• Netflix outside VPN

    16
    0 Votes
    16 Posts
    3k Views
    J

    please check this answer https://forum.netgate.com/topic/96636/netflix-vpn-block-how-to-fix/19

  • (SOLVED) Not enough double u's?

    4
    0 Votes
    4 Posts
    449 Views
    Raffi_R

    Yup, "test.com" was in one of my lists. That explains it! pfblocker was doing its job. Thanks!

  • Stuck on booting up on console

    2
    0 Votes
    2 Posts
    253 Views
    DerelictD

    Sure it's not the stuff listed about the console here?

    https://www.netgate.com/docs/pfsense/install/upgrade-guide.html?highlight=upgrading#upgrading-from-versions-older-than-pfsense-2-4-4

  • Checked "DNSBL Firewall Rules" however no floating rule added?

    3
    0 Votes
    3 Posts
    478 Views
    R

    Hi @BBcan177,

    Yes, i did. I also tried deselecting either one and disabling and re-enabling it.

    @reilos said in Checked "DNSBL Firewall Rules" however no floating rule added?:

    I have pfBlocker running on 2 interfaces, which i have selected in the list behind the checkbox.

  • 0 Votes
    5 Posts
    3k Views
    S

    Hi everybody,

    I found indeed a solution to my problem and would like to share it here. It is not perfect, but what in this word is? ☺

    My solution does not directly use pfSense. pfSense is only used to ...
    a) configure a special DNS server address for selected DHCP clients (smart TVs and the like)
    b) block access to the (uncensored) DNS resolver running on pfSense form said clients using the firewall

    The special standalone DNS server (a Raspberry Pi in my case) runs the dnsmasq service. dnsmasq has two very handy configuration options. The magic incantations are the "server" directive and the "address" directive. (Note: One could also run dnsmasq on pfSense - but in my setup I already use unbound on pfSense and didn't want to risk messing with everybody elses DNS resolution just for this.)

    With the server directive one can specify an address which we want to be resolved by a certain DNS server. The trick here: '#' as the target resolver means "use your configured standard server to forward the request to". Meaning: resolve normally. Im my case for Netflix I have:

    server=/netflix.com/#
    server=/netflix.ch/#
    server=/nflxext.com/#
    server=/nflximg.com/#
    server=/nflximg.net/#
    server=/nflxvideo.net/#
    server=/nflxso.net/#
    server=/netflix/#
    server=/cloudfront.net/#
    server=/d179kwmlpc4o47.cloudfront.net/#
    server=/d2s336w63pl2vv.cloudfront.net/#

    (the details seem to depend on geographic location - note I have a blanket "allow" for all of cloudfront.net here - the cloudfront host names are not necessarily stable)

    The "address" option can then be used to implement the "DNS black hole" functionality:

    address=/#/192.168.x.y

    OR -
    address=/#/

    The first version makes dnsmasq return a fixed (fake) IP address for any DNS request not whitelisted using a server directive. The second returns NXDOMAIN instead of a wrong IP. I use the first. Look at the manpages of dnsmasq and dnsmasq.conf for details!

    For some of my "smart" devices to function, I need to allow additional domains. One Samsung TV for example needs access to the domain time.samsungcloudsolution.com (among others). Otherwise it will not believe that it has internet access and will simply refuse to start the Netflix app - stupid "smart" thing!!

    My solution kind of works, but adding a new "smart" device is always a hassle. And if you want to use another video streaming service, you have to find out the necessary domains to whitelist first.

    This is the solution I am using. I hope this will help someone.
    Andy

  • Is pfBlockerNG Devel stable?

    Moved
    23
    0 Votes
    23 Posts
    4k Views
    newyork10023N

    @bbcan177 The list with which I am familar is pulled by uBlock Origin, but I cannot determine which exact list it is. I did find the following lists, and I expect one is the list pulled by uBO:

    https://www.zoso.ro/pages/rolist.txt
    https://www.zoso.ro/pages/rolist2.txt

  • Upgrade to newer pfblockerng have get error.

    2
    0 Votes
    2 Posts
    810 Views
    GrimsonG

    @akong77 said in Upgrade to newer pfblockerng have get error.:

    Hello,
    I upgrade lastest pfblockerng have got error.I use some command fix php error.
    ,,,

    ssh to pfsense cd /usr/local/lib/php/ ln -s 20170718/ 20131226

    That is not a fix, it just messes up things more.

    https://forum.netgate.com/topic/135895/package-update-triggers-only-half-2-4-4-update

  • pfBlockerNG-devel 2.2.5_17: IP Alerts list (Deny) not showing alerts

    7
    0 Votes
    7 Posts
    1k Views
    RonpfSR

    @aritus On my box I have selected WAN for Inbound, and LAN for Outbound. 😉

  • pfBlockerNG-devel 2.2.5_17 + 2.4.4 (Uncaught Fatal Error)

    2
    0 Votes
    2 Posts
    332 Views
    A

    Ok, to anyone else running into this issue you need to ensure the "Keep Settings" is unchecked in the General Tab and then uninstall the package. Once that is done reinstall the package and it should work.

  • Is Hiding DNSBL Alerts without Whitlisting Possible?

    5
    0 Votes
    5 Posts
    884 Views
    Z

    Oh, I see what you mean now! Thanks again.

  • pfBlockerNG and 1.1.1.1 - possible solution.

    8
    0 Votes
    8 Posts
    1k Views
    dragoangelD

    @BBcan177 P.S. after your post I launch update to devel version, and all goes smooth like a charm - need only to launch cron update from pfBlockerNG menu (i'm not use easylists), new menus, autocomplite for GeoIP, ASNs and other functions is awesome!

  • PRIX

    1
    0 Votes
    1 Posts
    433 Views
    No one has replied
  • pfBlockerNG - 2.2.5_16 pfb_filter

    17
    0 Votes
    17 Posts
    3k Views
    SnowaksS

    Thanks 👍

  • Whitelisting From Alerts Page Not Working

    15
    0 Votes
    15 Posts
    1k Views
    M

    Thanks, works perfectly now.

  • DNS over TLS - 2.4.3 to 2.4.4

    4
    0 Votes
    4 Posts
    2k Views
    jimpJ

    No, you do not.

  • DNSBL (DEV) Stopped working after 2.4.4 upgrade

    5
    0 Votes
    5 Posts
    1k Views
    V

    I was able to get DNS resolver errors above corrected with this post
    https://forum.netgate.com/topic/106011/solved-pfblockerng-reloading-unbound-fails/11

    After the above, resting Resolver settings (just clearing all setting then adding back the same settings) and a reboot it appears to be working again.

    Thanks for the help!

  • GeoIP and NAT

    8
    0 Votes
    8 Posts
    1k Views
    GrimsonG

    @cgeo said in GeoIP and NAT:

    But my point remains. Shouldn't this be visible in the firewall logs ?

    You have the source IP alias already in the NAT rule, so it will not process the port redirect from IPs not covered in that alias. As such the firewall simply sees a connection from your LAN to your WAN address, this is allowed by the default LAN-to-any rule (if it still exists in your config), and so it wont be logged. With this config you simply try to connect to pfSense on a port that is likely not in use.

  • 2.4.4 upgrade messed pfBNG (beta)?!

    4
    0 Votes
    4 Posts
    901 Views
    boukeB

    @bbcan177 Thanks BBcan177. This fixed it for me 👍

  • maxmind.com blocked by QuidSup Trackers

    3
    0 Votes
    3 Posts
    575 Views
    PuchoP

    Great, thanks!

    Completely overlooked it. I'll have a look at threat look up thing.

    I won't hesitate in the future to open a GitHub issue with the maintainers if after some investigation it turns out to be a false positive.

  • 0 Votes
    4 Posts
    723 Views
    BBcan177B

    With all the changes in PHP7, a commit was added to the installer code that created some empty XML tags.

    <config></config>

    This will be fixed in the next version which should be out soon. However, you can follow these steps below to fix this issue now:

    First make a backup of the config.xml from the:

    pfSense Diagnostics > Backup & Restore Tab:

    Then paste the following PHP code which will cleanup the empty XML tags into:

    pfSense > Diagnostics > Command Prompt > Execute PHP Commands:

    $upgrade_type = array('pfblockernglistsv4', 'pfblockernglistsv6', 'pfblockerngdnsblsettings', 'pfblockerngafrica', 'pfblockerngantarctica', 'pfblockerngasia', 'pfblockerngeurope', 'pfblockerngnorthamerica', 'pfblockerngoceania', 'pfblockerngsouthamerica', 'pfblockerngtopspammers', 'pfblockerngproxyandsatellite'); foreach ($upgrade_type as $type) { if (is_array($config['installedpackages'][$type]['config'])) { if (empty($config['installedpackages'][$type]['config'][0])) { unset($config['installedpackages'][$type]['config'][0]); print "\n| Removed | {$type} | Empty XML Tag"; } } } write_config('pfBlockerNG - Fix empty XML tags');

    Then hit the Execute button for the code to run.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.