Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> You could expose it to the internet but that's a horrible idea.

Been there, done that. It was a mistake. Not sure which attacks my public PiHole was part of, but I surely was part of some.

It's a shame, I'd really like to offer this as a service to friends, because I think they would be able to change the DNS settings of their routers and enjoy a safer surfing experience.

I don't want to get started with distributing key pairs to connect to a VPN and whatnot. PiHole really has a sweet spot there with its ease-of-use but it fails in regards of security/protection against becoming part of DNS-based attacks.



> Been there, done that. It was a mistake. Not sure which attacks my public PiHole was part of, but I surely was part of some.

How did you come to this conclusion? How did you come to know?


The PiHole has some integrated logging where you can see the requests that were made. I had several IPs which were doing queries for the same domains dozens of times per second. That wasn't a poweruser but some kind of automated system, probably doing reflection attacks or sth. alike.

I think PiHole has improved since that time, you can now set throttling, but I'm not sure I'd run a public PiHole anymore.


pihole + fail2ban

google that my man


Thanks! Only knew fail2ban from securing SSH, but yeah, works for other daemons, too...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: