frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Open in hackernews

Configuring Split Horizon DNS with Pi-Hole and Tailscale

https://www.bentasker.co.uk/posts/blog/general/configuring-pihole-to-serve-different-records-to-different-clients.html
66•gm678•7h ago

Comments

leipert•5h ago
> Chromecasts ignore local DNS... grrr

Can’t you force traffic to 8.8.8.8 / 8.8.4.4 (especially port 53) to hit your PiHole instead?

joombaga•4h ago
I think you can just block Google's servers and it'll use the DHCP-configured DNS server.
temp0826•4h ago
Iptables can be used to dump any traffic destined for port 53 to a dns server of your choosing, but I don't know if something like that exists in consumer routers. (Blocking a baked in doh client is a lot more complicated...)
Melatonic•4h ago
Yeah it would depend on your equipment - but basically if stuff pins and IP instead of doing DNS you would have to block the IP's of all the common resolvers (or at least the ones it will try)
VTimofeenko•3h ago
Why not forbid going outside on port 53 and (optionally) redirect to the local DNS servers:

(nftables syntax)

ip saddr != @lan_dns ip daddr != @lan_dns udp dport 53 counter dnat ip to numgen inc mod 2 map { 0 : 192.168.1.1, 1 : 192.168.1.2 } comment "Force all DNS traffic to go through local DNS servers"

watersb•4h ago
My older Kindle Fire HD 10 flips over to DNS over HTTPS if it can't see Google on port 53.

I've tried to add a couple of rules in iptables on my Ubiquiti Dream Machine (UDM), but the out-of-box configuration on the UDM is pages and pages to iptables rules. I can modify that config via a shell interface (a shell script with four iptables command lines), but it doesn't play with the web based GUI, and I have yet to figure out how the UDM handles such traffic.

Yes, I've simply blocked all traffic for 8.8.8.8 and 8.8.4.4, via the UDM GUI, the rules are there. The Kindle still shows me ads.

It may be possible to delete the entries for Google DNS on the Kindle via adb commands during boot, but I haven't gotten that far.

Someday I will get around to setting up a homelab network enough to learn iptables etc without blacking out my home network. As any network outage bring immediate screams from the house, I have to treat the firewall configuration as critical infrastructure: brittle. Don't touch.

ectospheno•3h ago
Hagezi and others provide reasonable DoH block lists.
OptionOfT•46m ago
With the UDM you can do DNS masquarade to redirect traffic destined for 8.8.8.8:53 to your local pihole / AdGuard instance.
api•2h ago
On my LAN I send all DNS traffic to pi.hole with iptables. Won’t help if they DoH tunnel it though.
gerdesj•2h ago
Its a trick one. Traditional DNS runs over port 53/udp and fails over to 53/tcp for large queries/results. That's easy to deal with on a packet filter firewall.

Then in the name of ... something, something, security ... DNS over http(s) was invented. Now you can balkanize DNS by requiring certain SSL certificates be involved. To my knowledge this hasn't been abused large scale yet but it could.

Let's go easy on the tinfoil and simply redirect outbound traffic to 53/udp and tcp to a PiHole or other DNS server under your control.

If you insist on the tin foil, you will probably need to look into a MitM proxy such as Squid - look into "bump" and "spice".

dolmen•3h ago
The post says:

> Side note: for those wondering, Tailscale is Canadian and can't see the content of connections (although if you're worried about this it's also possible to self-host using Headscale).

However this is no longer the case. From Tailscale's Terms of service "Schedule A", "New customer accounts on or after September 3, 2024" are bound to "Tailscale US Inc., a Delaware corporation"

doctorpangloss•1h ago
It can’t see the contents of connections but it records all the metadata. You know a lot about what the contents are going to be based on the ports. The default configuration of Tailscale will also collect all your DNS requests.

https://github.com/tailscale/tailscale/issues/16165

elashri•2h ago
I do force all plain DNS on port 53 to my local dns (Adguard home + unbound on a gl-inet router). And I block common DoH addresses. There are many lists on Github. I collect them using github action to have one big list of their IP and addresses and block them.

This is not a bullet proof solution in case there is a semi known custom DoH an application use. But it is the best that I can do without Enterprise network gear and more complex setup that I would like to maintain.

baby_souffle•1h ago
Would you be willing to share the list sources you use?
bozhark•1h ago
Seconded
metadat•52m ago
And perhaps automate pushing to a gist or repository?
snvzz•55m ago
I use headscale and took the high road: Tailscale IPs all the time.

Why trust the wires at all. Just run all traffic through VPN, even if it's in the same LAN.

This way, I know all traffic is encrypted. I don't have to worry about SMB or the like being plaintext.

