You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/ftldns/cache_dump.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,28 +115,28 @@ Self-explanatory: Queries sent, retried, and failed to the individual upstream s
115
115
116
116
The first character of the flags describes the query type:
117
117
118
-
Character | Record type
119
-
----------|------------
120
-
`4` | `A` (IPv4 address)
121
-
`6` | `AAAA` (IPv6 address)
122
-
`C` | `CNAME`
123
-
`V` | `SRV`
124
-
`S` | `DS`
125
-
`K` | `DNSKEY`
126
-
`(empty)` | something else
118
+
|Character | Record type|
119
+
|----------|------------|
120
+
|`4`|`A` (IPv4 address)|
121
+
|`6`|`AAAA` (IPv6 address)|
122
+
|`C`|`CNAME`|
123
+
|`V`|`SRV`|
124
+
|`S`|`DS`|
125
+
|`K`|`DNSKEY`|
126
+
|`(empty)`| something else|
127
127
128
128
The rest of the flags can be almost any combination of the following bits:
129
129
130
-
Bit | Interpretation
131
-
-------|---------------
132
-
`F` | Forward entry (domain-to-address record)
133
-
`R` | Reverse entry (address-to-domain, typically combined with `D` or `H`)
134
-
`I` | Immortal cache entry (no expiry, typically from local configuration)
135
-
`D` | DHCP-provided record
136
-
`N` | Negative record (This record does not exist)
137
-
`X` | NXDOMAIN (No record exists at all for this domain)
138
-
`H` | From HOSTS file (always combined with `I`)
139
-
`V` | DNSSEC verified
130
+
|Bit | Interpretation|
131
+
|-------|---------------|
132
+
|`F`| Forward entry (domain-to-address record)|
133
+
|`R`| Reverse entry (address-to-domain, typically combined with `D` or `H`)|
134
+
|`I`| Immortal cache entry (no expiry, typically from local configuration)|
135
+
|`D`| DHCP-provided record|
136
+
|`N`| Negative record (This record does not exist)|
137
+
|`X`| NXDOMAIN (No record exists at all for this domain)|
138
+
|`H`| From HOSTS file (always combined with `I`)|
139
+
|`V`| DNSSEC verified|
140
140
141
141
The `V` flag in negative DS records has a different meaning. Only validated `DS` records are every cached, and the `V` bit is used to store information about the presence of an `NS` record for the domain, i.e., if there's a zone cut at that point.
Copy file name to clipboardExpand all lines: docs/group_management/example.md
+48-48Lines changed: 48 additions & 48 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,12 +62,12 @@ after your database modifications to have FTL flush its internal domain-blocking
62
62
63
63
**Result**
64
64
65
-
Client | Group membership | Domain | Blocked
66
-
------------- | ----- | ------ | -------
67
-
*all other* | Default | doubleclick.net | Yes
68
-
192.168.0.101 | Group 1 | doubleclick.net | **No**
69
-
192.168.0.102 | Group 2 + Default | doubleclick.net | Yes
70
-
192.168.0.103 | Group 3 + Default | doubleclick.net | Yes
65
+
|Client | Group membership | Domain | Blocked|
66
+
|------------- | ----- | ------ | -------|
67
+
|*all other*| Default | doubleclick.net | Yes|
68
+
|192.168.0.101 | Group 1 | doubleclick.net |**No**|
69
+
|192.168.0.102 | Group 2 + Default | doubleclick.net | Yes|
70
+
|192.168.0.103 | Group 3 + Default | doubleclick.net | Yes|
71
71
72
72
All three clients got automatically assigned to the default (`Default`) group when they were added. The default group includes all subscribed lists and list domains (if not already changed by the user). When we remove the default group for client `192.168.0.101`, we effectively remove all associations to any subscribed lists and domains. This leaves this client completely unblocked.
