Guest User

Untitled

a guest
Feb 22nd, 2018
224
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.73 KB | None | 0 0
  1. *** [ INITIALIZING ]
  2. [i] 2018-02-22:10:17:41 debug log has been initialized.
  3.  
  4. *** [ INITIALIZING ] Sourcing setup variables
  5. [i] Sourcing /etc/pihole/setupVars.conf...
  6.  
  7. *** [ DIAGNOSING ]: Core version
  8. [i] Core: v3.2.1 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249)
  9. [i] Branch: master
  10. [i] Commit: v3.2.1-73-g1e87850
  11.  
  12. *** [ DIAGNOSING ]: Web version
  13. [i] Web: v3.3 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249)
  14. [i] Branch: master
  15. [i] Commit: v3.3-0-ge48aa29
  16.  
  17. *** [ DIAGNOSING ]: FTL version
  18. [✓] FTL: v3.0 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249)
  19.  
  20. *** [ DIAGNOSING ]: dnsmasq version
  21. [i] 2.72
  22.  
  23. *** [ DIAGNOSING ]: lighttpd version
  24. [i] 1.4.35
  25.  
  26. *** [ DIAGNOSING ]: php version
  27. [i] 5.6.30
  28.  
  29. *** [ DIAGNOSING ]: Operating system
  30. [✓] Raspbian GNU/Linux 8 (jessie)
  31.  
  32. *** [ DIAGNOSING ]: SELinux
  33. [i] SELinux not detected
  34.  
  35. *** [ DIAGNOSING ]: Processor
  36. /opt/pihole/piholeDebug.sh: line 470: $'[\E[32m✓\E[0m] \E[32marmv6l\E[0m': command not found
  37.  
  38. *** [ DIAGNOSING ]: Networking
  39. [✓] IPv4 address(es) bound to the eth0 interface:
  40. 192.168.0.21/24 does not match the IP found in /etc/pihole/setupVars.conf (https://discourse.pi-hole.net/t/use-ipv6-ula-addresses-for-pi-hole/2127)
  41.  
  42. [✓] IPv6 address(es) bound to the eth0 interface:
  43. fe80::26a5:b629:f948:92c3 does not match the IP found in /etc/pihole/setupVars.conf (https://discourse.pi-hole.net/t/use-ipv6-ula-addresses-for-pi-hole/2127)
  44.  
  45. ^ Please note that you may have more than one IP address listed.
  46. As long as one of them is green, and it matches what is in /etc/pihole/setupVars.conf, there is no need for concern.
  47.  
  48. The link to the FAQ is for an issue that sometimes occurs when the IPv6 address changes, which is why we check for it.
  49.  
  50. [i] Default IPv4 gateway: 192.168.0.1
  51. * Pinging 192.168.0.1...
  52. [✓] Gateway responded.
  53.  
  54. *** [ DIAGNOSING ]: Ports in use
  55. [] is in use by
  56. [22] is in use by sshd
  57. [80] is in use by lighttpd
  58. [4711] is in use by pihole-FTL
  59.  
  60. *** [ DIAGNOSING ]: Name resolution (IPv4) using a random blocked domain and a known ad-serving domain
  61. [✗] Failed to resolve www.mannyimages.com via localhost (127.0.0.1)
  62. [✗] Failed to resolve www.mannyimages.com via Pi-hole (192.168.0.21)
  63. [✓] doubleclick.com is 216.58.201.14 via a remote, public DNS server (8.8.8.8)
  64.  
  65. *** [ DIAGNOSING ]: Pi-hole processes
  66. [✗] dnsmasq daemon is failed
  67. [✓] lighttpd daemon is active
  68. [✓] pihole-FTL daemon is active
  69.  
  70. *** [ DIAGNOSING ]: Setup variables
  71. DNS_FQDN_REQUIRED=true
  72. DNS_BOGUS_PRIV=true
  73. PIHOLE_INTERFACE=eth0
  74. IPV4_ADDRESS=192.168.0.21
  75. IPV6_ADDRESS=
  76. PIHOLE_DNS_1=8.8.8.8
  77. PIHOLE_DNS_2=8.8.4.4
  78. QUERY_LOGGING=true
  79. INSTALL_WEB=true
  80. LIGHTTPD_ENABLED=1
  81.  
  82. *** [ DIAGNOSING ]: Dashboard and block page
  83. [✓] X-Pi-hole: A black hole for Internet advertisements.
  84. [✓] X-Pi-hole: The Pi-hole Web interface is working!
