Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    forcing dns to pihole

    Scheduled Pinned Locked Moved NAT
    11 Posts 4 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GertjanG
      Gertjan @publictoiletbowl
      last edited by

      @publictoiletbowl

      The bad news : You need a firewall.
      The good news : pfSense is a firewall !

      So, add at the top a firewall rule on the LAN interface 192.168.80.0/24 that passes DNS traffic (destination port 53, TCP and UDP) to 30.30.30.2
      After this pass rule, add a second, block rule : it should block "from any" and "to any" port 53 traffic, using TCP or UDP.

      Now, everybody can contact 30.30.30.2, but can't contact 8.8.8.8 or 1.1.1.1 or even the pfSense resolver on 192.168.80.1 using destination port 53 (dono if that's good or bad, check this)

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      1 Reply Last reply Reply Quote 0
      • AndyRHA
        AndyRH
        last edited by

        A long time ago I forced all DNS requests go to PiHole. This link is how I did it. I believe this will answer your question.

        https://forum.netgate.com/topic/156453/pfsense-dns-redirect-to-local-dns-server?_=1663853296484

        o||||o
        7100-1u

        1 Reply Last reply Reply Quote 1
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @publictoiletbowl
          last edited by

          @publictoiletbowl said in forcing dns to pihole:

          pihole in different vlan 30.30.30.2

          Where did you come up with that IP scheme?

          30/8 is a DoD public network - why would you be using that on your local network?

          It is bad practice to just pick random public IP space and use it internally, I would highly suggest you stick to the rfc1918 space.

          You can either block access to unwanted dns, or you can redirect it. I personally prefer blocking.. Or your just as bad as the isps doing dns interception..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          AndyRHA P 2 Replies Last reply Reply Quote 0
          • AndyRHA
            AndyRH @johnpoz
            last edited by

            @johnpoz said in forcing dns to pihole:

            Or your just as bad as the isps doing dns interception..

            Maybe. Different motive.

            o||||o
            7100-1u

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @AndyRH
              last edited by johnpoz

              @andyrh said in forcing dns to pihole:

              Different motive.

              Is it? They don't want client using some other dns, so they can keep tabs, get info, change records. Optimize their network flow, so that traffic stays internal and lets their users share a cache vs every single user all talking to 8.8.8.8 asking for www.whateverdomain.tld

              How as that really any different than redirecting to your pihole. You have now everything logged, you can alter what is returned for some fqdn, you can block stuff you don't want too ;)

              Just because a isp is redirecting doesn't mean they are getting some monetary gain, while that might be true..

              While redirection in a home setup can be quite useful sure.. If something has 8.8.8.8 for example hard coded and uses that to validate it has internet, and you don't want it talking to 8.8.8.8 a redirection can let it think its talking to 8.8.8.8 so it knows it has internet.

              Do you make sure you tell all your guests or users of your network that their dns is being redirected? ;) if not how is that different than the isps doing it hehehe

              I much rather just blocking outside dns.. Its cleaner, is more up front, etc. Not saying I don't use redirection, but I use it a limited fashion, only for the the bs iot devices that keep hammering checking 8.8.8.8 every 2 seconds if they don't get an answer ;)

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              AndyRHA 1 Reply Last reply Reply Quote 0
              • AndyRHA
                AndyRH @johnpoz
                last edited by

                @johnpoz It is a little off subject of the original post, but a good question.
                I do tell people they will be forced through PiHole.
                I do it to prevent a rouge DNS from being used, the kids have caught bugs before.
                I do it to prevent Roku from reporting usage.
                I do it to reduce the bad sites things in my house can go to. (I also block IPs with pfSense)
                I do it so I can track where the kids go if I need it. Nothing like bringing out a log and asking "Why did you go here?"

                If you come to my house you now know what you get.

                o||||o
                7100-1u

                GertjanG johnpozJ 2 Replies Last reply Reply Quote 0
                • GertjanG
                  Gertjan @AndyRH
                  last edited by Gertjan

                  @johnpoz was questioning the usage of :

                  @johnpoz said in forcing dns to pihole:

                  pihole in different vlan 30.30.30.2

                  Not pihole, but 30.30.30.2 which is most probably an IP you are not 'allowed' to use, as it is sold to some one else.
                  This can create routing issues.

                  Btw : I was thinking : "Nice, that changes from x.x.x.x or a.b.c.d as people are hiding their RFC1918 these days."

                  For your "I do" list : most of us do exactly the same thing, I guess ( I do too ^^)

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @AndyRH
                    last edited by

                    @andyrh yeah a bit off topic ;)

                    But all good info on what others are doing. I run pihole myself, the eye candy is nice - and its very nice to see where iot devices are trying to go.. And sure the adblocking a huge plus, etc.

                    I just hand out pihole is all, and normally block other dns, especially doh.. I wouldn't have a problem with doh if it was user initiated, and agreed too. What rubs me the wrong way with it is applications and browsers adopting it on their own, without confirmation that is what the user is wanting to do..

                    If dhcp hands you 1.2.3.4 as your dns - that is what you should use.. I wouldn't have so much of a problem with fallback, if dhcp didn't hand you a dns for some reason, or that dns didn't answer.. But these devices that insist on trying to ask 8.8.8.8 drive me nuts ;)

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @Gertjan
                      last edited by

                      @gertjan said in forcing dns to pihole:

                      not 'allowed' to use

                      There is no IP police that will knock on your door and say hey, you can't use that IP range its owned by X.

                      But sure it can cause issues, what if you really wanted to go to some 30.x address on the public - highly unlikely sure, this is mostly the reason I believe people choose dod networks.. Its highly unlikely they will ever need to actually talk to a IP in that range on the public internet.

                      Technically you can use any network you want internally, as long as you don't expect to be to actually get to the real network using that on the public internet.

                      But it is bad practice.. There is really no reason to use public networks internally - rfc1918 has enough space.. If you run into a issue with overlap with say vpn clients or the like - just use a odd rfc1918 space internally, not the default 192.168.0 and .1 networks ;) 172.29.42/24 for example ;) Is highly unlikely to overlap with some starbucks your at trying to vpn home ;)

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • P
                        publictoiletbowl @johnpoz
                        last edited by

                        @johnpoz hello sir actually just an example i quoted 30/8 but my ip actual settings belong to the rfc1918 standard i use 172.16.0.x for my pihole ip and at the moment its working i added rules from my office lan destination to pihole address, anyway thanks to you and someone input hearing about my concerns.

                        thanks

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.