Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *** [ INITIALIZING ]
- [i] 2018-02-22:10:17:41 debug log has been initialized.
- *** [ INITIALIZING ] Sourcing setup variables
- [i] Sourcing /etc/pihole/setupVars.conf...
- *** [ DIAGNOSING ]: Core version
- [i] Core: v3.2.1 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249)
- [i] Branch: master
- [i] Commit: v3.2.1-73-g1e87850
- *** [ DIAGNOSING ]: Web version
- [i] Web: v3.3 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249)
- [i] Branch: master
- [i] Commit: v3.3-0-ge48aa29
- *** [ DIAGNOSING ]: FTL version
- [✓] FTL: v3.0 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249)
- *** [ DIAGNOSING ]: dnsmasq version
- [i] 2.72
- *** [ DIAGNOSING ]: lighttpd version
- [i] 1.4.35
- *** [ DIAGNOSING ]: php version
- [i] 5.6.30
- *** [ DIAGNOSING ]: Operating system
- [✓] Raspbian GNU/Linux 8 (jessie)
- *** [ DIAGNOSING ]: SELinux
- [i] SELinux not detected
- *** [ DIAGNOSING ]: Processor
- /opt/pihole/piholeDebug.sh: line 470: $'[\E[32m✓\E[0m] \E[32marmv6l\E[0m': command not found
- *** [ DIAGNOSING ]: Networking
- [✓] IPv4 address(es) bound to the eth0 interface:
- 192.168.0.21/24 does not match the IP found in /etc/pihole/setupVars.conf (https://discourse.pi-hole.net/t/use-ipv6-ula-addresses-for-pi-hole/2127)
- [✓] IPv6 address(es) bound to the eth0 interface:
- fe80::26a5:b629:f948:92c3 does not match the IP found in /etc/pihole/setupVars.conf (https://discourse.pi-hole.net/t/use-ipv6-ula-addresses-for-pi-hole/2127)
- ^ Please note that you may have more than one IP address listed.
- As long as one of them is green, and it matches what is in /etc/pihole/setupVars.conf, there is no need for concern.
- The link to the FAQ is for an issue that sometimes occurs when the IPv6 address changes, which is why we check for it.
- [i] Default IPv4 gateway: 192.168.0.1
- * Pinging 192.168.0.1...
- [✓] Gateway responded.
- *** [ DIAGNOSING ]: Ports in use
- [] is in use by
- [22] is in use by sshd
- [80] is in use by lighttpd
- [4711] is in use by pihole-FTL
- *** [ DIAGNOSING ]: Name resolution (IPv4) using a random blocked domain and a known ad-serving domain
- [✗] Failed to resolve www.mannyimages.com via localhost (127.0.0.1)
- [✗] Failed to resolve www.mannyimages.com via Pi-hole (192.168.0.21)
- [✓] doubleclick.com is 216.58.201.14 via a remote, public DNS server (8.8.8.8)
- *** [ DIAGNOSING ]: Pi-hole processes
- [✗] dnsmasq daemon is failed
- [✓] lighttpd daemon is active
- [✓] pihole-FTL daemon is active
- *** [ DIAGNOSING ]: Setup variables
- DNS_FQDN_REQUIRED=true
- DNS_BOGUS_PRIV=true
- PIHOLE_INTERFACE=eth0
- IPV4_ADDRESS=192.168.0.21
- IPV6_ADDRESS=
- PIHOLE_DNS_1=8.8.8.8
- PIHOLE_DNS_2=8.8.4.4
- QUERY_LOGGING=true
- INSTALL_WEB=true
- LIGHTTPD_ENABLED=1
- *** [ DIAGNOSING ]: Dashboard and block page
- [✓] X-Pi-hole: A black hole for Internet advertisements.
- [✓] X-Pi-hole: The Pi-hole Web interface is working!
