I have been unable to update from version 5 (FTL updated), and the web interface seems to be having permissions errors in that it works for queries but I can't add domains and such.
There's some external connectivity issues going on. The Pi-hole DNS is working since the domain was able to be resolved. This error is showing the connection attempt was blocked by the endpoint.
What does the output from curl -IL https://github.com/pi-hole/ftl/releases/latest/download/pihole-FTL-linux-x86_64 show? You may see a 403 Forbidden notice but that is expected.
Thanks. I do indeed get connection refused. Is there a way to upload the file?
My IP seems to be getting blocked by some of the blacklist locations, too... any idea why that might be? I only use this IP for one thing - the pihole - and I've blocked off all users outside my IP block via firewall.
Weird name server issue? That would explain it. I was using 1.1.1.1 but can switch to something else... assuming the server is using the pihole DNS for its own purposes as well!
...
Those IPs are fine. The goal was to find out if they were public or private IP addresses.
I'm really not sure why you are being refused, you can try curl -L https://github-production-release-asset-2e65be.s3.amazonaws.com to see if there is any message returned. I get some html back that says AccessDenied but that's expected.
curl -IL https://github-production-release-asset-2e65be.s3.amazonaws.com should show 403 as a response.
Try both of those commands and see what warnings, if any, you get.
Thanks!! Yes, there are lots of dup lines, I deleted some but I'll drag it into BBEdit and get rid of the rest. I don't know why they keep cropping up. Does the order of the lines matter?
PS> curl: (6) Could not resolve host: github.com; Unknown error
Note: I don't know why but pihole -up now says: βEverything is up to date!β
Thanks on the dup lines, half of them must have been dups.
True, I serious concern. I keep an eye on the log. I have banned most of the world via firewall. Is the IP revealed anywhere in this thread?
PS> Good news. This server shouldn't partake in DNS amplification attacks. Your caching DNS server appears configured with correct ACL's. This server appears to have recursion disabled and does not answer to unknown third party DNS queries.
No identifying information has been revealed in public. I suggest that a better option would be to deploy VPN instead of manually blocking. Whack-a-mole gets tiring after a while and you only catch the moles after they've dug holes in the lawn.