mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2026-03-04 00:01:12 -05:00
Question: How safe is Adguardhome on a VPS? #905
Labels
No labels
P1: Critical
P2: High
P3: Medium
P4: Low
UI
bug
cannot reproduce
compatibility
dependencies
docker
documentation
duplicate
enhancement
enhancement
external libs
feature request
good first issue
help wanted
infrastructure
invalid
localization
needs investigation
performance
potential-duplicate
question
recurrent
research
snap
waiting for data
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/AdGuardHome#905
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @1985kasper on GitHub (Sep 5, 2019).
I know from the pihole forums it is discouraged to run pihole for home use on a VPS. It creates a opendns resolver which causes serious security risks.
How does adguardhome tackle this? Since you have a guide to install it on a VPS for home use are there any safeguards in place to prevent the security risks mentioned on the pihole forums and their articles on this subject?
Another question: Does adguardhome support multiple interfaces (vlans) if the server it's running on has multiple vlans enabled and needs to serve adblocking to clients on those vlans is this supported?
@ameshkov commented on GitHub (Sep 6, 2019):
Hi!
The only risk is that your open resolver can be used for DNS amplification DDOS attacks, and there's no way you can fully solve this issue. On the other hand, AGH by default comes with ratelimit set to 20 requests per second, so your resolver won't do much harm.
If you run AGH on a VPS, I'd suggest checking the stats from time to time, and block access from unknown IP addresses when you see them. You can do it in settings -> DNS -> access settings.
Well, you can configure it to listen to ALL network interfaces (0.0.0.0).