The World’s Greatest Pi-hole (and Unbound) Tutorial 2023

Welcome! In this article, I am going to detail for you what I consider to be the perfect Pi-hole setup instructions for 2023 (yes, I know – as of the writing of this article, it’s still 2022, but we’re close enough).

Video Version of this Tutorial

WTF is a Pi-hole?

First of all though – what is Pi-hole? Pi-hole is a network-wide ad blocker designed to be run on a Raspberry Pi single-board computer. When Pi-hole is installed, and your computers and devices are configured to use it for their DNS queries, ads and malware are blocked automatically in order to reduce the chances of being tracked, or having malware installed. This increases both security and privacy on your network overall.

“I cAn’T gEt a RaSpBeRrY pI!!”

Yes yes – supply chain issues make it extremely difficult to get your hands on a Raspberry Pi at the moment. But don’t let that stop you! You can also run Pi-Hole in a Docker container (for instance if you have a QNAP or Synology NAS with the Docker app installed), or any one of a number of other operating systems. Don’t let lack of Raspberry Pi availability stop you from doing this project – it’s extremely lightweight, and can be installed on a virtual machine with very little resources allocated.

Another excellent resource is to follow RPilocator on Twitter, or keep an eye on their web page which can send alerts when a Raspberry Pi comes into stock in your geographical location. I used RPilocator to get an 8GB Raspberry Pi 4 recently, and would have been able to get even MORE Raspberry Pi’s if not for stock limits. (Damn you Adafruit! <shakes fist>).

Let’s get started!

Here’s what you need to get started:

  • Raspberry Pi – I’m using a Raspberry Pi 2GB for this project, but even that version is total overkill – Pi-hole works great on older units as well if you have any Raspberry Pi 2’s or 3’s lying around. I wouldn’t recommend trying this on any of the Pi Zeros though since it’s much better to have this hard-wired. We won’t be using any of the wireless capabilities of the Pi.
  • A microSD card – Does not have to be a big card – 8GB is totally fine. When finished, Raspberry Pi OS + Pi-hole will end up taking up about 1.6GB on the microSD card. I would recommend a decent quality card though – don’t want anything to slow down those DNS lookups!
  • Raspberry Pi Imager – This software formats the microSD card and installs your Raspberry Pi OS of choice. It also allows you to set some of the Raspberry Pi defaults before you ever boot it up. Raspberry Pi Imager is available for download on Windows, macOS, and Ubuntu.

Raspberry Pi Imager

Download and run Raspberry Pi Imager on your desktop computer. You’ll also want to insert the microSD card into a microSD card reader. Take note of the drive letter of the microSD card – but no need to format it ahead of time as Raspberry Pi imager will do this for you.

Underneath ‘Operating System’ click ‘CHOOSE OS.’ Then click on Raspberry Pi OS (other) and choose ‘Raspberry Pi OS Lite (64-bit).’

We don’t need any sort of GUI or extra software here, so the Lite version of the Raspberry Pi OS is going to be just fine.

Next, click ‘CHOOSE STORAGE.’ You’ll want to select your microSD card.

MAKE SURE you don’t overwrite any drive that ISN’T the microSD card!! This is the only warning! If you pick the wrong drive and erase Grandma’s 90th birthday pictures, you will never get them back.

Finally, click the gear icon so that we can set some of the Raspberry Pi default settings.

Check the box next to ‘Set hostname:’ and pick a name. I’m going to call mine pihole3.local (since I already have 2 Pi-holes on my network).

Check the box next to ‘Enable SSH’ and then leave the radio button on ‘Use password authentication.’

Scroll down and set a username and password for your Pi-hole SSH. I’m going to leave ‘pi’ as the username, but set a strong password.

Optionally, you can scroll further down and check the box next to ‘Set locale settings’ and then pick your time zone and keyboard layout. When finished, click ‘SAVE.’

Finally, click ‘WRITE’ and your brand new Raspberry Pi OS will be written to the microSD card. This takes about 3-4 minutes. Once complete, remove the microSD card and insert it into your Raspberry Pi.

Boot your Pi-hole

Plug power into your Raspberry Pi to boot it up – the boot process should only take a minute or so. Other than the power cord, you should also have the Pi’s Ethernet port plugged into a network switch.

PRO TIP: I have found that when working with Raspberry Pi’s it’s nice to have an on/off switch. This product works great for being able to easily switch the power on and off of the Raspberry Pi without having to disconnect the USB-C or MicroUSB cable.

PISwitch (USB-C)

Once your Raspberry Pi has booted, it will likely grab an IP address from your network’s DHCP server – but how will you know which IP address it grabbed? There are two main ways to do this.

Option 1: You can check your DHCP lease table in your router. I have an EdgeRouter 4, so I log into the router and navigate to the Services –> DHCP tab. From there, I can drop down the ‘Actions’ box to view DHCP leases for my LAN network. If I sort by the most recent leases, I can see Hostname ‘pihole3’ (exactly as I set in the Raspberry Pi Imager above). This tells me that the ‘pihole3’ host received 192.168.200.182 from the DHCP server.

Finding the IP address of my Pi-hole upon first boot.

Now – if you don’t have an EdgeRouter, whichever device you DO have that provides DHCP leases to your client devices will likely have a similar way to view these leases and figure out which IP address your Pi-hole has been given. If you’re using UniFi or a Dream Machine / Dream Router, you can likely find this information in the ‘Clients’ section.

Option 2: If you don’t have any way to check DHCP leases in your DHCP server, you can always hook up a keyboard and monitor to the Raspberry Pi, log in, and then run:

ip a

To get the IP address information.

SSH into the Pi

Once you have your Raspberry Pi’s IP address, use SSH to log in. On Windows, you can SSH from the command prompt by typing:

ssh pi@192.168.200.182

Where ‘pi’ is your username, and 192.168.200.182 is the IP address of your Raspberry Pi.

Alternatively, you can use a program such as PuTTY to log in via SSH. Just download and run PuTTY and then type your IP address in the Host Name field and click ‘Open.’

Use PuTTY to log in.

Finally, on macOS, open ‘Terminal’ and then log in with:

ssh pi@192.168.200.182

Just like you would with the Windows command prompt.

Log in with username ‘pi’ and the password you set in the Raspberry Pi Imager.

Update Raspberry Pi OS

The first thing we want to do is update all packages. To do so, run this command:

sudo apt update && sudo apt upgrade -y

Updating the Pi takes 4-5 minutes.

Set a Static IP Address

We want to ensure that the IP address of the Raspbery Pi never changes, so we need to set a static IP. There are two ways to do this.

Option 1 – Set a DHCP reservation

A DHCP reservation is basically just a way for us to tell the DHCP server to only ever give a specific IP address to the MAC address of our Raspberry Pi. In my EdgeRouter 4, this is pretty simple – I just find the DHCP lease for the Raspberry Pi, and then click the ‘Map Static IP’ button followed by ‘Save.’ Once I have done that, the DHCP server will only ever give out the IP address I picked to the Raspberry Pi. In the settings of the Pi itself, it’s still set to obtain an IP address from DHCP, but my DHCP server knows that it should only ever give the Pi a specific IP…which essentially makes it static.