  85.  
  86. *** [ DIAGNOSING ]: Gravity list
  87. -rw-r--r-- 1 root root 40357591 Feb 18 03:50 /etc/pihole/gravity.list
  88. -----head of gravity.list------
  89. 192.168.0.21 0.0.0.0
  90. 192.168.0.21 00000000000.com.cn
  91. 192.168.0.21 000000-0.000webhostapp.com
  92. 192.168.0.21 0000000000-windows-block-notification.online
  93.  
  94. -----tail of gravity.list------
  95. 192.168.0.21 zzzzc.homedrugseshop.ru
  96. 192.168.0.21 zzzzz4.52896368.com
  97. 192.168.0.21 zzzzz.cauction.hop.clickbank.net
  98. 192.168.0.21 zzzzz.regmum.hop.clickbank.net
  99.  
  100. *** [ DIAGNOSING ]: contents of /etc/pihole
  101.  
  102. -rw-r--r-- 1 root root 4907 Oct 20 11:56 /etc/pihole/adlists.list
  103. https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
  104. https://mirror1.malwaredomains.com/files/justdomains
  105. http://sysctl.org/cameleon/hosts
  106. https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
  107. https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
  108. https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
  109. https://hosts-file.net/ad_servers.txt
  110. https://hosts-file.net/grm.txt
  111. https://reddestdream.github.io/Projects/MinimalHosts/etc/MinimalHostsBlocker/minimalhosts
  112. https://raw.githubusercontent.com/StevenBlack/hosts/master/data/KADhosts/hosts
  113. https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Spam/hosts
  114. https://v.firebog.net/hosts/BillStearns.txt
  115. https://www.dshield.org/feeds/suspiciousdomains_Low.txt
  116. https://raw.githubusercontent.com/piwik/referrer-spam-blacklist/master/spammers.txt
  117. https://hostsfile.org/Downloads/hosts.txt
  118. https://raw.githubusercontent.com/Dawsey21/Lists/master/main-blacklist.txt
  119. https://raw.githubusercontent.com/vokins/yhosts/master/hosts
  120. https://v.firebog.net/hosts/Airelle-trc.txt
  121. https://v.firebog.net/hosts/Easyprivacy.txt
  122. https://v.firebog.net/hosts/Prigent-Ads.txt
  123. https://raw.githubusercontent.com/quidsup/notrack/master/trackers.txt
  124. https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.2o7Net/hosts
  125. https://raw.githubusercontent.com/StevenBlack/hosts/master/data/tyzbit/hosts
  126. https://v.firebog.net/hosts/Airelle-hrsk.txt
  127. https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt
  128. https://mirror1.malwaredomains.com/files/justdomains
  129. https://hosts-file.net/exp.txt
  130. https://hosts-file.net/emd.txt
  131. https://hosts-file.net/psh.txt
  132. https://mirror.cedia.org.ec/malwaredomains/immortal_domains.txt
  133. https://www.malwaredomainlist.com/hostslist/hosts.txt
  134. https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Report_Appendix_D.txt
  135. https://openphish.com/feed.txt
  136. https://v.firebog.net/hosts/Prigent-Malware.txt
  137. https://v.firebog.net/hosts/Prigent-Phishing.txt
  138. https://raw.githubusercontent.com/quidsup/notrack/master/malicious-sites.txt
  139. https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
  140. https://v.firebog.net/hosts/Shalla-mal.txt
  141. https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Risk/hosts
  142. https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
  143. https://hosts-file.net/grm.txt
  144. https://reddestdream.github.io/Projects/MinimalHosts/etc/MinimalHostsBlocker/minimalhosts
  145. https://raw.githubusercontent.com/StevenBlack/hosts/master/data/KADhosts/hosts
  146. https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Spam/hosts
  147. https://v.firebog.net/hosts/static/w3kbl.txt
  148. https://adaway.org/hosts.txt
  149. https://v.firebog.net/hosts/AdguardDNS.txt
  150. https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
  151. https://hosts-file.net/ad_servers.txt
  152. https://v.firebog.net/hosts/Easylist.txt
  153. https://raw.githubusercontent.com/StevenBlack/hosts/master/data/SpotifyAds/hosts
  154. https://raw.githubusercontent.com/StevenBlack/hosts/master/data/UncheckyAds/hosts
  155. https://v.firebog.net/hosts/Airelle-trc.txt
  156. https://v.firebog.net/hosts/Easyprivacy.txt
  157. https://v.firebog.net/hosts/Prigent-Ads.txt