MCP-B: A Protocol for AI Browser Automation

https://mcp-b.ai/
62•bustodisgusto•1h ago•29 comments

Biomni: A General-Purpose Biomedical AI Agent

https://github.com/snap-stanford/Biomni
126•GavCo•5h ago•25 comments

Tree Borrows

https://plf.inf.ethz.ch/research/pldi25-tree-borrows.html
396•zdw•9h ago•60 comments

Show HN: FlopperZiro – A DIY open-source Flipper Zero clone

https://github.com/lraton/FlopperZiro
161•iraton•7h ago•46 comments

A Typology of Canadianisms

https://dchp.arts.ubc.ca/how-to-use
41•gnabgib•2h ago•21 comments

Show HN: MCP server for searching and downloading documents from Anna's Archive

https://github.com/iosifache/annas-mcp
48•iosifache•3h ago•22 comments

Jank Programming Language

https://jank-lang.org/
196•akkad33•3d ago•42 comments

Show HN: Petrichor – a free, open-source, offline music player for macOS

https://github.com/kushalpandya/Petrichor
17•kushalpandya•2h ago•3 comments

Multi-Region Row Level Security in CockroachDB

https://www.cockroachlabs.com/blog/fine-grained-access-control-row-level-security/
18•rusticwizard•2h ago•1 comments

A fast 3D collision detection algorithm

https://cairno.substack.com/p/improvements-to-the-separating-axis
173•OlympicMarmoto•10h ago•23 comments

HyAB k-means for color quantization

https://30fps.net/pages/hyab-kmeans/
20•ibobev•3h ago•8 comments

Configuring Split Horizon DNS with Pi-Hole and Tailscale

https://www.bentasker.co.uk/posts/blog/general/configuring-pihole-to-serve-different-records-to-different-clients.html
66•gm678•7h ago•17 comments

Understand CPU Branch Instructions Better

https://chrisfeilbach.com/2025/07/05/understand-cpu-branch-instructions-better/
27•mfiguiere•3d ago•6 comments

Linda Yaccarino is leaving X

https://www.nytimes.com/2025/07/09/technology/linda-yaccarino-x-steps-down.html
356•donohoe•9h ago•524 comments

Archaeologists unveil 3,500-year-old city in Peru

https://www.bbc.co.uk/news/articles/c07dmx38kyeo
119•neversaydie•2d ago•30 comments

Making Explainable Minesweeper

https://sublevelgames.github.io/blogs/2025-07-06-making-explainable-minesweeper/
20•greentec•3d ago•10 comments

Would You Like an IDOR With That? Leaking 64m McDonald's Job Applications

https://ian.sh/mcdonalds
41•samwcurry•5h ago•19 comments

White Noise – secure and private messenger

https://www.whitenoise.chat/
26•onhacker•2h ago•5 comments

Ask HN: How is the tech scene in LA?

16•asdev•3d ago•26 comments

Ruby 3.4 frozen string literals: What Rails developers need to know

https://www.prateekcodes.dev/ruby-34-frozen-string-literals-rails-upgrade-guide/
199•thomas_witt•3d ago•99 comments

Nuclear Waste Reprocessing Gains Momentum in the U.S.

https://spectrum.ieee.org/nuclear-waste-reprocessing-transmutation
89•rbanffy•9h ago•76 comments

Bootstrapping a side project into a profitable seven-figure business

https://projectionlab.com/blog/we-reached-1m-arr-with-zero-funding
790•jonkuipers•2d ago•208 comments

The most otherworldly, mysterious forms of lightning on Earth

https://www.nationalgeographic.com/science/article/lightning-sprites-transient-luminous-events-thunderstorms
50•Anon84•3d ago•15 comments

Most RESTful APIs aren't really RESTful

https://florian-kraemer.net//software-architecture/2025/07/07/Most-RESTful-APIs-are-not-really-RESTful.html
279•BerislavLopac•17h ago•447 comments

Phrase origin: Why do we "call" functions?

https://quuxplusone.github.io/blog/2025/04/04/etymology-of-call/
246•todsacerdoti•20h ago•170 comments

Memory-Level Parallelism: Apple M2 vs. Apple M4

https://lemire.me/blog/2025/07/09/memory-level-parallelism-apple-m2-vs-apple-m4/
27•zdw•3h ago•6 comments

QRS: Epsilon Wrangling

https://www.tbray.org/ongoing/When/202x/2025/07/07/Epsilon-Wrangling
10•zdw•3h ago•0 comments

An ambitious vision of a city built from lava

https://www.cnn.com/2025/07/03/style/lava-material-architecture-venice-biennale
7•dabinat•2d ago•1 comments

7-Zip for Windows can now use more than 64 CPU threads for compression

https://www.7-zip.org/history.txt
253•doener•2d ago•175 comments

Why LLMs Can't Write Q/Kdb+: Writing Code Right-to-Left

https://medium.com/@gabiteodoru/why-llms-cant-write-q-kdb-writing-code-right-to-left-ea6df68af443
172•gabiteodoru•1d ago•120 comments