The Beauty of Having a Pi-Hole (2024)

DNS arms race and Pi-hole limitations

  • Many comments note that simple iptables rules that redirect port 53 only catch plain DNS; apps using DNS-over-HTTPS (DoH), DNS-over-TLS (DoT), hardcoded DNS, or even custom HTTP-based DNS bypass Pi-hole completely.
  • Browsers and apps increasingly ship with DoH (e.g., Telegram, iOS, some IoT), making router-level DNS interception less effective.
  • Workarounds discussed:
    • Blocking known DoH/DoT IPs and hostnames via curated blocklists.
    • Enterprise-style tools (e.g., Zenarmor) that detect and intercept DoH.
    • Aggressive approaches: mapping every AAAA/A lookup to NAT’d addresses and only allowing connections to those, or stateful rules that drop connections to IPs not resolved via the local resolver.
  • Several people frame this as an endless “arms race”; some think TLS MITM and certificate pinning make deeper inspection increasingly impractical, especially for IoT.

Alternatives and deployment models

  • You don’t need a Raspberry Pi or Pi-hole specifically: dnsmasq, Unbound, AdGuard Home, pfBlocker, OPNSense/RouterOS, etc., can provide similar DNS-level blocking.
  • Many run Pi-hole/AdGuard in Docker or VMs on always-on machines, NASes, or VPSes. Others use NextDNS (cloud), sometimes combined with Tailscale for roaming devices.
  • Several point out that a Pi 5 kit is overkill; even very old Pis (Zero, Model B) or small x86 mini-PCs easily handle the load.

Why use network-wide blocking at all?

  • Pro-Pi-hole arguments:
    • Covers non-browser traffic: mobile apps, smart TVs, game consoles, IoT, desktop software telemetry.
    • Useful for nontechnical family members and guests without configuring every device.
    • Provides insight into what devices are “phoning home”.
  • Many combine Pi-hole/AdGuard with uBlock Origin/SponsorBlock in browsers for layered blocking.

Usability, breakage, and reliability

  • DNS-level blocking can break services expecting ads or ad domains (e.g., streaming services, Google ad click-throughs, some payment/log-in flows).
    • Typical mitigation: inspect Pi-hole logs and selectively whitelist problem domains.
  • Some report months–years of “set and forget” stability; others mention mysterious failures, network outages when the Pi-hole is down, or family unable to troubleshoot.
    • Suggested mitigations: static IPs, dual Pi-holes, fallback DNS, separate SSIDs/guest networks, VPN access to fix issues remotely.

Broader views on the modern web

  • Several see Pi-hole as essential because “raw” internet with full ads/telemetry feels unusable.
  • Others argue the underlying problem is hostile, ad-driven service design; some try to reduce connected devices or avoid ad-heavy sites altogether, or worry about depriving smaller sites of ad revenue.