I’ve just set up my pihole and I’m considering the best way to configure it. Is it a good idea to set the default group to block (almost) all domains and then manually add trusted devices to another group with a “normal” block list? My use case is untrustworthy devices that I don’t want phoning home but which might change their IP address.

  • grehund@lemmy.world
    link
    fedilink
    arrow-up
    6
    ·
    3 days ago

    Untrusted devices should really be on their own VLAN. You will have much better control over them and their ability to reach out to the net, or gather info on your network and other devices. Some IoT devices have their DNS hardcoded, so they will ignore your Pihole anyway - you will need to redirect the DNS with outbound NAT to combat this.

  • LazerDickMcCheese@sh.itjust.works
    link
    fedilink
    arrow-up
    6
    ·
    3 days ago

    Not very practical. Find a few curated lists, then start blocking domains 1 by 1. Sounds inefficient, but it’s ironically faster in the long run than blocking the whole WWW then backpedaling

    • smeg@feddit.ukOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 days ago

      The trouble is that I don’t want an untrusted device to be able to call out at all, and I won’t know where it’s trying to reach until I connect it

          • Taleya@aussie.zone
            link
            fedilink
            English
            arrow-up
            3
            ·
            3 days ago

            most routers allow dual wireless networks now, you should be able to set one that’s exclusively for IoT. So you have MyWifi and WifiForThings.

            You can then set the WifiForThings to have no actual internet access. This will mean that any apps etc won’t work though, so be aware.

                • smeg@feddit.ukOP
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  2 days ago

                  Any idea how I go about setting up a second sub(?)network? I’ve got a load of old routers but I’ve always assumed they’re too locked down to be of any use.

              • Taleya@aussie.zone
                link
                fedilink
                English
                arrow-up
                2
                ·
                3 days ago

                You could explore openwrt if you were inclined - you should be able to set a static ip assignation for the device and then just block that off

                • smeg@feddit.ukOP
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  3 days ago

                  I’ve seen it mentioned a lot over the years, ultimately I think I’d just be making a rod for my own back by giving myself another device to support! I have considered it before but I just feel I’m going to spend a load of time tinkering every time I move house or change ISP, and paying for the privilege of buying my own hardware while I’m at it.

  • chickenf622@sh.itjust.works
    link
    fedilink
    arrow-up
    3
    ·
    3 days ago

    If you’re willing to deal with the massive pain in the ass that is, I don’t see a reason not to. Maybe write a note next to your computer to check the block list if something isn’t working right.

  • sbv@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    2
    ·
    3 days ago

    My use case is untrustworthy devices that I don’t want phoning home but which might change their IP address.

    If you’re using DHCP, you might be able to tell your router to assign a specific IP to the MAC address.

    Alternatively, if you have a few trusted devices on your network, can you add them to an allow list and deny traffic to every other IP?

    • smeg@feddit.ukOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 days ago

      If you’re using DHCP, you might be able to tell your router to assign a specific IP to the MAC address.

      Hopefully, seems pretty unlikely that the untrusted devices will bother spoofing their MAC addresses

      can you add them to an allow list and deny traffic to every other IP?

      Yeah that’s what I meant by manually adding trusted devices to a group with a normal block list

  • Darkassassin07
    link
    fedilink
    English
    arrow-up
    2
    ·
    3 days ago

    That’s not a terrible idea; though it means extra configuration everytime anything new connects to the network. Friends using your wifi for example.

    I just manually assign DHCP reservations for the MAC of each known device. Then they always have the same IP (without requiring static ip config on the devices themselves)

    For a bunch of blocklists: https://firebog.net/

    • smeg@feddit.ukOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 days ago

      Yeah that was going to be my plan, I think I can set that on my router but its UI isn’t particularly clear!

  • Reannlegge
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    3 days ago

    I tried that once, pihole blocks stuff coming in and not going out. Many “smart” devices will freak out if they can send things out to the internet but cannot receive things back.

    • Onomatopoeia@lemmy.cafe
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      3 days ago

      Pihole doesn’t block inbound traffic, it has nothing to do with it (as you mention in your later comment, DNS is about address lookups, not routing IP addresses).

      PiHole is a DNS server, all it will do is resolve addresses for clients that use it.

    • smeg@feddit.ukOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 days ago

      Does it? I don’t know much about networking but I thought for a device to even send something out it still needs to go through DNS first.

      • Reannlegge
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 days ago

        No it does not go through a DNS on the way out. A DNS, or domain name server, is like a phonebook so people can put in whatever.whereever and get the IP address back.