- *** [ DIAGNOSING ]: Gravity list
- -rw-r--r-- 1 root root 40357591 Feb 18 03:50 /etc/pihole/gravity.list
- -----head of gravity.list------
- 192.168.0.21 0.0.0.0
- 192.168.0.21 00000000000.com.cn
- 192.168.0.21 000000-0.000webhostapp.com
- 192.168.0.21 0000000000-windows-block-notification.online
- -----tail of gravity.list------
- 192.168.0.21 zzzzc.homedrugseshop.ru
- 192.168.0.21 zzzzz4.52896368.com
- 192.168.0.21 zzzzz.cauction.hop.clickbank.net
- 192.168.0.21 zzzzz.regmum.hop.clickbank.net
- *** [ DIAGNOSING ]: contents of /etc/pihole
- -rw-r--r-- 1 root root 4907 Oct 20 11:56 /etc/pihole/adlists.list
- https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
- https://mirror1.malwaredomains.com/files/justdomains
- http://sysctl.org/cameleon/hosts
- https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
- https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
- https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
- https://hosts-file.net/ad_servers.txt
- https://hosts-file.net/grm.txt
- https://reddestdream.github.io/Projects/MinimalHosts/etc/MinimalHostsBlocker/minimalhosts
- https://raw.githubusercontent.com/StevenBlack/hosts/master/data/KADhosts/hosts
- https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Spam/hosts
- https://v.firebog.net/hosts/BillStearns.txt
- https://www.dshield.org/feeds/suspiciousdomains_Low.txt
- https://raw.githubusercontent.com/piwik/referrer-spam-blacklist/master/spammers.txt
- https://hostsfile.org/Downloads/hosts.txt
- https://raw.githubusercontent.com/Dawsey21/Lists/master/main-blacklist.txt
- https://raw.githubusercontent.com/vokins/yhosts/master/hosts
- https://v.firebog.net/hosts/Airelle-trc.txt
- https://v.firebog.net/hosts/Easyprivacy.txt
- https://v.firebog.net/hosts/Prigent-Ads.txt
- https://raw.githubusercontent.com/quidsup/notrack/master/trackers.txt
- https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.2o7Net/hosts
- https://raw.githubusercontent.com/StevenBlack/hosts/master/data/tyzbit/hosts
- https://v.firebog.net/hosts/Airelle-hrsk.txt
- https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt
- https://mirror1.malwaredomains.com/files/justdomains
- https://hosts-file.net/exp.txt
- https://hosts-file.net/emd.txt
- https://hosts-file.net/psh.txt
- https://mirror.cedia.org.ec/malwaredomains/immortal_domains.txt
- https://www.malwaredomainlist.com/hostslist/hosts.txt
- https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Report_Appendix_D.txt
- https://openphish.com/feed.txt
- https://v.firebog.net/hosts/Prigent-Malware.txt
- https://v.firebog.net/hosts/Prigent-Phishing.txt
- https://raw.githubusercontent.com/quidsup/notrack/master/malicious-sites.txt
- https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
- https://v.firebog.net/hosts/Shalla-mal.txt
- https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Risk/hosts
- https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
- https://hosts-file.net/grm.txt
- https://reddestdream.github.io/Projects/MinimalHosts/etc/MinimalHostsBlocker/minimalhosts
- https://raw.githubusercontent.com/StevenBlack/hosts/master/data/KADhosts/hosts
- https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Spam/hosts
- https://v.firebog.net/hosts/static/w3kbl.txt
- https://adaway.org/hosts.txt
