block ads trackers and malware with raspberry pi and pi
play

Block ads, trackers and malware with Raspberry Pi and Pi-hole - PowerPoint PPT Presentation

Block ads, trackers and malware with Raspberry Pi and Pi-hole https://cryptoaustralia.org.au Nick Kavadias nick@cryptoaustralia.org.au Self promotion! CryptoAUSTRALIA is a not-for-profit started by security and privacy enthusiast.


  1. Block ads, trackers and malware with Raspberry Pi and Pi-hole https://cryptoaustralia.org.au Nick Kavadias nick@cryptoaustralia.org.au

  2. Self promotion! • CryptoAUSTRALIA is a not-for-profit started by security and privacy enthusiast. • Finding practical ways of dealing with the modern privacy and security challenge.

  3. We know how to internet.. @CryptoAustralia #cryptoaus http://chat.cryptoaustralia.org.au

  4. NOTICES 1. I will tolerate some interruptions. So call out questions. 2. The night is split into two parts 1. First preso ppt death (40 min?) 2. Then the workshop (the rest)

  5. What we will be covering… 1. Why block the internet? 2. What is a DNS blackhole/sinkhole; 3. Pi-hole hardware and software supported; 4. My home Pi-hole install; 5. Advanced topics on DNS, lists and VPNs 6. Workshop with RPi / VM

  6. Instructions (for later) • Have RPi (or like) device use: https://cryptoa.us/centaurus • VirtualBox or VMWare Fusion use: https://cryptoa.us/fornax Link to download VM in these instructions, we do have a local copies on usb

  7. Can’t you just leave the internet alone? Flash ads which hijack pages; No! Pop-up and pop-under ads; Ads which stalk me on all my devices; Ad networks which track and profile me; Ads that tell me I’ve won stuff; and, Malvertising…

  8. Tech support scams! how do they work? Check out Jim Browning’s YouTube channel

  9. Pi-hole, the solution to all your problems?

  10. No! No such thing as a silver bullet! But.. • Good job blocking ads and trackers out of the box • Not YouTube video ads, but you can do with some tinkering • It is easy to setup and configure; • network based; • It is not a traffic filter. • A ct as a second line of defence for malware/viruses • I still use browser extensions • … and antivirus

  11. How DNS works normally https://go.gliffy.com/go/publish/12358860

  12. How DNS works with Pi-hole https://go.gliffy.com/go/publish/12358867

  13. Pi-Hole, not just for blocking ads and tracking • Out of the ‘box’ ads/trackers & C&C blacklists ; • Many additional lists which are well maintained by security community; • Upstream DNS services (power user!)

  14. What a blocked page site looks like What about: • Images? • JavaScript? • Https? V3.2 now lets you customise block page

  15. Do I need Raspberry Pi Hardware? • NOT Raspberry Pi exclusive • Well tested on Raspberry Pi SBCs • ARM, or Intel x86/x64 • Will work with a Pi Zero and a ethernet dongle • Works on other SBCs, like Orange-Pi, see this write-up. • Works on crappy old Intel desktops too

  16. What OS will Pi-hole run on? • Will work on any modern Linux OS. Officially supported Linux distributions are:

  17. How did I set Pi- hole up at my place?

  18. Hardware I used: • Raspberry Pi 3 model B+ (overkill?) • 2 GB microSD card (smallest!) • microUSB cable for power into back of router • USB Y cables useful. • WARNING on underpowering: https://www.raspberrypi.org/help/faqs/#powerReqs

  19. Software I used • Software: • Windows 10 & Etcher.io for prepping card https://etcher.io/ • Raspbian Lite https://www.raspberrypi.org/downloads/raspbian/ • Pi-hole – installed by piping URL to bash!

  20. And you can too, with my easy 5 Step Plan..

  21. Step 1: Put image on SD Card • Format SD • Etcher.io • touch /boot/ssh Windows will try reformat unknown card because ext4. IGNORE IT

  22. Step 2: Plug into network • Patch into home router • Power with microUSB • if you don’t have a USB slot close by, an old 1 amp USB charger will do.

  23. Step 3: Figure out IP address of RPi? This is the hardest part of the whole process! There are a few methods to try….

