December 15, 2019

How to set up a PiHole with PiVPN and DNS-Over-HTTPS

 This tutorial has has been updated! Please follow the new version here.

 

I was recently trying to configure my PiVPN to work how I wanted after many months of PiHole running flawlessly on my home WiFi. I ended up breaking something, so I decided to start from scratch.
This tutorial contains instructions on how I have recently setup my PiHole with this functionality on a Raspberry Pi Zero W with an Ethernet connection to my router.

I have tried to make this as easy to follow as possible. If anyone has suggestions on how to make it better, please leave a comment.

Go to this link if you want to read about what PiHole is.

PiHole Logo


Equipment Required:

  • Raspberry Pi (Pi 2 or above recommended, or a Pi Zero)
  • Official power supply or alternative that can provide the required amount of power to the Pi
  • Micro SD card (minimum 8GB, but 16 or 32 GB recommended)
  • Optional: Micro USB to Ethernet adapter for Pi Zero and Zero W (Ethernet is STRONGLY recommended)

Setting up Raspbian:

  1. Download a copy of the latest version of Raspbian Lite (or the full version, but you don't need it) from the official site here
  2. Extract the zip file
  3. Install Etcher or any other image writing tool and flash the image to the micro SD card. Etcher can be downloaded from here. NOTE: If etcher freezes while writing the image or goes to a white window, close the program and run it as Administrator. 
  4. To be able to gain access to the command line remotely, SSH access is required. This can be done by accessing the Windows readable partition of the SD Card (/boot) and creating an empty file called "ssh" or "ssh.txt". This is case-sensitive. Now SSH access will be enabled. 
  5. Insert the micro SD card into the Pi, plug in the Ethernet and then power it on. 
  6. Find the IP address of the Pi by either going to your router/switch control panel and looking for "raspberrypi" in connected devices or by downloading and using an IP scanner like Angry IP Scanner (download here). Make sure you enter the correct IP range of your network. Once again look for "raspberrypi". 
  7. Once you have found the IP address, go to Command Prompt or Terminal and enter:
    ssh pi@[IP ADDRESS]
    The default password is "raspberry". 
  8. Once your are logged in, it is strongly advised you change the default password. This can be done by entering:
    passwd
    This will ask for the current password, then the password you want to set. 
  9. One more recommended thing is to upgrade all your packages. This can be done by entering:
    sudo apt update
    sudo apt upgrade
    This may take a few minutes, depending if you installed the lite version or the full. Once complete, type:
    sudo reboot
  10. Once it has rebooted, reconnect using SSH and type:
    sudo raspi-config
    This menu allows you to change many settings on the Raspberry Pi, including setting up a WiFi connection if your board supports it, as well as setting up localisation and many other things. 
  11. In this menu, use the arrow keys to navigate to "Localisation Options" and hit Enter.
  12. Change your Locale and Timezone to make sure your time and location are set correctly. 
  13. Once finished, use the arrow keys to select "Back", then hit Enter.
  14. Go to 'Network Options" and hit Enter.
  15. Select "Hostname" and click Enter. This allows you to change the name or your Pi.
  16. Read the warning/instructions and enter the new hostname. Once complete, hit Enter.
  17. If it asks you to reboot, hit "Yes"

Installing and Configuring PiHole:

  1.  Copy this command into the Raspberry Pi terminal:
    sudo curl -sSL https://install.pi-hole.net | bashPaste this into the SSH session with the Raspberry Pi and hit Enter.
    NOTE: The command is from this link and does not include sudo on the PiHole website, however when I was installing it, it only seemed to work with sudo. 
  2. An ascii PiHole logo should appear and it should start doing some checks. 
  3. The installer should start within 1 - 2 minutes
  4. If your Raspberry Pi has more than one network interface, select the one you are using. If it is Ethernet, click "eth0", while WiFi is "wlan0".
  5. The installer will ask if you want to use IPv4 and/or IPv6 to block ads. unless you know what you are doing, leave it as the default. 
  6. Next, it will ask if you want to use your current IP address and subnet as the static IP for the PiHole. Unless you know what you are doing, click "Yes"
    NOTE: Once you know the IP address for your PiHole, it is recommended you set an IP Address reservation on your DHCP server, which is most likely your router. To find out how to do this, type your router model and "IP Address reservation" into Google. This will make sure the PiHole continues to function correctly. 
  7. The installer will ask you to confirm your settings. If they are correct, press "Yes".
  8. Next, it will ask you to select your Upstream DNS provider. unless you prefer something else, leave it as the default and hit enter. 
  9. When it asks you to confirm, press "Yes".
  10. For all of the rest of the prompts, leave it as the defaults and press "Enter" unless you know what you are doing. 
  11. Once it is complete, it will show you the Web Interface password. Write this down somewhere. 
  12. To change this password enter this command into the terminal:
    pihole -a -p
    Then follow the prompts. 
  13. Once you are back to the terminal, open up a web browser and go to:
    http://pi.hole/admin or http://[Pi IP Address]/admin
  14. Login using the password you set. 
You have now successfully setup the PiHole! To use it to block ads on your devices, you can set it up 2 ways:
  1. Set the DNS servers on your router to only include the IP Address of your Raspberry Pi
  2. Set the DNS servers of each device to the IP Address of your Raspberry Pi.
Currently, it is only setup to work on your WiFi. To make it work externally, you need to install PiVPN. 

Installing and configuring PiVPN to work with PiHole:

Installing PiVPN is quite straight-forward, and it allows you to use an encrypted connection to connect to your PiHole, as well as optionally devices on your home network. It can also be configured to encrypt and send all data through the VPN to make it look like you are at the location of the Raspberry Pi.
NOTE: For your VPN server to function its best, it is recommended you get a static Public IP address from your ISP, or (like me) your Public IP from your ISP needs to be mostly static and not change too often.


  1. Open an SSH connection to your Raspberry Pi and enter this command:
    curl -L https://install.pivpn.io | bash
    This command downloads the setup script for PiVPN and runs it. 
  2. If it asks for your password, type it in and hit Enter
  3. After this, a window should pop-up saying that it will install a VPN server on your Pi. it will next warn you that you need a static IP address for it to work properly. NOTE: This was setup in the PiHole section, but if you need to set it up now, refer to step 6 above. 
  4. Next it will ask you to select your network interface. If the Pi is connected over WiFi (NOT recommended), select wlan0 with by clicking Space, or eth0 if you are using ethernet. Once done, hit Enter.
  5. Now it will ask you to select which user will store your OpenVPN configurations. Leave it as the default "Pi" unless you know what you are doing.
  6. It will now ask you if you want to enable unattended upgrades. It is strongly recommended you enable this as it will ensure vulnerabilities are patched. 
  7. It will ask if you want to use UDP or TCP. Like it says, only use TCP if you know what you are doing. 
  8. Now it will ask you to select what port you would like to use for your VPN. It is recommended you change it slightly to make it harder for attackers to find your VPN server. I just add a random number on the end. NOTE: You need to remember this port number for later.
  9. Next it asks what level of encryption you want. Leave this as the default as increasing encryption will make it more secure, but it will slow the connection down. 
  10. Click enter to this window.
  11. Next it will ask if you want clients to connect directly to your Public IP address or through a domain name. leave it as the default unless you know what you are doing. 
  12. Now you need to select your DNS Provider. Select any as this will later be changed to the PiHole. 
  13. PiVPN should now be installed on your Raspberry Pi!
  14. It will ask you to reboot. This is recommended. 
  15. Once it has rebooted, reconnect over SSH.
  16. Next we need to setup a profile for you client device. This can be done by entering:
    pivpn add or pivpn -a
  17. Enter the required credentials.
  18. You can create as many profiles as you want. It is recommended you create one profile per device. 
  19. Now the profile has been created, you need to copy it off of your Raspberry Pi. There are multiple ways to do this, but the way I prefer (and is the easiest) is to use Filezilla. This can be downloaded from here and installed on any PC running Windows, MacOS or Linux. 
  20. Once Filezilla is installed, enter the IP address of your Pi into the Host box, the username of your Pi into the next box, that user's password into the last box, and 22 into the Port box. Then hit Quickconnect.
  21. Navigate to the folder called "ovpns" and double click it
  22. This folder should contain your client ovpn files. To download them, open the folder you want to save it in on the left and then double click the file on the right. It will then download to the folder on the left automatically. 
  23. If this file is for a phone, you can now email it or transfer it to your phone however suits you. 
  24. To use the icon file, download the OpenVPN Connect, OpenVPN for Android or OpenVPN desktop client programs and import the file. 
  25. Now we have a config file on our client device, we need to configure the server itself. To do this we need to enter this command:
    sudo nano /etc/openvpn/server.conf
    This will open the server configuration file.
  26. Remove all the lines which include "dhcp-option" and replace them with one line:
    push "dhcp-option DNS [Pi Local IP Address]
    This now makes your PiHole the DNS server for you PiVPN. 
  27. Click Ctrl+X, followed by Y and Enter to exit the editor and save the changes.
  28. To restart the VPN server and activate the changes, enter this command:
    sudo systemctl restart openvpn
  29. The VPN server will still not work as there are 2 more steps:
    1. Go to your Router and find the Port Forwarding settings. In here, we need to forward the port we used for the VPN server to the Raspberry Pi with UDP. This is most likely in the Advanced settings. This is different for every router so a quick manual read or Google search should show you how to do it on your setup.
    2. We need to change the listening settings on the PiHole. This done by navigating to the PiHole Admin Console, going to Settings, then the DNS tab. There is a section labelled 'Interface Listening Behaviour". In here, we need to select "Listen on all interfaces, permit all origins". PLEASE NOTE: Only do this if your Raspberry Pi is not accessible to the internet and is secured inside your WiFi network. If not, anyone could exploit your Raspberry Pi. 
  30. If you have ticked the box, scroll down to the bottom and click Save. 
If you try to connect to your PiVPN, the client should be able to connect and go to websites. If everything is working, congratulations! If not, check your ISP doesn't use CG-NAT or block the port you are using. 
If it still doesn't work, leave a comment below. 

