Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- This process collects information from your Pi-hole, and optionally uploads it to a unique and random directory on tricorder.pi-hole.net.
- The intent of this script is to allow users to self-diagnose their installations. This is accomplished by running tests against our software and providing the user with links to FAQ articles when a problem is detected. Since we are a small team and Pi-hole has been growing steadily, it is our hope that this will help us spend more time on development.
- NOTE: All log files auto-delete after 48 hours and ONLY the Pi-hole developers can access your data via the given token. We have taken these extra steps to secure your data and will work to further reduce any personal information gathered.
- *** [ INITIALIZING ]
- [i] 2019-01-28:01:08:18 debug log has been initialized.
- *** [ INITIALIZING ] Sourcing setup variables
- [i] Sourcing /etc/pihole/setupVars.conf...
- *** [ DIAGNOSING ]: Core version
- [i] Core: v4.1.1 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249)
- [i] Branch: master
- [i] Commit: v4.1.1-0-g8d85d46
- *** [ DIAGNOSING ]: Web version
- [i] Web: v4.1.1 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249)
- [i] Branch: master
- [i] Commit: v4.1.1-0-gde7aa5a3
- *** [ DIAGNOSING ]: FTL version
- [✓] FTL: v4.1.2
- *** [ DIAGNOSING ]: lighttpd version
- [i] 1.4.45
- *** [ DIAGNOSING ]: php version
- [i] 7.0.33
- *** [ DIAGNOSING ]: Operating system
- [✓] Debian GNU/Linux 9 (stretch)
- *** [ DIAGNOSING ]: SELinux
- [i] SELinux not detected
- *** [ DIAGNOSING ]: Processor
- [i] x86_64
- *** [ DIAGNOSING ]: Networking
- [✓] IPv4 address(es) bound to the eth0 interface:
- 172.17.0.2/16 does not match the IP found in /etc/pihole/setupVars.conf (https://discourse.pi-hole.net/t/use-ipv6-ula-addresses-for-pi-hole/2127)
- [✗] No IPv6 address(es) found on the eth0 interface.
- [i] Default IPv4 gateway: 172.17.0.1
- * Pinging 172.17.0.1...
- [✓] Gateway responded.
- *** [ DIAGNOSING ]: Ports in use
- *** [ DIAGNOSING ]: Name resolution (IPv4) using a random blocked domain and a known ad-serving domain
- [✓] advert.heise.org is 0.0.0.0 via localhost (127.0.0.1)
- [✗] Failed to resolve advert.heise.org via Pi-hole (192.168.1.160)
- [✓] doubleclick.com is 172.217.8.14 via a remote, public DNS server (8.8.8.8)
- *** [ DIAGNOSING ]: Name resolution (IPv6) using a random blocked domain and a known ad-serving domain
- [✗] Failed to resolve ads.videofen.com via localhost (::1)
- [✗] Failed to resolve ads.videofen.com via Pi-hole (fd30:a4a4:7615:0:2e56:dcff:fe08:acb4)
- [✗] Failed to resolve doubleclick.com via a remote, public DNS server (2001:4860:4860::8888)
- *** [ DIAGNOSING ]: Pi-hole processes
- [✗] lighttpd daemon is inactive
- [✗] pihole-FTL daemon is inactive
- *** [ DIAGNOSING ]: Setup variables
- BLOCKING_ENABLED=true
- DNSMASQ_LISTENING=all
- PIHOLE_DNS_3=2620:fe::10
- PIHOLE_DNS_4=2620:fe::fe:10
- PIHOLE_DNS_5=192.168.1.1#53
- DNS_FQDN_REQUIRED=true
- DNS_BOGUS_PRIV=true
- DNSSEC=false
- CONDITIONAL_FORWARDING=true
- CONDITIONAL_FORWARDING_IP=192.168.1.1
- CONDITIONAL_FORWARDING_DOMAIN=lan
- CONDITIONAL_FORWARDING_REVERSE=1.168.192.in-addr.arpa
- QUERY_LOGGING=true
- INSTALL_WEB_SERVER=true
- INSTALL_WEB_INTERFACE=true
- LIGHTTPD_ENABLED=
- IPV4_ADDRESS=192.168.1.160
- IPV6_ADDRESS=fd30:a4a4:7615:0:2e56:dcff:fe08:acb4
- PIHOLE_DNS_1=8.8.8.8
- PIHOLE_DNS_2=8.8.4.4
- PIHOLE_INTERFACE=eth0
- *** [ DIAGNOSING ]: Dashboard and block page
- [✓] Block page X-Header: X-Pi-hole: A black hole for Internet advertisements.
