All I did was get a new Broadband Modem installed. Now, Pi-hole does not resolve anything I'm down

Please follow the below template, it will help us to help you!

Expected Behaviour:

I had Pihole working fine.

My set up was broadband modem to personal router = Pi + various computers. I got a broadband modem upgrade.... that's the only change.

My personal router got the IP of the router, I presume called WAN IP.

I can ping using PC... the WAN IP.
(if I direct LAN wire a pc to the new modem, pc gets an IP and I can webbrowse fine.).

Actual Behaviour:

problem presently is, command line from any PC, NSLOOKUP, shows me:

And thought to post my router (asus) lan side, DNS settings of which nothing changed, only the new modem.

debug token provided... not sure if the pihole was able to upload it though, but i did chose the option to allow it to upload. it didnt' tell me if it succeeded to upload, at least from anywhere i was looking.

Debug Token:

https://tricorder.pi-hole.net/gf0rwvo46p

A few things in your debug log:

Your unbound instance was not responding. SERVFAIL is frequently associated with DNSSEC errors due to incorrect date/time on the Pi.

*** [ DIAGNOSING ]: Pi-hole log
-rw-r--r-- 1 pihole pihole 89272 Jan 28 11:44 /var/log/pihole.log
   -----head of pihole.log------
   Jan 28 00:15:24 dnsmasq[624]: query[A] 0.debian.pool.ntp.org from 127.0.0.1
   Jan 28 00:15:24 dnsmasq[624]: forwarded 0.debian.pool.ntp.org to 127.0.0.1
   Jan 28 00:15:24 dnsmasq[624]: query[AAAA] 0.debian.pool.ntp.org from 127.0.0.1
   Jan 28 00:15:24 dnsmasq[624]: forwarded 0.debian.pool.ntp.org to 127.0.0.1
   Jan 28 00:15:24 dnsmasq[624]: forwarded 0.debian.pool.ntp.org to 127.0.0.1
   Jan 28 00:15:24 dnsmasq[624]: reply error is SERVFAIL
   Jan 28 00:15:24 dnsmasq[624]: reply error is SERVFAIL

During the function test in the debug process, the Pi-hole was not able to be reached on its LAN-facing interface. Ensure you don't have any firewall rules blocking port 53 traffic.

*** [ DIAGNOSING ]: Name resolution (IPv4) using a random blocked domain and a known ad-serving domain
[✓] sun49.3322.net is 0.0.0.0 via localhost (127.0.0.1)
[✗] Failed to resolve sun49.3322.net via Pi-hole (192.168.0.68)
[✓] doubleclick.com is 172.217.10.110 via a remote, public DNS server (8.8.8.8)

In this snap of your router settings, you should not select the "advertise router's IP..."

If you look at your debug output, you will see that you have adlists assigned by category to various groups. But, there are no clients assigned to any of those groups, so all the clients are in group 0 (the default group). As a result, only the first three adlists are having any effect. The others are assigned to empty groups with no clients.

*** [ DIAGNOSING ]: Groups
   id    enabled  name                                                date_added           date_modified        description                                       
   ----  -------  --------------------------------------------------  -------------------  -------------------  --------------------------------------------------
   0           1  Default                                             2020-08-01 00:12:21  2020-08-01 00:12:21  The default group                                 
   1           1  suspicious                                          2020-08-02 12:14:43  2020-08-02 12:14:43                                                    
   2           1  advertising                                         2020-08-02 12:22:47  2020-08-02 12:22:47                                                    
   5           1  Telemetry                                           2020-08-02 12:25:28  2020-08-02 12:25:28                                                    
   20          1  Malicious                                           2020-08-02 12:32:10  2020-08-02 12:32:10                                                    
   21          1  other                                               2020-08-02 13:07:21  2020-08-02 13:07:21  coins            

