# sys-pihole Pi-hole DNS Sinkhole in Qubes OS. ## Table of Contents * [Description](#description) * [Installation](#installation) * [Usage](#usage) * [Credits](#credits) ## Description The package will create a standalone qube "sys-pihole". It blocks advertisements and internet trackers by providing a DNS sinkhole. It is a drop in replacement for sys-firewall. The qube will be attached to the "netvm" of the "default_netvm", in other words, if you are using Qubes OS default setup, it will use "sys-net" as the "netvm", else it will try to figure out what is your upstream link and attach to it. ## Installation Pi-Hole commits and tags are not signed by individuals, but as they are done through the web interface, they have GitHub Web-Flow signature. This is the best verification we can get for Pi-Hole. If you don't trust the hosting provider however, don't install this package. - Top: ```sh qubesctl top.enable sys-pihole browser qubesctl --targets=tpl-browser,sys-pihole-browser,sys-pihole state.apply qubesctl top.disable sys-pihole browser qubesctl state.apply sys-pihole.appmenus ``` - State: ```sh qubesctl state.apply sys-pihole.create qubesctl --skip-dom0 --targets=tpl-browser state.apply browser.install qubesctl --skip-dom0 --targets=sys-pihole state.apply sys-pihole.install qubesctl --skip-dom0 --targets=sys-pihole-browser state.apply sys-pihole.configure-browser qubesctl state.apply sys-pihole.appmenus ``` If you want to change the global preferences `updatevm` and `default_netvm` and the per-qube preference `netvm` of all qubes from `sys-firewall` to `sys-pihole`, run: ```sh qubesctl state.apply sys-pihole.prefs ``` ## Usage Pi-hole will be installed with these default settings: - The DNS provider is Quad9 (filtered, DNSSEC) - Steven Black's Unified Hosts List is included - Query logging is enabled to show everything. You can change these settings via the admin interface: - URL: http://localhost/admin - default password: `UpSNQsy4` You should change this password on first use by running in `sys-pihole`: ```sh pihole -a -p ``` If you want to view statistics or manage the server through a GUI, open `sys-pihole` or `sys-pihole-browser` desktop file `pihole-browser.desktop` from Dom0. Addresses starting with `http` or `https` will be redirected to `sys-pihole-browser`. The browser separation from the server is to avoid browsing malicious sites and exposing the browser to direct network on the same machine the server is running. The browser qube is offline and only has access to the admin interface. In other words, it has control over the server functions, if the browser is compromised, it can compromise the server. You can clone `sys-pihole`. If you do, you must manually change the IP address of the clone. If you want to combine Pi-Hole with Tor, then you should reconfigure your netvm chaining (will break tor's client stream isolation) as such: - qube -> sys-pihole -> Tor-gateway -> sys-firewall -> sys-net If you encounter problems with DNS after having upstream netvm route changes, restart Pi-Hole DNS from `sys-pihole`: ```sh pihole restartdns ``` ## Credits - [Patrizio Tufarolo](https://blog.tufarolo.eu/how-to-configure-pihole-in-qubesos-proxyvm/) - [Unman](https://github.com/unman/shaker/tree/main/pihole)