- [✓] Web interface X-Header: X-Pi-hole: The Pi-hole Web interface is working!
- *** [ DIAGNOSING ]: Gravity list
- -rw-r--r-- 1 root root 2639751 Jan 27 04:32 /etc/pihole/gravity.list
- -----head of gravity.list------
- 0.0.0.0
- 0.r.msn.com
- 0.start.bz
- 000.0x1f4b0.com
- -----tail of gravity.list------
- zzz.clickbank.net
- zzzezeroe.fr
- zzzpooeaz-france.com
- zzzrtrcm2.com
- *** [ DIAGNOSING ]: contents of /etc/pihole
- -rw-r--r-- 1 root root 381 Jan 1 00:58 /etc/pihole/adlists.list
- https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
- https://mirror1.malwaredomains.com/files/justdomains
- http://sysctl.org/cameleon/hosts
- https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
- https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
- https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
- https://hosts-file.net/ad_servers.txt
- -rw-r--r-- 1 root root 144 Jan 27 04:32 /etc/pihole/local.list
- 192.168.1.160 94fe6fd34d9b
- fd30:a4a4:7615:0:2e56:dcff:fe08:acb4 94fe6fd34d9b
- 192.168.1.160 pi.hole
- fd30:a4a4:7615:0:2e56:dcff:fe08:acb4 pi.hole
- *** [ DIAGNOSING ]: contents of /etc/dnsmasq.d
- -rw-r--r-- 1 root root 1582 Jan 23 23:24 /etc/dnsmasq.d/01-pihole.conf
- addn-hosts=/etc/pihole/gravity.list
- addn-hosts=/etc/pihole/black.list
- addn-hosts=/etc/pihole/local.list
- user=pihole
- group=pihole
- localise-queries
- no-resolv
- cache-size=10000
- log-queries
- log-facility=/var/log/pihole.log
- local-ttl=2
- log-async
- server=8.8.8.8
- server=8.8.4.4
- server=2620:fe::10
- server=2620:fe::fe:10
- server=192.168.1.1
- domain-needed
- bogus-priv
- except-interface=nonexisting
- server=/lan/192.168.1.1
- server=/1.168.192.in-addr.arpa/192.168.1.1
- *** [ DIAGNOSING ]: contents of /etc/lighttpd
- -rw-r--r-- 1 root root 3102 Jan 23 23:24 /etc/lighttpd/lighttpd.conf
- server.modules = (
- "mod_access",
- "mod_accesslog",
- "mod_auth",
- "mod_expire",
- "mod_compress",
- "mod_redirect",
- "mod_setenv",
- "mod_rewrite"
- )
- server.document-root = "/var/www/html"
- server.error-handler-404 = "pihole/index.php"
- server.upload-dirs = ( "/var/cache/lighttpd/uploads" )
- server.errorlog = "/var/log/lighttpd/error.log"
- server.pid-file = "/var/run/lighttpd.pid"
- server.username = "www-data"
- server.groupname = "www-data"
- server.port = 80
- accesslog.filename = "/var/log/lighttpd/access.log"
- accesslog.format = "%{%s}t|%V|%r|%s|%b"
- index-file.names = ( "index.php", "index.html", "index.lighttpd.html" )
- url.access-deny = ( "~", ".inc", ".md", ".yml", ".ini" )
- static-file.exclude-extensions = ( ".php", ".pl", ".fcgi" )
- compress.cache-dir = "/var/cache/lighttpd/compress/"
- compress.filetype = ( "application/javascript", "text/css", "text/html", "text/plain" )
- include_shell "/usr/share/lighttpd/use-ipv6.pl " + server.port
- include_shell "/usr/share/lighttpd/create-mime.assign.pl"