The current setup is forwarding all traffic through the VPN. If this is what you want, you are done. If you want only DNS queries, or only DNS and local IP addresses to be forwarded, read on.

Setup 1: DNS queries only:
  1. Insert a "#" at the start of the line from the config file from step 23 that reads:
    push "redirect-gateway def1"This line forwards all traffic through the VPN. 
Now only DNS queries will go through the VPN! To apply these changes, enter the command from step 26 above. 

Setup 2: DNS queries and local IP addresses only:
  1. Follow the step from Setup 1.
  2. Add a line into the file that reads:
    push "route 192.168.x.x 255.255.x.x"
    The first number is the IP range of your local network. If devices use the IPs 192.168.0.1 - 255, enter 192.168.0.0. If it uses 192.168.1.1 - 255, use 192.168.1.0.
    For others, follow the pattern.
    The second set of numbers is the subnet mask. It begins with 255.255 but can end differently. Mine is "255.255.255.0" but some peoples is "255.255.255.255". To find yours, go to your router setup and it will say the subnet mask. Alternatively, find a device connected to the network and you will find the subnet mask in the network configuration settings. 
Now only local IPs and DNS should go through the VPN! Once again, to apply these changes, follow Step 26 from above. 

Optional: Installing and configuring Cloudflare DNS-Over-HTTPS:

This step is only necessary if you want your DNS queries to be encrypted once they have passed through the PiHole. If you don't need this, ignore this section, as your setup will still function as intended. 
Instructions source: link
Download link source: link
The download link above is unofficial, as the official one from the GitHub has a Segmentation Fault on most Raspberry pi's. I have used the download above and had no issues. 
  1. Go to this link, scroll down to the very bottom and find the latest version. Click on that
  2. Find the file that ends in ".tar.gz". Right click it and click "Copy Link Address" (Chrome), or a similar button in your browser. 
  3. Go to your ssh session with the PiHole and paste it onto the end of this command:
    wget [paste URL here]
  4. Once that is complete, copy this command, substituting in the name of the downloaded file:
    tar -xvzf [downloaded-file-name].tar.gz
  5. Copy the following commands, one after the other (no substitution is required):
    sudo cp ./cloudflared /usr/local/bin
    sudo chmod +x /usr/local/bin/cloudflared
  6. Enter this command:
    cloudflared -v
    If everything is working correctly, it should return something like this:
    cloudflared version 2019.11.3 (built 2019-11-21-0625 UTC)
  7. To create the cloudflared user to run the daemon, run this command:
    sudo useradd -s /usr/sbin/nologin -r -M cloudflared
  8. Next, you need to create a config in the file /etc/default/cloudflared. This is the command cloudflared uses on startup. It can be created by entering:
    sudo nano /etc/default/cloudflared
  9. Enter in file:CLOUDFLARED_OPTS=--port 5053 --upstream https://1.1.1.1/dns-query --upstream https://1.0.0.1/dns-query
  10. To exit and save changes, press Ctrl+X, followed by Y, followed by Enter. 
  11. Change the file permissions so cloudflared can access it:
    sudo chown cloudflared:cloudflared /etc/default/cloudflared
    sudo chown cloudflared:cloudflared /usr/local/bin/cloudflared
  12. Next you need to create the systemd script to allow you to control cloudflared. This is done by creating the file /etc/systemd/cloudflared.service and entering some text:
    sudo nano /etc/systemd/system/cloudflared.service
    Enter in the file:[Unit]
    Description=cloudflared DNS over HTTPS proxy
    After=syslog.target network-online.target

    [Service]
    Type=simple
    User=cloudflared
    EnvironmentFile=/etc/default/cloudflared
    ExecStart=/usr/local/bin/cloudflared proxy-dns $CLOUDFLARED_OPTS
    Restart=on-failure
    RestartSec=10
    KillMode=process

    [Install]
    WantedBy=multi-user.target
  13. Follow step 10 to exit nano
  14. To enable cloudflared, enter these 3 commands:
    sudo systemctl enable cloudflared
    sudo systemctl start cloudflared
    sudo systemctl status cloudflared
  15. Cloudflared should now be working. It is functioning if the third command above doesn't show any errors. If it does:1. Enter this command:
    sudo systemctl restart cloudflared
    Once this has completed, enter the status command from the last step. If errors still appear, try a few more times. 
    2. Make sure your time is set correctly in raspi-config under "Localisation Options".
    3. According to this issue report, this behaviour can be caused by the internet dropping out. If you have unstable/unreliable internet, that might be your problem.
    If it still doesn't work, leave a comment below. 
  16. To set the PiHole DNS to cloudflared, go to the PiHole Admin Console, click on 'Settings" on the left, go the the "DNS" tab and enter this into the custom DNS 1 box:
    127.0.0.1#5053
    Then untick all the other boxes and tick the custom one. 
  17. Scroll down to the very bottom and hit Save.
Cloudflared should now be working with PiHole clients! You can test it by going to this site. It should show a green tick unless you are running DNSSEC as well, which it will show a yellow question mark. 

Hopefully this tutorial has helped you setup your PiHole, PiVPN and optionally DNS-Over-HTTPS.

Please leave a comment if you have any feedback or questions.
Once I create more tutorials, you check them out here

37 comments:

  1. For PiVPN, under Setup 2 you don't specify what to use for the "x.x" for the subnet mask.

    ReplyDelete
    Replies
    1. Thanks for that. I added a description on what the subnet is.

      Delete
  2. In step 1 under "Installing and configuring PiVPN to work with PiHole:" there is a typo: "conenction". For the rest great tutorial.

    ReplyDelete
    Replies
    1. Thank you for letting me know. It has now been fixed.

      Delete
  3. Thanks for the guide, I still can't connect the VPN after all steps are performed. The log keeps saying connection timeout. Any suggestions?

    ReplyDelete
    Replies
    1. Here are a few things to check:
      1. Is your port forwarded?
      2. Does your ISP use CG-NAT? To check, go to your router/modem config panel and find you public IP address. Now go to google and search 'what is my IP'. If these numbers are different, you need your ISP to disable CG-NAT or it won't work.
      If it is not one of these, let me know.

      Delete
    2. So port is forwarded and open but it seems to just timeout connecting. If I put the wrong password it refuses the connection. I can't figure it out at all.

      EVENT: CONNECTING
      2019-12-17 12:05:32 Tunnel Options:V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client

      2019-12-17 12:05:32 Creds: UsernameEmpty/PasswordEmpty

      2019-12-17 12:05:32 Peer Info:
      IV_GUI_VER=net.openvpn.connect.ios 3.1.0-2771
      IV_VER=3.git::2ae73415
      IV_PLAT=ios
      IV_AUTO_SESS=1

      2019-12-17 12:05:50 EVENT: CONNECTION_TIMEOUT [ERR]

      2019-12-17 12:05:50 Raw stats on disconnect:
      BYTES_IN : 132
      BYTES_OUT : 9068
      PACKETS_IN : 2
      PACKETS_OUT : 58
      KEEPALIVE_TIMEOUT : 1
      CONNECTION_TIMEOUT : 1
      N_RECONNECT : 1

      2019-12-17 12:05:50 Performance stats on disconnect:
      CPU usage (microseconds): 334986
      Network bytes per CPU second: 27463
      Tunnel bytes per CPU second: 0

      2019-12-17 12:05:50 EVENT: DISCONNECTED

      And that just repeats. Any advice?

      Delete
    3. Can you send me your server.conf file to [email protected]? Make sure you remove any public ips and the cert and key file names at the top.

      Delete
  4. Could you possibly do a version for non RaspberryPi systems (e.g. Debian/Ubuntu/CentOS) and with perhaps Nginx for public DoH access?

    ReplyDelete
    Replies
    1. I may look into that. Thank you for the idea though.

      Delete
  5. so i got this vpn working on my rp4b along with pi hole. and i opened a port for it. how do i protect the RP?

    ReplyDelete
    Replies
    1. This link contains many of the basic ways to do so. https://www.raspberrypi.org/documentation/configuration/security.md
      Also, make sure you enabled Unattended Upgrades. Finally, I havent done anything extra to secure my Pi as OpenVPN is pretty good at doing so.

      Delete
  6. I am running Dietpi, and have a well-functioning PiHole install. I have tried installing PiVPN twice from the Dietpi-Software list, and each time, it ends up breaking DNS completely on my network. The PiHole is acting as the sole DNS server for the network. Any ideas anyone?

    ReplyDelete
  7. Thank you for this fantastic step by step guide--this helped me *finally* put my RasPi 3B to use.

    However I stop at step 1 of the PiVPN section because the "curl...bash" command ends with an error: "Failed to install iptables-persistent". It appears similar to a reported bug; should I submit a new issue? --> https://github.com/pivpn/pivpn/issues/943

    ReplyDelete
    Replies
    1. I don't think you need to submit a new issue as someone had already. Did you follow the link in the issue post to a possible solution?

      Delete
    2. I am getting a 403 error on the command "apt-get install iptables-persistent", but I can ping that IP and also "raspbian.raspberrypi.org" which returns the same IP. Oddly, "traceroute" to that IP or domain fails after 9 hops.

      E: Failed to fetch http://raspbian.raspberrypi.org/raspbian/pool/main/i/iptables-persistent/netfilter-persistent_1.0.11_all.deb 403 Forbidden [IP: 146.112.61.106 80]

      Delete
    3. Have you tried doing "sudo apt update" and then running that command again? Also, did you run it with sudo?

      Delete
    4. @Harrison: Yes and yes. I get the same "forbidden" still. I'll ask specifically about this over on r/raspberry_pi.

      Delete
    5. If you don't get an answer from there, check out r/pihole as they are a really good community.

      Delete
  8. Clear and complete step by step tutorial, helped me a lot, thank you!

