xxxx@xxxx:~$ sudo su
xxxx@xxxx:/home/xxxx# netstat -ltnp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:4711 0.0.0.0:* LISTEN 2223/pihole-FTL
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 2745/pixelserv-tls
tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 2223/pihole-FTL
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 862/sshd
tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN 2745/pixelserv-tls
tcp 0 0 0.0.0.0:444 0.0.0.0:* LISTEN 604/openvpn
tcp6 0 0 ::1:4711 :::* LISTEN 2223/pihole-FTL
tcp6 0 0 :::53 :::* LISTEN 2223/pihole-FTL
tcp6 0 0 :::22 :::* LISTEN 862/sshd
PIHOLE_INTERFACE=eth0
PIHOLE_INTERFACE=tun0
PIHOLE_INTERFACE=tun1
IPV4_ADDRESS=0.0.0.0
IPV6_ADDRESS=0.0.0.0
PIHOLE_DNS_1=10.128.0.1
#PIHOLE_DNS_2=8.8.4.4
QUERY_LOGGING=true
INSTALL_WEB_SERVER=false
INSTALL_WEB_INTERFACE=false
LIGHTTPD_ENABLED=false
BLOCKING_ENABLED=true
DNSMASQ_LISTENING=all
PRIVACYLEVEL=0
BLOCKINGMODE=IP-NODATA-AAAA
dnsmasq[2223]: query[A] ssl.google-analytics.com from 10.8.0.3
dnsmasq[2223]: /etc/pihole/gravity.list ssl.google-analytics.com is 0.0.0.0
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1460
inet 10.128.0.6 netmask 255.255.255.255 broadcast 10.128.0.6
inet6 fe80::4001:aff:fe80:6 prefixlen 64 scopeid 0x20<link>
ether 42:01:0a:80:00:06 txqueuelen 1000 (Ethernet)
RX packets 3319 bytes 883009 (862.3 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 2513 bytes 623072 (608.4 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1 (Local Loopback)
RX packets 48 bytes 4659 (4.5 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 48 bytes 4659 (4.5 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
tun0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500
inet 10.9.0.1 netmask 255.255.255.0 destination 10.9.0.1
inet6 fe80::1ab:3b0c:547e:d869 prefixlen 64 scopeid 0x20<link>
unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 (UNSPEC)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 10 bytes 480 (480.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
tun1: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500
inet 10.8.0.1 netmask 255.255.255.0 destination 10.8.0.1
inet6 fe80::111a:a7a7:5dd1:2df5 prefixlen 64 scopeid 0x20<link>
unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 (UNSPEC)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 11 bytes 528 (528.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
hi there everyone !
I have the following setup.
I have pixelcerv-tls with pihole without web interface and pivpn installed on debian stretch 9. with all the clients connecting through vpn.
despite pixelserv-tls listening on port 80 and 443 with cert installed on windows and android device and pihole sending requests to 0.0.0.0 , pixelserv-tls is not intercepting, resulting in page not found for ads. does it has something to do with vpn settings or any other issue ?
can please someone help me out it has been couple totaly stuck here may be lack of networking knowledge.
note: tried starting pixelserve with ip address for e.g 10.128.0.6 , no result.
i did it and even restarted pihole and even reinstall crt but same result no interception from pixelserv@tokra
I'm not een expert but you direct your requests to 0.0.0.0, shouldn't you direct them to the ip-address of pixelserv-tls?
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:4711 0.0.0.0:* LISTEN 17253/pihole-FTL
tcp 0 0 10.128.0.6:80 0.0.0.0:* LISTEN 17121/pixelserv-tls
tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 17253/pihole-FTL
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 861/sshd
tcp 0 0 10.128.0.6:443 0.0.0.0:* LISTEN 17121/pixelserv-tls
tcp 0 0 0.0.0.0:444 0.0.0.0:* LISTEN 596/openvpn
tcp6 0 0 ::1:4711 :::* LISTEN 17253/pihole-FTL
tcp6 0 0 :::53 :::* LISTEN 17253/pihole-FTL
tcp6 0 0 :::22 :::* LISTEN 861/sshd
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1460
inet 10.128.0.6 netmask 255.255.255.255 broadcast 10.128.0.6
inet6 fe80::4001:aff:fe80:6 prefixlen 64 scopeid 0x20<link>
ether 42:01:0a:80:00:06 txqueuelen 1000 (Ethernet)
RX packets 32375 bytes 7364972 (7.0 MiB)
RX errors 0 dropped 0 overruns 0 frame 12
TX packets 29536 bytes 3634927 (3.4 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1 (Local Loopback)
RX packets 322 bytes 32828 (32.0 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 322 bytes 32828 (32.0 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
tun0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500
inet 10.9.0.1 netmask 255.255.255.0 destination 10.9.0.1
inet6 fe80::8840:f4fb:e3f7:501d prefixlen 64 scopeid 0x20<link>
unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 (UNSPEC)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 31 bytes 1488 (1.4 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
tun1: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500
inet 10.8.0.1 netmask 255.255.255.0 destination 10.8.0.1
inet6 fe80::f76a:43eb:eab7:1ec2 prefixlen 64 scopeid 0x20<link>
unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 (UNSPEC)
RX packets 3702 bytes 249215 (243.3 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 3730 bytes 389503 (380.3 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
I think you are mostly in the wrong place unless you are running pi-hole on the router.
