Setting up Pi-hole

Just reviewed our work pihole and added the Hagezi Normal, TIF Medium, Badware Hoster as well as changing Danadelion Sprout from the old hosts version to the current AdGuard version, and removing a couple of defunct ones (was 1.7 million Domains before changes).

1747211951105.png
Interesting - What do you have that I'm not using in my list above?

78spxug.png
 
Interesting - What do you have that I'm not using in my list above?

78spxug.png

Not necessarily anything good, however I'll post my lists when I'm back at work tomorrow. Most were lists that were previously posted in here however



Code:
https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
http://sysctl.org/cameleon/hosts
https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt

https://v.firebog.net/hosts/AdguardDNS.txt
https://v.firebog.net/hosts/static/w3kbl.txt
https://v.firebog.net/hosts/Prigent-Malware.txt
https://v.firebog.net/hosts/Easyprivacy.txt
https://v.firebog.net/hosts/Prigent-Ads.txt
https://v.firebog.net/hosts/Easylist.txt
https://v.firebog.net/hosts/Admiral.txt
https://v.firebog.net/hosts/RPiList-Malware.txt
https://v.firebog.net/hosts/RPiList-Phishing.txt

https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts
https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.2o7Net/hosts
https://raw.githubusercontent.com/FadeMind/hosts.extras/master/UncheckyAds/hosts
https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Risk/hosts

https://osint.digitalside.it/Threat-Intel/lists/latestdomains.txt
https://adaway.org/hosts.txt
https://raw.githubusercontent.com/PolishFiltersTeam/KADhosts/master/KADhosts.txt
https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt
https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt
https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/hosts
https://raw.githubusercontent.com/Spam404/lists/master/main-blacklist.txt    
https://raw.githubusercontent.com/bigdargon/hostsVN/master/hosts
https://hostfiles.frogeye.fr/firstparty-trackers-hosts.txt
https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&showintro=0&mimetype=plaintext
https://urlhaus.abuse.ch/downloads/hostfile/
https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-malware.txt    
https://phishing.army/download/phishing_army_blocklist_extended.txt
https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Report_Appendix_D.txt

https://raw.githubusercontent.com/hagezi/dns-blocklists/main/adblock/multi.txt
https://raw.githubusercontent.com/hagezi/dns-blocklists/main/adblock/tif.medium.txt
https://raw.githubusercontent.com/hagezi/dns-blocklists/main/adblock/hoster.txt
https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareAdGuardHome.txt
 
I wonder if there's a way to compare two, or more, lists to see what, if any, percentage of the domains are common to both. Is there any performance impact to having domains present on more than one list?
More useful would be if there were any stats to show which adlists were responsible for blocking. In my instance I might have 2 million domains blocked, but if the only ones ever blocked are from the same lists Feek uses, it makes them kind of redundant.
 
mavity mavity eh! I had to google what you were on about! :D
Yes, yes, very funny. Who did that?! :D
More useful would be if there were any stats to show which adlists were responsible for blocking. In my instance I might have 2 million domains blocked, but if the only ones ever blocked are from the same lists Feek uses, it makes them kind of redundant.
But if all the lists get merged into a single one and duplicates eliminated, how would this be calculated?
 
fyi Fakes is already included in TIF Medium
I have two Pi-holes, I disabled fakes on one of them and there's a difference of over 20,000 blocked domains between the two.

Putting it back in, the numbers are the same.
 
I have two Pi-holes, I disabled fakes on one of them and there's a difference of over 20,000 blocked domains between the two.

Putting it back in, the numbers are the same.
Not great if the author doesn't know what's included in their lists :(
 
Looking for some help, I have been running PI hole for years and suddenly, last week my iPhone stopped having internet connectivity. Looking into Pi hole logs it had hit a client ratio limit, did a bit of Googling nothing obvious came up and nothing knowingly had changed from my side.

