Set up a Pi-hole VPN on an AWS Lightsail instance
Build your own VPN with Pi-hole to block ads and trackers.privacy aws cybersecurity open-source
I’ve written a fair bit in the past about the whys of online privacy, and a lot about staying safe online. Chances are, if a search brought you here, you’re well-past why. Let’s go straight on to how.
This guide will walk you through setting up Pi-hole on an AWS Lightsail instance that acts as your VPN thanks to OpenVPN. It’s a more succinct version of the official Pi-hole docs for OpenVPN, made specifically for Lightsail with a few tips and tricks added in, because you deserve it.
Log in or sign up to AWS and create a Lightsail Instance.
Under Select a platform, choose Linux/Unix.
Under Select a blueprint, choose the OS Only button.
Select the latest officially supported Ubuntu server.
You can save a tidbit of effort by putting the following into the Launch script box:
# Update installed packages sudo apt-get update sudo apt-get upgrade -y
Create a new SSH key for this server and ensure you download the
Choose your plan. The $3.50 USD instance is sufficient.
Give it a name then click Create instance.
Stare eagerly at the page until the instance status is Running, then go to the Networking tab.
Create a Static IP and attach it to your new instance. Remember that static IP addresses are free only while attached to an instance.
Click on your instance name to return to its dashboard. Go back to the Networking tab. It’ll look a bit different now.
Under IPv6 networking, click the toggle to turn it off (unless you know what you are doing and you want IPv6 for some reason. Most of y’all don’t need it).
Under IPv4 Firewall, delete the rule for
Click Add rule. In the Application dropdown, choose Custom.
- For Protocol, choose UDP.
- In the Port or range input, enter a UDP port for the OpenVPN server to run on. (It’s typically
1194, which you can choose to use, but you might like a different number for security purposes. Port range is
After connecting to your server using SSH, install OpenVPN on your server.
# Download OpenVPN wget https://git.io/vpn -O openvpn-install.sh chmod 755 openvpn-install.sh sudo ./openvpn-install.sh
Welcome to this OpenVPN road warrior installer! This server is behind NAT. What is the public IPv4 address or hostname? Public IPv4 address / hostname [x.xx.xxx.xxx]:
…where the default option is your static IP that you set up earlier. Hit return to accept this. Then:
Which protocol should OpenVPN use? 1) UDP (recommended) 2) TCP Protocol : 1
1 or hit return. Then:
What port should OpenVPN listen to? Port : #####
Enter the UDP port number you chose earlier. Then:
Select a DNS server for the clients: 1) Current system resolvers 2) Google 3) 22.214.171.124 4) OpenDNS 5) Quad9 6) AdGuard DNS server : 1
1 or hit return. Then:
Enter a name for the first client: Name [client]: pihole
The Pi-hole will be the client. Name it as you like then
Press any key to continue...
OpenVPN will set itself up. Confirm that
tun0 has the interface address
10.8.0.1/24 with the following command:
ip addr show tun0
This ensures that the Pi-hole will be set up properly. Now, about that:
On your Lightsail instance, install Pi-hole.
# Download and install Pi-hole curl -sSL https://install.pi-hole.net | bash
This runs the Pi-hole automated installer. You’ll see some prompts which you can answer using the enter key, arrow keys, tab, and space bar for selecting an option.
The important things:
- When you see Choose An Interface, ensure you pick
tun0. It isn’t the default selection.
- You’ll need to set the IPv4 address to the interface address you viewed previously using the
10.8.0.1/24. This ensures the Pi-hole uses the VPN.
At time of writing, the second item above wasn’t presented as an option in the automated installer. After the Pi-hole installer finishes, manually change the IP address by editing the configuration file:
> sudo vim /etc/pihole/setupVars.conf
10.8.0.1/24and save the file. Restart the Pi-hole with:
If you mess up, you can redo the configuration with
Finally, you’ll configure the VPN to use the Pi-hole.
Confirm the address of the
tun0 interface with:
ip a | grep -C 1 'tun0'
You should see:
inet 10.8.0.1/24 in there.
Edit the OpenVPN config file with:
sudo vim /etc/openvpn/server/server.conf
Change the line that starts with
push "dhcp-option… to use the Pi-hole’s IP address that you confirmed above:
push "dhcp-option DNS 10.8.0.1"
If any other lines start with
push "dhcp-option…, comment those out.
If you want to log OpenVPN traffic, add these lines to the end of the file:
log /var/log/openvpn.log verb 3
Save the config. If you forgot to open Vim with
sudo, use the
:w !sudo tee %, then
Restart OpenVPN with
sudo systemctl restart openvpn-server@server.
Run the following to control traffic to the server as described here.
sudo iptables -I INPUT -i tun0 -j ACCEPT sudo iptables -A INPUT -i tun0 -p tcp --destination-port 53 -j ACCEPT sudo iptables -A INPUT -i tun0 -p udp --destination-port 53 -j ACCEPT sudo iptables -A INPUT -i tun0 -p tcp --destination-port 80 -j ACCEPT sudo iptables -A INPUT -p tcp --destination-port 22 -j ACCEPT sudo iptables -A INPUT -p tcp --destination-port 1194 -j ACCEPT sudo iptables -A INPUT -p udp --destination-port 1194 -j ACCEPT sudo iptables -I INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT sudo iptables -I INPUT -i lo -j ACCEPT sudo iptables -P INPUT DROP # Optionally, also block HTTPS advertisements while you're here. sudo iptables -A INPUT -p udp --dport 80 -j REJECT --reject-with icmp-port-unreachable sudo iptables -A INPUT -p tcp --dport 443 -j REJECT --reject-with tcp-reset sudo iptables -A INPUT -p udp --dport 443 -j REJECT --reject-with icmp-port-unreachable
You can review the results with
sudo iptables -L --line-numbers.
These are only stored in memory before you save them, so test out your set up on your client now to see if it all works as expected.
To test your configuration, try adding a client (the phone or computer that will connect to the VPN).
- Run the OpenVPN script again:
sudo ./openvpn-install.shand choose 1) Add a new client. Give it a name; you may find it helps to name it by the device, e.g. “phone”. This creates a file that ends in
.ovpn. You need to place this file on your client to use it.
- Install the appropriate OpenVPN app for your device.
- Transfer the
.ovpnfile you just obtained to the device if you haven’t already. (See future tasks for a way to copy the file to your host machine.) Follow instructions in your app (try under FAQ) for importing the
.ovpnfile and activating the VPN.
- Ensure it seems to connect properly. If you go to DuckDuckGo.com and search for “What’s my IP”, you should see the location of your Lightsail instance. For a more in-depth test, check for DNS leaks at BrowserLeaks.com.
Try browsing for a while. You can also view the Pi-hole dashboard by visiting
http://pi.hole/admin/ on this device.
If everything seems all right, go on to saving the configuration on your instance.
iptables you created earlier using the
tee command to achieve the second permission.
sudo iptables-save | sudo tee /etc/pihole/rules.v4
You’re finished with configuration on your Lightsail instance. If you wish to disconnect now, you can just type
You’re done with the set up! You now have your very own personal VPN with a Pi-hole keeping you safe from nasty trackers. Here are some references for operations you might like to come back to in the future:
- Reconnect to your Lightsail instance with SSH:
ssh -i /path/to/private-key.pem ubuntu@public-ip-address
- Set a password for the web interface dashboard:
pihole -a -p
- Access the web interface dashboard:
- Connect to the VPN, then visit
- Connect to the VPN, then visit
- Update the Pi-hole:
- Add a new client (for iOS, Linux, or Windows, or for Android)
- Copy the
.ovpnfile for a client to your host machine (run on the host machine):
ssh -i /path/to/private-key.pem ubuntu@public-ip-address 'sudo cat /path/on/lightsail/client.ovpn' > /path/on/host/client.ovpn
- Beef up that block list! Here’s my favorite resource for updating your Pi-hole adlist table: The Big Blocklist Collection
Enjoy your new, more secure and peaceful Internet! If you found this guide helpful, please share it with someone else.