This might help: pixelserv - A Better One-pixel Webserver for Adblock
Also this: Setup pixelserv-tls for Pi-Hole
15:08:50 dnsmasq[17253]: query[A] pagead2.googlesyndication.com from 10.8.0.2
15:08:50 dnsmasq[17253]: /etc/pihole/gravity.list pagead2.googlesyndication.com is 0.0.0.0
15:09:18 dnsmasq[17253]: query[A] ssl.google-analytics.com from 10.8.0.2
15:09:18 dnsmasq[17253]: /etc/pihole/gravity.list ssl.google-analytics.com is 0.0.0.0
I think you are mostly in the wrong place unless you are running pi-hole on the router.
This might help: pixelserv - A Better One-pixel Webserver for Adblock
Also this: Setup pixelserv-tls for Pi-Hole
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:4711 0.0.0.0:* LISTEN 2410/pihole-FTL
tcp 0 0 10.128.0.6:80 0.0.0.0:* LISTEN 2438/pixelserv-tls
tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 2410/pihole-FTL
tcp 0 0 10.128.0.6:53 0.0.0.0:* LISTEN 2410/pihole-FTL
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 842/sshd
tcp 0 0 10.128.0.6:443 0.0.0.0:* LISTEN 2438/pixelserv-tls
tcp 0 0 0.0.0.0:444 0.0.0.0:* LISTEN 642/openvpn
tcp6 0 0 ::1:4711 :::* LISTEN 2410/pihole-FTL
tcp6 0 0 ::1:53 :::* LISTEN 2410/pihole-FTL
tcp6 0 0 :::22 :::* LISTEN 842/sshd
egrep 'pixelserv' /var/log/syslog
Jul 29 16:06:09 x pixelserv-tls[2438]: pixelserv-tls 2.2.1 (compiled: Jul 27 2019 20:11:34 flags: tfo no_tls1_3) options: 10.128.0.6 -l 5
Jul 29 16:06:09 x pixelserv-tls[2438]: sslctx_tbl_load: 10.128.0.6
Jul 29 16:06:09 x pixelserv-tls[2438]: Listening on :10.128.0.6:443
Jul 29 16:06:09 x pixelserv-tls[2438]: Listening on :10.128.0.6:80
Jul 29 16:06:18 x pixelserv-tls[2438]: x.x.x.x x.x.x.x GET /servstats HTTP/1.1 tls_none
Jul 29 16:06:21 x pixelserv-tls[2438]: x.x.x.x x.x.x.x GET /servstats HTTP/1.1 tls_none
Jul 29 16:06:22 x pixelserv-tls[2438]: x.x.x.x x.x.x.x GET /favicon.ico HTTP/1.1 tls_none
Jul 29 16:06:24 x pixelserv-tls[2438]: x.x.x.x x.x.x.x GET /servstats HTTP/1.1 tls_none
Jul 29 16:06:24 x pixelserv-tls[2438]: x.x.x.x x.x.x.x GET /favicon.ico HTTP/1.1 tls_none
Jul 29 16:06:25 x pixelserv-tls[2438]: x.x.x.x x.x.x.x GET /servstats HTTP/1.1 tls_none
Jul 29 16:06:25 x pixelserv-tls[2438]: x.x.x.x x.x.x.x GET /favicon.ico HTTP/1.1 tls_none
Jul 29 16:06:25 x pixelserv-tls[2438]: x.x.x.x x.x.x.x GET /servstats HTTP/1.1 tls_none
Jul 29 16:08:00 x pixelserv-tls[2438]: x.x.x.x x.x.x.x GET /servstats HTTP/1.1 tls_none
Jul 29 16:08:01 x pixelserv-tls[2438]: x.x.x.x x.x.x.x GET /favicon.ico HTTP/1.1 tls_none
Jul 29 16:08:26 x pixelserv-tls[2438]: Exit recv loop socket:9 rv:690 errno:11 num_req:7
Jul 29 16:09:21 x pixelserv-tls[2438]: no file extension / from path /
Jul 29 16:09:21 x pixelserv-tls[2438]: x.x.x.x x.x.x.x:80 GET / HTTP/1.1 tls_none
Jul 29 16:09:27 x pixelserv-tls[2438]: Exit recv loop socket:9 rv:102 errno:0 num_req:1
Jul 29 16:10:02 x pixelserv-tls[2438]: Exit recv loop socket:10 rv:690 errno:11 num_req:3
Jul 29 18:22:14 pixelserv pixelserv-tls[17083]: pixelserv-tls 2.2.1 (compiled: Jul 29 2019 18:09:05 flags: tfo tls1_3) options: -l 5
Jul 29 18:22:14 pixelserv pixelserv-tls[17083]: chown failed to set owner of /tmp/pixelcerts to nobody
Jul 29 18:26:19 pixelserv pixelserv-tls[17132]: pixelserv-tls 2.2.1 (compiled: Jul 29 2019 18:09:05 flags: tfo tls1_3) options: -l 5
Jul 29 18:26:19 pixelserv pixelserv-tls[17132]: chown failed to set owner of /tmp/pixelcerts to nobody
Jul 29 18:28:35 pixelserv pixelserv-tls[17152]: pixelserv-tls 2.2.1 (compiled: Jul 29 2019 18:09:05 flags: tfo tls1_3) options: -l 5
Jul 29 18:28:35 pixelserv pixelserv-tls[17152]: chown failed to set owner of /tmp/pixelcerts to nobody
xxxxx@pixelserv:/tmp$ ls -l
total 8
-rw------- 1 xxxxx xxxxx 0 Jul 29 18:05 cpan_install_8kk4.txt
-rw------- 1 xxxxx xxxxx 37 Jul 29 18:05 cpan_install_kj9f.txt
prw------- 1 nobody xxxxx 0 Jul 29 18:12 pixelcerts
drwx------ 2 xxxxx xxxxx 4096 Jul 29 17:54 ssh-TECOJCgX5F
slh 0 # of accepted HTTPS requests
