• 10.10.10.1 trying to delete error

    3
    0 Votes
    3 Posts
    1k Views
    L
    thanks!  I'm also having WAN drop issues since upgrading to 2.3.4-p1 so I might just re-install with 2.4 and try that out as well. It's just a home firewall so not like I have massive rules/etc set :)
  • Feature Request: | pfB_Pass/Match | pfB_Block/Reject | All other Rules

    2
    0 Votes
    2 Posts
    546 Views
    BBcan177B
    When you are interleaving your rules like that, its very difficult to auto-generate the order…. I would recommend to use "Alias type" rules and then manually create the rules as required.  Click on the blue infoblock icon in the IPv4 tab to get more details....
  • Updated lists and just discovered firehol

    3
    0 Votes
    3 Posts
    1k Views
    BBcan177B
    Its not recommended to use the LVL1 feed to block Outbound since it contains Bogons. Also IBlock doesn't seem to be maintained very well… I'd not recommend to use Feeds that are not maintained.
  • PfBlockerNG DNSBL Latency?

    3
    0 Votes
    3 Posts
    2k Views
    BBcan177B
    @killmasta93: Hi, I was wondering if someone else has had this issue before? Recently users been complaining about slow internet speeds. Right now its configured as windows server DNS root are pointed to pfSense and the DNS on pfSense are 8.8.8.8. So Im guessing it might be a DNS issue for the request. I checked the unbound DNS cache and seems to be allright, What i also been noting at times on chrome shows that the page connection is not private but if i reload it again it shows normal the website. My question is there to troubleshoot the issue by checking DNS speed from pfBlockerNG to the roots of the windows server? Thank you If browsing is slow it could be one of two things generally… You Lan segments cannot access the DNSBL VIP address... to test, try to ping the DNSBL VIP address, and try to browse to the DNSBL VIP address from each of your LAN Segments. If that doesn't work then ensure that you have selected the DNSBL Permit option to allow those subnets to access the DNSBL VIP address... You can also check your NAT/Limiter rules to see if something is interfering with the access... When a LAN segment cannot access the DNSBL VIP, it will timeout the browser as its still looking to access the blocked domain. One of the blocked domains is causing the browser to timeout... Your LAN devices should have there DNS settings set to your MS AD/DNS Server only. Then the AD/DNS should have its Forwarders set to pfSense which will then be filtered via DNSBL. Another thing to keep in mind, is that when you try to open a web page that is blocked via DNSBL via HTTPS, the browser will show a certificate error since the browser sees that the DNSBL certificate does not match the Domain that was blocked.... Its safe to ignore...
  • IPV4 White list before Geo IP

    2
    0 Votes
    2 Posts
    582 Views
    BBcan177B
    Check the Firewall rule order… To overcome a GeoIP blocklist, you need to have the Permit rules above the Block rules.  The Rule order setting is in the General tab.
  • 2.3.4-p1 Breaks PFBlockerNG broke one VLAN, rest ok

    3
    0 Votes
    3 Posts
    614 Views
    BBcan177B
    To confirm, can you ping 10.10.10.1 from each VLAN, and can you browser to 10.10.10.1 and get the 1x1 pix from each VLAN?
  • PfBlockerNG for OpenVPN Client Configuration

    5
    0 Votes
    5 Posts
    3k Views
    XentrkX
    @David127: Hi Xentrk. Can you make a screenshot of all general settings and post it here? That would be helpful. What did you choose in DNSBL under DNSBL Listening Interface? Thank you. No problem. Let me know if I can be of further assistance. I recall the days of reading every post in the pfBlockerNG forum before trying to set it up and struggling with getting it working. Hang in there! Regards, Xen [image: pfBlockerNG-General.PNG] [image: pfBlockerNG-General.PNG_thumb] [image: pfBlockerNG-DNSBL.PNG] [image: pfBlockerNG-DNSBL.PNG_thumb]
  • Blocked website help

    2
    0 Votes
    2 Posts
    611 Views
    F
    From the general tab of pfBlockerNG what is the 'Firewall auto rule order' You can ping the domain and get a reponse, does nslookup return the expected address? What does the alerts tab of pfBlockerNG show once you try and visit the website.
  • Data location: Custom Domain Whitelist

