This process collects information from your Pi-hole, and optionally uploads it to a unique and random directory on tricorder.pi-hole.net. The intent of this script is to allow users to self-diagnose their installations. This is accomplished by running tests against our software and providing the user with links to FAQ articles when a problem is detected. Since we are a small team and Pi-hole has been growing steadily, it is our hope that this will help us spend more time on development. NOTE: All log files auto-delete after 48 hours and ONLY the Pi-hole developers can access your data via the given token. We have taken these extra steps to secure your data and will work to further reduce any personal information gathered. *** [ INITIALIZING ] [i] 2018-12-10:08:45:17 debug log has been initialized. *** [ INITIALIZING ] Sourcing setup variables [i] Sourcing /etc/pihole/setupVars.conf... *** [ DIAGNOSING ]: Core version [i] Core: v4.1 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249) [i] Branch: master [i] Commit: v4.1-0-gf65f793 *** [ DIAGNOSING ]: Web version [i] Web: v4.1 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249) [i] Branch: master [i] Commit: v4.1-0-g5ec769d9 *** [ DIAGNOSING ]: FTL version [✓] FTL: v4.1 *** [ DIAGNOSING ]: lighttpd version [i] 1.4.45 *** [ DIAGNOSING ]: php version [i] 7.0.30 *** [ DIAGNOSING ]: Operating system [✓] Raspbian GNU/Linux 9 (stretch) *** [ DIAGNOSING ]: SELinux [i] SELinux not detected *** [ DIAGNOSING ]: Processor [✓] armv7l *** [ DIAGNOSING ]: Networking [✓] IPv4 address(es) bound to the eth0 interface: 192.168.178.4/24 matches the IP found in /etc/pihole/setupVars.conf [✓] IPv6 address(es) bound to the eth0 interface: fd00::4cce:6d95:df39:6300 does not match the IP found in /etc/pihole/setupVars.conf (https://discourse.pi-hole.net/t/use-ipv6-ula-addresses-for-pi-hole/2127) 2a02:810d:1380:3030:3b02:ce33:e49a:6a5 matches the IP found in /etc/pihole/setupVars.conf fe80::d7df:bd5b:d4ec:588 does not match the IP found in /etc/pihole/setupVars.conf (https://discourse.pi-hole.net/t/use-ipv6-ula-addresses-for-pi-hole/2127) ^ Please note that you may have more than one IP address listed. As long as one of them is green, and it matches what is in /etc/pihole/setupVars.conf, there is no need for concern. The link to the FAQ is for an issue that sometimes occurs when the IPv6 address changes, which is why we check for it. [i] Default IPv4 gateway: 192.168.178.1 * Pinging 192.168.178.1... [✓] Gateway responded. [i] Default IPv6 gateway: fe80::e228:6dff:fe5d:4df6 * Pinging fe80::e228:6dff:fe5d:4df6... [✓] Gateway responded. *** [ DIAGNOSING ]: Ports in use *:22 sshd (IPv4) *:22 sshd (IPv6) [*:80] is in use by lighttpd [*:80] is in use by lighttpd [*:53] is in use by pihole-FTL [*:53] is in use by pihole-FTL [127.0.0.1:4711] is in use by pihole-FTL [[::1]:4711] is in use by pihole-FTL *** [ DIAGNOSING ]: Name resolution (IPv4) using a random blocked domain and a known ad-serving domain [✓] ad.doubleclick.net.60729.9336.302br.net is 0.0.0.0 via localhost (127.0.0.1) [✓] ad.doubleclick.net.60729.9336.302br.net is 0.0.0.0 via Pi-hole (192.168.178.4) [✓] doubleclick.com is 172.217.21.14 via a remote, public DNS server (8.8.8.8) *** [ DIAGNOSING ]: Name resolution (IPv6) using a random