ok, thank you very much.
will make both settings on the router!
helped me a lot!
what about the guest access, does anyone have experience with it in relation to pi-hole?
Perfect!Joulinar wrote: ↑Sat Jan 16, 2021 1:06 pm I don't use the guest access. But I did a small test at home and Ad blocking was working as well. This is due to setting #1 as your guest clients are going to use fritz.box as DNS server and the FritzBox will use PiHole. Inside Pihole these request are related to Fritzbox as client.![]()
Hello, you mentioned in your post that you can use unbound to hide the DNS requests from upstream providers.MichaIng wrote: ↑Fri Jan 15, 2021 1:45 pm
- ...
- ...
- ...
- This service adds and removes 127.0.0.1 to
/etc/resolv.conf
dynamically with Unbound service start and stop, if "resolvconf" is installed (AFAIK it is as a dependency for Pi-hole). That would actually makes sense when you use Unbound directly as local resolver and relativises my argument above at least for maintenance tasks when the service is gracefully stopped. The problem in combination with Pi-hole is thatunbound-resolvconf.service
manages 127.0.0.1 without port (hence port 53) hardcoded, instead of using the IP + port that it is actually configured to listen on, which is 127.0.0.1:5335 (or 5353), while Pi-hole listens on port 53. Hence it adds and removes Pi-hole as local nameserver entry when the Unbound service is started/stopped, which might not be exactly what you want, e.g. if Pi-hole has a fallback upstream DNS or you actually use Unbound directly with port 5335 or 5353, which would make sense when you want to hide DNS queries from upstream providers but do not need to have ads blocked on the server, where you do not browse websites from.
You use 1 DNS server: my upstream providers server.
/etc/resolv.conf is: nameserver 127.0.0.1
cat /etc/resolv.conf > nameserver 127.0.0.53
127.0.0.53
practically equals 127.0.0.1
(like all 127.* IP addresses), hence loops requests back to the sender. This can hence only work on the machine that runs Unbound, not on other network members./etc/resolv.conf
, sends DNS requests unencrypted to the public provider, hence your ISP as well as the public DNS provider can read them.So everything is right with the clients!?!MichaIng wrote: ↑Sat Feb 13, 2021 6:58 pm Connected clients should have the Unbound server's local IP address.127.0.0.53
practically equals127.0.0.1
(like all 127.* IP addresses), hence loops requests back to the sender. This can hence only work on the machine that runs Unbound, not on other network members.
MichaIng wrote: ↑Sat Feb 13, 2021 6:58 pm ...
Unbound supports those protocols as well, but then needs to use a public DNS provider again.
...
- Using Unbound with e.g. DoT enabled, sends requests encrypted to the public provider, hence your ISP cannot read them. But the public provider can read them and sends them unencrypted (obfuscated between many others though) to DNS root servers.
/etc/unbound/unbound.conf.d/....
?Well you clients would need to point to your local network IP/server your have unbound running on and not to a loopback interface.So everything is right with the clients!?!
in network manager (Ubuntu) the local network IP / server of the pi-hole is displayed, but in terminal
cat /etc/resolv.conf> nameserver 127.0.0.53
Strange or Right?
That is of course understandable. What are the advantages and disadvantages of DoH and DoT?Joulinar wrote: ↑Sun Feb 14, 2021 9:06 pm DoT, DoH and DNScrypt are completly different types to encrypt your DNS request. Every method has advantages as well as disadvantages. It is not like, method A is better method B
At the end you would need to decide whom you are trusting, because someone need to read your DNS request. It could be you ISP, one of the global
Very importantJoulinar wrote: ↑Sun Feb 14, 2021 9:06 pm An easy way to setup DoH is describe on PiHole wiki https://docs.pi-hole.net/guides/dns/cloudflared/
dietpi-software
./etc/unbound/unbound.conf.d/dietpi-pihole.conf
and apply interface and port directly in /etc/unbound/unbound.conf.d/dietpi.conf
. We did falsely assume that dietpi-pihole.conf would override dietpi.conf, but actually it adds that ip/port binding, so Unbound would then listen on two ports. This is fixed with next release already.Code: Select all
cat << '_EOF_' > /etc/unbound/unbound.conf.d/dietpi-dot.conf
# Adding DNS-over-TLS support
server:
tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt
forward-zone:
name: "."
forward-tls-upstream: yes
## Cloudflare
forward-addr: 1.1.1.1@853#cloudflare-dns.com
forward-addr: 1.0.0.1@853#cloudflare-dns.com
## Quad9
forward-addr: 9.9.9.9@853#dns.quad9.net
forward-addr: 149.112.112.112@853#dns.quad9.net
## Cloudflare IPv6
forward-addr: 2606:4700:4700::1111@853#cloudflare-dns.com
forward-addr: 2606:4700:4700::1001@853#cloudflare-dns.com
_EOF_
forward-addr
entries are just examples, Cloudflare IPv6 is not required to resolve hostnames to IPv6 addresses, but only if for some reason you want to have the request sent over IPv6 for some reason. Using only a single forward-addr will work as well, I'm not sure how fallbacks are done by Unbound, e.g. in which case/how fast it will try the second entry, if the first cannot be connected to. A separate file can be used safely here since this forward-zone block is not present in dietpi.conf