So DNS Black-holing is not new obviously, and what stands out as the go to solution? Pihole probably… and yeah thats what im using because hey its a popular choice. Though I am running it in docker. Combining that with Unbound (also in docker), and configuring outbound DNS to use DNS over TLS, with a few additional minor tweaks, but otherwise mostly standard configuration on both.

Wondering what you guys might be using, and if you are using Pihole and/or Unbound if you have any tips on configuration.

Happy to share my config if there is interest.

  • relic4322@lemmy.mlOP
    link
    fedilink
    arrow-up
    1
    ·
    7 hours ago

    sure thing, here you are

    services:
      pihole:
        container_name: pihole
        image: pihole/pihole:latest
        ports:
          # DNS Ports
          - "53:53/tcp"
          - "53:53/udp"
          # Default HTTP Port
          - "8082:80/tcp"
          # Default HTTPs Port. FTL will generate a self-signed certificate
          - "8443:443/tcp"
          # Uncomment the below if using Pi-hole as your DHCP Server
          #- "67:67/udp"
          # Uncomment the line below if you are using Pi-hole as your NTP server
          #- "123:123/udp"
        environment:
          # Set the appropriate timezone for your location from
          # https://en.wikipedia.org/wiki/List_of_tz_database_time_zones, e.g:
          TZ: 'America/New_York'
          # Set a password to access the web interface. Not setting one will result in a random password being assigned
          FTLCONF_webserver_api_password: 'false cat call cup'
          # If using Docker's default `bridge` network setting the dns listening mode should be set to 'all'
          FTLCONF_dns_listeningMode: 'all'
          FTLCONF_dns_upstreams: '127.0.0.1#5335' # Unbound
        # Volumes store your data between container upgrades
        volumes:
          # For persisting Pi-hole's databases and common configuration file
          - './etc-pihole:/etc/pihole'
          # Uncomment the below if you have custom dnsmasq config files that you want to persist. Not needed for most starting fresh with Pi-hole v6. If you're upgrading from v5 you and have used this directory before, you should keep it enabled for the first v6 container start to allow for a complete migration. It can be removed afterwards. Needs environment variable FTLCONF_misc_etc_dnsmasq_d: 'true'
          #- './etc-dnsmasq.d:/etc/dnsmasq.d'
        cap_add:
          # See https://github.com/pi-hole/docker-pi-hole#note-on-capabilities
          # Required if you are using Pi-hole as your DHCP server, else not needed
          - NET_ADMIN
          # Required if you are using Pi-hole as your NTP client to be able to set the host's system time
          - SYS_TIME
          # Optional, if Pi-hole should get some more processing time
          - SYS_NICE
        restart: unless-stopped
      unbound:
        container_name: unbound
        image: mvance/unbound:latest # Change to use 'mvance/unbound-rpi:latest' on raspberry pi
        # use pihole network stack
        network_mode: service:pihole
        volumes:
          # main config
          - ./unbound-config/unbound.conf:/opt/unbound/etc/unbound/unbound.conf:ro
          # custom config (unbound.conf.d/your-config.conf). unbound.conf includes these via wilcard include
          - ./unbound-config/unbound.conf.d:/opt/unbound/etc/unbound/unbound.conf.d:ro
          # log file
          - /srv/docker/pihole-unbound/unbound/etc-unbound/unbound.log:/opt/unbound/etc/unbound/unbound.log
        restart: unless-stopped
    

    I am relatively new to docker as well tbh. I did a lot with virtualization and a lot with linux and never bothered, but I totally get the use case now ha. just an FYI, if you use docker on Windows it runs slower as it has to leverage the Windows subsystem Linux (WSL) and a slightly different docker engine (forget which one). So linux is your best bet. If you do want to use a full VM I found Qemu to be the best option for least resource usage.