- include_shell "find /etc/lighttpd/conf-enabled -name '*.conf' -a ! -name 'letsencrypt.conf' -printf 'include \"%p\"
- ' 2>/dev/null"
- $HTTP["url"] =~ "^/admin/" {
- setenv.add-response-header = (
- "X-Pi-hole" => "The Pi-hole Web interface is working!",
- "X-Frame-Options" => "DENY"
- )
- $HTTP["url"] =~ ".ttf$" {
- setenv.add-response-header = ( "Access-Control-Allow-Origin" => "*" )
- }
- }
- $HTTP["url"] =~ "^/admin/\.(.*)" {
- url.access-deny = ("")
- }
- include_shell "cat external.conf 2>/dev/null"
- *** [ DIAGNOSING ]: contents of /etc/cron.d
- -rw-r--r-- 1 root root 1704 Dec 24 16:52 /etc/cron.d/pihole
- 32 4 * * 7 root PATH="$PATH:/usr/local/bin/" pihole updateGravity >/var/log/pihole_updateGravity.log || cat /var/log/pihole_updateGravity.log
- 00 00 * * * root PATH="$PATH:/usr/local/bin/" pihole flush once quiet
- @reboot root /usr/sbin/logrotate /etc/pihole/logrotate
- */10 * * * * root PATH="$PATH:/usr/local/bin/" pihole updatechecker local
- 58 14 * * * root PATH="$PATH:/usr/local/bin/" pihole updatechecker remote
- @reboot root PATH="$PATH:/usr/local/bin/" pihole updatechecker remote reboot
- *** [ DIAGNOSING ]: contents of /var/log/lighttpd
- -rw-r--r-- 1 www-data www-data 49 Jan 23 23:25 /var/log/lighttpd/error.log
- 2019-01-23 23:25:04: (log.c.217) server started
- *** [ DIAGNOSING ]: contents of /var/log
- -rw-r--r-- 1 pihole pihole 32077 Jan 28 00:48 /var/log/pihole-FTL.log
- -----head of pihole-FTL.log------
- [2019-01-23 23:24:54.644] Using log file /var/log/pihole-FTL.log
- [2019-01-23 23:24:54.644] ########## FTL started! ##########
- [2019-01-23 23:24:54.644] FTL branch: master
- [2019-01-23 23:24:54.644] FTL version: v4.1.2
- [2019-01-23 23:24:54.644] FTL commit: b06eedf
- [2019-01-23 23:24:54.644] FTL date: 2018-12-21 14:43:34 -0600
- [2019-01-23 23:24:54.644] FTL user: root
- [2019-01-23 23:24:54.644] WARNING: Starting pihole-FTL as user root is not recommended
- [2019-01-23 23:24:54.644] Starting config file parsing (/etc/pihole/pihole-FTL.conf)
- [2019-01-23 23:24:54.644] SOCKET_LISTENING: only local
- [2019-01-23 23:24:54.644] AAAA_QUERY_ANALYSIS: Show AAAA queries
- [2019-01-23 23:24:54.644] MAXDBDAYS: max age for stored queries is 365 days
- [2019-01-23 23:24:54.644] RESOLVE_IPV6: Resolve IPv6 addresses
- [2019-01-23 23:24:54.644] RESOLVE_IPV4: Resolve IPv4 addresses
- [2019-01-23 23:24:54.644] DBINTERVAL: saving to DB file every minute
- [2019-01-23 23:24:54.644] DBFILE: Using /etc/pihole/pihole-FTL.db
- [2019-01-23 23:24:54.644] MAXLOGAGE: Importing up to 24.0 hours of log data
- [2019-01-23 23:24:54.644] PRIVACYLEVEL: Set to 0
- [2019-01-23 23:24:54.644] IGNORE_LOCALHOST: Show queries from localhost
- [2019-01-23 23:24:54.644] BLOCKINGMODE: Null IPs for blocked domains
- [2019-01-23 23:24:54.644] REGEX_DEBUGMODE: Inactive