    ReplyDelete
  9. I installed DNS over HTTPS and now as i go to the test site it shows that DNSSEC is activated. But its actually deactivated. Can anyone explain this?

    ReplyDelete
    Replies
    1. When you say deactivated, do you mean pihole isn't set to use it? Also, due to the many issues I had with DOH, I'd recommend using unbound instead.

      Delete
    2. So is there any guide how to use unbound?

      Delete
    3. Also as i select the two Cloudflare IPv6 Servers and i start the test, it says there is no Secure DNS.

      Delete
    4. This is the tutorial to setup unbound. You'll want to uninstall is at least disable cloudflared before installing: https://docs.pi-hole.net/guides/unbound/

      Delete
  10. Is there a way when I connect remotely to PiVPN that I can "see" the local computers and any locally shared folders?

    ReplyDelete
    Replies
    1. Sure can. Follow setup 2 to get this to work.

      Delete
    2. That was perfect. Thanks. If I want to tunnel all my traffic, not just my DNS queries, leave this server.conf uncommented out?
      push "redirect-gateway def1"
      I was messing with OpenVPN on the Asus router for years. Thanks so much for this.

      Delete
    3. That is correct.
      Also, I haven't written a tutorial yet, but you can also use pivpn with wireguard to achieve the same effect but with less battery drain, although OpenVPN does work just fine.

      Delete
  11. Great guide! I have tried following through and managed to get my pihole and vpn running seperately. However, when i attempted to link them together, either service would break. Currently, my vpn seems to not be able to make any dns query when i link it to my pihole. I tried following https://marcstan.net/blog/2017/06/pivpn-and-pi-hole/, and it would work, but the pi.hole would then not work locally.

    dev tun
    proto udp
    port 1194
    ca /etc/openvpn/easy-rsa/pki/ca.crt
    cert /etc/openvpn/easy-rsa/pki/issued/raspberrypi_edcdc17c-9850-4d9b-95b1-00508$
    key /etc/openvpn/easy-rsa/pki/private/raspberrypi_edcdc17c-9850-4d9b-95b1-00508$
    dh none
    ecdh-curve prime256v1
    topology subnet
    server 10.8.0.0 255.255.255.0
    # Set your primary domain name server address for clients
    #push "dhcp-option DNS 9.9.9.9"
    #push "dhcp-option DNS 149.112.112.112"
    push "dhcp-option DNS 192.168.1.200" <- I have changed this to reflect my pi.hole ip address
    # Prevent DNS leaks on Windows
    push "block-outside-dns"
    # Override the Client default gateway by using 0.0.0.0/1 and
    # 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of
    # overriding but not wiping out the original default gateway.
    push "redirect-gateway def1"
    client-to-client
    client-config-dir /etc/openvpn/ccd
    keepalive 15 120
    remote-cert-tls client
    tls-version-min 1.2
    tls-crypt /etc/openvpn/easy-rsa/pki/ta.key
    cipher AES-256-CBC
    auth SHA256
    user openvpn
    group openvpn
    persist-key
    persist-tun
    crl-verify /etc/openvpn/crl.pem
    status /var/log/openvpn-status.log 20
    status-version 3
    syslog
    verb 3
    #DuplicateCNs allow access control on a less-granular, per user basis.
    #Remove # if you will manage access by user instead of device.
    #duplicate-cn
    # Generated for use by PiVPN.io

    ReplyDelete
    Replies
    1. I would recommend you uninstall PiVPN and reinstall it but select Wireguard instead of PiVPN. The performance is better, and if I remember correctly it can detect Pihole and configure it automatically.
      If you have any other issues let me know.

      Delete
    2. Sorry I meant select Wireguard instead of OpenVPN

      Delete
  12. When I run cloudflared -v i get this error: /lib/ld-linux.so.3: No such file or directory

    I am running Raspberry Pi Desktop on a VM.

    ReplyDelete
    Replies
    1. Hi,
      This tutorial is out of date. I highly recommend you stop using cloudflared and switch to Unbound.
      The new tutorial is linked at the top of the post.

      Delete
    2. Thanks! Unbound is working perfectly :)

      Delete

Ad