  158. https://raw.githubusercontent.com/quidsup/notrack/master/trackers.txt
  159. https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.2o7Net/hosts
  160. https://raw.githubusercontent.com/StevenBlack/hosts/master/data/tyzbit/hosts
  161. https://v.firebog.net/hosts/Airelle-hrsk.txt
  162. https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt
  163. https://mirror1.malwaredomains.com/files/justdomains
  164. https://hosts-file.net/exp.txt
  165. https://hosts-file.net/emd.txt
  166. https://hosts-file.net/psh.txt
  167. https://mirror.cedia.org.ec/malwaredomains/immortal_domains.txt
  168. https://www.malwaredomainlist.com/hostslist/hosts.txt
  169. https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Report_Appendix_D.txt
  170. https://v.firebog.net/hosts/Prigent-Malware.txt
  171. https://v.firebog.net/hosts/Prigent-Phishing.txt
  172. https://raw.githubusercontent.com/quidsup/notrack/master/malicious-sites.txt
  173. https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
  174. https://v.firebog.net/hosts/Shalla-mal.txt
  175. https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Risk/hosts
  176. https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
  177. https://gist.github.com/10ZiN/748054e1df8e6eb5b08c8c0c0994ab6d/raw/de09de7c6c85f4768ae6adc366f9dc750bf84368/hosts.txt
  178. https://gist.github.com/10ZiN/9e04e88e1add39ef75ba14fa4da44172/raw/857344dd7732be82380c230dd36f095dab7ac176/partial.txt
  179. https://hosts-file.net/download/hosts.txt
  180. https://hosts-file.net/partial.txt
  181.  
  182. -rw-r--r-- 1 root root 25 Dec 9 15:38 /etc/pihole/blacklist.txt
  183. cdn.ss.anno.channel4.com
  184.  
  185. -rw-r--r-- 1 root root 46 Feb 18 03:49 /etc/pihole/local.list
  186. 192.168.0.21 raspberrypi
  187. 192.168.0.21 pi.hole
  188.  
  189. -rw-r--r-- 1 root root 234 Feb 22 09:49 /etc/pihole/logrotate
  190. /var/log/pihole.log {
  191. su root root
  192. daily
  193. copytruncate
  194. rotate 5
  195. compress
  196. delaycompress
  197. notifempty
  198. nomail
  199. }
  200. /var/log/pihole-FTL.log {
  201. su root root
  202. weekly
  203. copytruncate
  204. rotate 3
  205. compress
  206. delaycompress
  207. notifempty
  208. nomail
  209. }
  210.  
  211. -rw-r--r-- 1 root root 1272 Feb 14 09:21 /etc/pihole/whitelist.txt
  212. raw.githubusercontent.com
  213. mirror1.malwaredomains.com
  214. sysctl.org
  215. zeustracker.abuse.ch
  216. s3.amazonaws.com
  217. hosts-file.net
  218. click.email.holidaylettings.co.uk
  219. reddestdream.github.io
  220. v.firebog.net
  221. www.dshield.org
  222. hostsfile.org
  223. hostsfile.mine.nu
  224. adblock.mahakala.is
  225. mirror.cedia.org.ec
  226. www.malwaredomainlist.com
  227. bitbucket.org
  228. openphish.com
  229. ransomwaretracker.abuse.ch
  230. rover.ebay.com
  231. accounts.youtube.com
  232. mailchimp.com
  233. dropbox.com
  234. video-downloads.googleusercontent.com
  235. clientlog.portal.office.com
  236. clients2.google.com
  237. clients3.google.com
  238. clients4.google.com
  239. clients5.google.com
  240. bit.ly
  241. ow.ly
  242. j.mp
  243. goo.gl
  244. s.youtube.com
  245. video-stats.l.google.com
  246. dl.dropboxusercontent.com
  247. ns1.dropbox.com
  248. ns2.dropbox.com
  249. outlook.office365.com
  250. products.office.com
  251. c.s-microsoft.com
  252. i.s-microsoft.com
  253. login.live.com
  254. msftncsi.com
  255. www.msftncsi.com
  256. www.bit.ly
  257. s.gateway.messenger.live.com
  258. ui.skype.com
  259. pricelist.skype.com
  260. apps.skype.com
  261. m.hotmail.com
  262. sa.symcb.com
  263. bitly.com
  264. www.autotrader.co.uk
  265. autotrader.co.uk
  266. mp.weixin.qq.com
  267. mandrillapp.com
  268. blog.sina.com.cn
  269. analytics.google.com
  270. adaway.org
  271. gist.github.com
  272. www.youtube.com
  273. docs.google.com
  274. paypal.com
  275. taobao.com
  276. www.paypal.com
  277. cathaypacific.com
  278. webstat.channel4.com
  279. www.paypalobjects.com
  280. tinyurl.com
  281. adwords.google.com
  282. unlocker.emptyloop.com
  283. drive.google.com
  284.  
  285. *** [ DIAGNOSING ]: contents of /etc/dnsmasq.d
  286.  
  287. -rw-r--r-- 1 root root 1533 Feb 22 09:49 /etc/dnsmasq.d/01-pihole.conf
  288. addn-hosts=/etc/pihole/gravity.list
  289. addn-hosts=/etc/pihole/black.list
  290. addn-hosts=/etc/pihole/local.list
  291. localise-queries
  292. no-resolv
  293. cache-size=10000
  294. log-queries=extra
  295. log-facility=/var/log/pihole.log
  296. local-ttl=2
  297. log-async
  298. server=8.8.8.8
  299. server=8.8.4.4
  300. domain-needed
  301. bogus-priv
  302. interface=eth0
  303.  
  304. *** [ DIAGNOSING ]: contents of /etc/lighttpd
  305.  
  306. -rw-r--r-- 1 root root 3027 Feb 22 09:49 /etc/lighttpd/lighttpd.conf
  307. server.modules = (
  308. "mod_access",
  309. "mod_accesslog",
  310. "mod_auth",
  311. "mod_expire",
  312. "mod_compress",
  313. "mod_redirect",
  314. "mod_setenv",
  315. "mod_rewrite"
  316. )
  317. server.document-root = "/var/www/html"
  318. server.error-handler-404 = "pihole/index.php"
  319. server.upload-dirs = ( "/var/cache/lighttpd/uploads" )
  320. server.errorlog = "/var/log/lighttpd/error.log"
  321. server.pid-file = "/var/run/lighttpd.pid"
  322. server.username = "www-data"
  323. server.groupname = "www-data"
  324. server.port = 80
  325. accesslog.filename = "/var/log/lighttpd/access.log"
  326. accesslog.format = "%{%s}t|%V|%r|%s|%b"
  327. index-file.names = ( "index.php", "index.html", "index.lighttpd.html" )
  328. url.access-deny = ( "~", ".inc", ".md", ".yml", ".ini" )
  329. static-file.exclude-extensions = ( ".php", ".pl", ".fcgi" )
  330. compress.cache-dir = "/var/cache/lighttpd/compress/"
  331. compress.filetype = ( "application/javascript", "text/css", "text/html", "text/plain" )
  332. include_shell "/usr/share/lighttpd/use-ipv6.pl " + server.port
  333. include_shell "/usr/share/lighttpd/create-mime.assign.pl"
  334. include_shell "find /etc/lighttpd/conf-enabled -name '*.conf' -a ! -name 'letsencrypt.conf' -printf 'include \"%p\"
  335. ' 2>/dev/null"
  336. $HTTP["url"] =~ "^/admin/" {
  337.  
  338. setenv.add-response-header = (
  339. "X-Pi-hole" => "The Pi-hole Web interface is working!",
  340. "X-Frame-Options" => "DENY"
  341. )
  342. $HTTP["url"] =~ ".ttf$" {
  343.  
  344. setenv.add-response-header = ( "Access-Control-Allow-Origin" => "*" )
  345. }
  346. }
  347. $HTTP["url"] =~ "^/admin/\.(.*)" {
  348. url.access-deny = ("")
  349. }
  350. include_shell "cat external.conf 2>/dev/null"
  351.  
  352. *** [ DIAGNOSING ]: contents of /etc/cron.d
  353.  
  354. -rw-r--r-- 1 root root 1496 Feb 22 09:49 /etc/cron.d/pihole
  355. 10 4 * * 7 root PATH="$PATH:/usr/local/bin/" pihole updateGravity
  356. 00 00 * * * root PATH="$PATH:/usr/local/bin/" pihole flush once quiet
  357. @reboot root /usr/sbin/logrotate /etc/pihole/logrotate
  358. */10 * * * * root PATH="$PATH:/usr/local/bin/" pihole updatechecker local
  359. 37 12 * * * root PATH="$PATH:/usr/local/bin/" pihole updatechecker remote
  360. @reboot root PATH="$PATH:/usr/local/bin/" pihole updatechecker remote reboot
  361.  
