Although the static leases GUI has been improved tremendously thanks to the-joker, many of us just add the static leases to the DNSMasq additional options e.g.:
Especially if you have a lot of static leases it is just easier to save and restore them after a reset and you can save them to a spreadsheet and sort them like you want and copy them back.
You should be able to grab the current static leases you have already set with:
cat /tmp/dnsmasq.conf | grep dhcp-host
Problem solved
Yeah its a decent workaround, but I prefer to keep stuff in a table rather than a text field. (although as you said restoring with text field is 1000 times easier).
I have a pihole server, so tend not to use dnsmasq on router.
Is there a way to push dnsmasq list to the static routes table?
dnsmasq is both dns forwarder and DHCP server
but you don't have to use it as both
you can also use dnsmasq as a pure DHCP server
dnsmasq provides the DHCP IPv4 server functionality under dd-wrt
and regarding the Pi-Hole you can also read the following link, there on the dd-wrt router dnsmasq is used as DHCP server and depending on that the Pi-Hole as DNS forwarder.
dnsmasq is both dns forwarder and DHCP server
but you don't have to use it as both
you can also use dnsmasq as a pure DHCP server
dnsmasq provides the DHCP IPv4 server functionality under dd-wrt
and regarding the Pi-Hole you can also read the following link, there on the dd-wrt router dnsmasq is used as DHCP server and depending on that the Pi-Hole as DNS forwarder.
nice post. I have it set up as in your example #1. I do desire fallback DNS, but its my understanding you cant set it up to use fallback only if pihole is down? Clients will randomly choose one of the available DNS servers. My desired behavior would be use pihole 100% of the time, unless no response, then use fallback DNS. Maybe things have changed but when I did my research on the topic this wasnt possible.
If you would be nice then you could just split the off-topic posts into a separate thread so the rest of us can keep talking.
@Duxa
Well, in example 1+2 you can also configure a DNS fallback
server (just configure it as static DNS2) but this is only recommended if the fallback server is also a Pi-Hole otherwise this can lead to DNS leaks.
If you would be nice then you could just split the off-topic posts into a separate thread so the rest of us can keep talking.
@Duxa
Well, in example 1+2 you can also configure a DNS fallback
server (just configure it as static DNS2) but this is only recommended if the fallback server is also a Pi-Hole otherwise this can lead to DNS leaks.
Fallback DNS is not important enough for me to set up another piece of hardware (its been solid for years). In ideal situation id like to use pihole as DNS 100% of the time. Then if its down use 8.8.8.8 or 1.1.1.1 or something like that.
Plenty threads on doing PIHole setups 100% all, success stories.
I dont need help setting up pihole, Ive had one running for years. I was just confirming that you cant really do a pihole 100% DNS with fallback being google or OpenDNS or something.
Well if you use the setup example 1 then all DNS servers configured as "static DNS 1-3" will be sent directly via DHCP to the client.
The client then decides itself which DNS it uses.
Often this happens in the round robin procedure, so the client queries any configured DNS server
In example 2 the DNS servers are queried in "strict order" but this does not protect 100% from DNS leaks, in case of a timeout or a NXDOMAIN it is possible that the 2nd DNS server is queried.
If you want gapfree DNS blocking then you have to use (unfortunately) a 2nd Pi-Hole as fallback - or you use a filtered DNS provider.
Joined: 16 Nov 2015 Posts: 6410 Location: UK, London, just across the river..
Posted: Fri Jun 10, 2022 7:44 Post subject:
just to add that, you either use filtered DNS providers or not, as it's get messy...if you have a mix of them both...
i use 9.9.9.9 as well Next DNS and some others all with malware filtering and ad blocking...
i also stay away form google 8.8.8.8 or 1.1.1.1.. _________________ Atheros
TP-Link WR740Nv1 ---DD-WRT 55179 WAP
TP-Link WR1043NDv2 -DD-WRT 55303 Gateway/DoT,Forced DNS,Ad-Block,Firewall,x4VLAN,VPN
TP-Link WR1043NDv2 -Gargoyle OS 1.15.x AP,DNS,QoS,Quotas
Qualcomm-Atheros
Netgear XR500 --DD-WRT 55460 Gateway/DoH,Forced DNS,AP Isolation,4VLAN,Ad-Block,Firewall,Vanilla
Netgear R7800 --DD-WRT 55460 Gateway/DoT,AD-Block,Forced DNS,AP&Net Isolation,x3VLAN,Firewall,Vanilla
Netgear R9000 --DD-WRT 55363 Gateway/DoT,AD-Block,AP Isolation,Firewall,Forced DNS,x2VLAN,Vanilla
Broadcom
Netgear R7000 --DD-WRT 55460 Gateway/SmartDNS/DoH,AD-Block,Firewall,Forced DNS,x3VLAN,VPN
NOT USING 5Ghz ANYWHERE
------------------------------------------------------
Stubby DNS over TLS I DNSCrypt v2 by mac913
Last edited by Alozaros on Fri Jun 10, 2022 12:38; edited 1 time in total
Joined: 31 Jul 2021 Posts: 2146 Location: All over YOUR webs
Posted: Fri Jun 10, 2022 8:12 Post subject:
I would suggest that DNS 1 and DNS 2 fields are populated with different DNS IP's, only one doesnt work proeprly sometimes and its always good to have fallbacks, I dont recommend Google and friends DNS anything, unless you like to have your traffic being fed into their AI for training and god/dog knows what.