Giter Site home page Giter Site logo

Comments (26)

welcome avatar welcome commented on July 29, 2024

Thanks for opening your first issue here 🙋🕵️


from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

I see.. yes try all interface

does that settings works for you?

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

I think it might need to listen to local lan. do you get a bind host error?

from adguard-wireguard-unbound-dnscrypt.

Hanif-Faez avatar Hanif-Faez commented on July 29, 2024

I see.. yes try all interface

does that settings works for you?

I already tried listening to all interfaces with 0.0.0.0 but after reloading Adguard home, DNS service not working it spinning continuously.
It only work when I followed your instruction with DNS interface wlan0 since my pi is wireless.

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

I see.. yes try all interface
does that settings works for you?

I already tried listening to all interfaces with 0.0.0.0 but after reloading Adguard home, DNS service not working it spinning continuously. It only work when I followed your instruction with DNS interface wlan0 since my pi is wireless.

hmm i never tried with wifi..try making ip static on pi .

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

@Haniffaez your issue is tailscale not working with AGH using wlan0 right ?.. I wonder if something else is listening on address

from adguard-wireguard-unbound-dnscrypt.

Hanif-Faez avatar Hanif-Faez commented on July 29, 2024

@Haniffaez your issue is tailscale not working with AGH using wlan0 right ?.. I wonder if something else is listening on address

Ya tailscale can't use DNS from Adguard if I set to wlan0. It need to listen on all interface just like pihole permit all origin. My pi IP already reserved on router. I follow this step on tailscale website.
https://tailscale.com/kb/1114/pi-hole/

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

did you check to see if anything else on port 53?

sudo netstat -anp | grep 53

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

checking adguard logs as well can be helpful

from adguard-wireguard-unbound-dnscrypt.

Hanif-Faez avatar Hanif-Faez commented on July 29, 2024

Sorry for late reply.
Here is the output.
Screenshots_2022-06-13-09-34-09
What am I looking at, I'm new to this.
Do I need to enable verbosity and try again?

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

what you get for

sudo systemctl status AdGuardHome

&

sudo nano /var/log/AdGuardHome.err

from adguard-wireguard-unbound-dnscrypt.

Hanif-Faez avatar Hanif-Faez commented on July 29, 2024

what you get for

sudo systemctl status AdGuardHome

&

sudo nano /var/log/AdGuardHome.err

Here is the output after I stopped Adguard service and went to Adguard.yaml to change the DNS interface to 0.0.0.0
1

Second output: sudo systemctl status AdGuardHome
error

DNS service won't starts if it is set to 0.0.0.0 and the whole network is down
error 3

Here is the Adguard.yaml
error 2

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

hmmm try setting up firewall rules https://help.ubuntu.com/community/UFW

sudo apt install ufw -y
sudo ufw enable
sudo ufw allow from 0.0.0.0
sudo ufw allow in on wlan0

from adguard-wireguard-unbound-dnscrypt.

Hanif-Faez avatar Hanif-Faez commented on July 29, 2024

Sorry I have to reinstall the whole pi after messing up with ufw.
After reinstalling and configuring ufw, DNS service still can't start when set to 0.0.0.0
When checking for Adguard status, the service run but it keeps loading just like the screenshot I attached before.

err

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

@Haniffaez have you tried with a wired connection to see if it works? then you can know if its a wifi issue or not

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

when i use all interface i get in bind host 0.0.0.0

image

did you change that ?

image

from adguard-wireguard-unbound-dnscrypt.

Hanif-Faez avatar Hanif-Faez commented on July 29, 2024

@Haniffaez have you tried with a wired connection to see if it works? then you can know if its a wifi issue or not

Ya wired connection might be the last resort but I need to get ethernet to micro usb adapter and see how it goes.

from adguard-wireguard-unbound-dnscrypt.

Hanif-Faez avatar Hanif-Faez commented on July 29, 2024

when i use all interface i get in bind host 0.0.0.0

image

did you change that ?

image

Ya it does not work when I put 0.0.0.0 and DNS service seems like not even start up by looking at continuous loading icon on adguard dashboard. All interface only play nice when I use default upstream dns like cloudflare or Google dns without unbound and TLS forwarder.

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

so that 192.168.1.11 address is for tailscale to work ?

from adguard-wireguard-unbound-dnscrypt.

Hanif-Faez avatar Hanif-Faez commented on July 29, 2024

so that 192.168.1.11 address is for tailscale to work ?

I used default upstream dns (cloudflare) before and it work well with tailscale but it need to listen on all interface. When I use unbound and TLS forwarder, set interface to 0.0.0.0 the dns service won't start and it keep loading until I revert back changes to 192.168.1.11

from adguard-wireguard-unbound-dnscrypt.

