Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pi-Hole - New version leaking ??

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    21 Posts 3 Posters 3.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @bingo600
      last edited by johnpoz

      @bingo600 said in Pi-Hole - New version leaking ??:

      I'm a bit ?? about the Cloudflare part confusing him.

      hehehe - yeah, I see his point though - it wasn't really pihole asking cloudflare - it was just that the reverse of 127.0.0.1 (1.0.0.127) falls into the cloudflare public space..

      If it would of been doing it with the local address 10.0.0.42 vs loopback, it would of looked like someone else ip space 42.0.0.10..

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      bingo600B 1 Reply Last reply Reply Quote 0
      • bingo600B
        bingo600 @johnpoz
        last edited by bingo600

        @johnpoz

        To revert pihole

        pihole checkout master

        And when mentioning Cloudflare i also gave the correct ip on the same line.
        Pihole asking 1.0.0.127 - Cloudflare for RFC1918 arpa info

        Well maybe i'we spend to much time on IP's & whois 😲

        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

        pfSense+ 23.05.1 (ZFS)

        QOTOM-Q355G4 Quad Lan.
        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @bingo600
          last edited by

          @bingo600 Yeah I know how to revert - but thanks for posting that.. Did it actually make it to master already.. We can can go back to master?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          bingo600B 1 Reply Last reply Reply Quote 0
          • bingo600B
            bingo600 @johnpoz
            last edited by bingo600

            @johnpoz

            Naah i doubt it's in master yet.

            I would expect them to close the issue first ... Or is that me ???
            I would think it was better they did it.

            It's not in master yet

            de3ca1f3-faf2-4c0e-b664-1a79616c66ef-image.png

            /Bingo

            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

            pfSense+ 23.05.1 (ZFS)

            QOTOM-Q355G4 Quad Lan.
            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @bingo600
              last edited by johnpoz

              @bingo600 I hear yeah, and agree you did post the actual IP, etc. I got where you were coming from for sure. It was good info to provide - but possible the "cloudflare" mention got them thinking something else other than it was just reverse of 127.0.0.1

              If clouldflare actually listened for dns and used that 1.0.0.127 it could of been more confusing ;) But you are correct that IP does fall to their space - and it could be leveraged on the public internet for sure.

              edit: What is funny to think about is there has to be lots and lots of piholes out there - in the millions I would guess. And all of them started doing queries to 1.0.0.127? With this latest version - could of gotten the cloudflare guys scratching their heads. If they happen to notice the uptick in traffic to that IP.

              Or has this been happening before, I was not blocking dns traffic on that vlan - because the only thing on that vlan is my pihole and my ntp server.. Which I directly control and setup and trust they wouldn't be trying to do doh or use some other dns that I didn't setup, etc. So I wouldn't have noticed that traffic unless it had been brought up.. So was this happening before? Or just something that came out of the lastest update to pihole?

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              bingo600B 2 Replies Last reply Reply Quote 0
              • bingo600B
                bingo600 @johnpoz
                last edited by

                @johnpoz

                I think Cloudflare might have lots of "interesting" traffic going to that 1.0.0.127 ip.
                And that it was not a coincidence that they "just got" the /24 where "Reverse loopback was pointing".
                Prob. better them than many others ...

                /Bingo

                If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                pfSense+ 23.05.1 (ZFS)

                QOTOM-Q355G4 Quad Lan.
                CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @bingo600
                  last edited by johnpoz

                  @bingo600 yeah thinking the same thing - see the edit on my other post.

                  edit: To the ownership of that before nonused space - yeah prob lots of interesting traffic going to that space. 1.1.1.1 use to be a common IP to use in setting up stuff - cisco wireless even suggested if not defaulted to using that for what should of been just internal consumption, etc.

                  Bad practice to use non assigned space internally.. Just grabbing public space and trying to use it internally has always been bad idea, even if the space wasn't actually being used at the time.. Or you didn't think you would ever need to go to that space.. I can almost promise you there are many places using DOD space internally for their own use.. Since when would they ever need to actually go to those IPs ;)

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  bingo600B 1 Reply Last reply Reply Quote 0
                  • bingo600B
                    bingo600 @johnpoz
                    last edited by bingo600

                    @johnpoz said in Pi-Hole - New version leaking ??:

                    So was this happening before? Or just something that came out of the lastest update to pihole?

                    I have never seen pihole not behave nicely before.
                    But in our trade the "tinfoil hat" can sometimes be a bit "heavy" 😊
                    So since i knew pihole was only supposed to query my two binds's , i set up a "deny all others".

                    For me it started friday at 18:00 , and i had just updated pihole to latest at 17:32.

                    But at the same time Debian was also pulling in a few packets , so it was like hmmmm .....

                    Then i did a trace on pfSense , and saw the arpa adresses queried was consistant with my pihole "Top Clients" , and now it pointed at pihole.

                    I was 90% sure the Debian OS would not want to reverse lookup those ip's.
                    But i did have to check first, if i had installed bind on the pihole , and where resolv.conf was pointing (it was localhost).

                    When no bind , it could only have been pihole resolving for localhost.

                    On afterthought bind & dnsmasq would have been fighting for UDP 53 , and hopefully one of them would have "barfed" loudly in syslog.

                    Re: Cisco 1.1.1.1 captive portal .. Yupp would also be a good one to have.
                    And is has Cloudflare as owner too 😊

                    /Bingo

                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                    pfSense+ 23.05.1 (ZFS)

                    QOTOM-Q355G4 Quad Lan.
                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                    1 Reply Last reply Reply Quote 0
                    • bingo600B
                      bingo600 @johnpoz
                      last edited by bingo600

                      @johnpoz said in Pi-Hole - New version leaking ??:

                      I can almost promise you there are many places using DOD space internally for their own use.. Since when would they ever need to actually go to those IPs ;)

                      Murphy is going to bite your "behind" if you do that ...
                      Just wait ...

                      ISTR back in the oooleee days.
                      HP made a lot of teaching material , for their HP UX.
                      Where they used some of their "Public ip's" as setup examples.
                      I can't remember what Blok they has , it was an A.

                      But so many sysadms were using HP's ip addesses at their sites (100%) example , that HP refrained for using them (the ones used in examples) for public servers.

                      /Bingo

                      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                      pfSense+ 23.05.1 (ZFS)

                      QOTOM-Q355G4 Quad Lan.
                      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                      bingo600B 1 Reply Last reply Reply Quote 0
                      • bingo600B
                        bingo600 @bingo600
                        last edited by

                        @bingo600

                        PI-Hole released a new version yesterday.
                        Seems like the fix is working.

                        I had no "DENY's at 07.00" this morning

                        /Bingo

                        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                        pfSense+ 23.05.1 (ZFS)

                        QOTOM-Q355G4 Quad Lan.
                        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                        1 Reply Last reply Reply Quote 1
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.