- [2019-01-23 23:24:54.644] ANALYZE_ONLY_A_AND_AAAA: Disabled. Analyzing all queries
- [2019-01-23 23:24:54.644] DBIMPORT: Importing history from database
- [2019-01-23 23:24:54.644] PIDFILE: Using /var/run/pihole-FTL.pid
- [2019-01-23 23:24:54.644] PORTFILE: Using /var/run/pihole-FTL.port
- [2019-01-23 23:24:54.644] SOCKETFILE: Using /var/run/pihole/FTL.sock
- [2019-01-23 23:24:54.645] WHITELISTFILE: Using /etc/pihole/whitelist.txt
- [2019-01-23 23:24:54.645] BLACKLISTFILE: Using /etc/pihole/black.list
- [2019-01-23 23:24:54.645] GRAVITYFILE: Using /etc/pihole/gravity.list
- [2019-01-23 23:24:54.645] REGEXLISTFILE: Using /etc/pihole/regex.list
- [2019-01-23 23:24:54.645] SETUPVARSFILE: Using /etc/pihole/setupVars.conf
- [2019-01-23 23:24:54.645] AUDITLISTFILE: Using /etc/pihole/auditlog.list
- [2019-01-23 23:24:54.645] Finished config file parsing
- [2019-01-23 23:24:54.645] INFO: No whitelist file found
- [2019-01-23 23:24:54.645] Compiled 0 Regex filters and 0 whitelisted domains in 0.0 msec (0 errors)
- -----tail of pihole-FTL.log------
- [2019-01-23 23:25:06.460] -> Unknown DNS queries: 74
- [2019-01-23 23:25:06.460] -> Unique domains: 1780
- [2019-01-23 23:25:06.460] -> Unique clients: 14
- [2019-01-23 23:25:06.460] -> Known forward destinations: 3
- [2019-01-23 23:25:06.460] Successfully accessed setupVars.conf
- [2019-01-23 23:25:06.896] PID of FTL process: 524
- [2019-01-23 23:25:06.896] Listening on port 4711 for incoming IPv4 telnet connections
- [2019-01-23 23:25:06.896] Listening on Unix socket
- [2019-01-23 23:25:06.897] INFO: No whitelist file found
- [2019-01-23 23:25:06.897] Compiled 0 Regex filters and 0 whitelisted domains in 0.0 msec (0 errors)
- [2019-01-23 23:25:07.095] /etc/pihole/gravity.list: parsed 112526 domains (took 197.9 ms)
- [2019-01-23 23:25:08.569] New forward server: 8.8.8.8 (3/4)
- [2019-01-23 23:36:03.364] New forward server: 8.8.4.4 (4/4)
- [2019-01-23 23:36:03.364] Notice: Increasing forwarded struct size from 4 to 8
- [2019-01-23 23:38:19.773] Notice: Increasing queries struct size from 1230000 to 1240000
- [2019-01-23 23:46:55.156] Notice: Increasing queries struct size from 1240000 to 1250000
- [2019-01-23 23:55:42.263] Notice: Increasing queries struct size from 1250000 to 1260000
- [2019-01-24 00:26:20.610] Notice: Increasing queries struct size from 1260000 to 1270000
- [2019-01-24 00:30:08.327] Notice: Increasing queries struct size from 1270000 to 1280000
- [2019-01-24 00:33:51.304] Notice: Increasing queries struct size from 1280000 to 1290000
- [2019-01-24 00:53:09.552] Notice: Increasing queries struct size from 1290000 to 1300000
- [2019-01-24 00:55:46.796] Notice: Increasing queries struct size from 1300000 to 1310000
- [2019-01-24 01:38:13.507] Notice: Increasing domains struct size from 2000 to 3000
- [2019-01-24 08:30:00.052] Notice: Increasing overTime struct size from 200 to 300
