ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Pi Hole

    Scheduled Pinned Locked Moved IT Discussion
    pi-holednssecurity
    135 Posts 24 Posters 20.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      Alex Sage @JaredBusch
      last edited by

      @jaredbusch said in Pi Hole:

      My wife had to shut off her wifi to get her shopping cart to load a bit ago. I was out working on the front yard and not in a position to troubleshoot.

      I think she was shopping on ShopJustice.com or something.

      Add to the whitelist 😉

      1 Reply Last reply Reply Quote 0
      • jt1001001J
        jt1001001
        last edited by

        dont (yet) have a lab virtual host at home, but do have 2 new (to me) PI's on the way so one will be for this app.

        coliverC 1 Reply Last reply Reply Quote 0
        • coliverC
          coliver @jt1001001
          last edited by

          @jt1001001 said in Pi Hole:

          dont (yet) have a lab virtual host at home, but do have 2 new (to me) PI's on the way so one will be for this app.

          I've set this up on vultr. It's been working phenomenally.

          A 1 Reply Last reply Reply Quote 0
          • A
            Alex Sage @coliver
            last edited by

            @coliver Same here 🙂 How are you making sure it's only taking requests from you?

            coliverC scottalanmillerS 2 Replies Last reply Reply Quote 0
            • coliverC
              coliver @Alex Sage
              last edited by

              @aaronstuder said in Pi Hole:

              @coliver Same here 🙂 How are you making sure it's only taking requests from you?

              Monitoring more then anything else. I'm not too concerned by other people using it. The admin interface is locked down to just my IP and it's a pretty complex password.

              A 1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @Alex Sage
                last edited by

                @aaronstuder said in Pi Hole:

                @coliver Same here 🙂 How are you making sure it's only taking requests from you?

                Does it matter? I let people use mine. It's DNS, I could handle thousands of users without noticing.

                1 Reply Last reply Reply Quote 0
                • A
                  Alex Sage @coliver
                  last edited by Alex Sage

                  @coliver @scottalanmiller So what's your PiHole IP address? 🙂

                  1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller
                    last edited by scottalanmiller

                    173.199.123.211

                    A 1 Reply Last reply Reply Quote 1
                    • A
                      Alex Sage @scottalanmiller
                      last edited by Alex Sage

                      @scottalanmiller said in Pi Hole:

                      173.199.123.211

                      Now I just need @coliver's for backup and I don't need to run my own DNS anymore lmao

                      1 Reply Last reply Reply Quote 0
                      • A
                        Alex Sage
                        last edited by

                        I guess that means I have no control over my forwarders ether lol...

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @Alex Sage
                          last edited by

                          @aaronstuder said in Pi Hole:

                          I guess that means I have no control over my forwarders ether lol...

                          And we can mess with you. All kinds of funny things can happen if you control the DNS for lots of people.

                          1 Reply Last reply Reply Quote 0
                          • A
                            Alex Sage
                            last edited by

                            Hmmmmmm......

                            https://www.us-cert.gov/ncas/alerts/TA13-088A

                            JaredBuschJ M 2 Replies Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller
                              last edited by

                              "...but is more difficult to mitigate since even a server configured with best practices can still be used in an attack. "

                              1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller
                                last edited by

                                Basically, network servers can be used to respond to the wrong address. Nothing special there, really.

                                1 Reply Last reply Reply Quote 0
                                • JaredBuschJ
                                  JaredBusch @Alex Sage
                                  last edited by

                                  @aaronstuder said in Pi Hole:

                                  Hmmmmmm......

                                  https://www.us-cert.gov/ncas/alerts/TA13-088A

                                  That is old news.

                                  1 Reply Last reply Reply Quote 0
                                  • M
                                    marcinozga @Alex Sage
                                    last edited by

                                    @aaronstuder said in Pi Hole:

                                    Hmmmmmm......

                                    https://www.us-cert.gov/ncas/alerts/TA13-088A

                                    Keep your DNS private, behind NAT and firewall and don't expose it to internets.

                                    1 Reply Last reply Reply Quote 1
                                    • NashBrydgesN
                                      NashBrydges
                                      last edited by

                                      I realize I'm necro posting here but, is anyone actually running their Pi-Hole on Vultr? I have family that would love to use this for ad blocking but aren't technical enough to setup a Pi at home.

                                      Any special consideration? Risks about having this open to the public? The obviously have dynamic IPs so not like I can restrict their IPs. Would Vultr's smallest instance be enough?

                                      black3dynamiteB JaredBuschJ A scottalanmillerS 4 Replies Last reply Reply Quote 0
                                      • black3dynamiteB
                                        black3dynamite @NashBrydges
                                        last edited by

                                        @nashbrydges said in Pi Hole:

                                        Would Vultr's smallest instance be enough?

                                        I would assume the $5 instance would the best choice.

                                        1 Reply Last reply Reply Quote 1
                                        • coliverC
                                          coliver
                                          last edited by

                                          I have mine running on the 2.50$ server.

                                          NashBrydgesN 1 Reply Last reply Reply Quote 1
                                          • NashBrydgesN
                                            NashBrydges @coliver
                                            last edited by

                                            @coliver said in Pi Hole:

                                            I have mine running on the 2.50$ server.

                                            Have you locked it down to only your IP address or is it open to the internet? What have you done to secure the server?

                                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 7
                                            • 5 / 7
                                            • First post
                                              Last post