- https://v.firebog.net/hosts/AdguardDNS.txt
- https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
- https://hosts-file.net/ad_servers.txt
- https://v.firebog.net/hosts/Easylist.txt
- https://raw.githubusercontent.com/StevenBlack/hosts/master/data/SpotifyAds/hosts
- https://raw.githubusercontent.com/StevenBlack/hosts/master/data/UncheckyAds/hosts
- https://v.firebog.net/hosts/Airelle-trc.txt
- https://v.firebog.net/hosts/Easyprivacy.txt
- https://v.firebog.net/hosts/Prigent-Ads.txt
- https://raw.githubusercontent.com/quidsup/notrack/master/trackers.txt
- https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.2o7Net/hosts
- https://raw.githubusercontent.com/StevenBlack/hosts/master/data/tyzbit/hosts
- https://v.firebog.net/hosts/Airelle-hrsk.txt
- https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt
- https://mirror1.malwaredomains.com/files/justdomains
- https://hosts-file.net/exp.txt
- https://hosts-file.net/emd.txt
- https://hosts-file.net/psh.txt
- https://mirror.cedia.org.ec/malwaredomains/immortal_domains.txt
- https://www.malwaredomainlist.com/hostslist/hosts.txt
- https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Report_Appendix_D.txt
- https://v.firebog.net/hosts/Prigent-Malware.txt
- https://v.firebog.net/hosts/Prigent-Phishing.txt
- https://raw.githubusercontent.com/quidsup/notrack/master/malicious-sites.txt
- https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
- https://v.firebog.net/hosts/Shalla-mal.txt
- https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Risk/hosts
- https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
- https://gist.github.com/10ZiN/748054e1df8e6eb5b08c8c0c0994ab6d/raw/de09de7c6c85f4768ae6adc366f9dc750bf84368/hosts.txt
- https://gist.github.com/10ZiN/9e04e88e1add39ef75ba14fa4da44172/raw/857344dd7732be82380c230dd36f095dab7ac176/partial.txt
- https://hosts-file.net/download/hosts.txt
- https://hosts-file.net/partial.txt
- -rw-r--r-- 1 root root 25 Dec 9 15:38 /etc/pihole/blacklist.txt
- cdn.ss.anno.channel4.com
- -rw-r--r-- 1 root root 46 Feb 18 03:49 /etc/pihole/local.list
- 192.168.0.21 raspberrypi
- 192.168.0.21 pi.hole
- -rw-r--r-- 1 root root 234 Feb 22 09:49 /etc/pihole/logrotate
- /var/log/pihole.log {
- su root root
- daily
- copytruncate
- rotate 5
- compress
- delaycompress
- notifempty
- nomail
- }
- /var/log/pihole-FTL.log {
- su root root
- weekly
- copytruncate
- rotate 3
- compress
- delaycompress
- notifempty
- nomail
- }
- -rw-r--r-- 1 root root 1272 Feb 14 09:21 /etc/pihole/whitelist.txt
- raw.githubusercontent.com
- mirror1.malwaredomains.com
- sysctl.org
- zeustracker.abuse.ch
- s3.amazonaws.com
- hosts-file.net
- click.email.holidaylettings.co.uk
- reddestdream.github.io
- v.firebog.net
- www.dshield.org
- hostsfile.org
- hostsfile.mine.nu
- adblock.mahakala.is
- mirror.cedia.org.ec
- www.malwaredomainlist.com
- bitbucket.org
- openphish.com
- ransomwaretracker.abuse.ch
- rover.ebay.com
- accounts.youtube.com
- mailchimp.com
- dropbox.com
- video-downloads.googleusercontent.com
- clientlog.portal.office.com
- clients2.google.com
- clients3.google.com
- clients4.google.com
- clients5.google.com
- bit.ly
- ow.ly
- j.mp
- goo.gl
- s.youtube.com
- video-stats.l.google.com
- dl.dropboxusercontent.com