Option 2 – Set a Static IP on the Raspberry Pi

The other option is to set an IP address statically on the Pi itself – this is the method that I prefer. Open up the dhcpcd.conf file by typing:

sudo nano -w /etc/dhcpcd.conf

And then scroll down until you find the section called ‘Example Static IP configuration:’

This section is commented out by default, so you will need to uncomment some lines and input your own static IP address and network information. For my Pi-hole, I am going to want to use the following information:

Static IP: 192.168.200.52/24
Gateway: 192.168.200.1
DNS Servers: 192.168.200.1, 1.1.1.1

In my case the configuration will look like this:

# Example static IP configuration:
interface eth0
static ip_address=192.168.200.52/24
# static ip6_address=fd51:42f8:caae:d92e::ff/64
static routers=192.168.200.1
static domain_name_servers=192.168.200.1 1.1.1.1

Interface eth0 was uncommented, and then I set a static IPv4 IP address of 192.168.200.52 (don’t use my network subnet information – substitute it with your own). Then I set ‘static routers’ to my gateway IP and set two DNS servers (I removed the IPv6 DNS server).

Once you’re happy with your configuration, press CTRL+X to exit followed by ‘Y’ and ENTER to save.

Now reboot the Pi to take advantage of the new network settings:

sudo reboot

Install Pi-hole

Once you’ve set your Pi-hole’s networking to a static IP address and rebooted (or if you’ve done a DHCP reservation), it’s time to install Pi-hole. Remember to re-connect to the NEW IP address if you set it statically on the Raspberry Pi.

Run this command to install Pi-hole:

curl -sSL https://install.pi-hole.net | bash

This will fire off the installation wizard. When the screen below appears, press ENTER (OK).

Pi-hole installation wizard – press OK.

The next screen recommends that you DONATE to help the Pi-hole project – I recommend it as well! Press ENTER (OK).

Donate to this worth project! Press OK.

Next, the wizard gives us a warning about using a static IP address – we’ve already covered this, to move the cursor over to Continue and press ENTER.

Choose Continue and press OK.

On this screen, double-check that the IP address shown is the IP address that you want to use for the Pi-hole and then press ENTER (select Yes – Set static IP using current values).

Choose Yes and press OK.

NOTE: If you set a specific static IP, but that is not displayed on this screen, you probably forgot to reboot the Raspberry Pi. Cancel out – reboot, and then re-start the installation wizard.

The next screen is another warning about networking – they REALLY REALLY want you to have a static IP address. Press ENTER (OK).

Press OK.

Now we are going to pick an upstream DNS provider. This is the DNS server that the Pi-hole will use to do DNS lookups (initial lookups – then they get cached). Since we’re going to be installing Unbound, we’ll be making our own DNS lookups to the primary root domain servers on the Internet, so for now, it’s fine to pick any one of these – I’ll be using Cloudflare (1.1.1.1) for this tutorial.

Choose an upstream DNS provider and press OK. I will be choosing Cloudflare, but we will be changing this setting later in the tutorial.

DNS Server Selection – You don’t HAVE to use Unbound to perform your own lookups to the Internet’s primary root domain servers – you an absolutely skip that part of this tutorial and simply pick one of the DNS servers on this list. BUT – if you do choose one of these DNS servers, you should understand that not all DNS servers are equal – some of them simply do any lookup that you request, and others do some level of content filtering. There’s a great breakdown of the various DNS servers in this list (plus some more options), and which ones do phishing/malware/adult content filtering HERE.

Next we’re asked if we want to use the default included block list – this block list is a list of domains that Pi-hole is going to block for us. This list is perfectly fine, and will block a significant chunk of suspect sites – however, there are many block lists available, and you’ll likely want to add some more – we’ll cover this later in the tutorial. Choose YES and press ENTER.

Choose Yes and press OK.

Next we’re asked if we want to install the Admin Web Interface, which of course we do! Select YES and press ENTER.

Choose Yes and press OK.

Another notice about the web server – just choose YES and press ENTER.

Choose Yes and press OK.

Next, we’re asked if we want to enable query logging. Typically, you will want to say Yes here, but if you’re super security conscious and you don’t want any of your DNS lookups logged, you can also choose No.

Choose Yes and press OK.

Now we’re asked about the level of privacy – you can visit the website listed for more information. For this tutorial, we’re going to select ‘Show everything’ and press Continue.

Leave this selected on Show everything and press Continue.

That’s it! After this step, Pi-hole has all of the information it needs to get started. You’ll see it run through a bunch of scripts in the CLI (takes about 2 minutes), and will eventually be brought to this screen:

Press OK to finish the installation.

This final screen is giving a summary of our install and also shows us our Admin Webpage login password. You don’t need to copy this down – we’re going to change that password in the next step.

Change the Pi-hole Web GUI Admin Password

You’ll want to set a nice strong password for the Pi-hole admin GUI – to do that, run this command:

pihole -a -p

This will have you input a password and then confirm it.

Log into the Pi-hole GUI

We’re now ready to log into the GUI for the first time! Open up a browser and input the IP address followed by /admin in this format:

http://192.168.200.52/admin

(Substitute my IP address with your own). Note also that this is HTTP and not HTTPS.

Pi-hole Admin GUI login screen – enter your Admin password and click ‘Log in.’

Enter the Admin password that you set in the previous step and click ‘Log in.’ Upon logging in, we’re presented with the Pi-hole Dashboard – let’s take a look around!

Pi-hole dashboard.

We’re not using this Pi-hole yet, so we don’t have a ton of useful statistics…those will start to populate as soon as we start using this server for our DNS queries.

Down the left-hand side of the dashboard are our menu options. The 4 colored blocks across the top are some statistics. The blue box is the total number of queries Pi-hole has processed. The red box is how many of those queries matched FQDN’s on the block list and were blocked. The yellow box is a percentage of blocked requests (red box divided into the blue box). Finally the green box is the number of domains that are on the block lists. Since we only have a single block list for now, we can see we have about 158,000 domains that will be blocked by this Pi-hole.

Going down the left-hand menu – I won’t cover every single setting, but I will point out some of the more important ones.

Query Log – this shows you the Pi-hole’s history of DNS lookups in descending order (most recent lookups at the top). You can see all domain statuses – both passed and blocked domains. For passed domains, there is a button to blacklist, and for blocked domains, there is a button to whitelist.

Long-Term Data – much like the Query Log, this section gives you a deeper dive look into the Pi-hole’s DNS history and lets you filter into that data in great detail.

Groups and Clients – some pretty interesting functionality here in Groups and Clients – we’re not going to dig into this section for this tutorial, but you can use this section if you wanted to block DNS queries for all devices except for devices in a specific group. Or, if you wanted to ONLY block DNS queries for devices in a specific group – you can get very granular with which clients and groups use which block lists as well.

Domains – this section allows you to specifically add domains to a blacklist or whitelist. For instance, if there are specific stores where you like to shop online, and those stores are being blocked, you can whitelist them here.

Some Blocking Resources – if you’re interested in taking a deeper dive into what block lists you can add to Pi-hole, here are some good resources:

The Best Pi-hole Blocklists – Avoidthehack.com – This article does an excellent job of explaining the different types of block lists, and then lists a number of resources for lists in different categories of blocking.

The Firebog (blocklist collection) – This blocklist resource does an excellent job of providing sources of blocklists in multiple categories such as Suspicious, Advertising, Tracking & Telemetry, & Malicious. It further breaks those lists down into green links and blue links – the green links are the ones least likely to interfere with normal Internet activity. A good rule of thumb is to add one or two of these lists from each category to your Pi-hole.

