Could you give me an ELI5 for this?
In this output, I'm 1) querying my server with IPv4, asking for a A record, 2) querying IPv4 and asking for an AAAA, 3) querying with IPv6 and requesting an A record, and 4) querying IPv6 and requesting AAAA.
rewt@cairon:~ $ dig google.com | egrep "ANSWER SECTION|Query time" -A 1
;; ANSWER SECTION:
google.com. 237 IN A 142.251.214.142
--
;; Query time: 0 msec
;; SERVER: 192.168.1.3#53(192.168.1.3) (UDP)
rewt@cairon:~ $ dig google.com AAAA | egrep "ANSWER SECTION|Query time" -A 1
;; ANSWER SECTION:
google.com. 283 IN AAAA 2607:f8b0:4005:814::200e
--
;; Query time: 15 msec
;; SERVER: 192.168.1.3#53(192.168.1.3) (UDP)
rewt@cairon:~ $ dig google.com @::1 | egrep "ANSWER SECTION|Query time" -A 1
;; ANSWER SECTION:
google.com. 212 IN A 142.251.214.142
--
;; Query time: 15 msec
;; SERVER: ::1#53(::1) (UDP)
rewt@cairon:~ $ dig google.com @::1 AAAA | egrep "ANSWER SECTION|Query time" -A 1
;; ANSWER SECTION:
google.com. 259 IN AAAA 2607:f8b0:4005:814::200e
--
;; Query time: 3 msec
;; SERVER: ::1#53(::1) (UDP)
So, what kind of record is being requested doesn't indicate what kind of address was used to reach the DNS server. You can do all the combinations.
When I do an ifconfig I get a huge amount of output.
Did you run that on your pi?
Could you give me an ELI5 on this, too?
IPv6 interfaces can have lots of addresses. The fe80:... address is the "link-local" address. Devices autoconfigure this, and it's used basically only for communicaiton with the router. When a proper IPv6 setup takes place (whether that's DHCPv6, or SLAAC where devices are allowed to configure their own addresses with a prefix), the device gets a 2XXX:... address, a "global unicast" address. This is one that--if your firewall allowed it--would be reachable from the outside world.
Then, some setups also include a "unique local" address, which starts with something like fd67:..., and are vaguely the equivalent of local 192.168.1.x kind of addresses. They allow local devices to be reliably addressed by other local devices.
THEN, some clients generate temporary addresses, to minimize tracking. You may see two 2XXX or also two fd67 addresses.
What I was saying is that if you don't have interfaces with 2XXX:... addresses assigned to them, one way or another they are not set up to properly use IPv6 on that network. Whether that's due to IPv6 not being set up, or not being set up correctly and coincidentally not working, I'm not sure.
Is there any way I could test this? (ads coming in)
My approach isn't super-scientific, but I go to this site: Test Ad Block - Toolz
I know that with the standard block list that comes with pihole, about 57% of the ads get blocked. So if you have the standard block list and see less than 57% getting blocked, they're getting through somehow.
I'm assuming you are referring to the pie chart on the "Dashoard" page with the title "Upstream servers". I'm not sure how to determine if those servers are "v4" servers.
Heh... good point. That is what I meant but you're right: it doesn't show you. In your settings for the pihole's upstream servers, there's no IPv6 DNS servers selected at all?