*** [ DIAGNOSING ]: Clients

*** [ DIAGNOSING ]: Adlists
   id    enabled  group_ids     address                                                                                               date_added           date_modified        comment                                           
   ----  -------  ------------  ----------------------------------------------------------------------------------------------------  -------------------  -------------------  --------------------------------------------------
   1           1  0             https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts                                      2020-08-01 00:12:21  2020-08-02 12:35:16  Migrated from /etc/pihole/adlists.list            
   2           1  0             https://mirror1.malwaredomains.com/files/justdomains                                                  2020-08-01 00:12:21  2020-08-02 12:35:23  Migrated from /etc/pihole/adlists.list            
   3           1  0             https://dbl.oisd.nl                                                                                   2020-08-01 17:36:08  2020-08-02 12:34:50  https://dbl.oisd.nl                               
   4           1  1             https://v.firebog.net/hosts/static/w3kbl.txt                                                          2020-08-02 12:12:36  2020-08-02 13:08:00                                                    
   5           1  1             https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts                         2020-08-02 12:13:57  2020-08-02 12:22:05                                                    
   6           1  1             https://raw.githubusercontent.com/PolishFiltersTeam/KADhosts/master/KADhosts_without_controversies.t  2020-08-02 12:13:57  2020-08-02 12:22:11                                                    
   7           1  2             https://adaway.org/hosts.txt                                                                          2020-08-02 12:21:38  2020-08-02 12:23:04                                                    
   8           1  2             https://v.firebog.net/hosts/AdguardDNS.txt                                                            2020-08-02 12:21:38  2020-08-02 12:23:08                                                    
   9           1  2             https://v.firebog.net/hosts/Admiral.txt                                                               2020-08-02 12:21:38  2020-08-02 12:23:13                                                    
   10          1  2             https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt                            2020-08-02 12:21:38  2020-08-02 12:23:17                                                    
   11          1  2             https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt                                            2020-08-02 12:21:38  2020-08-02 12:23:42                                                    
   12          1  2             https://v.firebog.net/hosts/Easylist.txt                                                              2020-08-02 12:21:38  2020-08-02 12:23:45                                                    
   13          1  2             https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&showintro=0&mimetype=plaintext         2020-08-02 12:21:38  2020-08-02 12:23:50                                                    
   14          1  2             https://raw.githubusercontent.com/FadeMind/hosts.extras/master/UncheckyAds/hosts                      2020-08-02 12:21:38  2020-08-02 12:23:54                                                    
   15          1  2             https://raw.githubusercontent.com/bigdargon/hostsVN/master/hosts                                      2020-08-02 12:21:38  2020-08-02 12:23:57                                                    
   16          1  5             https://v.firebog.net/hosts/Easyprivacy.txt                                                           2020-08-02 12:24:55  2020-08-02 12:26:37                                                    
   17          1  5             https://v.firebog.net/hosts/Prigent-Ads.txt                                                           2020-08-02 12:24:55  2020-08-02 12:26:42                                                    
   18          1  5             https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-blocklist.txt                        2020-08-02 12:24:55  2020-08-02 12:26:46                                                    
   19          1  5             https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.2o7Net/hosts                       2020-08-02 12:24:55  2020-08-02 12:26:54                                                    
   20          1  5             https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt               2020-08-02 12:24:55  2020-08-02 12:26:59                                                    
   21          1  5             https://hostfiles.frogeye.fr/firstparty-trackers-hosts.txt                                            2020-08-02 12:24:55  2020-08-02 12:27:08                                                    
   22          1  20            https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%  2020-08-02 12:31:19  2020-08-02 12:32:27                                                    
   23          1  20            https://osint.digitalside.it/Threat-Intel/lists/latestdomains.txt                                     2020-08-02 12:31:19  2020-08-02 12:32:36                                                    
   24          1  20            https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt                                  2020-08-02 12:31:19  2020-08-02 12:32:40                                                    
   26          1  20            https://v.firebog.net/hosts/Prigent-Crypto.txt                                                        2020-08-02 12:31:19  2020-08-02 12:32:48                                                    
   27          1  20            https://mirror.cedia.org.ec/malwaredomains/immortal_domains.txt                                       2020-08-02 12:31:19  2020-08-02 12:32:58                                                    
   28          1  20            https://www.malwaredomainlist.com/hostslist/hosts.txt                                                 2020-08-02 12:31:19  2020-08-02 12:33:07                                                    
   29          1  20            https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/M  2020-08-02 12:31:19  2020-08-02 12:33:11                                                    
   30          1  20            https://phishing.army/download/phishing_army_blocklist_extended.txt                                   2020-08-02 12:31:19  2020-08-02 12:33:16                                                    
   31          1  20            https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-malware.txt                          2020-08-02 12:31:19  2020-08-02 12:33:28                                                    
   32          1  20            https://v.firebog.net/hosts/Shalla-mal.txt                                                            2020-08-02 12:31:19  2020-08-02 12:33:49                                                    
   33          1  20            https://raw.githubusercontent.com/Spam404/lists/master/main-blacklist.txt                             2020-08-02 12:31:19  2020-08-02 12:34:02                                                    
   34          1  20            https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Risk/hosts                         2020-08-02 12:31:19  2020-08-02 12:33:57                                                    
   35          1  20            https://urlhaus.abuse.ch/downloads/hostfile/                                                          2020-08-02 12:31:19  2020-08-02 12:34:17                                                    
   36          1  21            https://zerodot1.gitlab.io/CoinBlockerLists/hosts_browser                                             2020-08-02 13:06:35  2020-08-02 13:08:06  coims

Thankyou JFB. I did not know the time was not accurate. Recently I accidentally unplugged the power for a brief moment to the PI. Wonder if that made it lose time, but I thought it synchs automatically from somewhere?

"In this snap of your router settings, you should not select the "advertise router's IP..."

  • It isnt selected to advertise.

I guess if my debug did get uploaded, then there's proper connectivity between the new modem and my personal router and my issue of not being to use my browser is due to sites not resolving due to pi-hole.

I updated the time via putty and command sudo raspi-config

maybe i will reboot the pi and re-run a debug again.

++ https://tricorder.pi-hole.net/tmieid8gof here's a new debug token.

i wish I'd done a date command before and after, but the time for the pi is current presently.

But looking at the second debug I ran, I can see the servfail is still present.

A Pi has no onboard clock, and it syncs time from ntp servers. This works fine as long as:

(1) there is a functioning DNS server to resolve the domain name for the ntp server to an IP. In your case, with the wrong time, if your Pi is using Pi-hole for DNS, you will be in an endless loop here. The time is wrong, and you can't connect to a time server to set the time.
(2) the time is correct within 1000 seconds (about 16 minutes). Any farther out than that will cause problems.

yes, i'm sure my Pi is using pihole for DNS... meaning I think it's evident when I do a command line on my pc, the nslookup. the output used to give me the name of the pi-hole whereas now it cannot. it currently only gives the IP address of the Pihole.

127.0.0.1:5335 unbound (IPv4)
[80] is in use by lighttpd
[80] is in use by lighttpd
[53] is in use by pihole-FTL
[53] is in use by pihole-FTL

regarding port 53 you mentioned earlier... this from the debug, 53 in use by pihole, I toggled off my firewalls before running this second debug, i was still geting the same server fails you noted to me.

i decided to bypass my PI via the following

and as this screenshot shows i can immediatley resolve again.

so my new modem does work, and as does my router, as it relates to having installed a new modem.

i can load websites and as i am addind to my thread here w/o using my mobile hotspot as i have earlier today.

maybe i should update FTLDNS to 5.5 ?
but alas, a bit befuddled as to the sudden fate of my pi-hole.

I set my router's LAN DNS to something else this evening so I could be on with my business. Then a moment ago i decided to putty into my PI and update the pi-hole. pihole -up

while still in putty i did a nslookup and it gave me a promising output.

went back to my router LAN DNS and set it back to my PI's IP.

went to my PC and did a nslookup from cmd line, and i was back in business, my Pihole was back and resolving!.

Nooooo clue why a modem change threw this off.

also here is my latest debug:

https://tricorder.pi-hole.net/t9ocyoypuy

i'm sure there are no further "reply error is SERVFAIL" lines.

Hopefully you can take a look at my adlists situation in the latest debug, that you pointed out to me earlier today and see it's looking better.

I think as I had amassing a bunch of adlists, I started getting fancy months ago, losing track of how to properly maintain them.

in the section: Client group management,
"Clients may be described either by their IP addresses (IPv4 and IPv6 are supported), IP subnets (CIDR notation, like 192.168.2.0/24), their MAC addresses (like 12:34:56:78:9A:BC), by their hostnames (like localhost), or by the interface they are connected to (prefaced with a colon, like :eth0)."

I was thinking great, I could leverage the CIDR notation to conveniently include my subnet, but how do I/can I take my PI out of being included in it (since it's on the same subnet).

oh no, problem came back.

and this time i cant fix it via command pihole -up.

what i had to do tonight was shuffle some wiring around to put things better in place with my broad band stuff and the Pi. I decided also to make a backup of my microsd card, since the last backup was august. anyway, afterward, the Pi, which I didn't disconnect the power for any of this, I did when I changed the LAN cable to something shorter, but after which I noticed there was no LINK light, so I decided to pull the power plug of the PI.

Link lights came on in the LAN port and I was in business. I was able to PING my Pi. I went to web browse, and the sites stalled? Huh?

I had already putty-ed into my Pi and did a nslookup cnn.com and it gave me a output.

I went to my pc, command line, nslookup cnn.com, and same timed out issue like earlier in the week when I cam upon here to open this thread...ugh.

from putty: success

from pc command line no success

i ran a debug for a token

https://tricorder.pi-hole.net/lp1wtyyys1

perhaps not surprisingly, in the debug i see this failure:

*** [ DIAGNOSING ]: Name resolution (IPv4) using a random blocked domain and a k nown ad-serving domain
[✓] click.mingrunad.com is 0.0.0.0 via localhost (127.0.0.1)
[✗] Failed to resolve click.mingrunad.com via Pi-hole (192.168.0.68)
[✓] doubleclick.com is 172.217.10.78 via a remote, public DNS server (8.8.8.8)

since pihole -up had nothing to update, i was out of luck. came upon the pihole -r command for a repair. tried my luck, let it complete, and nslookup works on the pc. problem fixed (again).. what is it about pihole that gets damaged or corrupt when unplugging power to a pi?

You can't predict what damage will be done when you crash a Pi by removing power. It could be any open file that is damaged.

This topic was automatically closed 21 days after the last reply. New replies are no longer allowed.