- [2019-01-25 01:10:04.087] Notice: Increasing overTime struct size from 300 to 400
- [2019-01-25 04:39:56.964] Notice: Increasing domains struct size from 3000 to 4000
- [2019-01-25 17:50:11.454] Notice: Increasing overTime struct size from 400 to 500
- [2019-01-26 10:30:03.797] Notice: Increasing overTime struct size from 500 to 600
- [2019-01-26 21:12:44.448] Notice: Increasing domains struct size from 4000 to 5000
- [2019-01-27 03:10:06.016] Notice: Increasing overTime struct size from 600 to 700
- [2019-01-27 04:32:04.599] INFO: No whitelist file found
- [2019-01-27 04:32:04.600] Compiled 0 Regex filters and 0 whitelisted domains in 0.1 msec (0 errors)
- [2019-01-27 04:32:04.776] /etc/pihole/gravity.list: parsed 112751 domains (took 125.5 ms)
- [2019-01-27 19:50:37.259] Notice: Increasing overTime struct size from 700 to 800
- [2019-01-28 00:48:32.618] Notice: Increasing domains struct size from 5000 to 6000
- *** [ DIAGNOSING ]: Locale
- LANG=
- *** [ DIAGNOSING ]: Pi-hole log
- -rw-r--r-- 1 pihole pihole 15317314 Jan 28 01:08 /var/log/pihole.log
- -----head of pihole.log------
- Jan 28 00:00:07 dnsmasq[524]: query[A] graph.instagram.com from 192.168.1.173
- Jan 28 00:00:07 dnsmasq[524]: /etc/pihole/gravity.list graph.instagram.com is 0.0.0.0
- Jan 28 00:00:07 dnsmasq[524]: query[AAAA] graph.instagram.com from 192.168.1.173
- Jan 28 00:00:07 dnsmasq[524]: /etc/pihole/gravity.list graph.instagram.com is ::
- Jan 28 00:00:17 dnsmasq[524]: query[A] pi.hole from 127.0.0.1
- Jan 28 00:00:17 dnsmasq[524]: /etc/pihole/local.list pi.hole is 192.168.1.160
- Jan 28 00:00:21 dnsmasq[524]: query[A] scontent-iad3-1.cdninstagram.com from 192.168.1.173
- Jan 28 00:00:21 dnsmasq[524]: forwarded scontent-iad3-1.cdninstagram.com to 192.168.1.1
- Jan 28 00:00:21 dnsmasq[524]: query[A] scontent-iad3-1.cdninstagram.com from 192.168.1.1
- Jan 28 00:00:21 dnsmasq[524]: forwarded scontent-iad3-1.cdninstagram.com to 192.168.1.1
- Jan 28 00:00:21 dnsmasq[524]: query[A] scontent-iad3-1.cdninstagram.com from 192.168.1.1
- Jan 28 00:00:21 dnsmasq[524]: forwarded scontent-iad3-1.cdninstagram.com to 192.168.1.1
- Jan 28 00:00:21 dnsmasq[524]: query[AAAA] scontent-iad3-1.cdninstagram.com from 192.168.1.173
- Jan 28 00:00:21 dnsmasq[524]: forwarded scontent-iad3-1.cdninstagram.com to 192.168.1.1
- Jan 28 00:00:21 dnsmasq[524]: query[A] scontent-iad3-1.cdninstagram.com from 192.168.1.1
- Jan 28 00:00:21 dnsmasq[524]: forwarded scontent-iad3-1.cdninstagram.com to 192.168.1.1
- Jan 28 00:00:21 dnsmasq[524]: query[AAAA] scontent-iad3-1.cdninstagram.com from 192.168.1.1
- Jan 28 00:00:21 dnsmasq[524]: forwarded scontent-iad3-1.cdninstagram.com to 192.168.1.1
- Jan 28 00:00:21 dnsmasq[524]: query[A] scontent-iad3-1.cdninstagram.com from 192.168.1.1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement