[SOLVED] Why is my custom blocklist not working?

I created a blocklist to block gaming sites. A snippet of this blocklist is

# surviv.io
0.0.0.0 surviv.io
0.0.0.0 na-nyc-p1.surviv.io
0.0.0.0 na-sfo-p1.surviv.io
0.0.0.0 na-chi-p1.surviv.io

But for some reason, it is not working and I assume that the format of my blocklist is incorrect, For example, if I ping surviv.io, I see in /var/log/pihole.log:

Jan 30 08:24:44 dnsmasq[3866]: query[A] surviv.io from 192.168.1.11
Jan 30 08:24:44 dnsmasq[3866]: forwarded surviv.io to 208.67.222.222
Jan 30 08:24:44 dnsmasq[3866]: query[AAAA] surviv.io from 192.168.1.11
Jan 30 08:24:44 dnsmasq[3866]: forwarded surviv.io to 208.67.222.222
Jan 30 08:24:44 dnsmasq[3866]: reply surviv.io is 104.17.61.91
Jan 30 08:24:44 dnsmasq[3866]: reply surviv.io is 104.16.118.94
Jan 30 08:24:44 dnsmasq[3866]: reply surviv.io is 2606:4700::6810:765e
Jan 30 08:24:44 dnsmasq[3866]: reply surviv.io is 2606:4700::6811:3d5b

On the other hand, if I ping quantummetric.com which is on https://v.firebog.net/hosts/static/w3kbl.txt, I get:

Jan 30 08:29:55 dnsmasq[3866]: query[A] quantummetric.com from 192.168.1.11
Jan 30 08:29:55 dnsmasq[3866]: gravity blocked quantummetric.com is 0.0.0.0
Jan 30 08:29:55 dnsmasq[3866]: query[AAAA] quantummetric.com from 192.168.1.11
Jan 30 08:29:55 dnsmasq[3866]: gravity blocked quantummetric.com is ::

I am running this in an i386 based Debian box.

How are you loading your custom blocklist into Pi-hole?

Please generate a debug log, upload it when prompted and post the token here.

It is hosted on github.

This is the token: https://tricorder.pi-hole.net/d27vogb0dd

You have this blocklist assigned to group 1 (gaming), but there are no clients assigned to that group. As a result, the blocklist is not applied to any clients.

* [ DIAGNOSING ]: Groups
   id    enabled  name                                                date_added           date_modified        description                                       
   ----  -------  --------------------------------------------------  -------------------  -------------------  --------------------------------------------------
   0           1  Default                                             2021-01-06 12:01:08  2021-01-06 12:01:08  The default group                                 
   1           1  Gaming                                              2021-01-28 10:43:31  2021-01-28 20:33:13                                                    
                                                    

*** [ DIAGNOSING ]: Clients

*** [ DIAGNOSING ]: Adlists
   id    enabled  group_ids     address                                                                                               date_added           date_modified        comment                                           
   ----  -------  ------------  ----------------------------------------------------------------------------------------------------  -------------------  -------------------  --------------------------------------------------
   1        0     0             https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts                                      2021-01-06 12:01:08  2021-01-27 10:44:52  Migrated from /etc/pihole/adlists.list            
   ...                     
   7           1  1             https://raw.githubusercontent.com/zoof/Gaming-blocklist/main/hosts                                    2021-01-28 09:33:39  2021-01-28 10:43:51  Gaming

Ah, that makes sense! Thank you!

Related to this, do I need the 0.0.0.0 before each host in my list? I see this in StevenBlack's lists but not on others.

It's optional. Many public blocklists are used as native hosts files, and this requires an IP mapping. The NULL IP leads to nowhere and is commonly used here to block domains.

Pi-hole strips out any leading IP's and just keeps the domains. So, if you are using your list for Pi-hole only, you can omit the leading IP's, but this is not required. Pi-hole will remove them.

Thank you!

So there's something that is still not working. I have pd.na.a.pvp.net and pd.na.a.pvp.net.cdn.cloudflare.net in my blocklist and it seems to still be forwarding these requests.

Jan 31 10:22:47 dnsmasq[3866]: query[AAAA] pd.na.a.pvp.net from 192.168.1.66
Jan 31 10:22:47 dnsmasq[3866]: forwarded pd.na.a.pvp.net to 208.67.222.222
Jan 31 10:22:47 dnsmasq[3866]: reply pd.na.a.pvp.net is <CNAME>
Jan 31 10:22:47 dnsmasq[3866]: reply pd.na.a.pvp.net.cdn.cloudflare.net is NODATA-IPv6

Any ideas what the problem might be? The new debug link is https://tricorder.pi-hole.net/30vqnchgyn.

This topic was automatically closed 21 days after the last reply. New replies are no longer allowed.