blocked domain and a known ad-serving domain [✓] dco.datamind.ru is :: via localhost (::1) [✓] dco.datamind.ru is :: via Pi-hole (2a02:810d:1380:3030:3b02:ce33:e49a:6a5) [✓] doubleclick.com is 2a00:1450:4016:80b::200e via a remote, public DNS server (2001:4860:4860::8888) *** [ DIAGNOSING ]: Pi-hole processes [✓] lighttpd daemon is active [✓] pihole-FTL daemon is active *** [ DIAGNOSING ]: Setup variables DNSMASQ_LISTENING=local PIHOLE_DNS_3=2620:0:ccc::2 PIHOLE_DNS_4=2620:0:ccd::2 PIHOLE_DNS_5=1.1.1.1 PIHOLE_DNS_6=1.0.0.1 PIHOLE_DNS_7=2606:4700:4700::1111 PIHOLE_DNS_8=2606:4700:4700::1001 DNS_FQDN_REQUIRED=true DNS_BOGUS_PRIV=true DNSSEC=false CONDITIONAL_FORWARDING=true CONDITIONAL_FORWARDING_IP=192.168.178.1 CONDITIONAL_FORWARDING_DOMAIN=fritz.box CONDITIONAL_FORWARDING_REVERSE=178.168.192.in-addr.arpa PIHOLE_INTERFACE=eth0 IPV4_ADDRESS=192.168.178.4/24 IPV6_ADDRESS=2a02:810d:1380:3030:3b02:ce33:e49a:6a5 PIHOLE_DNS_1=208.67.222.222 PIHOLE_DNS_2=208.67.220.220 QUERY_LOGGING=true INSTALL_WEB_SERVER=true INSTALL_WEB_INTERFACE=true LIGHTTPD_ENABLED=true BLOCKING_ENABLED=true *** [ DIAGNOSING ]: Dashboard and block page [✓] Block page X-Header: X-Pi-hole: A black hole for Internet advertisements. [✓] Web interface X-Header: X-Pi-hole: The Pi-hole Web interface is working! *** [ DIAGNOSING ]: Gravity list -rw-r--r-- 1 root root 3253952 Dec 10 08:31 /etc/pihole/gravity.list -----head of gravity.list------ -x3.vindicosuite.com 0-hjsochvj-ios-1-2-3.mobile-sdk-api.intercom.io 0-jovd32f9-ios-7-0-1.mobile-sdk-api.intercom.io 0.0.0.0 -----tail of gravity.list------ zzz.clickbank.net zzzezeroe.fr zzzpooeaz-france.com zzzrtrcm2.com *** [ DIAGNOSING ]: contents of /etc/pihole -rw-r--r-- 1 root root 410 Dec 6 11:28 /etc/pihole/adlists.list https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts https://mirror1.malwaredomains.com/files/justdomains http://sysctl.org/cameleon/hosts https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt https://hosts-file.net/ad_servers.txt https://adaway.org/hosts.txt -rw-r--r-- 1 root root 0 Dec 6 17:42 /etc/pihole/blacklist.txt -rw-r--r-- 1 root root 146 Dec 10 08:31 /etc/pihole/local.list 192.168.178.4 raspberrypi 2a02:810d:1380:3030:3b02:ce33:e49a:6a5 raspberrypi 192.168.178.4 pi.hole 2a02:810d:1380:3030:3b02:ce33:e49a:6a5 pi.hole -rw-r--r-- 1 root root 234 Dec 10 08:31 /etc/pihole/logrotate /var/log/pihole.log { su root root daily copytruncate rotate 5 compress delaycompress notifempty nomail } /var/log/pihole-FTL.log { su root root weekly copytruncate rotate 3 compress delaycompress notifempty nomail } -rw-r--r-- 1 root root 0 Dec 7 14:25 /etc/pihole/whitelist.txt *** [ DIAGNOSING ]: contents of /etc/dnsmasq.d -rw-r--r-- 1 root root 1658 Dec 10 08:31 /etc/dnsmasq.d/01-pihole.conf addn-hosts=/etc/pihole/gravity.list addn-hosts=/etc/pihole/black.list addn-hosts=/etc/pihole/local.list user=pihole group=pihole localise-queries no-resolv cache-size=10000 log-queries log-facility=/var/log/pihole.log local-ttl=2 log-async server=208.67.222.222 server=208.67.220.220 server=2620:0:ccc::2 server=2620:0:ccd::2 server=1.1.1.1 server=1.0.0.1 server=2606:4700:4700::1111 server=2606:4700:4700::1001 domain-needed bogus-priv local-service server=/fritz.box/192.168.178.1 server=/178.168.192.in-addr.arpa/192.168.178.1 *** [ DIAGNOSING ]: contents of /etc/lighttpd -rw-r--r-- 1 root root 3102 Dec 10 08:31 /etc/lighttpd/lighttpd.conf server.modules = ( "mod_access", "mod_accesslog", "mod_auth", "mod_expire", "mod_compress", "mod_redirect", "mod_setenv", "mod_rewrite" ) server.document-root = "/var/www/html" server.error-handler-404 = "pihole/index.php" server.upload-dirs = ( "/var/cache/lighttpd/uploads" ) server.errorlog = "/var/log/lighttpd/error.log" server.pid-file = "/var/run/lighttpd.pid" server.username = "www-data" server.groupname = "www-data" server.port = 80 accesslog.filename = "/var/log/lighttpd/access.log" accesslog.format = "%{%s}t|%V|%r|%s|%b" index-file.names = ( "index.php", "index.html", "index.lighttpd.html" ) url.access-deny = ( "~", ".inc", ".md", ".yml", ".ini" ) static-file.exclude-extensions = ( ".php", ".pl", ".fcgi" ) compress.cache-dir = "/var/cache/lighttpd/compress/" compress.filetype = ( "application/javascript", "text/css", "text/html", "text/plain" ) include_shell "/usr/share/lighttpd/use-ipv6.pl " + server.port include_shell "/usr/share/lighttpd/create-mime.assign.pl" include_shell "find /etc/lighttpd/conf-enabled -name '*.conf' -a ! -name 'letsencrypt.conf' -printf 'include \"%p\" ' 2>/dev/null" $HTTP["url"] =~ "^/admin/" { setenv.add-response-header = ( "X-Pi-hole" => "The Pi-hole Web interface is working!", "X-Frame-Options" => "DENY" ) $HTTP["url"] =~ ".ttf$" { setenv.add-response-header = ( "Access-Control-Allow-Origin" => "*" ) } } $HTTP["url"] =~ "^/admin/\.(.*)" { url.access-deny = ("") } include_shell "cat external.conf 2>/dev/null" *** [ DIAGNOSING ]: contents of /etc/cron.d -rw-r--r-- 1 root root 1704 Dec 10 08:31 /etc/cron.d/pihole 44 3 * * 7 root PATH="$PATH:/usr/local/bin/" pihole updateGravity >/var/log/pihole_updateGravity.log || cat /var/log/pihole_updateGravity.log 00 00 * * * root PATH="$PATH:/usr/local/bin/" pihole flush once quiet @reboot root /usr/sbin/logrotate /etc/pihole/logrotate */10 * * * * root PATH="$PATH:/usr/local/bin/" pihole updatechecker local 51 14 * * * root PATH="$PATH:/usr/local/bin/" pihole updatechecker remote @reboot root PATH="$PATH:/usr/local/bin/" pihole updatechecker remote reboot *** [ DIAGNOSING ]: contents of /var/log/lighttpd -rw-r--r-- 1 www-data www-data 316 Dec 10 08:32 /var/log/lighttpd/error.log 2018-12-09 06:25:02: (server.c.1534) logfiles cycled UID = 0 PID = 29544 2018-12-10 08:31:32: (server.c.1828) server stopped by UID = 0 PID = 1 2018-12-10 08:31:32: (log.c.217) server started 2018-12-10 08:32:22: (server.c.1828) server stopped by UID = 0 PID = 1 2018-12-10 08:32:33: (log.c.217) server started *** [ DIAGNOSING ]: contents of /var/log -rw-r--r-- 1 pihole pihole 10955 Dec 10 08:32 /var/log/pihole-FTL.log -----head of pihole-FTL.log------ [2018-12-10 04:59:00.101] Notice: Increasing overTime struct size from 500 to 600 [2018-12-10 08:31:34.439] Using log file /var/log/pihole-FTL.log [2018-12-10 08:31:34.439] ########## FTL started! ########## [2018-12-10 08:31:34.439] FTL branch: master [2018-12-10 08:31:34.439] FTL version: v4.1 [2018-12-10 08:31:34.439] FTL commit: d42bcb7 [2018-12-10 08:31:34.439] FTL date: 2018-12-09 14:21:03 -0600 [2018-12-10 08:31:34.439] FTL user: pihole [2018-12-10 08:31:34.439] Starting config file parsing (/etc/pihole/pihole-FTL.conf) [2018-12-10 08:31:34.440] SOCKET_LISTENING: only local [2018-12-10 08:31:34.440] AAAA_QUERY_ANALYSIS: Show AAAA queries [2018-12-10 08:31:34.440] MAXDBDAYS: max age for stored queries is 365 days [2018-12-10 08:31:34.440] RESOLVE_IPV6: Resolve IPv6 addresses [2018-12-10 08:31:34.440] RESOLVE_IPV4: Resolve IPv4 addresses [2018-12-10 08:31:34.440] DBINTERVAL: saving to DB file every minute [2018-12-10 08:31:34.440] DBFILE: Using /etc/pihole/pihole-FTL.db [2018-12-10 08:31:34.440] MAXLOGAGE: Importing up to 24.0 hours of log data [2018-12-10 08:31:34.440] PRIVACYLEVEL: Set to 0 [2018-12-10 08:31:34.440] IGNORE_LOCALHOST: Show queries from localhost [2018-12-10 08:31:34.440] BLOCKINGMODE: Null IPs for blocked domains [2018-12-10 08:31:34.440] REGEX_DEBUGMODE: Inactive [2018-12-10 08:31:34.440] ANALYZE_ONLY_A_AND_AAAA: Disabled. Analyzing all queries [2018-12-10 08:31:34.440] DBIMPORT: Importing history from database [2018-12-10 08:31:34.440] PIDFILE: Using /var/run/pihole-FTL.pid [2018-12-10 08:31:34.440] PORTFILE: Using /var/run/pihole-FTL.port [2018-12-10 08:31:34.440] SOCKETFILE: Using /var/run/pihole/FTL.sock [2018-12-10 08:31:34.440] WHITELISTFILE: Using /etc/pihole/whitelist.txt [2018-12-10 08:31:34.440] BLACKLISTFILE: Using /etc/pihole/black.list [2018-12-10 08:31:34.441] GRAVITYFILE: Using /etc/pihole/gravity.list [2018-12-10 08:31:34.441] REGEXLISTFILE: Using /etc/pihole/regex.list [2018-12-10 08:31:34.441] SETUPVARSFILE: Using /etc/pihole/setupVars.conf [2018-12-10 08:31:34.441] AUDITLISTFILE: Using /etc/pihole/auditlog.list [2018-12-10 08:31:34.441] Finished config file parsing [2018-12-10 08:31:34.441] Compiled 0 Regex filters and 0 whitelisted domains in 0.1 msec (0 errors) [2018-12-10 08:31:34.442] Database successfully initialized -----tail of pihole-FTL.log------ [2018-12-10 08:32:38.620] New forward server: 2606:4700:4700::1111 (0/0) [2018-12-10 08:32:38.620] Notice: Increasing forwarded struct size from 0 to 4 [2018-12-10 08:32:38.625] New forward server: 192.168.178.1 (1/4) [2018-12-10 08:32:38.629] New forward server: 2606:4700:4700::1001 (2/4) [2018-12-10 08:32:38.634] New forward server: 1.0.0.1 (3/4) [2018-12-10 08:32:38.634] New forward server: 1.1.1.1 (4/4) [2018-12-10 08:32:38.634] Notice: Increasing forwarded struct size from 4 to 8 [2018-12-10 08:32:38.635] New forward server: 2620:0:ccd::2 (5/8) [2018-12-10 08:32:38.635] New forward server: 2620:0:ccc::2 (6/8) [2018-12-10 08:32:38.635] New forward server: 208.67.220.220 (7/8) [2018-12-10 08:32:38.636] New forward server: 208.67.222.222 (8/8) [2018-12-10 08:32:38.636] Notice: Increasing forwarded struct size from 8 to 12 [2018-12-10 08:32:38.700] Notice: Increasing domains struct size from 1000 to 2000 [2018-12-10 08:32:38.741] Notice: Increasing queries struct size from 10000 to 20000 [2018-12-10 08:32:38.784] Notice: Increasing clients struct size from 10 to 20 [2018-12-10 08:32:38.886] Notice: Increasing queries struct size from 20000 to 30000 [2018-12-10 08:32:38.911] Notice: Increasing overTime struct size from 100 to 200 [2018-12-10 08:32:38.970] Notice: Increasing domains struct size from 2000 to 3000 [2018-12-10 08:32:38.971] Imported 25050 queries from the long-term database [2018-12-10 08:32:38.971] -> Total