- ns1.dropbox.com
- ns2.dropbox.com
- outlook.office365.com
- products.office.com
- c.s-microsoft.com
- i.s-microsoft.com
- login.live.com
- msftncsi.com
- www.msftncsi.com
- www.bit.ly
- s.gateway.messenger.live.com
- ui.skype.com
- pricelist.skype.com
- apps.skype.com
- m.hotmail.com
- sa.symcb.com
- bitly.com
- www.autotrader.co.uk
- autotrader.co.uk
- mp.weixin.qq.com
- mandrillapp.com
- blog.sina.com.cn
- analytics.google.com
- adaway.org
- gist.github.com
- www.youtube.com
- docs.google.com
- paypal.com
- taobao.com
- www.paypal.com
- cathaypacific.com
- webstat.channel4.com
- www.paypalobjects.com
- tinyurl.com
- adwords.google.com
- unlocker.emptyloop.com
- drive.google.com
- *** [ DIAGNOSING ]: contents of /etc/dnsmasq.d
- -rw-r--r-- 1 root root 1533 Feb 22 09:49 /etc/dnsmasq.d/01-pihole.conf
- addn-hosts=/etc/pihole/gravity.list
- addn-hosts=/etc/pihole/black.list
- addn-hosts=/etc/pihole/local.list
- localise-queries
- no-resolv
- cache-size=10000
- log-queries=extra
- log-facility=/var/log/pihole.log
- local-ttl=2
- log-async
- server=8.8.8.8
- server=8.8.4.4
- domain-needed
- bogus-priv
- interface=eth0
- *** [ DIAGNOSING ]: contents of /etc/lighttpd
- -rw-r--r-- 1 root root 3027 Feb 22 09:49 /etc/lighttpd/lighttpd.conf
- server.modules = (
- "mod_access",
- "mod_accesslog",
- "mod_auth",
- "mod_expire",
- "mod_compress",
- "mod_redirect",
- "mod_setenv",
- "mod_rewrite"
- )
- server.document-root = "/var/www/html"
- server.error-handler-404 = "pihole/index.php"
- server.upload-dirs = ( "/var/cache/lighttpd/uploads" )
- server.errorlog = "/var/log/lighttpd/error.log"
- server.pid-file = "/var/run/lighttpd.pid"
- server.username = "www-data"
- server.groupname = "www-data"
- server.port = 80
- accesslog.filename = "/var/log/lighttpd/access.log"
- accesslog.format = "%{%s}t|%V|%r|%s|%b"
- index-file.names = ( "index.php", "index.html", "index.lighttpd.html" )
- url.access-deny = ( "~", ".inc", ".md", ".yml", ".ini" )
- static-file.exclude-extensions = ( ".php", ".pl", ".fcgi" )
- compress.cache-dir = "/var/cache/lighttpd/compress/"
- compress.filetype = ( "application/javascript", "text/css", "text/html", "text/plain" )
- include_shell "/usr/share/lighttpd/use-ipv6.pl " + server.port
- include_shell "/usr/share/lighttpd/create-mime.assign.pl"
- include_shell "find /etc/lighttpd/conf-enabled -name '*.conf' -a ! -name 'letsencrypt.conf' -printf 'include \"%p\"
- ' 2>/dev/null"
- $HTTP["url"] =~ "^/admin/" {
- setenv.add-response-header = (
- "X-Pi-hole" => "The Pi-hole Web interface is working!",
- "X-Frame-Options" => "DENY"
- )
- $HTTP["url"] =~ ".ttf$" {
- setenv.add-response-header = ( "Access-Control-Allow-Origin" => "*" )
- }
- }
- $HTTP["url"] =~ "^/admin/\.(.*)" {
- url.access-deny = ("")
- }
- include_shell "cat external.conf 2>/dev/null"
- *** [ DIAGNOSING ]: contents of /etc/cron.d
- -rw-r--r-- 1 root root 1496 Feb 22 09:49 /etc/cron.d/pihole
- 10 4 * * 7 root PATH="$PATH:/usr/local/bin/" pihole updateGravity
- 00 00 * * * root PATH="$PATH:/usr/local/bin/" pihole flush once quiet
- @reboot root /usr/sbin/logrotate /etc/pihole/logrotate
- */10 * * * * root PATH="$PATH:/usr/local/bin/" pihole updatechecker local
- 37 12 * * * root PATH="$PATH:/usr/local/bin/" pihole updatechecker remote