Hanif-Faez avatar Hanif-Faez commented on July 29, 2024

when i use all interface i get in bind host 0.0.0.0
image
did you change that ?
image

Ya it does not work when I put 0.0.0.0 and DNS service seems like not even start up by looking at continuous loading icon on adguard dashboard. All interface only play nice when I use default upstream dns like cloudflare or Google dns without unbound and TLS forwarder.

sudo nano /etc/resolv.conf nameserver 127.0.0.1 save and exit sudo systemctl restart systemd-resolved

now you can use bind host 0.0.0.0 for AdGuardHome

sudo systemctl status systemd-resolved ● systemd-resolved.service - Network Name Resolution Loaded: loaded (/lib/systemd/system/systemd-resolved.service; enabled; vendor preset: enabled) Active: active (running) since Tue 2022-06-14 19:19:15 EEST; 2h 30min ago Docs: man:systemd-resolved.service(8) man:org.freedesktop.resolve1(5) https://www.freedesktop.org/wiki/Software/systemd/writing-network-configuration-managers https://www.freedesktop.org/wiki/Software/systemd/writing-resolver-clients Main PID: 746 (systemd-resolve) Status: "Processing requests..." Tasks: 1 (limit: 4379) Memory: 7.8M CPU: 146ms CGroup: /system.slice/systemd-resolved.service └─746 /lib/systemd/systemd-resolved

Jun 14 19:19:15 homeserversystemd[1]: Starting Network Name Resolution... Jun 14 19:19:15 homeserver systemd-resolved[746]: Positive Trust Anchors: Jun 14 19:19:15 homeserver systemd-resolved[746]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.1> Jun 14 19:19:15homeserver systemd-resolved[746]: Using system hostname '-homeserver'. Jun 14 19:19:15 homeserver systemd[1]: Started Network Name Resolution.

2022-06-14_21-49-00 2022-06-14_21-51-39

I guess mine already set to 127.0.0.1

Screenshots_2022-06-15-15-28-46

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

so that 192.168.1.11 address is for tailscale to work ?

I used default upstream dns (cloudflare) before and it work well with tailscale but it need to listen on all interface. When I use unbound and TLS forwarder, set interface to 0.0.0.0 the dns service won't start and it keep loading until I revert back changes to 192.168.1.11

its a long shot but try adding nameserver 192.168.1.11 in resolv.conf

sudo apt install resolvconf
sudo systemctl start resolvconf.service
sudo systemctl enable resolvconf.service
sudo systemctl status resolvconf.service
sudo nano /etc/resolvconf/resolv.conf.d/head

add nameserver 192.168.1.11

sudo systemctl restart resolvconf.service
sudo systemctl restart systemd-resolved.service

check sudo nano /etc/resolv.conf

restart pi just in case

see if any change with unbound etc🙏

if not you will have to ask on https://github.com/AdguardTeam/AdGuardHome

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

@Haniffaez or try nameserver 0.0.0.0 if nameserver 192.168.1.11 do not work

from adguard-wireguard-unbound-dnscrypt.

Hanif-Faez avatar Hanif-Faez commented on July 29, 2024

so that 192.168.1.11 address is for tailscale to work ?

I used default upstream dns (cloudflare) before and it work well with tailscale but it need to listen on all interface. When I use unbound and TLS forwarder, set interface to 0.0.0.0 the dns service won't start and it keep loading until I revert back changes to 192.168.1.11

its a long shot but try adding nameserver 192.168.1.11 in resolv.conf

sudo apt install resolvconf
sudo systemctl start resolvconf.service
sudo systemctl enable resolvconf.service
sudo systemctl status resolvconf.service
sudo nano /etc/resolvconf/resolv.conf.d/head

add nameserver 192.168.1.11

sudo systemctl restart resolvconf.service
sudo systemctl restart systemd-resolved.service

check sudo nano /etc/resolv.conf

restart pi just in case

see if any change with unbound etc🙏

if not you will have to ask on https://github.com/AdguardTeam/AdGuardHome

I have tried all the steps but it still not working after adding nameserver and editing Adguard.yaml to listen on 0.0.0.0
Got the same error DNS server is starting up and it keeps loading.

3

Never mind, I just use this without tailscale or went back to default upstream DNS if I need.

from adguard-wireguard-unbound-dnscrypt.

Hanif-Faez avatar Hanif-Faez commented on July 29, 2024

Wait can I close this? Sorry, this is my first post. I guess need to refer Adguardhome.

from adguard-wireguard-unbound-dnscrypt.

trinib avatar trinib commented on July 29, 2024

@Haniffaez if you found solution from AGH community.. can you please mention solution here and then you can close .. thanks

from adguard-wireguard-unbound-dnscrypt.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.