119
My experiences with Pi-hole (scribe.disroot.org)
submitted 1 year ago* (last edited 1 year ago) by duikbrilletje@scribe.disroot.org to c/privacy@lemmy.ml

Pi-hole has helped improve my "relationship" with Firefox, or better phrased with Firefox forks like LibreWolf and Tor browser. Cool thing with Pi-hole is that you can watch the query log and see what happened in the background while you were surfing the Internet. I learned that :

  • After removing the sponsored shortcuts in Firefox and putting your own shortcuts there Firefox will make connections each time you start the browser. So, if you would have icons on your quick start page in Firefox for let's say EFF, Lemmy, Mastodon, HackerNews, with each Firefox start up, it would query these sites. which I didn't like so much. Since then I've gone back to a complete blank start page, removing search and all those quick start icons, using just toolbar folders with bookmarks.

  • Pi-hole defaults to blocking telemetry for Firefox and Thunderbird.

  • Signal uses Google servers I saw via Pi-hole. I thought that they were using Amazon servers, but looking at Wikipedia for the history of Signal hosting I learned that Signal went back to Google for hosting.

  • Firefox push notification services are hosted on Google servers. LibreWolf removes a lot of Google things that Firefox has by default, but not the push parts. With Pi-hole it is very easy to block that.

top 50 comments
sorted by: hot top controversial new old
[-] ZeDoTelhado@lemmy.world 32 points 1 year ago

Pi hole is an amazing tool and gives a lot of insight on what is being queried and blocked against the block lists. Also, makes completely transparent on the entire network to have nasty things blocked. One thing I will mention to make the setup better: make sure on the firewall level you can have a rule that makes every request for a DNS to go through pi hole. Some devices will use a hard coded DNS instead of respecting the one on the network

[-] Turun@feddit.de 6 points 1 year ago

Dns over https is immune to that firewall method, right?

[-] lemmyvore@feddit.nl 4 points 1 year ago

Yes but I think OP is referring to plain DNS requests to a preferred server.

You can hijack port 53 and redirect them to your preferred server. Also acts as a method of hardening DNS for devices and apps that do not support encrypted DNS.

[-] ZeDoTelhado@lemmy.world 3 points 1 year ago

Forgot to mention the port but that's it. Notorious devices like smart TVs and consoles like to use the hard coded DNS method

load more comments (5 replies)
[-] ZeDoTelhado@lemmy.world 3 points 1 year ago* (last edited 1 year ago)

I was making a quick check, and yes, the DoH situation is a bit more dicey. From how I see it, the best way to make this work is to, at the firewall level, either block as much as possible any requests that look like DoH (and hope whatever was using that falls back to regular DNS calls) or setup a local DoH server to resolve those queries (although I am not sure if it is possible to fully redirect those). In that sense, pihole can't really do much against DoH on its own

EDIT: decided to look a bit further on the router level, and for pfsense at least this is one way to do this recipe for DNS block and redirect

[-] Turun@feddit.de 5 points 1 year ago* (last edited 1 year ago)

Right, so flowing that link there are three ways for DNS:

Classic on port 53,

Dns over TLS on port 853

Dns over https.

The first two can be blocked, because they have specific ports exclusively assigned to them. DoH can't be blocked reliably, because it is encrypted and on a common port. Though blocking 443 on common DNS resolvers can force some clients to fall back to one of the variants that can be blocked/redirected

[-] jjlinux@lemmy.ml 3 points 1 year ago

Who do you think developed DoH? Google has it's paws on everything. It may be private, but as soon as I see Google, I'm out of there.

[-] Pete90@feddit.de 1 points 1 year ago

With most firewalls, there is an option to download ip lists for blocking. There are several list I don't recall right now, that aggregate DoH services. It's not perfect, but better than nothing.

[-] aStonedSanta@lemm.ee 2 points 1 year ago

What does something like this look like? I have an Orbi pro but have never really messed with firewall settings

[-] ZeDoTelhado@lemmy.world 3 points 1 year ago

Hm.... I am not familiar with that device myself, and since I use opnsense for a while I forget most people do not use routers outside of the provided one.

But in a theoretical sense, this firewall rule should look something like this:

  • origin of traffic is any IP that goes into port 53
  • outgoing traffic has to go to pi hole on port 53
[-] aStonedSanta@lemm.ee 3 points 1 year ago

Perfect thank you. My brain gets that. Had a long day of work working on IP centrex phones remotely with dumb end users.

[-] 1917isnow@lemmy.ml 9 points 1 year ago

Oh man glad you have learned about the favicons issue it's insane that we just accept such an easily fingerprintable method of getting TINY IMAGES. Is there a way to cache all of it? I just disable everything lol

[-] ichbinjasokreativ@lemmy.world 5 points 1 year ago

The icon thing can be worked around with something like heimdall. I host my own docker container of it and just set that as my startup page in my browser. Looks much nicer than a blank page and everything happens in my own network.

