-
-
Notifications
You must be signed in to change notification settings - Fork 200
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
REPLY_ADDR4/6 has multiple purposes #1291
Comments
This is expected and designed behavior. In addition to the documentation, the code is even more explicit about that this should be the IP address of your Pi-hole: Lines 505 to 507 in 7387e81
The feature was mainly meant for Pi-holes running in virtualization containers (such as Pointing blocked IPs to a foreign server that is not identical with the Pi-hole itself does seem like a valid use case, however, let me still ask why you are running the Let's skip the feature request and immediately start trying this new feature using
Please change your config from
to
The new option allows for the following configurations (
I'd appreciate it if you could test this new feature as much as you can! |
I'm not sure what alternative you have in mind, but it needs to be a separate IP address since requests are generally going to be http/https, and I already have ports 80/443 in use for local web services. I suppose I could figure out some approach based on source address and route external requests to a pixelserv reverse proxy, but it was very easy to just install pixelserv-tls on my router using Entware and send all blocked traffic to that IP address. Thanks so much for implementing/prototyping a solution!! 😎 From a naming perspective I would suggest including something about blocking so maybe As a side comment, this text in the current description of IP blocking does not seem completely accurate given this configuration:
Now https spoofing is obviously an advanced (and possibly controversial) configuration, and I can see you may not want to mention that, but I hope the option is not removed regardless. The cert spoofing does not always work (it's increasingly common for sites to check their cert and so the handshake fails) but it still works often enough to be useful. And of course I'm not serving a block page but a one pixel transparent gif. If it would help I'd be happy to help with documentation, though I would need some hand-holding on how exactly.
Absolutely! I put this on a test server, and I am not getting the local host name resolved from localhost (the local server is "snack"). Other hosts in my local network are still resolved (e.g. "lunch"). If I do From the pihole host:
From a different host
I'm not quite sure why the IPv6 localhost returns no-data, might that be due to my blocking mode Otherwise it is working great! I'm going to make this change on my primary pihole, and will let you know if I see any oddities. Thanks again! 👍 |
Yeah, I'm not happy with my choice, either, but I'm also not yet convinced by yours. Let's throw a few things at the wall and see what sticks.
We'd appreciate this! The documentation is open source itself and hosted at https://github.com/pi-hole/docs - check out the directory The |
I did some brainstorming on the new variable name, and it's tricky because "IP" can refer to both the blocking mode and the reply address. I saw some other variables with a My other ideas were Pretty cool this helped find a bug to boot! |
If one is for
|
@dschaper great insight! I like your approach, good idea to rename Just to see how this looks, I copied your examples into @DL6ER's sample documentation:
I think that seems clear and reads well, those variable names work for me... |
It's not only for |
My only concern with |
Versions
Platform
Expected behavior
A clear and concise description of what you expected to happen.
Background: I use a server called pixelserv-tls that handles ad domains. It returns a transparent 1x1 (pixel) image, and it handles spoofing HTTPS. This server runs on my router using a distinct IP address (10.0.0.2) separate from DHCP and any other host. This allows ads to be replaced with a transparent gif, which hides them more effectively than blocking with other methods.
I specify the following in pihole-FTL.conf:
Expected behavior is that ads are forwarded to
REPLY_ADDR4
. Implied in this expectation is that DNS for the pihole server address continues to return the actual IP address.Actual behavior / bug
A clear and concise description of what the bug is.
The blocking mode functions as expected, but the pihole DNS returns its own IP address as 10.0.0.2!
This causes all kinds of problems, as you can expect, since clients are attempting to connect to a different (and largely non-functional) server.
Steps to reproduce
Steps to reproduce the behavior:
Debug Token
Screenshots
If applicable, add screenshots to help explain your problem.
N/A
Additional context
Add any other context about the problem here.
I first configured this in FTL v5.8, which I was excited to see included the option to forward to a specified address. Now that I see the current config documentation, I have the feeling that even though
REPLY_ADDR4/6
allows redirecting ad sites, there are other uses for the configuration that are most certainly not what I want.I wrote this as a bug since this it appears that
REPLY_ADDR4/6
is being used for two different purposes that, for me, are in conflict. If the current behavior is intentional I can resubmit this as a feature request. What I really want is the ability to configure the IP address returned forBLOCKINGMODE=IP-NODATA-AAAA
that is independent of the pihole server address.I copied the content below from a different issue, I think it explains why this worked in FTL v5.8 but not since. A change was introduced with FTL v5.9, emphasis added:
The text was updated successfully, but these errors were encountered: