mirror of
https://github.com/ben-grande/qusal.git
synced 2024-10-01 02:35:49 -04:00
102 lines
3.3 KiB
Markdown
102 lines
3.3 KiB
Markdown
# sys-pihole
|
|
|
|
Pi-hole DNS Sinkhole in Qubes OS.
|
|
|
|
## Table of Contents
|
|
|
|
* [Description](#description)
|
|
* [Installation](#installation)
|
|
* [Usage](#usage)
|
|
* [Credits](#credits)
|
|
|
|
## Description
|
|
|
|
The package will create a standalone qube "sys-pihole". It blocks
|
|
advertisements and internet trackers by providing a DNS sinkhole. It is a drop
|
|
in replacement for sys-firewall.
|
|
|
|
The qube will be attached to the "netvm" of the "default_netvm", in other
|
|
words, if you are using Qubes OS default setup, it will use "sys-net" as the
|
|
"netvm", else it will try to figure out what is your upstream link and attach
|
|
to it.
|
|
|
|
## Installation
|
|
|
|
Pi-Hole commits and tags are not signed by individuals, but as they are done
|
|
through the web interface, they have GitHub Web-Flow signature. This is the
|
|
best verification we can get for Pi-Hole. If you don't trust the hosting
|
|
provider however, don't install this package.
|
|
|
|
- Top:
|
|
```sh
|
|
qubesctl top.enable sys-pihole browser
|
|
qubesctl --targets=tpl-browser,sys-pihole,sys-pihole-browser state.apply
|
|
qubesctl top.disable sys-pihole browser
|
|
qubesctl state.apply sys-pihole.appmenus
|
|
```
|
|
|
|
- State:
|
|
<!-- pkg:begin:post-install -->
|
|
```sh
|
|
qubesctl state.apply sys-pihole.create
|
|
qubesctl --skip-dom0 --targets=tpl-browser state.apply browser.install
|
|
qubesctl --skip-dom0 --targets=sys-pihole state.apply sys-pihole.install
|
|
qubesctl --skip-dom0 --targets=sys-pihole-browser state.apply sys-pihole.configure-browser
|
|
qubesctl state.apply sys-pihole.appmenus
|
|
```
|
|
<!-- pkg:end:post-install -->
|
|
|
|
If you want to change the global preferences `updatevm` and `default_netvm`
|
|
and the per-qube preference `netvm` of all qubes from `sys-firewall` to
|
|
`sys-pihole`, run:
|
|
```sh
|
|
qubesctl state.apply sys-pihole.prefs
|
|
```
|
|
|
|
## Usage
|
|
|
|
Pi-hole will be installed with these default settings:
|
|
|
|
- The DNS provider is Quad9 (filtered, DNSSEC)
|
|
- Steven Black's Unified Hosts List is included
|
|
- Query logging is enabled to show everything.
|
|
|
|
You can change these settings via the admin interface:
|
|
- URL: http://localhost/admin
|
|
- default password: `UpSNQsy4`
|
|
|
|
You should change this password on first use by running in `sys-pihole`:
|
|
```sh
|
|
pihole -a -p
|
|
```
|
|
|
|
If you want to view statistics or manage the server through a GUI, open
|
|
`sys-pihole` or `sys-pihole-browser` desktop file `pihole-browser.desktop`
|
|
from Dom0. Addresses starting with `http` or `https` will be redirected
|
|
to `sys-pihole-browser`.
|
|
|
|
The browser separation from the server is to avoid browsing malicious sites
|
|
and exposing the browser to direct network on the same machine the server is
|
|
running. The browser qube is offline and only has access to the admin
|
|
interface. In other words, it has control over the server functions, if the
|
|
browser is compromised, it can compromise the server.
|
|
|
|
You can clone `sys-pihole`. If you do, you must manually change the IP address
|
|
of the clone.
|
|
|
|
If you want to combine Pi-Hole with Tor, then you should reconfigure your
|
|
netvm chaining (will break tor's client stream isolation) as such:
|
|
|
|
- qube -> sys-pihole -> Tor-gateway -> sys-firewall -> sys-net
|
|
|
|
If you encounter problems with DNS after having upstream netvm route changes,
|
|
restart Pi-Hole DNS from `sys-pihole`:
|
|
```sh
|
|
pihole restartdns
|
|
```
|
|
|
|
## Credits
|
|
|
|
- [Patrizio Tufarolo](https://blog.tufarolo.eu/how-to-configure-pihole-in-qubesos-proxyvm/)
|
|
- [Unman](https://github.com/unman/shaker/tree/main/pihole)
|