shaker/pihole
2022-08-05 15:23:21 +00:00
..
change_netvm.sh Pi-hole - set up and packaging 2022-08-05 15:07:59 +00:00
create.sls Pi-hole - standalone 2022-08-05 12:13:46 +00:00
create.top Pi-hole - standalone 2022-08-05 12:13:46 +00:00
eth0 Pi-hole - set IP for eth0 and update 2022-08-05 12:18:39 +00:00
install.sls Pi-hole - set networking 2022-08-05 14:07:16 +00:00
install.top Pi-hole - set IP for eth0 and update 2022-08-05 12:18:39 +00:00
internalise.sh Pi-hole - set networking 2022-08-05 14:07:16 +00:00
README Pi-hole - credit 2022-08-05 15:23:21 +00:00
setupVars.conf Pi-hole - Unattended install with default settings 2022-08-05 13:00:01 +00:00
update_nft.sh Pi-hole - set networking 2022-08-05 14:07:16 +00:00

This is Pi-hole.
It blocks advertisements and internet trackers by providing a DNS sinkhole.

The package will create a new standalone qube, sys-pihole.
It is a drop in replacement for sys-firewall.
Sys-pihole is attached to sys-net.
If you have sys-firewall as the default netvm, this will be changed to sys-pihole.
sys-firewall will *not* be removed, so you can still use it for some qubes if you want.
To use sys-pihole simply change the netvm.
If you want to change all your qubes from sys-firewall to sys-pihole, a script is provided:
Run `sudo /srv/salt/pihole/change_netvm.sh` .

 If you want to use Tor, then you should reconfigure your system like this:
 qubes -> sys-pihole -> Tor-gateway -> sys-firewall -> sys-net

 You can clone sys-pihole, and use each in different places:
 qubes -> sys-pihole -> sys-net
 qubes -> sys-pihole -> Tor-gateway -> sys-firewall -> sys-net
 You will have to adjust the network settings for eth0 in the clone.

Pi-hole will be installed with these default settings:
 The DNS provider is Quad9 (filtered, DNSSEC)
 StevenBlack's Unified Hosts List is included
 The web interface is availble at http://localhost
 Query logging is enabled to show everything.

You can change these settings by logging in to the admin interface at http://localhost.
The default Admin Webpage login password is UpSNQsy4
You should change this on first use, by running:
`pihole -a -p`


The implementation is based on work by Patrizio Tufarolo, 
(https://blog.tufarolo.eu/how-to-configure-pihole-in-qubesos-proxyvm/ ), 
and updated for Qubes 4.1

  for i in `qvm-ls -O NAME,NETVM | awk '/ sys-firewall/{ print $1 }'`; do qvm-prefs $i netvm sys-pihole; done
  if [[ $(qubes-prefs default_netvm sys-firewall |grep sys-firewall ) ]]; then qubes-prefs default_netvm sys-pihole; fi