• Apparent bug

    5
    0 Votes
    5 Posts
    1k Views
    A

    Thanks.  That might have something to do with it.  I think the log entries that refer to the number of entries added/deleted refer to the alias files?  Even if the permit file is deleted upon saving the config, it wasn't clear to me that the corresponding entries would be removed from the alias file until the force update was run.  Therefore I would have expected the log nevertheless to show the number of entries being deleted.

    I've excerpted the relevant log entries below.  In this example, I disabled Switzerland and enabled Japan in one step, saved, then ran force update.  You can see that there is no reference to deleted entries, and the "last updated list summary" still refers to Switzerland (though it's been properly removed from the other sections).

    Thanks.

    **Saving configuration [ 05/12/17 10:13:15 ] ... [ Removing List(s) : InboundPermCH ] Archiving Aliastable folder Archiving selected pfBlockerNG files. **Saving configuration [ 05/12/17 10:15:38 ] ... UPDATE PROCESS START [ 05/12/17 10:15:55 ] ... ===[  IPv4 Process  ]================================================= ... [ InboundPermGB ] Reload [ 05/12/17 10:18:32 ] . completed .. [ InboundPermJP ] Downloading update [ 05/12/17 10:18:35 ] .. completed .. ... ===[  Aliastables / Rules  ]========================================== No changes to Firewall rules, skipping Filter Reload ... Updating: pfB_iBlockList 64 addresses added.11 addresses deleted. Updating: pfB_Inbound_permit 4583 addresses added. Archiving Aliastable folder Archiving selected pfBlockerNG files. ===[ FINAL Processing ]=====================================   [ Original IP count  ]  [ 490720 ]   [ Final IP Count  ]  [ 432383 ] ===[ Permit List IP Counts ]=========================   22599 total   18016 /var/db/pfblockerng/permit/InboundPermGB.txt     4583 /var/db/pfblockerng/permit/InboundPermJP.txt ... ====================[ Last Updated List Summary ]============== ... May 12 00:17 InboundPermGB May 12 00:17 InboundPermCH May 12 10:18 InboundPermJP =============================================================== .. Alias table IP Counts -----------------------------   545732 total ...   22599 /var/db/aliastables/pfB_Inbound_permit.txt ... UPDATE PROCESS ENDED [ 05/12/17 10:20:18 ]
  • Inbound on WAN to specific ports, allow specific country only

    6
    0 Votes
    6 Posts
    4k Views
    L

    If it can help, you need to select the List action "Alias Permit" to prevent auto rule creation - I had the same issue as above.

  • Can not allocate memory but I have plenty

    2
    0 Votes
    2 Posts
    780 Views
    BBcan177B

    The pfSense Max Table entries is a table setting for all aliastables in total…

    grep -c ^ /var/db/aliastables/*.txt

    And it usually needs about 30% more…

  • Blocking all internet?

    4
    0 Votes
    4 Posts
    1k Views
    P

    Yes I understand this however, I'm going to be turning on "both" not just "inbound" on the FW.  I'm easing my way into blocking country outbound SO I need to enabled GEO IP Block.

    I haven't quite figured out what was going on BUT it's possible this was a SNORT issue or perhaps a DNS resolution issue at the time.

    This might be a non-issue.  I've turned pfbng back on, have cleaned a few things up and it seems like all is well.

    Thanks for your feedback.

  • IPV6 lists

    2
    0 Votes
    2 Posts
    1k Views
    BBcan177B

    There aren't many IPv6 Feeds:

    https://www.spamhaus.org/drop/dropv6.txt
    https://www.myip.ms/files/blacklist/csf/latest_blacklist.txt

    Choose one of the following (recommend the first one):
    https://www.stopforumspam.com/downloads/listed_ip_30_ipv6.zip
    https://www.stopforumspam.com/downloads/listed_ip_1_ipv6.zip
    https://www.stopforumspam.com/downloads/listed_ip_7_ipv6.zip
    https://www.stopforumspam.com/downloads/listed_ip_90_ipv6.zip
    https://www.stopforumspam.com/downloads/listed_ip_180_ipv6.zip
    https://www.stopforumspam.com/downloads/listed_ip_365_ipv6.zip

    Note: v2.1.1_8 has an issue with IPv6 lists, use "Alias Type" settings until the next release.

  • Amazon Android app not working

    2
    0 Votes
    2 Posts
    2k Views
    a-a-ronA

    Hey, so I ran into this a while ago… Went through and white listed all sorts of domains that amazon wanted me to let through. I honestly think it's an issue with their app.  If you keep white listing, you'll eventually find that they are serving ads from 3rd party sites as well. It ends up being a pretty big rabbit hole.

    Unfortunately i ended up giving up, i just go to amazon in Chrome with all the sites still blocked, and have no issues. I think the Amazon app doesn't know how to deal with not being able to get to a site. Where Chrome just moves on...

  • Not getting PfBlockerNG updates

    2
    0 Votes
    2 Posts
    1k Views
    BBcan177B

    When you add a new Feed, it will download the feed and wait for the next Cron task. Each DNSBL Group has an "Update Frequency" setting where you can configure the update settings.

    If you want to force a download of a particular feed:

    Goto Logs Tab > Log/File Type > "DNSBL Files" > open Feed > Click on "Delete Icon" > Force Update OR From shell: rm /var/db/pfblockerng/dnsbl/ <insert name="" of="" feed="" header="" here=""> .txt</insert>
  • Pfblockerng blocking googledns despite it wasn't in a list…

    2
    0 Votes
    2 Posts
    608 Views
    BBcan177B

    Run the following command to see which feed contains that IP:

    grep "8.8.8.8" /var/db/pfblockerng/deny/*

    If you enable the suppression feature, it will add a "+" icon in the Alerts tab which can be used to suppress this IP. This IP shouldn't be listed in any feed, so once you find out which feed listed that IP, you may want to report it to the feed maintainer.

  • SpamList for pfBlockerNG

    5
    0 Votes
    5 Posts
    2k Views
    S

    @moscato359:

    Do you prune your IP lists over time?

    Sometimes old IPs get released, and handed to someone else.

    Most lists only keep the last 30 days at longest.

    I only remove IP address if I am contacted by the current owner of the IP address and our interactions convince me that the IP address is not likely to send out spam in the future.

    The bulk of the IP addresses in SpamList fall into one of two categories:

    1.  Machines at hosting providers who don't care if their clients use their systems to send out spam.  Even if the current customer gives up and stops paying to use those IP addresses to send out spam, it is likely that in the future some other customer will pick them up and start sending out spam.

    2.  Compromised machines that are being used to send out spam.  Even if the machine is cleaned up, most people who are compromised once will be compromised again repeatedly.  So it is likely their IP address will send out spam in the future.

  • Pfr_update_stats: assertion failed.

    6
    0 Votes
    6 Posts
    3k Views
    S

    The first command returned nothing but the second one returned the following at least a hundred times.

    /var/db/aliastables/pfB_BlockListMalware.txt:127.0.0.1

    I checked my malware lists and this one seems to be the problem.

    http://www.malwaredomainlist.com/hostslist/hosts.txt

    I deleted it, forced a reload and it continued to show the loopback address listed in the malware block list.  So, I disabled the entire list, forced a reload, re-enabled it, forced another reload and, while I'm not entirely sure it's still using the malware blocklist, at least it's not returning the loopback address when I enter the command anymore.

    I might try rebooting my router, just to see if that sorts everything out.

    Either way, thanks for the help.

  • Privacy Error

    9
    0 Votes
    9 Posts
    3k Views
    L

    @BBcan177:

    @LIGISTX:

    You are awesome. Thanks!

    Anytime… Thanks for using my package  8)

    Now I just need to figure out snort  :-X

  • DNSBL feed failed: Domainname length overflow

    4
    0 Votes
    4 Posts
    2k Views
    BBcan177B

    As I stated in my reply above, you cannot use these EasyList feeds by adding them to the DNSBL Feeds tab. They will not parse properly.