73
73
@@ -84,12 +84,12 @@ All three clients got automatically assigned to the default (`Default`) group wh
84
84
85
85
**Result**
86
86
87
-
Client | Group membership | Domain | Blocked
88
-
------------- | ----- | ------ | -------
89
-
*all other* | Default | doubleclick.net | Yes
90
-
192.168.0.101 | Group 1 | doubleclick.net | **Yes**
91
-
192.168.0.102 | Group 2 + Default | doubleclick.net | Yes
92
-
192.168.0.103 | Group 3 + Default | doubleclick.net | Yes
87
+
|Client | Group membership | Domain | Blocked|
88
+
|------------- | ----- | ------ | -------|
89
+
|*all other*| Default | doubleclick.net | Yes|
90
+
|192.168.0.101 | Group 1 | doubleclick.net |**Yes**|
91
+
|192.168.0.102 | Group 2 + Default | doubleclick.net | Yes|
92
+
|192.168.0.103 | Group 3 + Default | doubleclick.net | Yes|
93
93
94
94
`192.168.0.101` gets `doubleclick.net` blocked as it uses a subscribed list including this domain. All other clients stay unchanged.
95
95
@@ -112,12 +112,12 @@ Add the domain to be blocked
112
112
113
113
**Result**
114
114
115
-
Client | Group membership | Domain | Blocked
116
-
------------- | ----- | ------ | -------
117
-
*all other* | Default | denylisted.com | **Yes**
118
-
192.168.0.101 | Group 1 | denylisted.com | No
119
-
192.168.0.102 | Group 2 + Default | denylisted.com | **Yes**
120
-
192.168.0.103 | Group 3 + Default | denylisted.com | **Yes**
115
+
|Client | Group membership | Domain | Blocked|
116
+
|------------- | ----- | ------ | -------|
117
+
|*all other*| Default | denylisted.com |**Yes**|
118
+
|192.168.0.101 | Group 1 | denylisted.com | No|
119
+
|192.168.0.102 | Group 2 + Default | denylisted.com |**Yes**|
120
+
|192.168.0.103 | Group 3 + Default | denylisted.com |**Yes**|
121
121
122
122
Note that Pi-hole is *not* blocking this domain for client `192.168.0.101` as we removed the default assignment through group 0 above. All remaining clients are linked through the Default group to this domain and see it as being blocked.
123
123
@@ -135,12 +135,12 @@ Assign this domain to group 1
135
135
136
136
**Result**
137
137
138
-
Client | Group membership | Domain | Blocked
139
-
------------- | ----- | ------ | -------
140
-
*all other* | Default | denylisted.com | Yes
141
-
192.168.0.101 | Group 1 | denylisted.com | **Yes**
142
-
192.168.0.102 | Group 2 + Default | denylisted.com | Yes
143
-
192.168.0.103 | Group 3 + Default | denylisted.com | Yes
138
+
|Client | Group membership | Domain | Blocked|
139
+
|------------- | ----- | ------ | -------|
140
+
|*all other*| Default | denylisted.com | Yes|
141
+
|192.168.0.101 | Group 1 | denylisted.com |**Yes**|
142
+
|192.168.0.102 | Group 2 + Default | denylisted.com | Yes|
143
+
|192.168.0.103 | Group 3 + Default | denylisted.com | Yes|
144
144
145
145
All clients see this domain as being blocked: Client 1 due to a direct assignment through group 1, all remaining clients through the default group 0 (unchanged).
146
146
@@ -158,12 +158,12 @@ Remove default assignment to all clients not belonging to a group
158
158
159
159
**Result**
160
160
161
-
Client | Group membership | Domain | Blocked
162
-
------------- | ----- | ------ | -------
163
-
*all other* | Default | denylisted.com | **No**
164
-
192.168.0.101 | Group 1 | denylisted.com | Yes
165
-
192.168.0.102 | Group 2 + Default | denylisted.com | **No**
166
-
192.168.0.103 | Group 3 + Default | denylisted.com | **No**
161
+
|Client | Group membership | Domain | Blocked|
162
+
|------------- | ----- | ------ | -------|
163
+
|*all other*| Default | denylisted.com |**No**|
164
+
|192.168.0.101 | Group 1 | denylisted.com | Yes|
165
+
|192.168.0.102 | Group 2 + Default | denylisted.com |**No**|
166
+
|192.168.0.103 | Group 3 + Default | denylisted.com |**No**|
167
167
168
168
While client 1 keeps its explicit assignment through group 1, the remaining clients lost their unassignments when we removed group 0 from the assignment.
