Expected Behaviour:
On startup, PiHole should read the /etc/pihole/pihole-FTL.conf file and implement those settings
Actual Behaviour:
On startup, PiHole is not reading this file and is using the default settings (I think).
Debug Token: l057m1d0dj
Notes:
I attempted to change the FTLDNS behavior for BLOCKINGMODE to NULL. Created file /etc/pihole/pihole-FTL.conf with the following contents:
AAAA_QUERY_ANALYSIS=no
BLOCKINGMODE=NULL
However, on restart of the Pi which is running PiHole, for some blocked domains it is returning the IP address of the PiHole, rather than NULL. When I attempt to manually load in a web browser a domain that is blocked with a wildcard (example.*), the website blocked interface comes up on my browser (indicative that the IP address of the PiHole is being returned and the web interface is appearing to allow me to whitelist it) and the returned IP address is the address of the PiHole as shown in the pihole.log.
A few lines of the tailed piHole log appear. IP address 135 is the computer requesting the example.net through a browser. IP address 119 is an Amazon Echo device requesting the same domain.
It looks like some of the blocked domains are being returned as 0.0.0.0 though (msmetrics.ws.sonos.com).
Jun 18 12:12:12 dnsmasq[1114]: 867 192.168.0.135/62525 query[A] example.net from 192.168.0.135
Jun 18 12:12:12 dnsmasq[1114]: 867 192.168.0.135/62525 config example.net is 192.168.0.100
Jun 18 12:12:13 dnsmasq[1114]: 868 192.168.0.135/61168 query[A] pi.hole from 192.168.0.135
Jun 18 12:12:13 dnsmasq[1114]: 868 192.168.0.135/61168 /etc/pihole/local.list pi.hole is 192.168.0.100
Jun 18 12:12:15 dnsmasq[1114]: 869 192.168.0.140/50075 query[A] nexus.officeapps.live.com from 192.168.0.140
Jun 18 12:12:15 dnsmasq[1114]: 869 192.168.0.140/50075 /etc/pihole/gravity.list nexus.officeapps.live.com is 0.0.0.0
Jun 18 12:12:20 dnsmasq[1114]: 870 192.168.0.114/40534 query[A] msmetrics.ws.sonos.com from 192.168.0.114
Jun 18 12:12:20 dnsmasq[1114]: 870 192.168.0.114/40534 /etc/pihole/gravity.list msmetrics.ws.sonos.com is 0.0.0.0
Jun 18 12:12:21 dnsmasq[1114]: 871 192.168.0.121/35217 query[A] device-metrics-us.amazon.com from 192.168.0.121
Jun 18 12:12:21 dnsmasq[1114]: 871 192.168.0.121/35217 /etc/pihole/gravity.list device-metrics-us.amazon.com is 0.0.0.0
Jun 18 12:12:24 dnsmasq[1114]: 872 192.168.0.115/38805 query[A] msmetrics.ws.sonos.com from 192.168.0.115
Jun 18 12:12:24 dnsmasq[1114]: 872 192.168.0.115/38805 /etc/pihole/gravity.list msmetrics.ws.sonos.com is 0.0.0.0
Jun 18 12:12:34 dnsmasq[1114]: 873 192.168.0.135/54826 query[SOA] local from 192.168.0.135
Jun 18 12:12:34 dnsmasq[1114]: 873 192.168.0.135/54826 forwarded local to 127.0.0.1
Jun 18 12:12:34 dnsmasq[1114]: 873 192.168.0.135/54826 validation result is SECURE
Jun 18 12:12:34 dnsmasq[1114]: 874 192.168.0.135/52072 query[PTR] b._dns-sd._udp.0.0.168.192.in-addr.arpa from 192.168.0.135
Jun 18 12:12:34 dnsmasq[1114]: 874 192.168.0.135/52072 forwarded b._dns-sd._udp.0.0.168.192.in-addr.arpa to 127.0.0.1