[-] retrogirl@lemmings.world 4 points 1 year ago

Pi-hole is OK, but for good measure it's easy to set up a "hosts" file that blocks all that stuff locally. You can use your findings from Pi-hole. On Linux you just pop your entries in /etc/hosts, or other OS equivalent. Here are some curated lists. For Mozilla telemetry - https://github.com/MrRawes/firefox-hosts/blob/firefox-hosts/hosts Massive list for everything - https://github.com/StevenBlack/hosts

[-] BearOfaTime@lemm.ee 18 points 1 year ago

That's for one device.

Where does a smart TV keep it's hosts file? IPhone? Android?

DNS (PiHole) works for all devices on your network, which I'd argue is better than a hosts file.

[-] retrogirl@lemmings.world 4 points 1 year ago
[-] null@slrpnk.net 11 points 1 year ago

Why maintain the same thing in multiple places? If the pi-hole is blocking it, the pi-hole is blocking it. What added value is there in also maintaining the hosts file?

[-] retrogirl@lemmings.world 4 points 1 year ago

The amount of times I've seen people request help because Pi-hole was not blocking/functioning properly, well a hosts file just ensures nothing leaves that you want blocked. Besides, you may have different machines set up to be strict or permissive depending on their use case.

[-] scott@lem.free.as 5 points 1 year ago

With Pihole you can restrict or be permissive with different devices, based on MAC or IP address.

[-] ReversalHatchery@beehaw.org 2 points 1 year ago

On mobile or on networks with a bigger load on the DNS server it could make sense to make things faster, but otherwise a pihole is fine I think. If the pihole is not working as it should, that should be found out and fixed ASAP.

[-] suction@lemmy.world 2 points 1 year ago

That’s for one network. That’s why I switched to Next DNS and have protection at home and everywhere else.

[-] Swarfega@lemm.ee 4 points 1 year ago

I ran PiHole for years. It started as a way to block ads but then also a way to block games and YouTube for my kids so they get a break. I had to manually control this though. I switched to NextDNS last year because this can be done on a schedule and they can't get around it such as swapping to mobile data on their phones.

In the house though I run AdGuard because there's no way differentiate traffic for each of my kids NextDNS profiles. With AdGuard it can proxy DNS requests to take traffic from the TV in their bedroom and convert it to DNS over TLS so the traffic hits the correct profile. I don't use AdGuard for anything else. It does not filter anything. It's purely to make sure traffic hits the correct NextDNS profile.

[-] oxomoxo@lemmy.world 6 points 1 year ago

DNS services with blocks lists such as Pi-Hole, AdGuard, NextDNS, etc, provide a centralized config file for all devices on a network, so you only configure once, collect statistics, have built in block lists that can be easily modified and updated either automatically or manually and are fast.

Using large lists in a host file will slow local resolution. It wasn't designed for this use case as it's acting a flat file database with a limited amount of RAM allocated for the process and will get slower the longer the list. While this latency won't be noticeable in the thousands of lines, once you start hitting hundreds of thousand or millions of entries it will start to crawl.

Hosts file are also unable to RegEx or Wildcard entries which means you would have to duplicated lots of variations in domains...

I mean I can also statically assign IPs to ever client and keep a spreadsheet, but why don't I just use DHCP?

That is pretty cool for folks that want a quick and easy way to block ads.

[-] retrogirl@lemmings.world 1 points 1 year ago

Absolutely. These lists are created by server admins who collect what the firewall rejects, much like you see with the Pi-hole. They'll automatically block some ads and many threats too. Another tip if you're using Librewolf, Mullvad browser or Firefox with uBlock, enable more of the filter lists.

[-] mumblerfish@lemmy.world 3 points 1 year ago

How does pi-hole help with Tor Browser? Does DNS not go through the Tor network?

You're right. My point was that Pi-hole made me appreciate the Firefox forks more because the plain Firefox is FULL of GOOGLE!

[-] onlinepersona@programming.dev 4 points 1 year ago

That's what 500 million dollars of google money per year does to a "private" browser :)

Anti Commercial-AI license

load more comments (1 replies)
[-] barbara@lemmy.ml 2 points 1 year ago

Ever since using comouters I wonder why it is not built in to monitor your queries.

[-] possiblylinux127@lemmy.zip 2 points 1 year ago

I am more interested in Technitium

[-] jjlinux@lemmy.ml 3 points 1 year ago* (last edited 1 year ago)

Looks overly complicated ~~and needing Winblows commands is a huge no for me.~~ Using anything Winblows is a huge nope.

Edit: I was mistaken. Technitium DNS server does not have anything to do with windows, but their Get HTTPS product does.

[-] possiblylinux127@lemmy.zip 3 points 1 year ago

It doesn't need Windows. Its a docker container and a full fledged DNS server unlike Pi hole.

load more comments (3 replies)
load more comments
view more: next ›
this post was submitted on 18 Apr 2024
119 points (100.0% liked)

Privacy

40354 readers
357 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS