ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Tags
    3. pihole
    Log in to post
    • All categories
    • gjacobseG

      pi-Hole: Dashboard times out

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion pi-hole pihole
      29
      0 Votes
      29 Posts
      2k Views
      gjacobseG

      @JaredBusch said in pi-Hole: Dashboard times out:

      @gjacobse said in pi-Hole: Dashboard times out:

      @JaredBusch said in pi-Hole: Dashboard times out:

      Unless you have the Vultr Firewall in place restriciting access to your home IP or some software firewall running on the instance, you have setup a fucking public DNS server. What else would you expect to happen?

      Great - that's an extra $10 a month unless I can run firewalld on the system and be fine.

      um wut?

      Admittedly - I may have misspoke and that is the DDOS not the firewall. I have to go back and look through.

      @scottalanmiller said in pi-Hole: Dashboard times out:

      @gjacobse said in pi-Hole: Dashboard times out:

      @JaredBusch said in pi-Hole: Dashboard times out:

      Unless you have the Vultr Firewall in place restriciting access to your home IP or some software firewall running on the instance, you have setup a fucking public DNS server. What else would you expect to happen?

      Great - that's an extra $10 a month unless I can run firewalld on the system and be fine.

      $10? Should be $3.50 on Vultr

      This instance is indeed $3.50

    • gjacobseG

      piHole: Forwarded queries

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion pihole pi-hole forwarding
      4
      0 Votes
      4 Posts
      516 Views
      gjacobseG

      @scottalanmiller said in piHole: Forwarded queries:

      @gjacobse said in piHole: Forwarded queries:

      @gjacobse said in piHole: Forwarded queries:

      Looking through my pHole - I see that a number of entries (IPaddresses) are shown as forwarded. Is this something that should be allowed (forwarding) or blocked?

      Or - is it a reply to the request and completely normal

      Completely normal. A forward in DNS is when the local DNS server (the Pi-Hole) doesn't have the "answer" in its table.

      I wondered - I went back and read it 'backwards' and from that stand point - I can very much see it as being normal. the request is forwarded on - ... not something coming in that shouldn't.

      Thanks

    • gjacobseG

      pi-hole: Xbox; Ads on Youtube

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion pihole pi-hole xbox youtube adblock adblocking
      6
      0 Votes
      6 Posts
      2k Views
      DashrenderD

      @gjacobse said in pi-hole: Xbox; Ads on Youtube:

      @Dashrender said in pi-hole: Xbox; Ads on Youtube:

      @gjacobse said in pi-hole: Xbox; Ads on Youtube:

      @marcinozga said in pi-hole: Xbox; Ads on Youtube:

      Pi-hole won't block youtube ads, at least not the in-video ads. You need youtube premium to get rid of them, no way to block those I'm afraid.

      Noted - I don't get ads on the PC(s), likely due to different adblocker there.

      and well - dang.

      How are they being blocked on the PC... something other than blacklists/DNS not resolve...

      My default had been to install adblocker when building a PC,.. so it's likely still running even with the pi-hole running.

      Right, but how do most of those work? as far as I know they work by blocking DNS queries

    • gjacobseG

      pi-Hole: Client and Recursive DNS

      Watching Ignoring Scheduled Pinned Locked Moved Unsolved IT Discussion vultr pi-hole pihole client dns blacklist
      5
      0 Votes
      5 Posts
      851 Views
      scottalanmillerS

      @gjacobse said in pi-Hole: Client and Recursive DNS:

      And since i'm running this now, I get a notification on recursive DNS -

      Yup, just ignore them.

    • B

      Pi-hole server involved in a 'DNS Amplification' DDOS Attack

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion pi-hole pihole ddos dns amplification
      69
      1 Votes
      69 Posts
      8k Views
      DustinB3403D

      @bnrstnr said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

      @DustinB3403 didn't you say the method above would only work for devices on the Pi-Hole's LAN?

      The method linked by someone else would, yes. As it's impractical to try to do said linked approach for the open internet.

      Again, it's what you would do, but isn't practical because of your scale.

      Post 18.

      @DustinB3403 said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

      But the reported issue is that these request appear to come from your devices. IE they are spoofed or are legitimately coming from your trusted network.

      Can you setup ingress filtering for this?

      This is the approach proposed by Curtis.

      @Curtis said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

      https://freek.ws/2017/03/18/blocking-dns-amplification-attacks-using-iptables/

    • gjacobseG

      Vultr: Instance Security Notice:

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion vultr recursive dns pihole
      11
      2 Votes
      11 Posts
      1k Views
      scottalanmillerS

      @aaronstuder said in Vultr: Instance Security Notice::

      @scottalanmiller He can all requests not coming from the IP or Subnet (Assuming on DHCP)

      He can do that now. But that would make the system useless for him. The Vultr firewall might be nice for doing that, but doesn't alter the situation.

    • travisdh1T

      Anyone here have success accessing the Pi-Hole admin page from behind a reverse proxy?

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion pihole admin
      15
      1 Votes
      15 Posts
      7k Views
      travisdh1T

      @black3dynamite said in Anyone here have success accessing the Pi-Hole admin page from behind a reverse proxy?:

      @travisdh1 said in Anyone here have success accessing the Pi-Hole admin page from behind a reverse proxy?:

      @black3dynamite said in Anyone here have success accessing the Pi-Hole admin page from behind a reverse proxy?:

      @travisdh1 said in Anyone here have success accessing the Pi-Hole admin page from behind a reverse proxy?:

      @black3dynamite said in Anyone here have success accessing the Pi-Hole admin page from behind a reverse proxy?:

      This might help.
      https://www.c-rieger.de/pi-hole-behind-your-nginx-reverse-proxy/

      https://www.reddit.com/r/pihole/comments/7n87y6/figured_out_how_to_use_pihole_in_a_nginx_reverse/

      Rolling back to this. The web page is being displayed now, after following these instructions.

      Now it's not displaying any statistics. I saw that the log files were in /var/log instead of /var/log/pihole (which was empty.) I wonder if something has been messed up in the install script at this point.

      What OS are you using for Pi-Hole? I'm using Debian. If you are using Fedora and have SELinux set to enforcing then that can be causing the problem. See what happens when setting it to permissive.

      It is Fedora 28, but I purposely disabled selinux on it for now when I started having these issues. Good guess tho.

      You can try repairing Pi-Hole by using this command: pihole -r

      Ran it, but it didn't make any difference. I really thing there is an issue with the log file locations, in that the web interface is probably looking in /var/log/pihole for the log files, but everything else is pointing to /var/log.

    • travisdh1T

      DNS-over-HTTPS with Fedora based PiHole and Cloudflare

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion fedora pihole dns https
      17
      6 Votes
      17 Posts
      5k Views
      travisdh1T

      @jaredbusch said in DNS-over-HTTPS with Fedora based PiHole and Cloudflare:

      The entire concept is just stupid.
      You cannot hide from your provider.

      I'd agree with you, at least for now. This is just one small step in the right direction. It won't really make much difference until it's supported by all endpoints.

    • 1 / 1