pihole-FTL: block IP's from lists

Without having the illusion this is ever going to happen, clear to me as of the first response, I would like to argue your quoted statement.

The default adlists.list, suggested during the pihole installation contains https://mirror1.malwaredomains.com/files/justdomains and https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist

Do you really assume people see the word malware and abuse, and don't assume they have at least some protection against these, making it a security product in their minds?

The reason I would like pihole to take some action (implement something more than it currently is - innovate) is the fact that you can read almost anywhere the advertisers are fighting back, making it a losing battle with the current functionality of pihole.

Another feature request, made recently, is to, somehow, find a way to block recently created domains. May be not easy to implement, but could be a way to make pihole a more effective and attractive product, changes to the web interface may generate a WOW effect for some users, but since the introduction of regex, nothing has really changed.

To give my thoughts on how to implement my proposal (ain't gonna happen, I would fork if I could, but not smart enough)

  • sooner or later, pihole-FTL has an answer ready to send to the client, the original host that made the request.
  • code: If result in IPgravitylist then send 0.0.0.0 else send result.

Of course, I don't know the first thing about the source code, it's probably a lot more complicated than this, but this is how a project manager would approach the issue.

In conclusion: if you want pihole to remain relevant, you're gonna have to do something to get new users to install it. Changes to the web interface may convince some manager types, but this isn't going to have a long term effect.

1 Like