DNS queries: 25050 [2018-12-10 08:32:38.971] -> Cached DNS queries: 7624 [2018-12-10 08:32:38.971] -> Forwarded DNS queries: 13342 [2018-12-10 08:32:38.971] -> Exactly blocked DNS queries: 4084 [2018-12-10 08:32:38.972] -> Unknown DNS queries: 0 [2018-12-10 08:32:38.972] -> Unique domains: 2006 [2018-12-10 08:32:38.972] -> Unique clients: 14 [2018-12-10 08:32:38.972] -> Known forward destinations: 9 [2018-12-10 08:32:38.972] Successfully accessed setupVars.conf [2018-12-10 08:32:38.983] PID of FTL process: 699 [2018-12-10 08:32:38.983] Listening on port 4711 for incoming IPv4 telnet connections [2018-12-10 08:32:38.983] Listening on port 4711 for incoming IPv6 telnet connections [2018-12-10 08:32:38.983] Listening on Unix socket [2018-12-10 08:32:38.987] Compiled 0 Regex filters and 0 whitelisted domains in 0.1 msec (0 errors) [2018-12-10 08:32:38.989] /etc/pihole/black.list: parsed 0 domains (took 0.0 ms) [2018-12-10 08:32:39.822] /etc/pihole/gravity.list: parsed 137663 domains (took 831.7 ms) *** [ DIAGNOSING ]: Locale LANG=en_GB.UTF-8 *** [ DIAGNOSING ]: Pi-hole log -rw-r--r-- 1 pihole pihole 1703164 Dec 10 08:45 /var/log/pihole.log -----head of pihole.log------ Dec 10 00:59:00 dnsmasq[8199]: 44767 127.0.0.1/44284 query[PTR] 40.178.168.192.in-addr.arpa from 127.0.0.1 Dec 10 00:59:00 dnsmasq[8199]: 44767 127.0.0.1/44284 forwarded 40.178.168.192.in-addr.arpa to 192.168.178.1 Dec 10 00:59:00 dnsmasq[8199]: 44767 127.0.0.1/44284 reply 192.168.178.40 is iPhonevonEvelyn.fritz.box Dec 10 00:59:00 dnsmasq[8199]: 44768 127.0.0.1/56199 query[PTR] 55.178.168.192.in-addr.arpa from 127.0.0.1 Dec 10 00:59:00 dnsmasq[8199]: 44768 127.0.0.1/56199 forwarded 55.178.168.192.in-addr.arpa to 192.168.178.1 Dec 10 00:59:00 dnsmasq[8199]: 44768 127.0.0.1/56199 reply 192.168.178.55 is AppleWaonEvelyn.fritz.box Dec 10 00:59:00 dnsmasq[8199]: 44769 127.0.0.1/54818 query[PTR] 31.178.168.192.in-addr.arpa from 127.0.0.1 Dec 10 00:59:00 dnsmasq[8199]: 44769 127.0.0.1/54818 forwarded 31.178.168.192.in-addr.arpa to 192.168.178.1 Dec 10 00:59:00 dnsmasq[8199]: 44769 127.0.0.1/54818 reply 192.168.178.31 is iPad-von-Evelyn.fritz.box Dec 10 00:59:00 dnsmasq[8199]: 44770 127.0.0.1/53063 query[PTR] 23.178.168.192.in-addr.arpa from 127.0.0.1 Dec 10 00:59:00 dnsmasq[8199]: 44770 127.0.0.1/53063 forwarded 23.178.168.192.in-addr.arpa to 192.168.178.1 Dec 10 00:59:00 dnsmasq[8199]: 44770 127.0.0.1/53063 reply 192.168.178.23 is Samsung-SM-G935F.fritz.box Dec 10 00:59:00 dnsmasq[8199]: 44770 127.0.0.1/53063 reply 192.168.178.23 is Galaxy-S7-edge.fritz.box Dec 10 00:59:00 dnsmasq[8199]: 44771 127.0.0.1/48189 query[PTR] 2.178.168.192.in-addr.arpa from 127.0.0.1 Dec 10 00:59:00 dnsmasq[8199]: 44771 127.0.0.1/48189 forwarded 2.178.168.192.in-addr.arpa to 192.168.178.1 Dec 10 00:59:00 dnsmasq[8199]: 44771 127.0.0.1/48189 reply 192.168.178.2 is DESKTOP-H64Q9VU.fritz.box Dec 10 00:59:00 dnsmasq[8199]: 44772 127.0.0.1/46681 query[PTR] 43.178.168.192.in-addr.arpa from 127.0.0.1 Dec 10 00:59:00 dnsmasq[8199]: 44772 127.0.0.1/46681 forwarded 43.178.168.192.in-addr.arpa to 192.168.178.1 Dec 10 00:59:00 dnsmasq[8199]: 44772 127.0.0.1/46681 reply 192.168.178.43 is NXDOMAIN Dec 10 00:59:00 dnsmasq[8199]: 44773 127.0.0.1/51928 query[PTR] 35.178.168.192.in-addr.arpa from 127.0.0.1