Q: What is PI-Hole?
Pi-Hole is a Linux-based system for use on micro-computers such as the widely used Raspberry-Pi or Raspberry-PI Zero. Hardware requirements are low and the Raspberrys fit in every trouser pocket.
Functionally, PI is a tracking and advertising blocker as well as DHCP/DNS server that can be integrated into an existing network and fed with its own filter lists (hosts).
Q: What are the difficulties with PI?
From own experience and previous resonance, it is a double-edged sword with PI.
On the one hand, PI-Hole does not display everything that can be a hindrance to troubleshooting and on the other hand?
If services use the same endpoint, it means weighing up what is more important. In the case of the certificate provider Lets Encrypt, their OCSP-Service shares the servers with a spyware service from Adobe, Inc.
Is the certificate now allowed via PI-Hole or is spyware blocked and thus also the OCSP service?
0.0.0.0 a1887.dscq.akamai.net
0.0.0.0 e4578.dscb.akamaiedge.net
0.0.0.0 airdownload2.adobe.com
#0.0.0.0 x1.c.lencr.org
#0.0.0.0 x2.c.lencr.org
#0.0.0.0 e8652.dscx.akamaiedge.net
0.0.0.0 e1.o.lencr.org
0.0.0.0 r3.o.lencr.org
0.0.0.0 a1887.dscq.akamai.net
Neither is possible. Allow either security or data theft
x1.c.lencr.org (blocked e8652.dscx.akamaiedge.net)
x2.c.lencr.org (blocked e8652.dscx.akamaiedge.net)
e1.o.lencr.org (blocked a1887.dscq.akamai.net)
r3.o.lencr.org (blocked a1887.dscq.akamai.net)
Q: What about the stability of PI-Hole?
PI-Hole should also be treated with caution on this point. Users who only rely on PI as their own filter solution in the network may be able to rely more quickly on their all-round solution for blocking unpleasant events than was planned.
This is especially the case when PI hole and/or the Raspberry fail. And that likes to happen.
If no other solutions are available at this moment, such as an additional hosts Datei, any traffic of your own devices is connecting to the Internet and back at that very moment.
Q: How do I set up Pi-Hole with third party lists?
In Pi-Hole it is possible to implement own or third-party lists. This is even really easy.
In order for Pi-Hole to recognize the entries, you need to re-read the gravity list.To be found in the left column under "Tools".
Done. The lists were adopted and existing entries in the system were updated.
If you have no option to host lists by yourself, you will find filter lists everywhere (e.g. Github) whose addresses can usually be taken over directly.