One more thing to point out – there is a list of commonly whitelisted domains over at Pi-hole.net. If you’re having issues with a particular website or service (say Spotify or Xbox functionality for instance), go see if there are resources for whitelisting that particular service on that page – it may save you a lot of headache.

Adlists – by default, we have the default block list which is well maintained and blocks plenty of sites without breaking normal Internet functionality. That being said, you can get VERY detailed in what you’re blocking – malicious sites, adult content, ad sites, tracking & telemetry sites – there are specific public block lists for each of these types of content, but keep in mind that the MORE sites you add to your block lists, the greater chance you have of breaking something. Then you’ll have your family complaining to you about ‘the Internet’ not working, and you’ll have to deal with it. The trick is to find the happy medium that does plenty of blocking without affecting the user experience.

Since we’re taking a look at various block lists, let’s go ahead and add a few from The Firebog page. Copy the first link under ‘Suspicious Lists’ and paste it into the ‘Address:’ field – then click Add.

Copy/paste a block list into Adlist group management, and click Add.

Repeat this for as many block lists as you want – for this tutorial, I’m going to copy/paste the first two green URLs from each of the Firebog sections. Once completed, we need to tell Pi-hole to import these lists.

Navigate to Tools –> Update Gravity and then click the ‘Update’ button. This will comb through all of the block lists and add the blocked URLs to the Pi-hole database. Once complete, you’ll see a green ‘Success’ banner at the top of the screen.

Update Gravity to refresh your list of blocked domains.

Now click on Dashboard from the left-hand menu – notice anything different? Our ‘Domains on Adlists’ jumped from about 158k to 221k blocked domains.

More blocked domains now!

Let’s go back to our tour of the left-hand menu!

Disable Blocking – this lets you stop Pi-hole from blocking any domains for various amounts of time (or indefinitely). Very useful in troubleshooting – if something isn’t working in your network or Internet browsing, try disabling blocking for 5 minutes and see if that fixes it. If it DOES fix it, then you know there are probably some domains you’re going to have to whitelist.

One extra tip since we’re talking about disabling blocking – logging into the Pi-hole Admin GUI to disable blocking can be cumbersome! I find myself doing this on a fairly regular basis (once or twice a week), and I have multiple Pi-holes running for redundancy! So – it can take some time. To shorten up the time it takes to disable blocking, you can do some scripting. It all starts with this URL:

http://192.168.200.52/admin/api.php?disable=300&auth=PWHASH

Let’s break this down – the IP address is the IP address of your Pi-hole (don’t use mine for this). The ‘disable=300’ means disable for 300 seconds (5 minutes), and the auth=PWHASH is the hashed value of WEBPASSWORD which can be found in the /etc/pihole/setupVars.conf file. You can see it if you log into your Pi-hole with SSH and run the command:

cat /etc/pihole/setupVars.conf |grep WEBPASSWORD

This will show you your hashed password – copy and paste everything after the = and append it to the end of the URL above.

How to find your hashed password value

Pro tip – in PuTTY, you can select text and then do CTRL+INS to copy it to your clipboard.

If you now add that hashed password to the end of the URL string above and then pop it into a browser, this will authenticate to your Pi-hole and disable blocking for 5 minutes. You can now use that URL in scripts for Home Assistant, create a shortcut on your desktop that runs that URL, or do what I did and create a ‘Disable Pi-hole’ button on your Stream Deck!

Disable Pi-hole button on Stream Deck!

In the case of my Stream Deck button, it runs the disable URL for my first Pi-hole, pauses 1 second, and then runs the disable URL for my 2nd Pi-hole. Works great!

Local DNS – This allows you to create your own local DNS entries – very useful for using FQDNs with internal servers and devices.

Tools – yea…tools. Check ’em out.

Settings

Last but certainly not least, we have our Settings. This demands its own section of this tutorial. We’ll start with the ‘System’ tab – this shows us various info about the Pi-hole – software versions, resource utilization, etc. We also have the option of controlling DNS and the server itself using the buttons at the bottom.

Settings –> System

The DNS tab shows us which upstream providers we’re using for non-cached DNS queries. Since I picked Cloudflare during the setup wizard, we can see Cloudflare is my primary and secondary lookup source. You can also play around with the primary and secondary checkboxes here to have different DNS query sources – for instance, Cloudflare + Google. If you’re doing this full tutorial and installing Unbound, ignore this for now – we’ll be changing this shortly.

One other thing to point out on the DNS tab – on the right hand side is the ‘Interface settings’ section. By default, the Pi-hole is configured to ONLY respond to DNS queries from your local LAN. But in my case, I have 3 separate VLANs in my home network – LAN, Guests, and IoT Devices. I want all of them to be able to use the Pi-hole, so we need to change that setting to allow requests from other subnets. In my case, I’m going to choose the ‘Respond only on interface eth0’ which basically allows any DNS requests that come into the network port.

Allow DNS queries from other subnets.

Be sure to hit Save at the bottom of the screen when you make this change!

DHCP tab – the Pi-hole can be used as a DHCP server if you want, but this is beyond the scope of this tutorial.

API / Web Interface tab – this tab allows you to filter out some specific domains you don’t want to be shown in the dashboard stats. It also lets you change the look and feel of the Admin GUI! Multiple light and dark themes, plus the Star Trek LCARS theme!

Star Trek LCARS theme for the Pi-hole Admin GUI!

The Privacy tab lets you change which domains are displayed or hidden – this was an option in the initial setup wizard – if you want to change these settings…here ya go.

Finally, the Teleporter tab lets you backup and restore your Pi-hole settings. This is incredibly useful for keeping settings in sync across multiple Pi-holes. Once you get your whitelists/blacklists, block lists, and groups in place, you can just back up all of that data and restore it onto your 2nd Pi-hole server.

Configure Devices to use the Pi-hole

Awesome – we’ve got our Pi-hole all up and running, and configured to block ads and other bad guys. But – right now, nothing is using this Pi-hole! Let’s fix that – there are two main ways to configure your devices to use the Pi-hole – manually, and via DHCP.

Manual device configuration – to configure your devices to use the Pi-hole manually, you need to open up your device’s network settings and set your DNS server to be the IP address of the Pi-hole (or Pi-holes if you’re setting up multiple for redundancy).

In Windows 11, you’ll need to go to Network & Internet settings, click on ‘Change adapter options’ (or Properties of the current adapter). Then ‘Edit’ IP settings.

Windows 11 – Edit IP settings

You’ll have to set your IP address for your device to ‘Manual’ and then give it an IP, gateway, and input the IP address of your Pi-hole for ‘Preferred DNS.’ If you have multiple Pi-holes, enter the 2nd one as the ‘Alternate DNS.’

Modify DNS settings manually.

This however means you have to set an IP address statically for your Windows 11 device. Alternatively, you can go to Control Panel –> Network and Internet –> Network Connections, find your NIC, right-click on it, choose Properties, double-click on Internet Protocol Version 4 (TCP/IPv4), and then leave ‘Obtain an IP address automatically’ set at the top, but choose ‘Use the following DNS server addresses:’ down below and then set the IP address of your primary and secondary Pi-hole servers.

Windows settings with a DHCP’d IP address, but manual DNS server settings.

Holy crap what a PITA. Now imagine going around and doing this for all of your devices – no thank you.

The far superior method is to use your DHCP server to set these Pi-hole settings. This way, when devices connect to your network and request IP address information, they’re automatically provided with your Pi-hole DNS servers. This method is going to vary depending on your DHCP server, but it’s usually going to be similar to the way I have mine set in the EdgeRouter 4.

Set the Pi-hole IP address as the primary DNS server for your DHCP leases. Add a 2nd Pi-hole as the secondary DNS if you have one.

In the screenshot above, you can see that I added the IP address of my Pi-hole server (192.168.200.52) as the Primary DNS server that my clients will receive when they connect to my network. I have also added a 2nd Pi-hole server IP as DNS 2 for backup purposes.

If you don’t have a second Pi-hole, you can also populate DNS 2 with a public DNS server such as Cloudflare (1.1.1.1). If you go through the list of available upstream DNS providers that Pi-hole offers (Settings –> DNS), there are some that provide similar content filtering to Pi-hole that would work as a decent secondary DNS server for your clients.

Once you’ve made this change, you should shortly start seeing stats hit the Pi-hole dashboard:

Stuff starting to get blocked!

Unbound Setup

OK – so we have our Pi-hole working and blocking stuff – excellent! But let’s take this a step further. Right now, when we look up a website, if the Pi-hole doesn’t know where to find it, it forwards that request to an upstream DNS provider (as we have it configured right now, that upstream provider is Cloudflare). Those who are more security-conscious may not want some random 3rd party knowing which domains they’re surfing to or looking up (even though Cloudflare doesn’t keep logs of DNS queries).

For those folks, you can install Unbound on your Pi-hole. Unbound is a service that directly queries the DNS root domain servers for any uncached FQDN requests. First we’ll need to install Unbound, and then we’ll configure it for use with our Pi-hole.

To install Unbound, SSH into the Pi-hole and run this command:

sudo apt install unbound -y

This should only take about 10-15 seconds. Next, we need to add a whole wall of text to an Unbound configuration file – create this file by running this command to edit it:

sudo nano -w /etc/unbound/unbound.conf.d/pi-hole.conf

Copy all of this text below – you can also find this text in the Pi-hole documentation HERE.

server:
# If no logfile is specified, syslog is used
# logfile: "/var/log/unbound/unbound.log"
verbosity: 0

interface: 127.0.0.1
port: 5335
do-ip4: yes
do-udp: yes
do-tcp: yes

# May be set to yes if you have IPv6 connectivity
do-ip6: no

# You want to leave this to no unless you have *native* IPv6. With 6to4 and
# Terredo tunnels your web browser should favor IPv4 for the same reasons
prefer-ip6: no

# Use this only when you downloaded the list of primary root servers!
# If you use the default dns-root-data package, unbound will find it automatically
#root-hints: "/var/lib/unbound/root.hints"

# Trust glue only if it is within the server's authority
harden-glue: yes

# Require DNSSEC data for trust-anchored zones, if such data is absent, the zone becomes BOGUS
harden-dnssec-stripped: yes

# Don't use Capitalization randomization as it known to cause DNSSEC issues sometimes
# see https://discourse.pi-hole.net/t/unbound-stubby-or-dnscrypt-proxy/9378 for further details
use-caps-for-id: no

# Reduce EDNS reassembly buffer size.
# IP fragmentation is unreliable on the Internet today, and can cause
# transmission failures when large DNS messages are sent via UDP. Even
# when fragmentation does work, it may not be secure; it is theoretically
# possible to spoof parts of a fragmented DNS message, without easy
# detection at the receiving end. Recently, there was an excellent study
# >>> Defragmenting DNS - Determining the optimal maximum UDP response size for DNS <<<
# by Axel Koolhaas, and Tjeerd Slokker (https://indico.dns-oarc.net/event/36/contributions/776/)
# in collaboration with NLnet Labs explored DNS using real world data from the
# the RIPE Atlas probes and the researchers suggested different values for
# IPv4 and IPv6 and in different scenarios. They advise that servers should
# be configured to limit DNS messages sent over UDP to a size that will not
# trigger fragmentation on typical network links. DNS servers can switch
# from UDP to TCP when a DNS response is too big to fit in this limited
# buffer size. This value has also been suggested in DNS Flag Day 2020.
edns-buffer-size: 1232

# Perform prefetching of close to expired message cache entries
# This only applies to domains that have been frequently queried
prefetch: yes

# One thread should be sufficient, can be increased on beefy machines. In reality for most users running on small networks or on a single machine, it should be unnecessary to seek performance enhancement by increasing num-threads above 1.
num-threads: 1

# Ensure kernel buffer is large enough to not lose messages in traffic spikes
so-rcvbuf: 1m

# Ensure privacy of local IP ranges
private-address: 192.168.0.0/16
private-address: 169.254.0.0/16
private-address: 172.16.0.0/12
private-address: 10.0.0.0/8
private-address: fd00::/8
private-address: fe80::/10

Once you’ve pasted in that text (use SHIFT+INS to paste into PuTTY), hit CTRL+X followed by Y and ENTER to save and exit. Then we’ll restart the Unbound service:

sudo service unbound restart

If you then run:

sudo service unbound status

You should see that the Unbound service is active (running).

Unbound service is running.

Note in the Unbound config that we pasted in a few steps ago that we’re running Unbound on IP 127.0.0.1 (localhost) and port 5335. In order to test that Unbound is working, we can send a DNS query to that IP and port:

dig crosstalksolutions.com @127.0.0.1 -p 5335

Performing a DNS lookup to Unbound.

In this case, we can see that the status is NOERROR and we received an IP address for our query. Looks like we’re ready to use Unbound with Pi-hole!

Using Unbound with Pi-hole

Log into the Pi-hole Admin GUI and navigate to Settings –> DNS.

Uncheck the boxes next to Cloudflare (or whichever DNS provider you picked during the install wizard), and then add a new custom entry for Unbound:

127.0.0.1#5335
Clear existing upstream DNS servers and add a new custom entry.

Click ‘Save’ at the bottom of this screen. All done! Treat yourself to a beer.

Testing Ad Blocking

If you want to test out Ad Blocking, there’s a great tool for this HERE. Open up that page, and you should be around 90% blocking with this tutorial:

Ad blocking test results.

By contrast, if I bypass my Pi-hole and just use 8.8.8.8 (Google) as my DNS resolver, I get 61%. Yikes! Let’s get that Pi-hole back on ASAP!

Ad blocking results with 8.8.8.8.

Updating the Pi-hole

Every so often, you’ll want to update Pi-hole. To do so, simply log into the Pi-hole via SSH and run this command:

sudo pihole -up

Firewall considerations

This is beyond the scope of this tutorial, but at least worth mentioning. If you have kids that being blocked from stuff they’re searching for, or if you’re running Pi-hole in your business and your employees want to bypass your blocking attempts, by default, there’s nothing stopping them from manually adjusting their DNS settings to use a non-Pi-hole DNS server.

To help with this, you’ll need to set up some firewall rules. For instance, you may create a rule that allows DNS services on port 53 for the IP addresses of your Pi-holes, but BLOCKS port 53 everywhere else. This way – even if someone is savvy enough to manually bypass their DNS settings to get around your Pi-hole, they still won’t be able to resolve anything. Haha…gotcha sucker.

Thank you!

Thanks so much for using this Pi-hole tutorial – I will update it with any corrections or updates to the installation instructions.

Remember to DONATE to the Pi-hole project if you are getting a lot out of this ad blocking server!

If you would like to support Crosstalk Solutions, you can BUY ME A BEER HERE! Or check out some of the cool stuff we have in our Crosstalk merch store!

Comments 90

  1. Great Tutorial.
    May want to include the instructions to expand the usable space on the memory card.

    sudo raspi-config
    Advanced Options
    Expand Filesystem
    Ok / Exit out – Reboot when prompted

    1. Post
      Author

      I’m pretty sure that happens automatically now – I did a before/after comparison of df -h on my Pi, and it was the exact same output before and after running the ‘Expand file system’ command…pretty sure you haven’t had to do that for a while now.

      1. I don’t know about the Rasberry Pi, but I just set up a Banana Pi M5 (running the 5/22 version of Rasbian) using this tutorial and ran into the issue, so it hasn’t been patched there.

        Otherwise, this was a great guide and made the whole process incredibly easy. Thanks!

  2. Very useful, especially the Blocking Resources. I did block too much at the first place and disable pihole for a while giving more time to tune it. Your video just came at the right moment for me. Now better understanding of pihole blocking list & tune it sucessfully. Thank for the video.

  3. Hello Chris! thanks for an amazing tutorial, I just followed it with pinhole running in a docker container. Please maybe make a short video with firewall rules for pi hole for your complete Unifi setup playlist. I have your exact setup and would love to see a video that would help me with setting it up correctly. I’m sure many home users who have teenage kids would appreciate it.

    1. Agree, Chris it would be great if you could do a follow up to how to setup Unify firewalls to block ‘other’ DNS and point / allow only the use of the Pi-Hole. Is this something you’re planning on as I didn’t see it covered in your UDMP setup series either ? Thanks

  4. Excellent tutorial. Installation went without hitch, thanks to detailed instructions. Works as intended.

    One thing though, this is not blocking youtube ads on smart tv and this is the only reason I wanted to add pihole to my network. Is there any other solution for blocking ads on smart tv?

  5. Thanks for the tutorial. Unbound didn’t work for me.

    I’m only getting SERVERFAIL. Did everything that is in your tutorial. And a little more.

    Created a directory to unbound.log. But the thing is it is not recording any data. I’m honestly at lost here.

    https://pastebin.com/nEcmMqa6

    the log directory also has the appropriate ownership:

    https://pastebin.com/nEcmMqa6

    When I added a second DNS address on my OpenWRT (1.1.1.1) the percentage of blocked IPs dropped to 48% from 76%

    Is that normal?

    1. I too am having an issue with unbound. Service is running and I can dig a dns entry using 127.0.0.1 on port 5335 on the pihole server. However, when I set it in the admin interface then run a dns query from a network machine it fails.

      1. I had to comment out the unbound entry in resolvconf.conf:
        #dnsmasq_resolv=/var/run/dnsmasq/resolv.conf
        pdnsd_conf=/etc/pdnsd.conf
        #unbound_conf=/etc/unbound/unbound.conf.d/resolvconf_resolvers.conf

        The file it was creating in the unbound folder was creating a dns forward to my UDM-PRO, which, was pointing to the pihole causing a loop.

      2. Hi i just install im just fowwling the guide
        i have same problem with unbound get this error
        DNSMASQ_WARN Warning in dnsmasq core:
        Maximum number of concurrent DNS queries reached (max: 150)
        dont know what to do if i change dns to google and cloudflar it work

    2. I get similar results. While browsing to http://www.cisco.com works from chrome on a windows machine, I see the following when dns points to unbound port:

      nslookup wwww.cisco.com
      Server: pi.hole
      Address: 192.168.423.887 🙂

      *** pi.hole can’t find wwww.cisco.com: Non-existent domain

      But dig on the pi-hole machine gets:
      dig http://www.cisco.com

      ; <> DiG 9.11.5-P4-5.1+deb10u8-Raspbian <> http://www.cisco.com
      ;; global options: +cmd
      ;; Got answer:
      ;; ->>HEADER< server 8.8.8.8
      Default Server: dns.google
      Address: 8.8.8.8

      > http://www.cisco.com
      Server: dns.google
      Address: 8.8.8.8

      Non-authoritative answer:
      Name: e2867.dsca.akamaiedge.net
      Addresses: 2600:1408:c400:38e::b33
      2600:1408:c400:38d::b33
      104.106.160.119
      Aliases: http://www.cisco.com
      http://www.cisco.com.akadns.net
      wwwds.cisco.com.edgekey.net
      wwwds.cisco.com.edgekey.net.globalredir.akadns.net

      apparently cnames cause glitches for pihole.

      1. Post
        Author
        1. Sorry for the delayed reply. I was just using your blog post again to set up my 2nd pihole for redundancy and noticed you replied.

          I used google’s DNS to show what happens without unbound. It may have been that I recreated the error with wwww.cisco.com (4 w’s) which is a typo. Maybe that was my original problem but I was pretty sure I tried http://www.cisco.com at the time.

          Regardless, I don’t get the not found error anymore.

          Your tutorial is great as are all of your videos. Thank you.

    3. Required for Debian Bullseye+ releases

      1 – sudo systemctl disable –now unbound-resolvconf.service
      2 – sudo sed -Ei ‘s/^unbound_conf=/#unbound_conf=/’ /etc/resolvconf.conf
      3 – sudo rm /etc/unbound/unbound.conf.d/resolvconf_resolvers.conf
      4 – sudo service unbound restart
      5 – dig pi-hole.net @127.0.0.1 -p 5335
      5* You should have NOERROR message. “;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id blah blah

      You're welcome and get yourself a Yankees hat.

  6. This is really a great step-by-step tutorial 🙂

    I have some additions when you “are going to pick an upstream DNS provider”:
    From a privacy point of view you may not want to use a DNS provider that collects data about your DNS queries or is even tracking you! Therefore I have written some infos on my GitHub Page:
    https://thomasmerz.github.io/pihole-wireguard-knowhow/#upstream-resolvers

    My project is measuring very close to an end user via WiFi and via Vodafone ISP (coax/cable). So these results are what you also can expect on your home internet connection regardless which ISP (Telekom, Vodafone, 1-und-1, …) and which technology (DSL, Coax/Cable, Fiber or even mobile (4G/5G)).

    There’s also a link to another GitHub repo if me with daily/nightly updated real data from my home:
    https://github.com/thomasmerz/dnspingtest_rrd_ka

  7. I’ve started using DietPi for my Pi-hole installs to squeeze out the most of my aging Pis (Gen1 & Gen2).

    “DietPi is extremely lightweight at its core, with features of low process/memory footprint and DietPi-RAMlog installed by default, to get the maximum performance from your device.”

  8. Thank you very much Chris! Great tutorial. I have UDM with 2 VLANs isolated from each other and LAN. I would be really grateful if you (or someone from this chart) could let me know which firewall rule should be created in order to provide access from VLANs to Pi-hole. Sorry for this “stupid” question but I’m not IT specialist, all other firewall rules were created basing only on your videos. Thank you again.

  9. Thank you, but for some reason my Tp-link router Archer C-5400X has the following error when setting up the DNS there: “DNS server IP address and LAN IP address cannot be in the same subnet. Please enter another one.”

  10. From my tests this configuration of unbound still uses the resolvers found in the “/etc/dhcpcd.conf” file
    “static domain_name_servers=192.168.200.1 1.1.1.1”
    it is not recursive as it is meant to be.
    and if its not recursive what’s the point with unbund in this tutorial?

    Unbound will use port 53/tcp in some requests so that port need to be open alongside port 53/udp
    found out that one the hard way ;P

    1. I was wondering about this. He never went back into the Pi to reconfigure the eth0 to point to itself for DNS, it’s still using this default GW and cloudflare? Followed his instructions to a T and my device is still using my default gateway for DNS too.

  11. Thank you very much Chris, very helpful, as a total new Pi user, this is very helpful.
    I was able to put a hand on a 4GB pi 4 and have spent the day on it already.
    I’m getting an issue with the Unbound DNS query.
    Everything went well, my DHCP is correct and I see the dashboard updating with new blocked queries.

    If anyone can provide some help, here is the dig report below.
    Have I missed anything?

    /
    pirom@pi:~ $ dig crosstalksolutions.com @127.0.0.1 -p 5335

    ; <> DiG 9.16.33-Debian <> crosstalksolutions.com @127.0.0.1 -p 5335
    ;; global options: +cmd
    ;; Got answer:
    ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 11322
    ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

    ;; OPT PSEUDOSECTION:
    ; EDNS: version: 0, flags:; udp: 1232
    ;; QUESTION SECTION:
    ;crosstalksolutions.com. IN A

    ;; Query time: 39 msec
    ;; SERVER: 127.0.0.1#5335(127.0.0.1)
    ;; WHEN: Sat Jan 14 19:13:44 CET 2023
    ;; MSG SIZE rcvd: 51
    /

    Many thanks for any further guidance that anyone can provide.

  12. Could you please update the tutorial to include the following fix:
    https://www.reddit.com/r/pihole/comments/tsperl/comment/i2sr22h/

    I’ve been banging my head against a wall for hours wondering why DNS wouldn’t resolve when unbound was used. I even rebuilt my pi from scratch several times! Then I found one of several threads on reddit suggesting this solution which, fixed my issue immediately:

    This forwarding configuration was installed by Bullseye through resolvconf.

    Edit file /etc/resolvconf.conf and comment out the last line which should read:

    unbound_conf=/etc/unbound/unbound.conf.d/resolvconf_resolvers.conf

    Delete the unwanted unbound configuration file:

    sudo rm /etc/unbound/unbound.conf.d/resolvconf_resolvers.conf

    restart unbound:

    sudo service unbound restart

  13. Many thanks for this tutorial. I managed to get pihole and unbound up and running in a few hours. Get som errors when setting up unbound but that was the stupid copy and paste that screwed up the line breaks, had to put in # in two places and then it works.

  14. This was a great tutorial, but I am struggling getting the unbound DNS to work with my UDM-Pro.

    I can ping and dig @127.0.0.1 -p 5335 just fine on my raspberry pi 4.

    – I am using the tutorial setup for /etc/unbound/unbound.conf.d/pi-hole.conf
    – I followed this https://www.reddit.com/r/pihole/comments/tsperl/comment/i2sr22h/
    – I disabled resolvconf for unbound in https://docs.pi-hole.net/guides/dns/unbound/
    – I tried adding allow all firewall rules and disabled any blocking firewall rules

    No matter what I do when ever I try to dig on my LAN network, I get the following error: connection timed out; no servers could be reached

    Unifi logs are not mentioning anything either. I am completely stuck.

  15. Great guide. I got it set up in a few hours on my LAN network with not much effort. However, I set up my Ubiquiti Dream Machine Pro following your guide as well. Would love for you to make a quick video or post on how to adjust your firewall settings for this to allow the IOT Network to work. Even in your IOT network setup video you mention how you wouldnt explain how to do it in the video.

    We seemed to have locked it down pretty well in that video and while the PiHole is working great for my LAN network, if I change the settings for the IOT network, I dont get any internet. I am pretty new to this which is why I have loved using your guides and I feel I have learned alot. However this has me stumped. I feel the firewall settings are a bit confusing and I have tried a few things on how to make the pihole an exception to the rule for a few days now with no luck.

    Thanks!

  16. consistently getting “SERVFAIL” when I run the “dig” instructions similar to others. All is well up to that point. Any ideas would be helpful.

  17. I’ve installed PiHole as per your tutorial and get this error when running “sudo service unbound status”
    **This is the entire response after running the command:
    ___________________________________________________________________________________________________________________
    unbound.service – Unbound DNS server
    Loaded: loaded (/lib/systemd/system/unbound.service; enabled; vendor preset: enabled)
    Active: active (running) since Wed 2023-03-01 17:03:36 EST; 1min 40s ago
    Docs: man:unbound(8)
    Process: 715 ExecStartPre=/usr/lib/unbound/package-helper chroot_setup (code=exited, status=0/SUCCESS)
    Process: 737 ExecStartPre=/usr/lib/unbound/package-helper root_trust_anchor_update (code=exited, status=0/SUCCESS)
    Main PID: 752 (unbound)
    Tasks: 2 (limit: 4915)
    Memory: 11.8M
    CPU: 120ms
    CGroup: /system.slice/unbound.service
    └─752 /usr/sbin/unbound -d -p

    Mar 01 17:03:36 raspberry systemd[1]: Starting Unbound DNS server…
    Mar 01 17:03:36 raspberry unbound[752]: [1677708216] unbound[752:0] warning: so-rcvbuf 4194304 was not granted. Got 425984. To fix: start with root permissions(linux) or sysctl bigger net.core.rmem_max(linux) or kern.ipc.maxsockbu>
    Mar 01 17:03:36 raspberry unbound[752]: [1677708216] unbound[752:0] warning: so-rcvbuf 4194304 was not granted. Got 425984. To fix: start with root permissions(linux) or sysctl bigger net.core.rmem_max(linux) or kern.ipc.maxsockbu>
    Mar 01 17:03:36 raspberry unbound[752]: [752:0] info: start of service (unbound 1.13.1).
    Mar 01 17:03:36 raspberry systemd[1]: Started Unbound DNS server.
    ___________________________________________________________________________________________________________________
    I am a total noob and hope that someone has an answer for this. Thanks

  18. You forgot one very very important thing. I just wiped both my Pi’s and reset everything per your instructions to the “T” and my DNS queries were still forwarding in this case to CloudFlare vs the Root Hint servers. This can be seen by hitting this site:
    https://dnscheck.tools/

    You should see your Public IP as the DNS server but instead will see in this case CloudFlare.
    So this has to be done to fix the issue:
    https://discourse.pi-hole.net/t/pihole-unbound-not-working-as-it-should/51381/12

    It’s lame that it’s been 1+ years after that Discourse article and this fix hasn’t been implemented during setup.
    “This is caused by resolvconf running in the current (October 2021) Raspberry Pi release of the native Bullseye image.”

  19. Great write-up Chris. I second Rob’s comment related to resolvconf running on the Pi by default and needing to disable it so unbound will start.