    The only EasyList feeds that are usable in DNSBL are hardcoded in the EasyList tab. Only certain portions of the EasyList/EasyPrivacy are useable in a DNSBL filter. See the categories in the EasyList tab to see which categories are usable.

    The next version of pfBlockerNG will have all of the EasyList Language Feeds included.

  • DNSBL/EasyList used to work – now does not

    9
    0 Votes
    9 Posts
    3k Views
    S

    set DNSBL IP Firewall Rule Settings>List Action>Deny outbounded instead of both
    and remove any PIA DNS server ip from Services>DHCP Server>LAN

    for firewall rules, follow PIA pfsense guide, (go to end of page) https://www.privateinternetaccess.com/pages/client-support/pfsense

  • Pfb_dnsbl.conf too big?

    8
    0 Votes
    8 Posts
    2k Views
    RonpfSR

    @mugabemkomo:

    The only errors I get is:
    unbound 22943:0 error: cannot chdir to directory: (No such file or directory)

    This "error" has been present for ages. It doesn't cause any problem as far as I know.

  • Weird behaviour all IPs get blocked

    9
    0 Votes
    9 Posts
    1k Views
    BBcan177B

    @morreale:

    @BBcan177:

    I'd recommend these PRI1 Feeds:

    What does PRI1 mean?

    PRI1 is the IPv4 Aliasname that I use for the Primary-1 recommended feeds…

  • Pfblockerng 2.1.1_6 error message

    6
    0 Votes
    6 Posts
    1k Views
    BBcan177B

    Did you try the command in reply#2?

  • Block List Sticky?

    20
    0 Votes
    20 Posts
    5k Views
    C

    +1 on a block list sticky. I'd also like to see different sample blocklist sources for those of use hosting services vs those of us consuming services.

    As a host (hosting lots of web sites, so for example all my WordPress sites are constantly scanned, and all http/ftp/ssh etc ports are under constant attack), this is what I'm using as an IPv4 block list:

    https://isc.sans.edu/block.txt  (DShield Top 20 bad guys)

    http://feeds.dshield.org/top10-2.txt (DShield Port Scanners)

    https://zeustracker.abuse.ch/blocklist.php?download=badips  (ZeuS bad ips - not the most restrictive list but won't have false positives)

    https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt possibly overlaps the DShield lists? I don't host email so not sure if I need this.

    http://cinsscore.com/list/ci-badguys.txt CIArmy active threats. This gets by far the most blocks.

    This is by no means an endorsement of a proper hosting block list, though it does seem to block quite a bit of bad traffic. In fact, I'd appreciate any suggested changes for a hosting provider that wants to block the worst of the worst while avoiding false positives. Thanks!

    EDIT: I found a very good resource of blocklists: http://iplists.firehol.org/ has several. For my use, their Level 3 block list seems to be exactly what I need.

  • Pfblocker Alerts

    2
    0 Votes
    2 Posts
    784 Views
    BBcan177B

    The Alerts tab uses the pfSense Firewall log as its source. So you may need to increase the size of the firewall log retention.

  • Error Message

    3
    0 Votes
    3 Posts
    582 Views
    stephenw10S

    It's telling you two things. There is not enough memory to create the v6 bogons list. There is no data to populate that table from pfBlocker.

    You could try forcing an update in pfBlocker or disabling it to see if you can successfully load the ruleset. You can also try increasing the maximum table entries in System > Advanced > Firewall/NAT if you have available RAM for it.

    Steve

  • Wanted, A message page please

    2
    0 Votes
    2 Posts
    490 Views
    D

    Not with DNSBL, that'd make things pretty horrible, you'd get that page in place of every blocked advert, e.g.

    If you are talking about the firewall rules, there's nothing preventing you from creating aliases (use one of the Alias actions in List Action) and using those as a destination in a NAT rule, redirecting the requests to some webserver and serving whatever you want there.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.