  24. Step 3: Method 0 - PING If you’re feeling lucky, try PING ping raspberrypi

  25. Step 3: Method 1 - DHCP table on router?

  26. Step 3: Method 2 - Network Scanning • Good ol’ IP scanning. Pick one: • Nmap sudo apt install nmap • Angry IP Scanner http://angryip.org/download/ • Masscan https://github.com/robertdavidgraham/mass can • Arp-scan https://github.com/royhills/arp- scan • Scan before, and after. See what’s new!

  27. AngryIP Scanner

  28. Step 3: Method 3 • Plug RPi into a monitor and boot!

  29. Step 4: Run installer • ssh pi@raspberry • curl -sSL https://install.pi- hole.net | bash Bad idea? Read why

  30. Pi-hole is up and running.. But not a for all devices… yet • Connect to web admin using http://pi.hole/admin • Pi-hole over-take DHCP, (disable on your your router) I’ve done this on my setup because: • network printer • Get actual hostnames in your Pi-hole log

  31. (Optional) Test it out? • Reconfigure a test computer to use the IP address of Pi-Hole for its DNS.

  32. Step 5: Re-configure router DNS settings • Log into your router. • No idea how? Find your default gateway IP and try connecting with browser, e.g. http://192.168.1.1 • ipconfig or ifconfig • To get all devices on your network to use Pi-hole for DNS, you have to make a choice…

  33. You have two choices for router config Change Disable IP for DHCP & DNS have Pi- Server hole do it Questions????

  34. Changing IP for DNS on my home router

  35. Or...Disable DHCP on router

  36. …and turn on DHCP Server on Pi-hole

  37. Blocklists • Default blocklists in /etc/pihole/adlists.list • Blocklist collection here: https://wally3k.github.io/ • Your Pi-hole has a cronjob which runs pihole updateGravity once a week . • Refer to our blog post CryptoAUSTRALIA's Favourite Block Lists

  38. Blocklists using the web admin interface You can: - whitelist hosts - temporarily disable all blocks with a timer/ manually You cannot: - Make exceptions for local devices

  39. Setting up Pi-hole away from home • If you roll your own VPN on a VPS, you can setup Pi-hole on it. Then you can run it anywhere! • https://github.com/pi-hole/pi-hole/wiki/Pi-hole---OpenVPN-server

  40. Are you a Pi-hole Power User? • Self-hosted DNS • Advanced Upstream DNS • Response Policy Zone (RPZ) • We have blog posts covering these topics! Note: You don’t need to necessarily use these with Pi- Hole

  41. 1. Your Own DNS Server • No DNS requests go to third-parties • Run your DNS server in the cloud • Pi-hole <--- DNSCRYPT ---> DNS server • More details in a blog post Build a Privacy-Respecting and Threat- Blocking DNS Server

  42. 2. Advanced Upstream DNS • Third-party DNS servers • Complements Pi-Hole • Blocks malware and phishing • Admin panel • Block categories (adult, drugs, gambling, social media …) • DNS query logging and reporting • Manual blocking / whitelisting • Integration with real-time Threat Intelligence feeds ($$$ feature)

  43. 2. Advanced Upstream DNS • Strongarm https://strongarm.io • Comodo Dome Shield https://cdome.comodo.com/shield • OpenDNS https://signup.opendns.com/homefree • Quad 9 https://www.quad9.net

  44. Which is the best threat blocking DNS provider? More info? https://blog.cryptoaustralia.org.au/2017/12/23/ best-threat-blocking-dns-providers/

  45. Response Policy Zone (RPZ) • The previous two combined: • Use your own DNS server • Download RPZ-based block list • Register Strongarm business account (free) • Download BIND9.10+ config from https://app.strongarm.io/settings/rpz/

  46. Done! Let Workshop it! • If you’ve brought along a RPi, use these instructions: https://cryptoa.us/centaurus • If you’ve going to play along on the virtual machine, use these instructions: https://cryptoa.us/fornax • Join us on #Slack https://chat.cryptoaustralia.org.au/

  47. Where to get help after workshop CryptoAUSTRALIA Slack channel #pi-hole-workshop-help https://chat.cryptoaustralia.org.au/ Pi-Hole website https://pi-hole.net/ Has links to Discourse(!) , sub- Reddit, YouTube channel https://blog.cryptoaustralia.org.au

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend