Pi-hole - a network-level adblocker

I used to have extra add-ons. Not anymore. Pi-hole removes most tracking cookies and advertising.

The only page I had a problem with was YouTube. That’s where advertising came through. However, I have solved it by blocking the entire Google. :wink:

There’s no point in protecting yourself if you’re going to have services from Google, Apple, Facebook and so on. Block all of it!

3 Likes

A little tip for those of you who have DNS over HTTPS in your browsers. You have to turn it off. Otherwise, it won’t go through pi-hole. If you want to run DoH, you can fix it in Pi-hole instead. I’ve posted a link in this thread somewhere. It’s easy to fix.

It’s so nice to run it on an RPi. Just put it up and forget. I update once a month. Otherwise no maintenance! It draws very little power too. Doesn’t cost much in purchases either.

You can have really good uptime on them if you want:

RPi

2 Likes

Raspberry Pi 2 here. Pretty old but more than enough for a Pi Hole.

2 Likes

i Use this blocklist : https://raw.githubusercontent.com/deathbybandaid/piholeparser/master/Subscribable-Lists/CombinedBlacklists/CombinedBlackLists.txt

to block more then 2.098.000 domains. (Warning: to pretend overblocking, use whitelist)

Bildschirmfoto_2021-01-25_15-14-53

2 Likes

I am using the default list at the moment but it is still blocking a lot.

image

3 Likes

There were a lot of blocks on your network. 43,9%. A lot of smart gadgets and mobiles?

I’ve split my network into several. I don’t have that many “smart stuff” on mine. Don’t trust them. But I have many servers and regular computers. Want to keep them apart.

Pi-hole-3

You see I have an adblock too :wink:

Anyone know about DoH? Is it good or not? Watched Rob Braxman’s clip about DoH. Apparently wasn’t good for privacy. I had it on, but turned it off a while ago.

Of course it’s not good, Rob is right - centralization is extremely bad idea for privacy, especially centralization on Google / Amazon.

Well, unless you trust them and want to play in hands of corporations :face_with_hand_over_mouth:

1 Like

Just watched the video, seemed to be as much an advert for the services he sells than anything else. Who really, in this day and age, thinks Google can be trusted for privacy? :roll_eyes:

1 Like

I have 5 separate network segments

  • Servers
  • PCs
  • Moderate risk devices - Phones, Tablets, Gaming consoles, streaming boxes, etc
  • IoT - Thermostats, cameras, etc
  • Guest

I allow DNS traffic from everything except my guest network to the ph-hole so all my devices gain the benefit of the pi-hole.

DNS is generally problematic for privacy no matter what you choose. It is a choice between evils.

  • Using your ISPs DNS server is the most common option. All your DNS traffic is unencrypted and available to your ISP.
  • You can switch to using a privacy focused DNS server but, honestly, this isn’t that much better since your ISP is still a single point that can see all the unencrypted data. It can at least help with misbehaving ISPs/Wi-Fi providers that are injecting a proxy via DNS.
  • You can distribute your DNS queries across DNS servers from multiple providers but I think this is mostly useless. Not only does your ISP still have full access to all the queries, but it is debatable if this increases or decreases privacy. I actually think this is the worst option.
  • You can use a VPN which shifts the point of trust from your ISP to the VPN provider.
  • You can use DoH/DoT which shifts the point of trust from your ISP to the DNS provider.
  • You can use ToR which comes at a significant performance/reliablility hit. It is also doesn’t protect you against government surveillance if that is a personal priority of yours.
  • You can combine multiple methods but be careful as it is easy to accidentally decrease privacy this way.

Ultimately, it is a choice between bad options. So when you someone says “DoH is bad for privacy”, my response is “Compared to what?”.

In the US, we know that ISPs are collecting and selling our data so I would rather use a DoH provider. If you have a VPN provider you trust than that is an even better option.

However, I would say using DoH is much better for privacy than sending unencrypted DNS traffic unless your ISP is extremely trustworthy.

4 Likes

So for Pihole, should DoH be enabled, disabled or it doesn’t matter so much (from a privacy pov)?

If you aren’t using a VPN, I would enable it on your pi-hole unless you trust your ISP with your data. But that is just my opinion. There is no “right” answer.

With DNS, you have to choose what/who you trust the most.

1 Like

If you’re going to run DoH, you’re going to have to run it in pi-hole. If you turn it on in the browsers, it won’t go through pi-hole.

1 Like

Yup lots of options for DNS providers other than Google, Cloudflare or your ISP.

DNS that is in pi-hole from the beginning does not offer DoH. You must do this:

https://docs.pi-hole.net/guides/dns/cloudflared/

1 Like

Thanks. I generally use Adguard DNS at my router to cover my devices (plus ublock origin where I can). I’m planing on getting a Rpi zero w though.

1 Like

Indeed, I have cloudflared service running with Quad9 as the backend resolver.

pi@raspberrypi:~ $ sudo systemctl status cloudflared
● cloudflared.service - cloudflared DNS over HTTPS proxy
   Loaded: loaded (/etc/systemd/system/cloudflared.service; enabled; vendor preset: enabled)
   Active: active (running) since Tue 2021-01-26 11:48:19 GMT; 2h 28min ago
 Main PID: 3326 (cloudflared)
    Tasks: 10 (limit: 4915)
   CGroup: /system.slice/cloudflared.service
           └─3326 /usr/local/bin/cloudflared proxy-dns --port 5053 --upstream https://dns.quad9.net/dns-query

Jan 26 11:48:19 raspberrypi systemd[1]: Started cloudflared DNS over HTTPS proxy.
Jan 26 11:48:19 raspberrypi cloudflared[3326]: INFO[2021-01-26T11:48:19Z] Adding DNS upstream - url: https://dns.quad9.net/dns-query
Jan 26 11:48:19 raspberrypi cloudflared[3326]: INFO[2021-01-26T11:48:19Z] Starting metrics server on 127.0.0.1:37443/metrics
Jan 26 11:48:19 raspberrypi cloudflared[3326]: INFO[2021-01-26T11:48:19Z] Starting DNS over HTTPS proxy server on: dns://localhost:5053

2 Likes

Thanks for all of the help and suggestions on here. I ended up setting things up in a VM to start, but the lure of a dedicated device for it will probably draw me in before too long. Also, then I won’t have to coordinate reboots on this EOS box around other people needing internet. I used dietpi as the OS and everything was super easy to set up. I still need to mess around some with settings and blocked lists, but that’s a good weekend project. One other question I had was around one screen shot you posted @anon9173994 , I saw you had irssi running on a pi, which would be nice. I assume that would be able to run on the same device as pi-hole? Also, do you just ssh to it and use screen run irssi or something fancy I don’t even know about?

1 Like