Fast forward to today, I thought I would take the opportunity to setup Ad Guard home on my Rasp Pi, purely for something different. To my surprise and frustration, the same thing happens. Bullet pointed the main points of my set up below and things I have tried
  • When my iPhones DNS is configured to my Pi Ad guard home 192.168.1.XX no internet connection - when changed back to 8..8.8.8 etc works fine
  • Rasp Pi can ping DNS servers without any issue
  • Internet provider is Vodafone - Ultra Hub ( don't get one they are ****)
  • I have tried disabling Private relay, limit IP tracking.
  • Upstream DNS are setup as Google and Cloudflare
Any ideas as it's annoying me immensely! I am fairly confident it's a client problem, not an Ad Guard or Pi hole problem.

EDIT Setting my router to look at AdGuard home for DNS's seems to work fine on all devices.
Coming back to this, I worked out what it was … Vodafone’s Ultrahub, moved providers and replaced the pile of **** router they provide and the problem instantly disappeared.
 
On the latest version of Pi-Hole, every so often when I try to log into the web interface I am told that the password is wrong and has to be set on first log in! :confused: It obviously isn't as I upgraded from v5 to v6 when it was released. I can sort it by SSH'ing into the Pi and running sudo pihole setpassword and then set it to the password I'm trying to use. Does anyone else get this? It's weird and a little annoying to have to keep doing this. Might post on the official forum to see if anyone else has suffered this.
 
Something in this list is blocking incoming phone calls on my iPhone on EE when I have WiFi calling enabled. I've gone through all the lists one by one and this is the one that's stopping it from working. I don't know how long it's been like it, but now I've disabled it, I can take incoming calls again.
What was showing as blocked in your logs at the time? If you can narrow it down it's definitely something to report so Gerd can remove it from the list (or I'm happy to do so for you if you don't have a Git account).
 
Note to self on portainer+pihole+cloudflare dns to quad9

Code:
A Note To Myself pihole+cloudflared on portainer on rpi4 64

choose a couple of ip's in your network that isn't in you dhcp router pool
Make a macvlan network in portainer.

Step 1
Add
network: pihole-macvlan-config
driver: macvlan
subnet: 192.168.0.0/24
gateway: 192.168.0.254
ip range: 192.168.0.32/29
enable manual container and access control
create the network


step 2
Add
network: pihole-macvlan
driver: macvlan
Click Creation
enable manual container attachment and access control
create the network

step 3

add stack
name: pihole-cloudflared
paste the following in web editor and deploy the stack

version: "3"

services:
  pihole:
    container_name: pihole
    image: pihole/pihole:latest
    hostname: pihole
    domainname: local
    cap_add:
      - NET_ADMIN
    environment:
      - TZ=Europe/London
      - WEBPASSWORD=password
      # Update the upstream DNS to point to the cloudflared macvlan IP
      - PIHOLE_DNS_=192.168.0.32#5053
    networks:
      pihole-macvlan:
        ipv4_address: 192.168.0.33
    volumes:
      - './pihole/etc-pihole:/etc/pihole'
      - './pihole/etc-dnsmasq.d:/etc/dnsmasq.d'
    restart: unless-stopped
    ports:
      - "53:53/tcp"
      - "53:53/udp"
      - "67:67/udp"
      - "80:80/tcp"

  cloudflared:
    container_name: cloudflared
    image: cloudflare/cloudflared:latest
    restart: unless-stopped
    command: "proxy-dns --address 192.168.0.32 --port 5053 --upstream https://9.9.9.9/dns-query --upstream https://149.112.112.112/dns-query"
    networks:
      pihole-macvlan:
        ipv4_address: 192.168.0.32

networks:
  pihole-macvlan:
    external: true
    
    
    
step 4
Login to the web app if everything is running
If you can't login goto the stack/pihole console connect and paste: pihole setpassword
192.168.0.33:80/admin
goto settings DNS and untick everything
then add a custom dns server 192.168.0.33#5053
add your flavour of blocking to lists/Subscribed lists group management/URL
press add blocklist
goto tools/update mavity/update
 
Back
Top Bottom