this post was submitted on 05 May 2026
65 points (100.0% liked)

Selfhosted

59027 readers
324 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

Technitium DNS Server v15.1.0 has been released with support for OIDC! Now you can use your preferred identity provider to log in to user accounts, and manage your DHCP/DNS deployments with approriately granular permissions controls.

I've played around with it, and safe to say that the SSO integration works well. I've written a guide to set it up against Kanidm here. There were some OIDC/clustering bugs in prior v15 releases, and with v15.1.0 they have been squashed and solved.

The major release of version 15 also include various important changes, such as the following highlights:

  • A new API call for Prometheus metrics
  • Query Logs apps can now follow live updates
  • Codebase updated to .NET 10 runtime
  • HTTP tokens are now accepted via the Authorization: Bearer <token> header
  • Many other bugfixes, secfixes, and improvements...

Technitium is pretty great. Hope everyone enjoy the release :)

top 37 comments
sorted by: hot top controversial new old
[–] hellmo_luciferrari@lemmy.zip 9 points 4 days ago (7 children)

Has anyone used this and Pihole and have some thoughts on which they would use and why?

Currently using Pihole myself. For adblocking, and a local DNS server. I also have Unbound configured and installed which my Pihole uses.

Anyone have any insight on this before I work on spinning something like this up?

[–] Toribor@corndog.social 3 points 3 days ago (2 children)

I migrated from pihole to technitium a few weeks ago and it was so smooth.

Native support for clustering is huge. I didn't even realize how complex managing the pihole had gotten trying to get it to sync to multiple instances.

[–] zingo@sh.itjust.works 1 points 1 day ago (1 children)

Not very complex. Use nebula-sync in docker.

[–] Toribor@corndog.social 1 points 1 day ago

I was doing basically this with a different sync tool, but I had a couple issues with it:

  • If I needed to toggle ad blocking I had to go toggle it on both pihole instances
  • When troubleshooting an issue I had to check two log sources, or disable one and then reproduce the issue again
  • Sync was one directional so I could only make configuration changes from the primary instance

I've been a very happy Pihole user for years and years and Pihole 6 is the best yet, but once you're dealing with multiple pihole instances, Nebula Sync and Unbound, then Technitium is actually simpler to manage since it does all that natively.

[–] hellmo_luciferrari@lemmy.zip 2 points 3 days ago (1 children)

That's good to hear!

One feature I wish I could find was automatic DNS record creation for new docker containers I spawn.

Can't wait to check out Technitium.

[–] Toribor@corndog.social 2 points 1 day ago* (last edited 1 day ago) (2 children)

Oh do I have a treat for you, check out DNSWeaver.

It's designed to do exactly that, to automate creation of DNS records for container services. I use it with Traefik. It reads from the same labels that Traefik already uses to proxy services but if you already use another reverse proxy and don't want to switch it supports dnsweaver-specific labels as well which are easy to add to your current deploys.

I used it both with pihole and technitium and actually used it to make the migration easier. Great tool.

[–] hellmo_luciferrari@lemmy.zip 2 points 22 hours ago (1 children)

Good news is that I was playing around with DNSWeaver, and got it working with Pihole. However, this gives me incentive to move off from Pihole because DNSWeaver can't create TXT records for tracking which DNS records it creates so that it can clean up after itself.

So now I am torn between Adguard Home and Technitium. I just wish I could find a guide for getting Technitium working to at least on par with what I have setup.

[–] Toribor@corndog.social 2 points 21 hours ago (1 children)

I deployed Technitium with docker, but generally this got me heading in the right direction with the initial setup. It's more of an overview and quickstart than an in depth guide though.

[–] hellmo_luciferrari@lemmy.zip 2 points 21 hours ago

Thank you! A start was what I was looking for!

[–] hellmo_luciferrari@lemmy.zip 2 points 1 day ago (1 children)

Oh my. I am so thankful you shared this! I will be reading up on this and testing it out likely.

Currently I use Caddy. Which I eventually would like to automate Caddy with this: https://github.com/lucaslorentz/caddy-docker-proxy

Currently I build my own Caddy based off the official image with the cloudflare plugin

[–] Toribor@corndog.social 2 points 1 day ago* (last edited 1 day ago) (1 children)

DNSWeaver has support for caddy labels too! Specifically for use with caddy-docker-proxy. So yeah, really good fit for your architecture.

[–] hellmo_luciferrari@lemmy.zip 2 points 1 day ago

Again, thank you for your suggestions! I am contemplating switching to Adguard or Technitium from pihole. Just gotta figure out how I am gonna approach it

[–] non_burglar@lemmy.world 6 points 4 days ago* (last edited 4 days ago) (1 children)

I've used both.

Pihole is fine for a standard replacement of DNS for record lookups with the ad blocking most ppl want. But pihole is just fancy dnsmasq, you can't manage much more DNS than A records. (That was 4 years ago, though, things might have changed).

Technitium is a real DNS server with all the things DNS I supposed to be able to do. I use it for the zone transfers.

Performance is better than pihole, too, but that may also have changed.

[–] hellmo_luciferrari@lemmy.zip 1 points 4 days ago

With my Pihole setup I currently use A records and CNAMES for my local DNS entries. What interests me with Technitium is that it supports DoH, DoT, and DoQ. Which I would like to see if I could implement.

I remember a while back looking into setting up DoH or DoT with Unbound on my Pihole box, but that didn't work well for me (likely a me issue.)

But I am constantly looking to improve my homelab setup.

[–] rollerbang@lemmy.world 4 points 4 days ago (1 children)

I've used PiHole and have switched to Technitium. Basically there's vastly more options available. A lot of DNS records and zones that simply isn't available with PiHole.

Also much better support for more advanced protocols (DoH, DoT, ...).

But to get the best out of it you do need to use the "Advanced Blocking app", which is a sort of a plugin. And it doesn't always play nice with defaults in terms of blockint.

It's best if one uses one or another, also because of how temporary disabling works.

[–] hellmo_luciferrari@lemmy.zip 1 points 4 days ago (1 children)

Sounds like I am going to dig into some documentation for Technitium.

When you mention the "Advanced Blocking App" can you provide a link that for more info by chance?

I had zero plans of running both, more of a situation where I would want to try Technitium and then switch once I know everything is working!

Thank you for the info!

[–] InnerScientist@lemmy.world 2 points 4 days ago (1 children)

It's an addon that you enable/install inside Technitium, you only need to configure it in the Admin ui.

[–] hellmo_luciferrari@lemmy.zip 1 points 4 days ago

Perfect! I saw there were addons once I spun up a quick docker container for it. Though, I feel I may have a bit of configuring to do to get this working. My host server uses systemd-resolv so I may have to wrestle with that.

Thank you!

[–] ikidd@lemmy.dbzer0.com 4 points 4 days ago (1 children)

I never could get Technitium working correctly, it's like there's some switch you need to throw to actually get it to accept requests. I posted that and had a couple of other say the same thing. I didn't spend a lot of time with it, IMO a DNS server should serve requests out of the box.

Went back to Unbound on my OPNsense router.

[–] irmadlad@lemmy.world 1 points 4 days ago (1 children)

Went back to Unbound on my OPNsense router.

Yeah. I get more mileage with pFsense + unbound

[–] Cyber@feddit.uk 2 points 3 days ago* (last edited 3 days ago) (1 children)
[–] irmadlad@lemmy.world 2 points 3 days ago

Absolutely. It's quite effective.

[–] Konraddo@lemmy.world 2 points 3 days ago (1 children)

I'm just barely okay at self hosting applications, so using Unbound together with Pi-hole poses a great challenge. Technitum DNS is a whole package and the GUI is user-friendly to me. But, after using Netbird on VPS (for the reverse proxy mostly), because of a different sub-domain being used, I think I don't need Technitium anymore though it continues to work so I have no reason to change.

[–] hellmo_luciferrari@lemmy.zip 3 points 3 days ago (1 children)

Pihole + unbound on the same box as my DNS has been super simple for me. I didnt do a lot of extra configuration for Unbound, I used mostly the guide that was on Pihole official documentation.

As for reverse proxy, I have Caddy setup. And to access my homelab I use wireguard.

Most of my services run on a separate box running docker.

I've woven most of it together bit by bit. I'm slowly upgrading different pieces and its lead me down a rabbit hole. So I found this post intriguing.

Biggest hurdle with Technitium for me is the lack of documentation. I can say the compose file they provided has lots of comments. That doesn't solve for a few pieces for me though. Systemd-resolv uses port 53 on my host box, and I have to find out the ramifications for disabling that and using Technitium. That and I am unsure of what extra capabilities I have to grant that container. And I have to find out how adding it to my reverse proxy docker network.

So its gonna be trial and error I suppose! I'm looking forward to getting DoT or DoH or DoQ setup.

[–] Konraddo@lemmy.world 3 points 2 days ago

I couldn't agree more about the lack of documentation for Technitium. Thank God it has an interface instead of command line only. Don't know anything DoT or whatever. Guess I'm not using Technitium to it's full potential. That said, I appreciate it being a total package of DNS server and adblocker.

[–] stratself@lemdro.id 2 points 4 days ago (1 children)

Hi, the other comments have said it pretty well, but you can also check out my previous post for some of the other comparisons.

I went from Pihole > Adguard Home > Technitium, and stuck with the last one because it supports clustering (syncing data between nodes) and recursion (so no need for external Unbound). The interface is a bit complex and there is no dedicated documentation, but should be intuitive enough as you learn.

If you want something simpler, I think Adguard Home is a better choice than Pihole as it natively supports encrypted DNS protocol, and has a sleeker UI. But other than that Technitium is nice as you expand your homelab eventually.

[–] hellmo_luciferrari@lemmy.zip 1 points 3 days ago (1 children)

Thank you for sharing the link to your previous post. Will definitely read up on that!

I think I will skip Adguard just due to not wanting a license.

I do wish they had more documentation on this stuff for Technitium.

Though it does seem like a cool product.

[–] adarza@lemmy.ca 3 points 2 days ago (1 children)
[–] hellmo_luciferrari@lemmy.zip 1 points 2 days ago

I may give this a shot and see how I like it. However, I am struggling with my systemd-resolvd service not wanting to disable.

[–] irmadlad@lemmy.world 2 points 4 days ago

I have used Pi-Hole but not Technitium. As I understand it, Technitium has some more options than that of Pi-Hole + Unbound that power users may appreciate.

[–] possiblylinux127@lemmy.zip 4 points 3 days ago (1 children)

This could honesty be a enterprise product

[–] jobbies@lemmy.zip 2 points 2 days ago

Yep. I gave up on it cos it was too much for my home setup. It really is comprehensive.

[–] unitedwithme@lemmy.today 5 points 3 days ago* (last edited 2 days ago) (2 children)

Someone should do a write up for pihole vs adguard vs technitium vs eBlockerOS

https://eblocker.org/en/ (German product?) (BTW you're all welcome that I showed you a new thing)

Edit May 7: eBlockerOS seems geared towards better packet* inspection, hidden trackers protection, and fingerprinting. You can install a HTTPS cert* on your current machine so it does MITM packet inspection where it can scan*, inspect, and reencrypt from the looks of it.

Im probably going to run this at work on my test environment to see how well it does overall. Maybe less granular control, but I like is more* than just an adblocker like pihole.

[–] KairuByte@lemmy.dbzer0.com 2 points 2 days ago

eBlocker definitely looks like an interesting project, I may end up checking that out.

[–] eutampieri@feddit.it 2 points 3 days ago* (last edited 3 days ago)

eBlocker does indeed seem German. It’s also much more than PiHole (it MITMs your packets, it seems) https://eblocker.org/en/how-eblocker-works/

eBlocker uses SSL bumping with a unique root certificate to decrypt possibly encrypted TCP/IP packets. After this deep packet inspection a pattern matching to the target URI is performed. In case of a match, the request is answered by the eBlocker (instead of being sent to the target URI).

As a slightly less accurate alternative, eBlocker uses DNS blocking for fallback, where the domains of known data collectors are blocked. This way, even devices that do not allow to install root certificates are also protected.

[–] probable_possum@leminal.space 2 points 4 days ago* (last edited 3 days ago)

Technitium DNS Server v15.1.0 has been released... with support for OIDC! Now you can use your preferred identity provider to log in to Technitium accounts, and manage your DHCP/DNS deployments with approriately granular permissions controls.

I didn't understand the conection between DHCP/DNS server and login with an IDP. Had to look it up: That server has a web UI and you can use an identity provider to authenticate users, instead of local user management I guess.

Technitium DNS is advertised as a Pihole alternative.

Technitium? Indian company. One guy? Has a blog with some interesting entries. Products: a p2p messenger and a DNS resolver.

[–] Decronym@lemmy.decronym.xyz 1 points 3 days ago* (last edited 21 hours ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
DHCP Dynamic Host Configuration Protocol, automates assignment of IPs when connecting to a network
DNS Domain Name Service/System
IP Internet Protocol
PiHole Network-wide ad-blocker (DNS sinkhole)
SSL Secure Sockets Layer, for transparent encryption
TCP Transmission Control Protocol, most often over IP
VPS Virtual Private Server (opposed to shared hosting)

7 acronyms in this thread; the most compressed thread commented on today has 9 acronyms.

[Thread #274 for this comm, first seen 6th May 2026, 01:40] [FAQ] [Full list] [Contact] [Source code]