UPDATED: PureOS and Pihole

Background: I have a Pi-Hole and have been successfully running it for about 2 months now. A Pi-Hole is (as their tag line suggests) “A black hole for Internet advertisements”. It effectively redirects advertising URLs to it’s own domain and - voila! - ads disappear from devices running their DNS through the Pi-Hole. Pi-Hole (PH) users can query DNS transactions made from devices connected to the PH.

Attached is a snapshot - which will also serve as reference for my question:

As you can see, PH’s query feature enables me to see Time, Type (A=IPv4, AAAA=IPv6), Domain (i.e., hxxp://google.com, etc), Client (device named), Status, Reply, Action (enables user to instantly Blacklist the domain in the entry).

What you see in this image are entries for my PureOS Librem. In the span of ~3hrs, PureOS attempted the Domain TTY2 over 12,442 times. As a result, I’ve blacklisted this domain.

The Question: What is this TTY2 domain the PureOS is sending out so frequently and what is generating it?

Thanks for your thoughts!

1 Like

Hey! I was playing with my Librem 14 that I recently purchased and having fun reviewing internet traffic in Wireshark, and I find that my Librem 14 was also trying to connect to tty2 domain as well. [Edit: In my case, sometimes the domain name was listed as tty2.Home]

I would not be at all surprised if the software that reaches out to tty2 domain was a GNOME thing or something else that isn’t strictly Purism’s focus, but I’m still interested in what part of the system tried to contact this domain if even just for my own idle curiosity.

Did anyone else get to the bottom of it in the last 5 years since your post was made?

1 Like

See: Virtual console - Wikipedia
and (248-page PDF) - search for “TTY”: https://magazines-attachments.raspberrypi.org/books/full_pdfs/000/000/038/original/BeginnersGuide-4thEd-Eng_v2.pdf