slc 0 # of dropped HTTPS requests (client disconnect without sending any request)
slu 428 # of dropped HTTPS requests (other TLS handshake errors)
uca 0 slu break-down: # of unknown CA reported by clients
ucb 0 slu break-down: # of bad certificate reported by clients
uce 481 slu break-down: # of unknown cert reported by clients
ush 0 slu break-down: # of shutdown by clients after ServerHello
sct 71 cert cache: # of certs in cache
sch 422 cert cache: # of reuses of cached certs
scm 71 cert cache: # of misses to find a cert in cache
scp 0 cert cache: # of purges to give room for a new cert
ssh 0 sess cache: # of reuses of cached TLS sessions
ssm 507 sess cache: # of misses to find a TLS session in cache
ssp 0 sess cache: # of purges to give room for a new TLS session
I imported crt on my device and then rebooted but the "# of accepted HTTPS requests is 0 and rejections are high, is it normal and what is the reason ? however, the ads are being blocked.
Code:slh 0 # of accepted HTTPS requests slc 0 # of dropped HTTPS requests (client disconnect without sending any request) slu 428 # of dropped HTTPS requests (other TLS handshake errors) uca 0 slu break-down: # of unknown CA reported by clients ucb 0 slu break-down: # of bad certificate reported by clients uce 481 slu break-down: # of unknown cert reported by clients ush 0 slu break-down: # of shutdown by clients after ServerHello sct 71 cert cache: # of certs in cache sch 422 cert cache: # of reuses of cached certs scm 71 cert cache: # of misses to find a cert in cache scp 0 cert cache: # of purges to give room for a new cert ssh 0 sess cache: # of reuses of cached TLS sessions ssm 507 sess cache: # of misses to find a TLS session in cache ssp 0 sess cache: # of purges to give room for a new TLS session
is this normal behaviour ? or am i missing something ??
Thank you
Aug 11 00:02:03 ovpn-server1[28611]: TCP/UDP: Socket bind failed on local address [AF_INET6][undef]:443: Address already in use (errno=98)
Aug 11 00:02:03 ovpn-server1[28611]: Exiting due to fatal error
Hi,
I recently installed pixelserv-tls on my AC87U to work together with Diversion. Upon reboot after installation, my OpenVPN server borked. From the logs, it says:
Code:Aug 11 00:02:03 ovpn-server1[28611]: TCP/UDP: Socket bind failed on local address [AF_INET6][undef]:443: Address already in use (errno=98) Aug 11 00:02:03 ovpn-server1[28611]: Exiting due to fatal error
After a mild panic attack (I was doing this remotely, and thought I no longer had access to my router), I managed to reconfigure ovpn to use the default port (1194/udp).
I am guessing this is happening because the pixelserv-tls service starts before ovpn, and reserves the 443/TCP port.
Is there any way of running pixelserv-tls on a different port without breaking my Diversion configuration? I would like ovpn to be on 443/TCP for "accessibility" reasons, but would also like my router to do my adblocking for me.
Note: will be cross-posting this on the Diversion thread (https://www.snbforums.com/threads/diversion-the-router-ad-blocker.48538/page-174#post-509913)
Welcome to the forum. Tgere’s a simple fix:
https://www.snbforums.com/threads/ab-solution-the-ad-blocking-solution.37511/page-131#post-386022
Set up second server to reduce panic attacks.
(Cross posting doesn’t always go dow well )
The important thing is you got a fix and no-one complained - they very rarely do on this forum. And I take your point about the 50/50.Hi martinr, thanks for the pointer!
Noted about cross posting. My problem was a conflict with pixelserv-tls, which could be answered here, but then again it was installed because I wanted to use Diversion.
50/50 if you ask me.
Thread starter | Title | Forum | Replies | Date |
---|---|---|---|---|
C | Diversion Pixelserv replacement | Asuswrt-Merlin AddOns | 2 | |
L | Is Diversion better than NextDNS, PiHole or AdGuard Home? | Asuswrt-Merlin AddOns | 10 |
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!