fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.7K
active users

#cloudflared

0 posts0 participants0 posts today
Continued thread

Bruh I'm still so confused about this - can any #networking people or anyone with #PiHole/#Pi-hole experience chime in and tell if my goal is privacy, and if I were to prioritise one, it'd be better privacy against my ISP, what should I use on my Pi-hole DNS server?

-
#Unbound as a recursive DNS server (my interpretation of this route is, it's the best privacy vs 3rd party DNS - but I'm assuming it's the worst privacy vs ISP?)
- Enable
#DNS-Over-TLS (#DoT) using Unbound and upstream DNS provider set to something like #Cloudflare
- or Enable
#DNS-Over-HTTPS (#DoH) using #Cloudflared

I initially thought you could have Pi-hole run with all three (I have a feeling this a really stupid noob networking moment right here) but I don't think so, no?

Have lots of tasks outside of my #homelab, so there is almost nothing that happened inside.

I stopped using #Synology #NAS built-in reverse proxy for external access to #HomeAssistant. Now it is through the #Cloudflare tunnel: github.com/brenner-tobias/addo

Also, there are no non-Hue smart plugs left in my #SmartHome. It was a surprise for me that every #Philips #Hue smart plug is a light entity, not a switch.

Happy Friday, fediverse!

GitHubGitHub - brenner-tobias/addon-cloudflared: Connect remotely to your Home Assistant instance without opening any ports using Cloudflared.Connect remotely to your Home Assistant instance without opening any ports using Cloudflared. - brenner-tobias/addon-cloudflared

Despite some WiFi issues at the beginning, #Synology RT6600ax is the best home #router I ever had. It's like #Asus but with modern UI and some additional features for #HomeLab.

I finally have a separate #VLAN for my public services and potentially misconfigured Linux containers.

I also replaced #Traefik with the #cloudflare tunnel and I like it.

Oh, and I fixed my broken #AdGuardHome. Its only upstream was a DoH, but DoHs were not allowed on a router to make traffic monitoring more precise.

How's your weekend?

Thinking about my (still WIP) #PiHole setup. AFAICT, the guide for #DoH with #cloudflared at docs.pi-hole.net/guides/dns/cl only coveres using DoH between the PiHole and the upstream DNS provider (e.g., Cloudflare, Google, etc.). But if I want to use DoH between my browser and my PiHole, I seem to need another DoH Proxy, which makes request flow like this:

1. incoming on dns.ljrk.org:443 (traefik reverse proxy)
2. forwarded to 127.0.0.1:80 (DoH Proxy #1)
3. upstream classic DNS resolver on 127.0.0.1:53 (PiHole)
4. forwards any non-blocked requests to 127.0.0.1:5053 (DoH Proxy #2)
5. upstream DoH DNS resolver such as 1.1.1.1:443/dns-request

Of course, most PiHole setups are local and I'll probably end up opening dns.ljrk.org only through a #TailScale/#HeadScale #VPN, but my browser may still prefer to speak DoH instead of RFC1035. I'm also not sure how #DNSSEC plays into this...

docs.pi-hole.netcloudflared (DoH) - Pi-hole documentation

@HalsandRey hubo.be is always the last place I check because their website is #Cloudflared & I boycott businesses that use Cloudflare. But despiration brought me there after looking everywhere else, and Hubo did not have flared fittings. I appreciate the suggestion though.