  362. *** [ DIAGNOSING ]: contents of /var/log/lighttpd
  363.  
  364. -rw-r--r-- 1 www-data www-data 316 Feb 22 09:34 /var/log/lighttpd/error.log
  365. 2018-02-18 06:25:08: (server.c.1242) logfiles cycled UID = 0 PID = 23230
  366. 2018-02-22 08:55:22: (server.c.1558) server stopped by UID = 0 PID = 1
  367. 2018-02-22 08:55:41: (log.c.164) server started
  368. 2018-02-22 09:34:00: (server.c.1558) server stopped by UID = 0 PID = 1
  369. 2018-02-22 09:34:16: (log.c.164) server started
  370.  
  371. *** [ DIAGNOSING ]: contents of /var/log
  372.  
  373. -rw-r--r-- 1 pihole pihole 2088 Feb 22 10:13 /var/log/pihole-FTL.log
  374. [2018-02-22 10:13:13.441] Gravity list entries: 1132167
  375. [2018-02-22 10:13:13.441] Blacklist entries: 1
  376. [2018-02-22 10:13:13.442] No wildcard blocking list present
  377. [2018-02-22 10:13:13.444] Notice: Increasing queries struct size from 0 to 10000 (440.23 KB)
  378. [2018-02-22 10:13:13.445] Notice: Increasing domains struct size from 0 to 1000 (460.23 KB)
  379. [2018-02-22 10:13:13.445] Notice: Increasing clients struct size from 0 to 10 (460.39 KB)
  380. [2018-02-22 10:13:13.455] New client: 192.168.0.10 (0/10)
  381. [2018-02-22 10:13:13.456] Notice: Increasing forwarded struct size from 0 to 4 (460.49 KB)
  382. [2018-02-22 10:13:13.465] New forward server: 8.8.4.4 (0/4)
  383. [2018-02-22 10:13:13.466] Notice: Increasing overTime struct size from 0 to 100 (464.50 KB)
  384. [2018-02-22 10:13:13.475] New client: 192.168.0.15 (1/10)
  385. [2018-02-22 10:13:18.485] New forward server: 8.8.8.8 (1/4)
  386. [2018-02-22 10:13:18.489] New client: localhost localhost (2/10)
  387. [2018-02-22 10:13:18.500] New client: 192.168.0.16 (3/10)
  388. [2018-02-22 10:13:18.540] New client: 192.168.0.19 (4/10)
  389. [2018-02-22 10:13:23.553] New client: 192.168.0.12 (5/10)
  390. [2018-02-22 10:13:23.842] Notice: Increasing overTime struct size from 100 to 200 (485.06 KB)
  391. [2018-02-22 10:13:23.995] Imported 6016 queries from the long-term database
  392. [2018-02-22 10:13:23.996] Reading from /var/log/pihole.log (rw-r--r--)
  393. [2018-02-22 10:13:27.428] NOTICE: Received signal SIGHUP - re-reading gravity files
  394. [2018-02-22 10:13:37.697] Gravity list entries: 1132167
  395. [2018-02-22 10:13:37.698] Blacklist entries: 1
  396. [2018-02-22 10:13:37.698] No wildcard blocking list present
  397. [2018-02-22 10:13:37.698] -> Total DNS queries: 6016
  398. [2018-02-22 10:13:37.699] -> Cached DNS queries: 1048
  399.  
  400. *** [ DIAGNOSING ]: Pi-hole log
  401. -rw-r--r-- 1 dnsmasq root 0 Feb 22 10:13 /var/log/pihole.log
  402. -----head of pihole.log------
  403.  
  404.  
  405. ********************************************
  406. ********************************************
  407. [✓] ** FINISHED DEBUGGING! **
  408.  
  409. * The debug log can be uploaded to tricorder.pi-hole.net for sharing with developers only.
  410. * For more information, see: https://pi-hole.net/2016/11/07/crack-our-medical-tricorder-win-a-raspberry-pi-3/
  411. * If available, we'll use openssl to upload the log, otherwise it will fall back to netcat.
  412.  
  413. [?] Would you like to upload the log? [y/N] y
  414. * Using openssl for transmission.
  415. [✗] There was an error uploading your debug log.
  416. * Please try again or contact the Pi-hole team for assistance.
  417. * A local copy of the debug log can be found at: /var/log/pihole_debug-sanitized.log
Add Comment
Please, Sign In to add comment