New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Installation breaks Ubuntu's systemd-resolved #4816
Comments
Relevant code: pi-hole/automated install/basic-install.sh Lines 1657 to 1678 in aefbe1f
|
Pi-hole won't start if |
Considering the number of Ubuntu installs that are working perfectly fine, I think it's a well supported OS for Pi-hole. Now, if you'd like to see why your system is different then we're happy to take a look. |
I don't follow. Is this because they both run on port 53? I set
That's fair. I'm not sure what's special about my system and I'm not sure where to start looking. The only network related packages I've installed are docker and wireguard. I'm pretty sure it's just the systemd bug I linked that's screwed me over. |
I am also encountering the same issue and I wonder what other package or app is using the port |
This, from the Readme on our Docker image, may be of some use: https://github.com/pi-hole/docker-pi-hole#installing-on-ubuntu |
Yes.
Where there is a problem is that the installer is doing half the job. I'm not sure if something changed recently with |
link is now https://github.com/pi-hole/docker-pi-hole#installing-on-ubuntu-or-fedora |
I am new to open source. This is what my thinking pattern is currently, so please correct me if I am wrong. If I am not getting it wrong the |
I've been scratching my head around this: For people that wants to use systemd-resolved and its DNS over TLS capacity for instance, there's no way around using it, this is especially useful if you're using an authoritative DNS server/forwarder like BIND9 that does not handle DNS over TLS and setup your DNS forwarding this way: The problem is that dnsmasq by default tries to bind on 0.0.0.0 (everything):
To avoid this, create a separate conf file for dnsmasq: Add:
Save it and reload Pi-Hole service. Dnsmasq will correctly bind the interfaces available and not 0.0.0.0 nor 127.0.0.53:
Hope that helps. On a side note: I think this is a better approach than forcefully setting |
Versions
Pi-hole version is v5.11.4 (Latest: v5.11.4)
AdminLTE version is v5.13 (Latest: v5.13)
FTL version is v5.16.1 (Latest: v5.16.1)
Platform
Expected behavior
pi-hole should never mess with the host system's DNS client
Actual behavior / bug
pi-hole screws up the host system's DNS client
Steps to reproduce
This is likely related to systemd/systemd#14700
Running
sudo systemctl status systemd-resolved
printsDNSStubListener= is disabled, but /etc/resolv.conf is a symlink to /run/systemd/resolve/stub-resolv.conf which expects DNSStubListener= to be enabled.
I see the install log line
[✓] Disabling systemd-resolved DNSStubListener and restarting systemd-resolved
which is exactly the wrong thing to do regardless of the systemd bug. It leaves the server broken until I undo the change to/etc/systemd/resolved.conf
.IMO the ubuntu should not be listed as a supported OS if a default install on an LTS version breaks the system.
The text was updated successfully, but these errors were encountered: