2016-10-23 21:15:10 +00:00
#!/usr/bin/env bash
2016-03-20 01:32:11 +00:00
# Pi-hole: A black hole for Internet advertisements
# (c) 2015, 2016 by Jacob Salmela
# Network-wide ad blocking via your Raspberry Pi
# http://pi-hole.net
2016-09-27 01:06:31 +00:00
# Generates pihole_debug.log to be used for troubleshooting.
2016-03-20 01:32:11 +00:00
#
# Pi-hole is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 2 of the License, or
# (at your option) any later version.
2016-09-28 02:30:37 +00:00
set -o pipefail
2016-03-20 01:32:11 +00:00
######## GLOBAL VARS ########
2016-10-28 21:52:08 +00:00
VARSFILE = "/etc/pihole/setupVars.conf"
2016-03-20 01:32:11 +00:00
DEBUG_LOG = "/var/log/pihole_debug.log"
2016-03-24 21:21:29 +00:00
DNSMASQFILE = "/etc/dnsmasq.conf"
2016-10-28 21:52:08 +00:00
DNSMASQCONFFILE = "/etc/dnsmasq.d/01-pihole.conf"
2016-03-24 21:21:29 +00:00
LIGHTTPDFILE = "/etc/lighttpd/lighttpd.conf"
2016-04-11 23:35:44 +00:00
LIGHTTPDERRFILE = "/var/log/lighttpd/error.log"
2016-03-24 21:21:29 +00:00
GRAVITYFILE = "/etc/pihole/gravity.list"
WHITELISTFILE = "/etc/pihole/whitelist.txt"
BLACKLISTFILE = "/etc/pihole/blacklist.txt"
2016-10-28 21:52:08 +00:00
ADLISTFILE = "/etc/pihole/adlists.list"
2016-03-24 21:21:29 +00:00
PIHOLELOG = "/var/log/pihole.log"
2016-03-25 21:42:17 +00:00
WHITELISTMATCHES = "/tmp/whitelistmatches.list"
2016-03-24 21:21:29 +00:00
2016-10-28 21:52:08 +00:00
IPV6_READY = false
2016-10-26 19:22:20 +00:00
2016-09-27 01:06:31 +00:00
# Header info and introduction
2016-10-20 03:46:37 +00:00
cat << EOM
::: Beginning Pi-hole debug at $( date) !
2016-10-28 11:42:45 +00:00
:::
2016-10-28 21:52:08 +00:00
::: This process collects information from your Pi-hole, and optionally uploads
::: it to a unique and random directory on tricorder.pi-hole.net.
2016-10-28 11:42:45 +00:00
:::
2016-10-28 21:52:08 +00:00
::: NOTE: All log files auto-delete after 24 hours and ONLY the Pi-hole developers
::: can access your data via the given token. We have taken these extra steps to
::: secure your data and will work to further reduce any personal information gathered.
2016-10-23 21:15:10 +00:00
:::
2016-10-28 21:52:08 +00:00
::: Please read and note any issues, and follow any directions advised during this process.
2016-10-20 03:46:37 +00:00
EOM
2016-09-27 01:06:31 +00:00
2016-03-20 01:32:11 +00:00
# Ensure the file exists, create if not, clear if exists.
2016-10-28 21:52:08 +00:00
truncate --size= 0 " ${ DEBUG_LOG } "
chmod 644 ${ DEBUG_LOG }
chown " $USER " :pihole ${ DEBUG_LOG }
source ${ VARSFILE }
2016-03-20 01:32:11 +00:00
2016-03-24 21:21:29 +00:00
### Private functions exist here ###
2016-10-20 02:47:45 +00:00
log_write( ) {
2016-10-28 10:45:07 +00:00
echo " ${ 1 } " >> " ${ DEBUG_LOG } "
2016-09-28 20:09:38 +00:00
}
2016-09-27 01:06:31 +00:00
2016-10-26 00:50:14 +00:00
log_echo( ) {
2016-10-28 10:45:07 +00:00
case ${ 1 } in
-n)
echo -n " ::: ${ 2 } "
2016-10-28 14:06:05 +00:00
log_write " ${ 2 } "
2016-10-28 10:45:07 +00:00
; ;
2016-10-28 21:52:08 +00:00
-r)
echo " ::: ${ 2 } "
log_write " ${ 2 } "
; ;
2016-10-28 10:45:07 +00:00
-l)
echo " ${ 2 } "
log_write " ${ 2 } "
; ;
2016-10-28 21:52:08 +00:00
-e)
echo " ${ 2 } "
log_write
; ;
2016-10-28 10:45:07 +00:00
*)
2016-10-28 21:52:08 +00:00
echo " ::: ${ 1 } "
2016-10-28 10:45:07 +00:00
log_write " ${ 1 } "
esac
}
2016-10-28 21:52:08 +00:00
header_write( ) {
log_echo ""
log_echo " ${ 1 } "
log_write ""
}
2016-10-28 10:45:07 +00:00
file_parse( ) {
while read -r line; do
if [ ! -z " ${ line } " ] ; then
[ [ " ${ line } " = ~ ^#.*$ ] ] && continue
log_write " ${ line } "
fi
done < " ${ 1 } "
2016-10-28 21:52:08 +00:00
log_write ""
2016-10-28 10:45:07 +00:00
}
block_parse( ) {
2016-10-26 00:50:14 +00:00
log_write " ${ 1 } "
}
2016-10-28 10:53:53 +00:00
lsof_parse( ) {
local user
local process
local match
user = $( echo ${ 1 } | cut -f 3 -d ' ' | cut -c 2-)
process = $( echo ${ 1 } | cut -f 2 -d ' ' | cut -c 2-)
if [ [ ${ 2 } -eq ${ process } ] ] ; then
2016-10-28 21:52:08 +00:00
echo "::: Correctly configured."
2016-10-28 10:53:53 +00:00
else
2016-10-28 21:52:08 +00:00
log_echo "::: Failure: Incorrectly configured daemon."
2016-10-28 10:53:53 +00:00
fi
2016-10-28 21:52:08 +00:00
log_write " Found user ${ user } with process ${ process } "
2016-10-28 10:53:53 +00:00
}
2016-10-28 13:51:30 +00:00
2016-10-20 02:47:45 +00:00
version_check( ) {
2016-10-28 21:52:08 +00:00
header_write "Detecting Installed Package Versions:"
2016-10-28 17:42:30 +00:00
local error_found
error_found = 0
2016-10-26 02:53:00 +00:00
local pi_hole_ver = " $( cd /etc/.pihole/ && git describe --tags --abbrev= 0) " \
2016-10-28 21:52:08 +00:00
&& log_echo -r " Pi-hole: $pi_hole_ver " || ( log_echo "Pi-hole git repository not detected." && error_found = 1)
2016-10-26 02:53:00 +00:00
local admin_ver = " $( cd /var/www/html/admin && git describe --tags --abbrev= 0) " \
2016-10-28 21:52:08 +00:00
&& log_echo -r " WebUI: $admin_ver " || ( log_echo "Pi-hole Admin Pages git repository not detected." && error_found = 1)
2016-10-26 02:53:00 +00:00
local light_ver = " $( lighttpd -v | & head -n1 | cut -d " " -f1) " \
2016-10-28 21:52:08 +00:00
&& log_echo -r " ${ light_ver } " || ( log_echo "lighttpd not installed." && error_found = 1)
2016-10-26 02:53:00 +00:00
local php_ver = " $( php -v | & head -n1) " \
2016-10-28 21:52:08 +00:00
&& log_echo -r " ${ php_ver } " || ( log_echo "PHP not installed." && error_found = 1)
2016-10-28 17:42:30 +00:00
return " ${ error_found } "
2016-04-12 07:47:30 +00:00
}
2016-10-23 21:15:10 +00:00
files_check( ) {
2016-10-26 02:53:00 +00:00
#Check non-zero length existence of ${1}
2016-10-28 21:52:08 +00:00
header_write " Detecting existence of ${ 1 } : "
2016-10-28 10:45:07 +00:00
local search_file = " ${ 1 } "
2016-10-26 04:39:28 +00:00
if [ [ -s ${ search_file } ] ] ; then
2016-10-28 21:52:08 +00:00
echo "::: File exists"
2016-10-28 13:51:30 +00:00
file_parse " ${ search_file } "
return 0
2016-10-26 02:53:00 +00:00
else
2016-10-28 10:45:07 +00:00
log_echo " ${ 1 } not found! "
2016-10-28 13:51:30 +00:00
return 1
2016-10-26 02:53:00 +00:00
fi
echo ":::"
2016-10-23 21:15:10 +00:00
}
2016-10-28 13:51:30 +00:00
source_file( ) {
local file_found = $( files_check " ${ 1 } " ) \
2016-10-28 21:52:08 +00:00
&& ( source " ${ 1 } " & > /dev/null && echo " ${ file_found } and was successfully sourced " ) \
2016-10-28 13:51:30 +00:00
|| log_echo -l " ${ file_found } and could not be sourced "
}
2016-10-20 02:47:45 +00:00
distro_check( ) {
2016-10-28 21:52:08 +00:00
local soft_fail
header_write "Detecting installed OS Distribution"
soft_fail = 0
local distro = " $( cat /etc/*release) " && block_parse " ${ distro } " || ( log_echo "Distribution details not found." && soft_fail = 1)
return " ${ soft_fail } "
}
2016-09-27 01:06:31 +00:00
2016-10-28 21:52:08 +00:00
processor_check( ) {
local soft_fail
header_write "Checking processor variety"
soft_fail = 0
log_write $( uname -m) || soft_fail = 1
return " ${ soft_fail } "
2016-09-27 01:06:31 +00:00
}
2016-10-26 19:22:20 +00:00
ipv6_check( ) {
# Check if system is IPv6 enabled, for use in other functions
2016-10-28 21:52:08 +00:00
if [ [ $IPv6_address ] ] ; then
ls /proc/net/if_inet6 & >/dev/null && IPV6_READY = true
2016-10-26 19:22:20 +00:00
return 0
else
return 1
fi
}
2016-10-20 02:47:45 +00:00
ip_check( ) {
2016-10-26 00:19:33 +00:00
header_write "IP Address Information"
2016-10-26 04:25:57 +00:00
# Get the current interface for Internet traffic
2016-10-26 19:22:20 +00:00
# Check if IPv6 enabled
local IPv6_interface
ipv6_check && IPv6_interface = ${ piholeInterface :- $( ip -6 r | grep default | cut -d ' ' -f 5) }
2016-10-26 04:25:57 +00:00
# If declared in setupVars.conf use it, otherwise defer to default
2016-10-26 04:53:41 +00:00
# http://stackoverflow.com/questions/2013547/assigning-default-values-to-shell-variables-with-a-single-command-in-bash
2016-09-27 01:06:31 +00:00
2016-10-28 21:52:08 +00:00
local IPv4_addr_list = " $( ip a | awk -F " " '{ for(i=1;i<=NF;i++) if ($i == "inet") print $(i+1) }' ) " \
2016-10-28 10:45:07 +00:00
&& ( block_parse " ${ IPv4_addr_list } " && echo "::: IPv4 addresses located" ) \
|| log_echo "No IPv4 addresses found."
2016-10-26 03:53:18 +00:00
local IPv4_def_gateway = $( ip r | grep default | cut -d ' ' -f 3)
2016-10-22 07:32:36 +00:00
if [ [ $? = 0 ] ] ; then
2016-10-28 21:52:08 +00:00
echo -n "::: Pinging default IPv4 gateway: "
2016-10-26 03:53:18 +00:00
local IPv4_def_gateway_check = " $( ping -q -w 3 -c 3 -n " ${ IPv4_def_gateway } " | tail -n3) " \
2016-10-28 10:45:07 +00:00
&& echo "Gateway responded." \
|| echo "Gateway did not respond."
block_parse " ${ IPv4_def_gateway_check } "
2016-10-22 07:32:36 +00:00
2016-10-28 21:52:08 +00:00
echo -n "::: Pinging Internet via IPv4: "
2016-10-26 04:25:57 +00:00
local IPv4_inet_check = " $( ping -q -w 5 -c 3 -n 8.8.8.8 | tail -n3) " \
2016-10-28 10:45:07 +00:00
&& echo "Query responded." \
|| echo "Query did not respond."
block_parse " ${ IPv4_inet_check } "
2016-10-22 07:32:36 +00:00
fi
2016-10-28 21:52:08 +00:00
if [ [ IPV6_READY ] ] ; then
2016-10-26 19:22:20 +00:00
local IPv6_addr_list = " $( ip a | awk -F " " '{ for(i=1;i<=NF;i++) if ($i == "inet6") print $(i+1) }' ) " \
&& ( log_write " ${ IPv6_addr_list } " && echo "::: IPv6 addresses located" ) \
|| log_echo "No IPv6 addresses found."
local IPv6_def_gateway = $( ip -6 r | grep default | cut -d ' ' -f 3)
2016-10-26 20:57:57 +00:00
if [ [ $? = 0 ] ] && [ [ -n ${ IPv6_def_gateway } ] ] ; then
2016-10-28 21:52:08 +00:00
echo -n "::: Pinging default IPv6 gateway: "
2016-10-26 19:22:20 +00:00
local IPv6_def_gateway_check = " $( ping6 -q -W 3 -c 3 -n " ${ IPv6_def_gateway } " -I " ${ IPv6_interface } " | tail -n3) " \
2016-10-28 10:45:07 +00:00
&& echo "Gateway Responded." \
|| echo "Gateway did not respond."
block_parse " ${ IPv6_def_gateway_check } "
2016-10-26 19:22:20 +00:00
2016-10-28 21:52:08 +00:00
echo -n "::: Pinging Internet via IPv6: "
2016-10-26 19:22:20 +00:00
local IPv6_inet_check = $( ping6 -q -W 3 -c 3 -n 2001:4860:4860::8888 -I " ${ IPv6_interface } " | tail -n3) \
2016-10-28 10:45:07 +00:00
&& echo "Query responded." \
|| echo "Query did not respond."
block_parse " ${ IPv6_inet_check } "
2016-10-26 19:22:20 +00:00
else
2016-10-26 21:33:47 +00:00
log_echo = "No IPv6 Gateway Detected"
2016-10-26 19:22:20 +00:00
fi
fi
2016-07-15 20:11:10 +00:00
}
2016-09-27 01:52:12 +00:00
2016-10-28 21:52:08 +00:00
port_check( ) {
local lsof_value
2016-10-22 07:32:36 +00:00
2016-10-28 21:52:08 +00:00
lsof_value = $( lsof -i ${ 1 } :${ 2 } -FcL | tr '\n' ' ' ) \
&& lsof_parse " ${ lsof_value } " " ${ 3 } " \
|| log_echo " Failure: IPv ${ 1 } Port not in use "
2016-10-26 21:33:47 +00:00
}
2016-10-26 18:38:19 +00:00
daemon_check( ) {
# Check for daemon ${1} on port ${2}
2016-10-28 17:42:30 +00:00
header_write "Daemon Process Information"
2016-10-26 18:38:19 +00:00
2016-10-28 21:52:08 +00:00
echo " ::: Checking ${ 2 } port for ${ 1 } listener. "
2016-10-26 21:33:47 +00:00
2016-10-28 21:52:08 +00:00
if [ [ ${ IPV6_READY } ] ] ; then
port_check 6 " ${ 2 } " " ${ 1 } "
fi
2016-10-27 07:30:51 +00:00
lsof_value = $( lsof -i 4:${ 2 } -FcL | tr '\n' ' ' ) \
2016-10-28 21:52:08 +00:00
port_check 4 " ${ 2 } " " ${ 1 } "
2016-09-27 03:39:39 +00:00
}
2016-10-20 02:47:45 +00:00
testResolver( ) {
2016-10-26 00:19:33 +00:00
header_write "Resolver Functions Check"
2016-09-28 17:14:47 +00:00
2016-03-25 21:42:17 +00:00
# Find a blocked url that has not been whitelisted.
2016-10-22 07:32:36 +00:00
TESTURL = "doubleclick.com"
if [ -s " ${ WHITELISTMATCHES } " ] ; then
2016-03-26 00:04:03 +00:00
while read -r line; do
CUTURL = ${ line #* " " }
2016-10-22 07:32:36 +00:00
if [ " ${ CUTURL } " != "Pi-Hole.IsWorking.OK" ] ; then
2016-03-26 00:04:03 +00:00
while read -r line2; do
CUTURL2 = ${ line2 #* " " }
2016-10-22 07:32:36 +00:00
if [ " ${ CUTURL } " != " ${ CUTURL2 } " ] ; then
TESTURL = " ${ CUTURL } "
2016-03-26 00:04:03 +00:00
break 2
fi
2016-10-22 07:32:36 +00:00
done < " ${ WHITELISTMATCHES } "
2016-03-26 00:04:03 +00:00
fi
2016-10-22 07:32:36 +00:00
done < " ${ GRAVITYFILE } "
2016-03-26 00:04:03 +00:00
fi
2016-03-25 21:42:17 +00:00
2016-10-23 21:31:20 +00:00
log_write " Resolution of ${ TESTURL } from Pi-hole: "
2016-10-22 07:32:36 +00:00
LOCALDIG = $( dig " ${ TESTURL } " @127.0.0.1)
if [ [ $? = 0 ] ] ; then
2016-10-23 21:31:20 +00:00
log_write " ${ LOCALDIG } "
2016-09-28 17:24:44 +00:00
else
2016-10-23 21:31:20 +00:00
log_write " Failed to resolve ${ TESTURL } on Pi-hole "
2016-09-28 17:24:44 +00:00
fi
2016-10-23 21:31:20 +00:00
log_write ""
2016-09-28 17:24:44 +00:00
2016-10-23 21:31:20 +00:00
log_write " Resolution of ${ TESTURL } from 8.8.8.8: "
2016-10-22 07:32:36 +00:00
REMOTEDIG = $( dig " ${ TESTURL } " @8.8.8.8)
if [ [ $? = 0 ] ] ; then
2016-10-23 21:31:20 +00:00
log_write " ${ REMOTEDIG } "
2016-09-28 17:24:44 +00:00
else
2016-10-23 21:31:20 +00:00
log_write " Failed to resolve ${ TESTURL } on 8.8.8.8 "
2016-09-28 17:25:37 +00:00
fi
2016-10-23 21:31:20 +00:00
log_write ""
2016-09-28 17:14:47 +00:00
2016-10-23 21:31:20 +00:00
log_write "Pi-hole dnsmasq specific records lookups"
log_write "Cache Size:"
2016-10-22 07:32:36 +00:00
dig +short chaos txt cachesize.bind >> ${ DEBUG_LOG }
2016-10-23 21:31:20 +00:00
log_write "Upstream Servers:"
2016-10-22 07:32:36 +00:00
dig +short chaos txt servers.bind >> ${ DEBUG_LOG }
2016-10-23 21:31:20 +00:00
log_write ""
2016-03-24 21:21:29 +00:00
}
2016-10-20 02:47:45 +00:00
checkProcesses( ) {
2016-10-26 00:19:33 +00:00
header_write "Processes Check"
echo "::: Logging status of lighttpd and dnsmasq..."
2016-04-04 05:59:24 +00:00
PROCESSES = ( lighttpd dnsmasq )
2016-10-22 07:32:36 +00:00
for i in " ${ PROCESSES [@] } " ; do
2016-10-23 21:31:20 +00:00
log_write ""
log_write -n " ${ i } "
log_write " processes status:"
2016-10-23 21:15:10 +00:00
systemctl -l status " ${ i } " >> " ${ DEBUG_LOG } "
2016-04-04 05:59:24 +00:00
done
2016-10-23 21:31:20 +00:00
log_write ""
2016-04-04 05:59:24 +00:00
}
2016-10-20 02:47:45 +00:00
debugLighttpd( ) {
2016-10-28 13:51:30 +00:00
echo "::: Checking for necessary lighttpd files."
files_check " ${ LIGHTTPDFILE } "
files_check " ${ LIGHTTPDERRFILE } "
echo ":::"
2016-04-11 23:35:44 +00:00
}
2016-04-04 05:59:24 +00:00
### END FUNCTIONS ###
2016-10-28 17:42:30 +00:00
# Gather version of required packages / repositories
version_check || echo "REQUIRED FILES MISSING"
2016-10-28 21:52:08 +00:00
# Check for newer setupVars storage file
2016-10-28 13:51:30 +00:00
source_file "/etc/pihole/setupVars.conf"
2016-10-28 21:52:08 +00:00
# Gather information about the running distribution
distro_check || echo "Distro Check soft fail"
# Gather processor type
processor_check || echo "Processor Check soft fail"
2016-09-28 20:09:38 +00:00
ip_check
2016-10-28 17:42:30 +00:00
#hostnameCheck
2016-10-26 18:38:19 +00:00
daemon_check lighttpd http
daemon_check dnsmasq domain
2016-04-04 05:59:24 +00:00
checkProcesses
2016-09-28 17:14:47 +00:00
testResolver
2016-04-11 23:35:44 +00:00
debugLighttpd
2016-03-25 21:42:17 +00:00
2016-10-28 22:25:06 +00:00
files_check " ${ DNSMASQFILE } "
files_check " ${ DNSMASQCONFFILE } "
files_check " ${ WHITELISTFILE } "
files_check " ${ BLACKLISTFILE } "
files_check " ${ ADLISTFILE } "
2016-03-24 21:21:29 +00:00
2016-10-26 00:19:33 +00:00
2016-10-28 22:13:04 +00:00
header_write "Analyzing gravity.list"
gravity_length = $( wc -l " ${ GRAVITYFILE } " ) \
&& log_write " ${ GRAVITYFILE } is ${ gravity_length } lines long. " \
|| log_echo "Warning: No gravity.list file found!"
2016-03-24 21:21:29 +00:00
2016-03-20 01:32:11 +00:00
# Continuously append the pihole.log file to the pihole_debug.log file
2016-10-20 02:47:45 +00:00
dumpPiHoleLog( ) {
2016-04-11 23:35:44 +00:00
trap '{ echo -e "\n::: Finishing debug write from interrupt... Quitting!" ; exit 1; }' INT
2016-09-27 03:50:03 +00:00
echo -e "::: Writing current Pi-hole traffic to debug log...\n:::\tTry loading any/all sites that you are having trouble with now... \n:::\t(Press ctrl+C to finish)"
2016-10-26 00:19:33 +00:00
header_write "pihole.log"
2016-10-22 07:32:36 +00:00
if [ -e " ${ PIHOLELOG } " ] ; then
2016-03-20 01:32:11 +00:00
while true; do
2016-10-22 07:32:36 +00:00
tail -f " ${ PIHOLELOG } " >> ${ DEBUG_LOG }
2016-10-23 21:31:20 +00:00
log_write ""
2016-03-20 01:32:11 +00:00
done
else
2016-10-23 21:31:20 +00:00
log_write "No pihole.log file found!"
2016-09-27 03:54:05 +00:00
printf ":::\tNo pihole.log file found!\n"
2016-03-20 01:32:11 +00:00
fi
}
2016-03-24 21:21:29 +00:00
# Anything to be done after capturing of pihole.log terminates
2016-10-20 02:47:45 +00:00
finalWork( ) {
2016-10-28 11:42:45 +00:00
local tricorder
2016-10-22 07:32:36 +00:00
echo "::: Finshed debugging!"
2016-10-28 11:42:45 +00:00
echo "::: The debug log can be uploaded to tricorder.pi-hole.net for sharing with developers only."
2016-10-22 07:32:36 +00:00
read -r -p "::: Would you like to upload the log? [y/N] " response
case ${ response } in
[ yY] [ eE] [ sS] | [ yY] )
2016-10-28 11:42:45 +00:00
tricorder = $( cat /var/log/pihole_debug.log | nc tricorder.pi-hole.net 9999)
2016-10-22 07:32:36 +00:00
; ;
*)
2016-10-28 11:42:45 +00:00
echo "::: Log will NOT be uploaded to tricorder."
2016-10-22 07:32:36 +00:00
; ;
esac
2016-10-28 11:42:45 +00:00
# Check if tricorder.pi-hole.net is reachable and provide token.
if [ -n " ${ tricorder } " ] ; then
echo " ::: Your debug token is : ${ tricorder } "
2016-10-22 07:32:36 +00:00
fi
2016-10-28 11:42:45 +00:00
echo "::: Debug log can be found at : /var/log/pihole_debug.log"
2016-03-20 01:32:11 +00:00
}
2016-08-01 20:43:13 +00:00
2016-03-24 21:21:29 +00:00
trap finalWork EXIT
2016-03-20 01:32:11 +00:00
2016-03-24 21:21:29 +00:00
### Method calls for additional logging ###
2016-03-20 01:32:11 +00:00
dumpPiHoleLog