Family safe dns blocklist


#1

So I’m hoping that there is a way to have this double to block inappropriate sites into my home network as well. is there a way to do this? I don’t know if there is some sort of community supported block list that I can just add/update in the pihole config or something.

Any ideas?


#2

All of our lists are sourced from third-parties. As long as you can get a list of just domain names, you can add them to your whitelist. You can also use adlists.list to block more than just advertisements.


#3

To test the “blocklist” I added my own domain to it so all that is in the file is:

*mydomain.com

…ran the gravity script but it doesn’t seem to be blocking it for some reason.

Should I add it in the ‘addlist.list’ and try that?


#4

Are you on the latest version? If so, then you just need to run pihole blacklist domain1 [domain2 …] (filling in the domains) to blacklist domains. If you are not on the latest version, you can update by running curl -L https://install.pi-hole.net | bash.

Or, as supernova mentioned, you could make your own list/find one and add a link to it to the ad list file (make sure the linked list just contains domains separated by a newline).

Also remember that on client machines the domains may not become blocked until after a period of time, since they usually cache DNS records for a few minutes.


#5

Just did updated pi-hole as you suggested…did a dns flush on my windows machine and still can get to the domain that is in my blacklist. I even double checked that it is still in the blacklist.txt.

Also, after the update, it looks like the whitelist.sh and blacklist.sh are somewhere else…anyone know where they are? There is only the pihole executable in /usr/local/bin now.


#6

You can just run pihole blacklist domain1 [domain2 …]. So if you wanted to block mydomain.com you would run this command:

pihole blacklist mydomain.com

This will probably be the easiest solution. So you could just paste a bunch of domains in, so then your command would look like this:

pihole blacklist mydomain.com anotherdomain.com blockthisdomain.com


#7

You might want to switch to the “Policy 2” Norton DNS, OpenDNS Family Shield (now owned by Cisco, who also owns Sourcefire, one of the largest intrusion protection system companies), or the Comodo settings for the public-facing DNS on the RPi. You can modify the dnsmasq settings in /etc/dnsmasq.d/01-pihole.conf, then reload or restart dnsmasq.

The advantage of this choice is that it doesn’t require updating of the text files because the entries are managed by the DNS provider.

=V=


#8

As velociraptor said it is best to use a resolver that block adult content and not custom lists because every days hundreds of new sites/names appear.
Another reason is that actual adult blocking lists are so big that at this moment as it is pihole web interface will not handle that amount of data and will crash web interface when you try to check the logs.
I am using OpenDNS with customs settings for children ( porn + other categories )… it is free for home use.

edit.
In addition to that you can also force safemode for google/bing…
have a look here


#9

hello

don’t miss to block the adult specific domains name :

xxx
sex
sexy
porn

regards


#10

Nice. I am using OpenDNS as will. But as OpenDNS has been taken over by Cisco and other DNS providers are taken over / being taken over, I would like to have this in control myself. My assumption is that DNS data can and will be used for profiling etc. and I would like to prevent that as much as possible.

Therefore: are there any free available lists available for the content categories listed in OpenDNS? This would make it possible to sort out content filtering within Pi-Hole as well, also theoretically increasing perceived internet speed as will. Ideally, instead of showing a blank screen, the content filtering should show which filtered categorie(s) is blocking access (just as OpenDNS does)


#11

@Videopac

And that works for you? I’m in the process of setting this up, but no matter whether I use the “normal” OpenDNS servers or the FamilyShield Servers (208.67.222.123 and 208.67.220.123) (I found some contradicting docs in which to actually use for FamilyShield) I see nothing being logged in my OpenDNS dashboard (stats are turned on and my network is properly registered).


#12

I never had the need to have a look at the logs (yet). What might be a reason to go through the logs? The content filtering works, that’s what counts for me.