.168.1.2:80
Dec  5 14:39:49 kernel: pixelserv-tls[6250]: unhandled level 0 translation fault (11) at 0x66fc009b037e22, esr 0x92000044
Dec  5 14:39:49 kernel: pgd = ffffffc002576000
Dec  5 14:39:49 kernel: [66fc009b037e22] *pgd=0000000000000000, *pud=0000000000000000
Dec  5 14:39:49 kernel: CPU: 0 PID: 6250 Comm: pixelserv-tls Tainted: P           O    4.1.27 #2
Dec  5 14:39:49 kernel: Hardware name: Broadcom-v8A (DT)
Dec  5 14:39:49 kernel: task: ffffffc01921eb80 ti: ffffffc0088e4000 task.ti: ffffffc0088e4000
Dec  5 14:39:49 kernel: PC is at 0x7f80b6346c
Dec  5 14:39:49 kernel: LR is at 0x7f80b49924
Dec  5 14:39:49 kernel: pc : [<0000007f80b6346c>] lr : [<0000007f80b49924>] pstate: a0000000
Dec  5 14:39:49 kernel: sp : 0000007f78ea9fb0
Dec  5 14:39:49 kernel: x29: 0000007f78ea9fb0 x28: 0000007f80b9b000
Dec  5 14:39:49 kernel: x27: 0000007f80b5eb40 x26: 0000000000000000
Dec  5 14:39:49 kernel: x25: 0000000023bdadf8 x24: 0000000000000016
Dec  5 14:39:49 kernel: x23: 0000007f78eaa068 x22: 0000000000000000
Dec  5 14:39:49 kernel: x21: 0000007f80b63460 x20: 0000000000000000
Dec  5 14:39:49 kernel: x19: 0000007f80b3eb3c x18: baaa095d5b30b19d
Dec  5 14:39:49 kernel: x17: 0000007f80943108 x16: 0000000000001630
Dec  5 14:39:49 kernel: x15: 0000000000080000 x14: 0000000000000008
Dec  5 14:39:49 kernel: x13: 0000000000000000 x12: 0000000000000000
Dec  5 14:39:49 kernel: x11: 0000000000000000 x10: 0000000000000000
Dec  5 14:39:49 kernel: x9 : 0000007f78eaa220 x8 : 0101010101010101
Dec  5 14:39:49 kernel: x7 : 7f7f7f7f7f7f7f7f x6 : fefeff73746e1f63
Dec  5 14:39:49 kernel: x5 : 0000000000000010 x4 : 0000000000000028
Dec  5 14:39:49 kernel: x3 : 0000000000000016 x2 : 9366fc009b037c42
Dec  5 14:39:49 kernel: x1 : 0000000000000001 x0 : 0000007f80b3eb3c
Dec  5 14:54:22 Diversion: created br0:pixelserv-tls 192.168.1.2, from /opt/etc/init.d/S80pixelserv-tls
Dec  5 14:54:22 pixelserv-tls[7207]: pixelserv-tls 2.2.1-rc.4 (compiled: Dec  5 2018 22:24:53 flags: tfo no_tls1_3) options: 192.168.1.2
Dec  5 14:54:22 Entware (aarch64-k3.10): Started pixelserv-tls (Diversion) from /opt/bin/diversion
Dec  5 14:54:23 pixelserv-tls[7207]: Listening on :192.168.1.2:443
Dec  5 14:54:23 pixelserv-tls[7207]: Listening on :192.168.1.2:80
Dec  5 15:00:02 Skynet: [#] 146390 IPs (+0) -- 1690 Ranges Banned (+0) || 8790 Inbound -- 1029 Outbound Connections Blocked! [save] [2s]
Dec  5 16:00:02 Skynet: [#] 146390 IPs (+0) -- 1690 Ranges Banned (+0) || 8952 Inbound -- 1029 Outbound Connections Blocked! [save] [2s]
Dec  5 16:57:38 kernel: pixelserv-tls[7207]: unhandled level 0 translation fault (11) at 0x66fc009b037e22, esr 0x92000044
Dec  5 16:57:38 kernel: pgd = ffffffc0077ad000
Dec  5 16:57:38 kernel: [66fc009b037e22] *pgd=0000000000000000, *pud=0000000000000000
Dec  5 16:57:38 kernel: CPU: 0 PID: 7207 Comm: pixelserv-tls Tainted: P           O    4.1.27 #2
Dec  5 16:57:38 kernel: Hardware name: Broadcom-v8A (DT)
Dec  5 16:57:38 kernel: task: ffffffc0026f0a40 ti: ffffffc0094b8000 task.ti: ffffffc0094b8000
Dec  5 16:57:38 kernel: PC is at 0x7f7d4e346c
Dec  5 16:57:38 kernel: LR is at 0x7f7d4c9924
Dec  5 16:57:38 kernel: pc : [<0000007f7d4e346c>] lr : [<0000007f7d4c9924>] pstate: a0000000
Dec  5 16:57:38 kernel: sp : 0000007f71020fb0
Dec  5 16:57:38 kernel: x29: 0000007f71020fb0 x28: 0000007f7d51b000
Dec  5 16:57:38 kernel: x27: 0000007f7d4deb40 x26: 0000000000000000
Dec  5 16:57:38 kernel: x25: 0000000031387eb8 x24: 0000000000000016
Dec  5 16:57:38 kernel: x23: 0000007f71021068 x22: 0000000000000000
Dec  5 16:57:38 kernel: x21: 0000007f7d4e3460 x20: 0000000000000000
Dec  5 16:57:38 kernel: x19: 0000007f7d4beb3c x18: a702e61ebc8f71f5
Dec  5 16:57:38 kernel: x17: 0000007f7d2c3108 x16: 0000000000001630
Dec  5 16:57:38 kernel: x15: 0000000000007fff x14: 0000000000000008
Dec  5 16:57:38 kernel: x13: 0000000000000000 x12: 0000000000000000
Dec  5 16:57:38 kernel: x11: 0000000000000000 x10: 0000000000000000
Dec  5 16:57:38 kernel: x9 : 0000007f71021220 x8 : 0101010101010101
Dec  5 16:57:38 kernel: x7 : 7f7f7f7f7f7f7f7f x6 : fefeff73746e1f63
Dec  5 16:57:38 kernel: x5 : 0000000000000010 x4 : 0000000000000028
Dec  5 16:57:38 kernel: x3 : 0000000000000016 x2 : 9366fc009b037c42
Dec  5 16:57:38 kernel: x1 : 0000000000000001 x0 : 0000007f7d4beb3c
Dec  5 17:00:03 Skynet: [#] 146390 IPs (+0) -- 1690 Ranges Banned (+0) || 9120 Inbound -- 1029 Outbound Connections Blocked! [save] [3s]
Dec  5 17:20:00 Diversion: updated ads counter: 75,809 total, 4,048 this week, 1,092 new since last count, from /opt/bin/diversion
Dec  5 17:28:17 Diversion: created br0:pixelserv-tls 192.168.1.2, from /opt/etc/init.d/S80pixelserv-tls
Dec  5 17:28:17 pixelserv-tls[12111]: pixelserv-tls: v2.0.1 compiled: Mar  3 2018 11:05:58 options: 192.168.1.2
Dec  5 17:28:17 Entware (aarch64-k3.10): Started pixelserv-tls (Diversion) from
Dec  5 17:28:17 pixelserv-tls[12111]: Listening on :192.168.1.2:80
Dec  5 17:28:17 pixelserv-tls[12111]: Listening on :192.168.1.2:443
 
I'm waiting until the source code is posted on GitHub since I'd like to see how Pixelserv-tls is handling the YouTube URLs and what purpose the libcurl serves.

You may never see the code and what the "magic" is as I intend to not include some of the features in rc.4 after my extensive tests.

Also so that you know the tls report link that I PM'ed you is used by quite a few people in this thread already. In case, you're remotely thinking I'm phishing. Rest assured that I don't have time for such stunt. LoL

As to why nobody responded to your original call on the report, it's beyond my comprehension..:)
 
It looks like the "manifest.google.com" method is taken from this reddit post. Don't know if kvic has performed extensive test with that method to deploy it to public.

I did a few extra things in rc.4. However, I think the manifest.google.com method widely publicised now is a placebo with zero effect after my extensive tests.

There are bugs in rc.4 which I'll provide fixes in an update. So that people can blind test themselves to make a judgement.
 
I did a few extra things in rc.4. However, I think the manifest.google.com method widely publicised now is a placebo with zero effect after my extensive tests.

There are bugs in rc.4 which I'll provide fixes in an update. So that people can blind test themselves to make a judgement.
I hope that 'IF' it proves to be effective it will be ported to the tls 1.3 version of pixelserv.
 
2.2.1 includes a couple changes in blocking ads on youtube. In rc.4, I introduced a few extra things with respect to the so-called "manifest.googlevideo.com" method.

From my extensive tests, that domain has zero effect in blocking any video ads. To prove it does, you have to perform "blind A B tests" with and without the domain blocked.

What I meant is my intention to remove the extra things I did in rc.4 with the so-called "manifest.googlevideo.com" method. I said so 'cos I'm open to new ideas or challenges to prove me wrong. But honestly, people will have a hard job in doing so.....

I've just uploaded a set of new binaries with bug fixes mentioned previously.
 
I have installed rc4 without domain blocking.

On my iMac chrome, I noticed the first advertisement will trigger off when YouTube show begin. But so far no ad between the YouTube show. Awesome blocking :D
 
wc1dt2.png


I configured a custom adblock with dnsmasq but I do not know how to remove this warning here in the Forum. Any tips?
 
aub49l.png


I installed Kvic's Pixelserv-tls via Entware. I do not think it's working. Any tips?
 
wc1dt2.png


I configured a custom adblock with dnsmasq but I do not know how to remove this warning here in the Forum. Any tips?
IF you want get rid of that you have to whitelist snbforums.com
 
IF you want get rid of that you have to whitelist snbforums.com
It does not solve. I was able to use the whitelist compilation of Divertion, adapting to my custom adblock.
 
aub49l.png


I installed Kvic's Pixelserv-tls via Entware. I do not think it's working. Any tips?
I solved the problem. Just generate a blocklist pointing to the Pixelserv-tls IP
 
It does not solve. I was able to use the whitelist compilation of Divertion, adapting to my custom adblock.

if you are using firefox you may have to disabled content blocking on this site.

That worked for me.
 
upgraded from rc3 to rc4 last week but it was unstable for me. Did you release an updated RC4 build on sunday?
 
upgraded from rc3 to rc4 last week but it was unstable for me. Did you release an updated RC4 build on sunday?

Asad Ali is right. You could also tell by comparing the timestamp on the servstats page. The latest timestamp is mentioned on the release page (see my signature).
 

Similar threads

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top