- @reboot root PATH="$PATH:/usr/local/bin/" pihole updatechecker remote reboot
- *** [ DIAGNOSING ]: contents of /var/log/lighttpd
- -rw-r--r-- 1 www-data www-data 316 Feb 22 09:34 /var/log/lighttpd/error.log
- 2018-02-18 06:25:08: (server.c.1242) logfiles cycled UID = 0 PID = 23230
- 2018-02-22 08:55:22: (server.c.1558) server stopped by UID = 0 PID = 1
- 2018-02-22 08:55:41: (log.c.164) server started
- 2018-02-22 09:34:00: (server.c.1558) server stopped by UID = 0 PID = 1
- 2018-02-22 09:34:16: (log.c.164) server started
- *** [ DIAGNOSING ]: contents of /var/log
- -rw-r--r-- 1 pihole pihole 2088 Feb 22 10:13 /var/log/pihole-FTL.log
- [2018-02-22 10:13:13.441] Gravity list entries: 1132167
- [2018-02-22 10:13:13.441] Blacklist entries: 1
- [2018-02-22 10:13:13.442] No wildcard blocking list present
- [2018-02-22 10:13:13.444] Notice: Increasing queries struct size from 0 to 10000 (440.23 KB)
- [2018-02-22 10:13:13.445] Notice: Increasing domains struct size from 0 to 1000 (460.23 KB)
- [2018-02-22 10:13:13.445] Notice: Increasing clients struct size from 0 to 10 (460.39 KB)
- [2018-02-22 10:13:13.455] New client: 192.168.0.10 (0/10)
- [2018-02-22 10:13:13.456] Notice: Increasing forwarded struct size from 0 to 4 (460.49 KB)
- [2018-02-22 10:13:13.465] New forward server: 8.8.4.4 (0/4)
- [2018-02-22 10:13:13.466] Notice: Increasing overTime struct size from 0 to 100 (464.50 KB)
- [2018-02-22 10:13:13.475] New client: 192.168.0.15 (1/10)
- [2018-02-22 10:13:18.485] New forward server: 8.8.8.8 (1/4)
- [2018-02-22 10:13:18.489] New client: localhost localhost (2/10)
- [2018-02-22 10:13:18.500] New client: 192.168.0.16 (3/10)
- [2018-02-22 10:13:18.540] New client: 192.168.0.19 (4/10)
- [2018-02-22 10:13:23.553] New client: 192.168.0.12 (5/10)
- [2018-02-22 10:13:23.842] Notice: Increasing overTime struct size from 100 to 200 (485.06 KB)
- [2018-02-22 10:13:23.995] Imported 6016 queries from the long-term database
- [2018-02-22 10:13:23.996] Reading from /var/log/pihole.log (rw-r--r--)
- [2018-02-22 10:13:27.428] NOTICE: Received signal SIGHUP - re-reading gravity files
- [2018-02-22 10:13:37.697] Gravity list entries: 1132167
- [2018-02-22 10:13:37.698] Blacklist entries: 1
- [2018-02-22 10:13:37.698] No wildcard blocking list present
- [2018-02-22 10:13:37.698] -> Total DNS queries: 6016
- [2018-02-22 10:13:37.699] -> Cached DNS queries: 1048
- *** [ DIAGNOSING ]: Pi-hole log
- -rw-r--r-- 1 dnsmasq root 0 Feb 22 10:13 /var/log/pihole.log
- -----head of pihole.log------
- ********************************************
- ********************************************
- [✓] ** FINISHED DEBUGGING! **
- * The debug log can be uploaded to tricorder.pi-hole.net for sharing with developers only.
- * For more information, see: https://pi-hole.net/2016/11/07/crack-our-medical-tricorder-win-a-raspberry-pi-3/
- * If available, we'll use openssl to upload the log, otherwise it will fall back to netcat.
- [?] Would you like to upload the log? [y/N] y
- * Using openssl for transmission.
- [✗] There was an error uploading your debug log.
- * Please try again or contact the Pi-hole team for assistance.
- * A local copy of the debug log can be found at: /var/log/pihole_debug-sanitized.log
Add Comment
Please, Sign In to add comment