Unbound container setup
Introduction
Pi-hole is a network-level ad blocker that acts as a DNS sinkhole, filtering out unwanted advertisements and tracking domains to enhance privacy and improve browsing speed. Using Unbound in combination with Pi-hole allows you to run a recursive DNS server, adding an extra layer of privacy by ensuring DNS queries are resolved locally without relying on third-party DNS providers.
Setup
-
Create the network
dns-net
You need to create a Docker network first, this will also allow Pi-hole to communicate with Unbound.
Run the following command:
# Open your terminal applicationsudo docker network create --driver=bridge --subnet=172.19.0.0/16 --gateway=172.19.0.1 dns-net -
Create the folders needed by the container
Run the following commands inside your home folder:
# Open your terminal applicationcd ~mkdir -p unbound/etc-unboundcd unbound -
Download
root.hints
The
root.hints
file is not often changed but you can run the command below (or use the crontab) every 6 months to be sure. Run the following command:# Open your terminal applicationsudo wget -O root.hints https://www.internic.net/domain/named.root -
Create
unbound.conf
Save the following configuration as
unbound.conf
:Terminal window # unbound.conf# To create this script use your text editor application, for example Nanoserver:## To listen on all interfaces use:interface: 0.0.0.0@5053do-ip4: yesdo-udp: yesdo-tcp: yes# May be set to yes if you have IPv6 connectivitydo-ip6: no# You want to leave this to no unless you have *native* IPv6. With 6to4 and# Terredo tunnels your web browser should favor IPv4 for the same reasonsprefer-ip6: nodo-daemonize: noaccess-control: 127.0.0.1/32 allowaccess-control: 192.168.0.0/16 allowaccess-control: 172.16.0.0/12 allowaccess-control: 10.0.0.0/8 allowlogfile: ""# If no logfile is specified, syslog is used# logfile: "/var/log/unbound/unbound.log"verbosity: 0# Use this only when you downloaded the list of primary root servers!root-hints: "/opt/unbound/etc/unbound/root.hints"# Trust glue only if it is within the servers authorityharden-glue: yes# Require DNSSEC data for trust-anchored zones, if such data is absent, the zone becomes BOGUSharden-dnssec-stripped: yes# Don't use Capitalization randomization as it known to cause DNSSEC issues sometimes# see https://discourse.pi-hole.net/t/unbound-stubby-or-dnscrypt-proxy/9378 for further detailsuse-caps-for-id: no# Reduce EDNS reassembly buffer size.# Suggested by the unbound man page to reduce fragmentation reassembly problemsedns-buffer-size: 1472# TTL bounds for cachecache-min-ttl: 3600cache-max-ttl: 86400# Perform prefetching of close to expired message cache entries# This only applies to domains that have been frequently queriedprefetch: yes# One thread should be sufficient, can be increased on beefy machinesnum-threads: 1# Ensure kernel buffer is large enough to not loose messages in traffic spikes#so-rcvbuf: 1m# Ensure privacy of local IP rangesprivate-address: 192.168.0.0/16private-address: 169.254.0.0/16private-address: 172.16.0.0/12private-address: 10.0.0.0/8private-address: fd00::/8private-address: fe80::/10 -
Create the script needed to run the container
Save the following script as
unbound_run.sh
:unbound_run.sh # To create this script use your text editor application, for example Nanodocker run -d \--name=unbound \--hostname=unbound \--network=dns-net \--ip=172.19.0.5 \-p 5053:5053/tcp \-p 5053:5053/udp \-v $PWD/etc-unbound:/opt/unbound/etc/unbound \--restart=unless-stopped \klutchell/unbound# IMPORTANT: Please read the instructions belowInstructions:
- Optional Replace
docker
withpodman
if needed - Optional The setting
--ip=172.19.0.5
contains the fixed IP address of the container in the range of the dns-net network, you can change this if needed - Optional The settings
-p 5053:5053/tcp
and-p 5053:5053/udp
contains the ports used by Unbound. The port number is for example used by Pi-hole as part of the custom upstream DNS server. Do not forget to also change theinterface
in the configuration fileunbound.conf
- Optional Replace
-
Run the script to create the container
Run the following command:
# Open your terminal applicationsudo sh unbound_run.shThe image
klutchell/unbound
is automatically pulled and the container is created. -
Check the results
If needed you can check if the container is running properly.
Run the following command to check if Unbound is working properly:
# Test Pi-hole with digdig pi-hole.net @127.0.0.1 -p 5053If you want to use Unbound with Pi-hole make sure Unbound is configured within Pi-hole as
Upstream DNS server
. There you can add the IP and port172.19.0.5#5053
asCustom 1 (IPv4)
.
No comments found for this note.
Join the discussion for this note on Github. Comments appear on this page instantly.