  20. One thing I noticed.
    Is that when my Pi-Hole device restarted, that the Settings>DNS>Interface Settings defaulted back to the “Allow only local requests”. Since I have multiple subnets this broke DNS for all but the one the Pi was on.
    Is this known behavior? Also is there a fix for this so reboot defaults to int eth0?
    Thanks

  21. If running bullseye, you’ll need to follow a few steps in the pi-hole/unbound docs or this will not work
    https://docs.pi-hole.net/guides/dns/unbound/

    Step 1 – Disable the Service
    sudo systemctl disable –now unbound-resolvconf.service

    Step 2 – Disable the file resolvconf_resolvers.conf
    sudo sed -Ei ‘s/^unbound_conf=/#unbound_conf=/’ /etc/resolvconf.conf
    sudo rm /etc/unbound/unbound.conf.d/resolvconf_resolvers.conf

    Step 3 – restart teh unbound service
    sudo service unbound restart

  22. Pretty good tutorial. Followed it and was up in running quick. One issue that I had was a couple days later I had an ISP outage for an hour or so and apparently while PiHole was working, Unbound was not. Pihole usually knows how to recover from something like this but however Unbound was configured it was DOA behind the scenes and I couldn’t troubleshoot it in a reasonable timeframe so gave up on it.

    I think this guide works but it’s fragile. If Unbound is a typical integration w/PiHole, there should be a service health monitor and automated recovery. I can’t leave the family hanging with instructions to putty into the pihole and restart the service…

  23. Very nice tutorial, many thanks for your time and effort.
    The tutorial works on a Model B Revision 1.0 (0003) using the legacy version.

    If you are using another DHCP server, how do you configure pi-hole to show localhost names?

    I have an OpnSense firewall and this issues the IP addresses to LAN hosts, some of which are servers with fixed reservations. When clients are configured with the pi-hole as their DNS server, they cannot find the servers by name.

    If the firewall uses the pi-hole as its DNS server and the clients are configured to use the DNS server of the firewall, then the queries are reported as insecure and the DNS lookup works for LAN hosts.

    Thanks again.

  24. Thanks for the great video.
    I followed you instructions exactly (inc the block lists).
    Everything is working find, but my blocking is a lot less that yours with PiHole enabled I only got 30% blocked.
    PiHole Disabled was 2%, so its working.
    Why was your blocking so much higher in the video, when I am using the same lists as yours ?

    Thanks

  25. Chris,
    I have to say this is a great video you put together. I really enjoyed it and picked up some more info from last time.
    The only issue I really need help is with VLAN’s on the UDMPro. I want all my networks to use Pi-Hole
    I have
    10.2.0.xx
    10.2.10.xx
    10.2.20.xx
    network. Currently I only have Pi-Hole running on the 10.2.0 network.

    Do you have a write or something regarding the firewall rules for this? When I first setup my Unifi network I followed your setup videos.

    Any kind of help would be awesome. This would help me block the IoT network .
    Keep up the great videos.!!

    1. Hi i just install im just fowwling the guide
      i have same problem with unbound get this error
      DNSMASQ_WARN Warning in dnsmasq core:
      Maximum number of concurrent DNS queries reached (max: 150)
      dont know what to do if i change dns to google and cloudflar it work
      put i dont understand what to do with the unbound i need some total guid what to writh and do step by step because i dont know what all the the stuff means because im total noob

  26. Chris, what a fantastic tutorial! Thank you for taking the time for the community.

    One thing, when I test my add blocking, I’m getting 67% yet on the pihole GUI it says its picking up around 23% of requests and blocking them. Am I doing something wrong? Or do I need to restart my devices?

    1. I’m getting similar results – and they’re abysmal. Doesn’t seem like the PiHole is doing much of anything. Disabled IPv6 to avoid any sort of Windows shenanigans with IPv6 DNS, and still only getting around 4% block rate on the block ‘test’ site (https://d3ward.github.io/toolz/adblock.html).

      I’m running the top three green links from every category from Firebog in my Adlists.

      This, compared to a 68% block rate with just using UBlock Origin on Firefox. Good grief.

  27. Thanks! Good walkthrough. Works on Linode to connect pi-hole to my home.

    I would like to see how to add those firewall rules to block out all DNS except the one I specify. I do have pfsense.

  28. Hi,

    Thank you for the awesome write up! quick question. I wanted to dedicate a single SSID that would route through the pihole. That way I could toggle adblocking by simply connecting to a different SSID. From my base understanding (new to networking!) . From what i can tell Pihole is working as expected (can log in and pointing a device to the pihole dns blocks ads as expected. I think I might be missing something in the unifi setup.

    I took the following steps:
    1) setup a new network (“adfree”)… customized DNS to point to the pi’s ip address
    1.a) ensure that this network was checked off under Primary Wan setting (internet> primary wan> unpnp settings)
    2) setup a new SSID (“adfree wifi”)
    2.a) switched network to “adfree”

    I didn’t mess with any of the other settings.

    however when i try to connect my devices to this new wifi… I get a “connect obtain ip” error or if a device connects to the network can’t connect to any sites.

    Is there something in the firewall rules i need to adjust? Have I potentially missed any other steps? Thanks in advance!

  29. Thank you Chris for your tutorial… but I have a big problem as you can see underneath. I did your tutorial 2 times and I got the same results. So could you help me with this?

    Total queries: 150 Queries Blocked: 0 Percentage Block: 0 Domains to Adlists: 258,982

    Testing Ad Blocking Result: 3%

    Hoping an answer!

    1. event though your blocklist seems small (mine has about 800k and is quite enough) the result is just that of an unfiltered connection.
      make sure your LAN is using the pihole as DNS

  30. Hi Chris,

    AWESOME video!!! I do have a firewall after a Verizon router, from the firewall I have two switches connected to it. question is where I connect the raspberry Pi to? Thank you!

  31. I had to reconfigure my pihole today (botched update)
    and hell, Internet is ugly without ad blocking
    4% blocked with Google DNS
    up to 90% with Pihole + ABP

  32. Hey Chris thank you for a great tutorial! I am curious on if you set up a second Pi-Hole with Unbound, would you then set up a second Upstream DNS Server to the second Pi-Hole under Custom 2?

  33. Followed this guide a few months ago and worked great, just did an update of pihole today and wondered should we also be updating unbound sometime? And is that just the same type of command something like “sudo unbound -up”?

  34. Great write up, thanks.
    Instead of a firewall rule, blocking all DNS queries except to Pihole, better create a NAT Port Forward rule, so that all DNS queries except router or a Pihole are redirected to the pihole address. Thus DNS resolution will continue working (for allowed domains) even if somebody (or some malicious IoT device) use custom DNS.

    I have an OPNsense (pfSense fork) with Unbound installed onboard (192.168.0.1), and a PiHole on another box (192.168.0.100).
    All devices by default query DNS from the router (192.168.0.1).
    Above mentioned NAT Port Forward rule redirects all DNS queries to the Pihole (192.168.0.100).
    Pihole has Unbound on a router as an upstream (192.168.0.1).

    SO, unfortunately, there are some networks hops to and fro, but I can’t install Pihole on an OPNsense router (it’s FreeBSD and not Linux).

  35. Wow, super geeked out that I was able to do this with your help! Apple home here and wondering if you’ve addressed the private relay aspect of whitelisting and if that’s possible. Anyone else have issues here, I only saw one comment previously.

  36. Hi I have followed your excellent how to, step by step.
    I’ve managed to get the pi-hole running and working, thank you!

    The only issue is the router, my ISP has provided (Technicolor DGA4314) its pretty locked down.
    I’ve email my ISP tech support and told them I wish to change the DNS on the router.
    They have replied to me with this question. I would appreciate an answer please.

    “Thanks for reaching out

    Can you let us know if you are looking to change the internal DNS or external DNS please?

    All the best

    If you have any additional information you would like to add to this case, just reply to this email.

    Kind regards

    Giganet”

    I’m not sure what is the answer? Please can you tell me should I reply internal and external?
    And if you could explain and tell me why that would be brilliant!

    Many thanks
    Ian

    1. Hey Ian,
      In answer, basically you are looking to change both internal and external DNS.
      This sounds like my ISP and I have been running a second router just to do DNS and DHCP so I could watch Hulu here down-under. If you follow this awesome tutorial and use DHCP on Pi-Hole, you will just need to configure Pi-Hole and remove DHCP and DNS from your ISP router. You will need to make sure that your ISP routers’ DHCP is shutdown at about the same time you bring it up on the Pi-Hole – unless you know how to add static IPs and plug directly into your LAN.
      Hope that helps mate!!
      Cheers,
      Mike

  37. “I cAn’T gEt a RaSpBeRrY pI!!”

    So I should get a raspberry pi just to use this pi-hole everybody keeps talking about? Why do I want a pi-hole in the first place though?

  38. HI there.

    I got given a Raspberry Pi the other day it’s a Pi 4 B 4gb

    so, I moved my Wire-pod to it and got hat working without too many problems.

    and then I was rummaging through you tubes that I had saved and remembered your PiHole video this one!

    so, I was like I wonder if I can run both on the pie as it’s not really doing much. to run vector’s wire-pod.
    I checked around a few places as your video didn’t indicate if I could run the 2 tasks.

    so, I went through the setup without any issues. until I got the logging into the web interface.

    so right now, pihole says its running. but I can’t get the web interface up. (please remember I’m new to pie and Linux)

  39. Were using an Raspberry Pi 3 Model B for this. Followed the this guide that I think is awsome! But I got into trouble. Symptom was that lists was not updated with gravity and with outdated/empty list was blocking not optimal. The error messages lead me to that packages were missing on the Pi. I tried to add them manually but got into more errors. So I went for a full install, when using Raspberry Pi OS (64 bit) instead of Raspberry Pi OS Lite (64 bit) does everything work perfectly.

  40. Great tutorial. I’ve FINALLY got an answer to the problem I was having on my phone and YOU were it. I have one question when I do that Ad Blocking test at the end I only get 6-10%. Any idea what I could have done wrong? Thanks again for such a great tutorial.

  41. Great video and document. Finally took the time yesterday to get the pi-hole setup. Works great! Beer is on the way! Thanks again Chris.

  42. Im running my 2 Pi-Holes on Raspberry PI Ws and they work great.
    My only complaint is technology seems to have leapfrogged. A lot of the sites are now blocking me for blocking their ads. 🙁

  43. So i git pi hole running, followed all the instructions but when i run the test add block, im only blocking about 15%.

    am i doing somthing wrong as im not blocking the 98% like in the video.

    any tips will be apprceated.

  44. Hello, What a wonderful tutorial! Still, I have some reluctance to install it. The instruction explicitly assumes a clean installation. I want to install Pihole on a Raspberry Pi 4 (4Gb) that already runs PiVPN with Wireguard. The question is whether the installation of Pihole does not stand in the way of it.

  45. This is great thank you. I got as far as being able to grab my Pi’s IP address but when I try to login with SSH the Terminal does not register keystrokes for the password. Any advice? I feel like I am so close!

    1. The keystrokes are not displayed – but they are there. Just type the password and press enter even though you cannot see it.

  46. How could I do something like that when I don’t even know where this Raspberry computer is supposed to be connected to the Internet in my house and how. This is not described in the tutorial. The tutorial is for people who deal with it and know the subject, but only need details. An ordinary person can’t do it, based on this tutorial.

  47. G’day from AU, Chris! I’m not great with this but followed along fine until I tried to align your notes with your video. I have the Netgear RAX4200, which allowed me to specify an address reservation (static). I just ticked for it to reserve what it had given it. Later, I recalled you using terminal and “uncommenting”/adding a LOT more stuff than if you simply did option 1: Set a DHCP reservation.

    In option 2 you then said to choose a range outside of the range normally handed out. What does that mean, exactly? Because if option 1 is available, you’d skip option 2 and never adjust the .conf file and all of the other things you showed. If using option 1, how/where/when would you change to Cloudflare or Google let’s say?

    PS: as others have already stated, Youtube ads are one of the ones I want to remove– is there any sort of update which has run around however Google has fixed this to bypass the Pi?

    Thank you for the work you did with that tutorial, even if I’m still a bit lost in AU.

  48. Hopefully CrossTalk sees this, but this guide needs to be updated. As of the 10/10/2023 of Debian Bookworm. Debian (and by extension Raspberry Pi OS) does not use dhcpcd as the networking interface. Instead, it uses the more complex/robust NetworkManager. This change can be found in the release notes for RaspberyPi OS here: https://downloads.raspberrypi.com/raspios_lite_arm64/release_notes.txt.

    This means that the dhcpcd.conf file will not exist under /etc as the guide suggest. There are ways to use nmcli (the command the interact with NetworkManager) to set a static IP. However, I recommend simply setting up a DHCP reservation using your router. Either way, you cannot set up a static IP using dhcpcd.conf. Hope this helps anyone on their PiHole journey!

  49. Hi
    Thanks for the exhaustive tutorial, I did it before but needed a refresh on how to set up the pihole unbound combination on a raspberry4 b (8gb)running raspberry OS bullseye (32 bit)
    but i followed it to the letter and end up with a “DNSMASQ_WARN Warning in dnsmasq core: interface eth0 does not currently exist” under diagnosis in Pihole; I already tried:
    – eth0 is properly registered under /etc/pihole/setupVars.conf & /etc/dnsmasq.d
    – reinstalling pihole did nothing
    – added DELAY_STARTUP=5 to /etc/pihole/pihole-FTL.conf
    has anyone met the same issue – if so how did you sort it out?
    Thanks
    bob

  50. Hi
    Thanks a lot for a VERY comprehensive tutorial (i need a refresh after an old installation on a raspberry pi 3b+)
    I currently set up the pihole – unbound combination on a Pi 4b (8GB), running legacy 32bit OS (personnally don’t think wayland environment is quite there yet…) and pihole reports “DNSMASQ_WARN Warning in dnsmasq core: interface eth0 does not currently exist”.
    YET indeed, as Joseph pointed out, this tutorial needs updating, even for Bullseye; please see section
    Disable resolvconf.conf entry for unbound (Required for Debian Bullseye+ releases)
    of
    https://docs.pi-hole.net/guides/dns/unbound/#disable-resolvconf-for-unbound-optional
    I hope this will help others too.

  51. I’m hoping someone is still reading comments. I’ve flashed RPi OS Lite using the RPi imager 1.8.1, which no longer has the same UX as 1.7.x that was used for the tutorial. 1.8.1 moves the SSH option to another screen and doesn’t have a place to enter your desired SSH password, so when I try to login, I keep getting a rejected password. Any advice?

    1. Hi Chris,

      With RasPi Imager 1.8.1 open, pressing shift+ctrl+x opens the OS Customisation dialogue box that allows you to set SSH password, wi-fi credentials and more.
      Hope this helps.

      Ned

Leave a Reply

Your email address will not be published. Required fields are marked *