169
169
@@ -186,12 +186,12 @@ Add the domain to be allowlisted
186
186
187
187
**Result**
188
188
189
-
Client | Group membership | Domain | Blocked
190
-
------------- | ----- | ------ | -------
191
-
*all other* | Default | doubleclick.net | **No**
192
-
192.168.0.101 | Group 1 | doubleclick.net | Yes
193
-
192.168.0.102 | Group 2 + Default | doubleclick.net | **No**
194
-
192.168.0.103 | Group 3 + Default | doubleclick.net | **No**
189
+
|Client | Group membership | Domain | Blocked|
190
+
|------------- | ----- | ------ | -------|
191
+
|*all other*| Default | doubleclick.net |**No**|
192
+
|192.168.0.101 | Group 1 | doubleclick.net | Yes|
193
+
|192.168.0.102 | Group 2 + Default | doubleclick.net |**No**|
194
+
|192.168.0.103 | Group 3 + Default | doubleclick.net |**No**|
195
195
196
196
Client `192.168.0.101` is not allowlisting this domain as we removed the default assignment through group 0 above. All remaining clients are linked through the default group to this domain and see it as being allowlisted. Note that this is completely analog to step 1 of [example 3](#example-3-denylisting).
197
197
@@ -208,12 +208,12 @@ Remove default group assignment
208
208
209
209
**Result**
210
210
211
-
Client | Group membership | Domain | Blocked
212
-
------------- | ----- | ------ | -------
213
-
*all other* | Default | doubleclick.net | **Yes**
214
-
192.168.0.101 | Group 1 | doubleclick.net | Yes
215
-
192.168.0.102 | Group 2 + Default | doubleclick.net | **Yes**
216
-
192.168.0.103 | Group 3 + Default | doubleclick.net | **Yes**
211
+
|Client | Group membership | Domain | Blocked|
212
+
|------------- | ----- | ------ | -------|
213
+
|*all other*| Default | doubleclick.net |**Yes**|
214
+
|192.168.0.101 | Group 1 | doubleclick.net | Yes|
215
+
|192.168.0.102 | Group 2 + Default | doubleclick.net |**Yes**|
216
+
|192.168.0.103 | Group 3 + Default | doubleclick.net |**Yes**|
217
217
218
218
Requests from all clients are blocked as the new allowlist entry is not associated with any group and, hence, is not used by any client.
219
219
@@ -231,11 +231,11 @@ Assign this domain to group 2
231
231
232
232
**Result**
233
233
234
-
Client | Group membership | Domain | Blocked
235
-
------------- | ----- | ------ | -------
236
-
*all other* | Default | doubleclick.net | Yes
237
-
192.168.0.101 | Group 1 | doubleclick.net | Yes
238
-
192.168.0.102 | Group 2 + Default | doubleclick.net | **No**
239
-
192.168.0.103 | Group 3 + Default | doubleclick.net | Yes
234
+
|Client | Group membership | Domain | Blocked|
235
+
|------------- | ----- | ------ | -------|
236
+
|*all other*| Default | doubleclick.net | Yes|
237
+
|192.168.0.101 | Group 1 | doubleclick.net | Yes|
238
+
|192.168.0.102 | Group 2 + Default | doubleclick.net |**No**|
239
+
|192.168.0.103 | Group 3 + Default | doubleclick.net | Yes|
240
240
241
241
Client 2 got the allowlist entry explicitly assigned to. Accordingly, client 2 does not get the domain blocked whereas all remaining clients still see this domain as blocked.
-[Lifehacker: Turn A Raspberry Pi Into An Ad Blocker With A Single Command](https://www.lifehacker.com.au/2015/02/turn-a-raspberry-pi-into-an-ad-blocker-with-a-single-command/)_Feb 17, 2015_
25
25
-[MakeUseOf: Adblock Everywhere: The Raspberry Pi-Hole Way](https://www.makeuseof.com/tag/adblock-everywhere-raspberry-pi-hole-way/)_Mar 25, 2015_
0 commit comments