Jun 18 12:12:34 dnsmasq[1114]: * 192.168.0.135/52072 dnssec-query[DS] 168.192.in-addr.arpa to 127.0.0.1
Jun 18 12:12:34 dnsmasq[1114]: 875 192.168.0.135/49741 query[PTR] db._dns-sd._udp.0.0.168.192.in-addr.arpa from 192.168.0.135
Jun 18 12:12:34 dnsmasq[1114]: 875 192.168.0.135/49741 forwarded db._dns-sd._udp.0.0.168.192.in-addr.arpa to 127.0.0.1
Jun 18 12:12:34 dnsmasq[1114]: * 192.168.0.135/52072 reply 168.192.in-addr.arpa is BOGUS DS
Jun 18 12:12:34 dnsmasq[1114]: 874 192.168.0.135/52072 validation b._dns-sd._udp.0.0.168.192.in-addr.arpa is BOGUS
Jun 18 12:12:34 dnsmasq[1114]: * 192.168.0.135/49741 dnssec-query[DS] 168.192.in-addr.arpa to 127.0.0.1
Jun 18 12:12:34 dnsmasq[1114]: * 192.168.0.135/49741 reply 168.192.in-addr.arpa is BOGUS DS
Jun 18 12:12:34 dnsmasq[1114]: 875 192.168.0.135/49741 validation db._dns-sd._udp.0.0.168.192.in-addr.arpa is BOGUS
Jun 18 12:12:36 dnsmasq[1114]: 876 192.168.0.135/65453 query[SOA] local from 192.168.0.135
Jun 18 12:12:36 dnsmasq[1114]: 876 192.168.0.135/65453 forwarded local to 127.0.0.1
Jun 18 12:12:36 dnsmasq[1114]: 876 192.168.0.135/65453 validation result is SECURE
Jun 18 12:12:40 dnsmasq[1114]: 877 192.168.0.132/55648 query[SOA] local from 192.168.0.132
Jun 18 12:12:40 dnsmasq[1114]: 877 192.168.0.132/55648 forwarded local to 127.0.0.1
Jun 18 12:12:40 dnsmasq[1114]: 877 192.168.0.132/55648 validation result is SECURE
Jun 18 12:12:40 dnsmasq[1114]: 878 192.168.0.135/53816 query[SOA] local from 192.168.0.135
Jun 18 12:12:40 dnsmasq[1114]: 878 192.168.0.135/53816 forwarded local to 127.0.0.1
Jun 18 12:12:40 dnsmasq[1114]: 878 192.168.0.135/53816 validation result is SECURE
Jun 18 12:12:43 dnsmasq[1114]: 879 192.168.0.135/52200 query[SOA] local from 192.168.0.135
Jun 18 12:12:43 dnsmasq[1114]: 879 192.168.0.135/52200 forwarded local to 127.0.0.1
Jun 18 12:12:43 dnsmasq[1114]: 879 192.168.0.135/52200 validation result is SECURE
Jun 18 12:12:43 dnsmasq[1114]: 880 192.168.0.122/33967 query[A] device-metrics-us.amazon.com from 192.168.0.122
Jun 18 12:12:43 dnsmasq[1114]: 880 192.168.0.122/33967 /etc/pihole/gravity.list device-metrics-us.amazon.com is 0.0.0.0
Jun 18 12:12:45 dnsmasq[1114]: 881 192.168.0.131/52780 query[A] metrics.icloud.com from 192.168.0.131
Jun 18 12:12:45 dnsmasq[1114]: 881 192.168.0.131/52780 /etc/pihole/gravity.list metrics.icloud.com is 0.0.0.0
Jun 18 12:12:53 dnsmasq[1114]: 882 192.168.0.119/24644 query[A] www.example.com from 192.168.0.119
Jun 18 12:12:53 dnsmasq[1114]: 882 192.168.0.119/24644 config www.example.com is 192.168.0.100
Jun 18 12:12:53 dnsmasq[1114]: 883 192.168.0.119/37848 query[A] www.example.net from 192.168.0.119
Jun 18 12:12:53 dnsmasq[1114]: 883 192.168.0.119/37848 config www.example.net is 192.168.0.100
Jun 18 12:12:53 dnsmasq[1114]: 884 192.168.0.119/32670 query[A] www.example.org from 192.168.0.119
Jun 18 12:12:53 dnsmasq[1114]: 884 192.168.0.119/32670 config www.example.org is 192.168.0.100