    3
    0 Votes
    3 Posts
    948 Views
    P
    Thanks! I realized that too after mucking around and READING lol.  Thanks for the link…I'll figure out how to decode it with a script too if I need it.  It's a minor issue.
  • Rule reordering needs better customization - possibly solved - see reply #8

    10
    0 Votes
    10 Posts
    1k Views
    P
    I'll chime in here.  For me & what I do is: 1 - Have all my BL's on a web server 2 - Make a "whitelist.txt" BL 3 - Add all my IP's and networks to it I want to whitelist.txt 4 - Add the URL and allow it in the ipv4 tab + get it once per hour + move it to the top of the list although I don't think moving it to the top does anything :P 5 - Cront reload Done…now I just manage the single whitelist.txt file and sometime within an hour it gets updated.  I have a substantial list of networks and IP's in that white list now. I believe this even overrules any geo IP / country block in place...it allows it out.
  • DNSBL and mobile apps

    2
    0 Votes
    2 Posts
    1k Views
    a-a-ronA
    So… I've run into this issue a few times. Only solution is to white list the ad sites that Amazon uses, and unfortunately it's not just amazon domains. I will generally tail the log and grep only on the device i'm monitoring. Try these to start... fls-na.amazon.com # amazon app watson.telemetry.microsoft.com # amazon app modern.watson.data.microsoft.com.akadns.net # CNAME for (watson.telemetry.microsoft.com) But basically yeah, what you're doing is the only way...
  • 2.3.4-p1 Breaks PFBlockerNG

    6
    0 Votes
    6 Posts
    1k Views
    T
    Just to confirm that I had the same problem, I disabled PFBlockerNG and did a force reload as RonpfS suggested then enabled it again and all OK now.
  • How to make rules order persistent?

    4
    0 Votes
    4 Posts
    2k Views
    C
    Solution - (worked for me, anyway, needs to be adapted for your situation) I recently had and solved the same problem. I had false positives on a block list. The iblocklist blocked akami as a hijacked site. Hulu was stopped out for me as a result. pfBlockerNG sorted out my alias pass list in the wrong place by only using the drop box with the sort orders. After going back and forth on the forum, I devised my own solution which appears to work well. I put it in another posting in this area, but here's a cut and paste of the relevant part. The key is to move pfBlockerNG into the floating rules section. This causes the LAN and WAN rules to be ignored when pfBlockerNG sorts them out according to the drop box. The only sorting occurs in the floating rules section. Anyway it works for me. You may need to adapt the following a little to match your own situation. Put false positive IP addresses in an alias list Add alias to floating rules as a pass, choose proper interface and direction, check apply immediate box Tell pfBlockerNG to apply all rules as floating rules by checking the box on the general tab Use the dropdown box to tell pfBlockerNG to sort rules with pfsense pass rules first. Reload your rules just to see if they sort out correctly on ALL rule tabs Test Apparently, since pfBlockerNG is told to put everything on floating rules, the rules reordering ignores the LAN and WAN rules. According to pfSense documentation, floating rules execute first. Edit: Removed many iblocklists from pfBlockerNG. No Bluetack lists are updated any longer and hijacked sites was one of them. FireHOL offers several lists. It appears to be a list aggregator. They seem to take pride in staying current. I added a few fireHOL lists. fireHOL also blocks some LAN multicast / broadcast addresses. I used the above technique to put them on a false positive list. I prefer it over pfBlockerNG custom lists because they are immediate. No forced updates required. So - in summary - the hijacked sites list was bad because it was outdated. The problem it created forced me to develop a technique to block false positives. It also, indirectly, prompted me to find better block lists. This technique can be adapted to probably any need for persistent lists to bypass pfBlockerNG reordering that may cause firewall problems.
  • Private Block lists …

    8
    0 Votes
    8 Posts
    1k Views
    C
    https://forum.pfsense.org/index.php?topic=133609.0 I had a similar problem recently and this topic describes it and a possible solution. I'm still testing the fix but it seems to work. The fix for your problem is a simple adaptation of my solution. Good luck.
  • Alert question

    3
    0 Votes
    3 Posts
    834 Views
    N
    @BBcan177: Click on the "i" icon in the Alerts tab to do some research on that domain. Can also Google for "who <domain name="">".</domain> The blocks from Russia and China are ok according to IPVOID but in my permit alert there are entries from the US coming in that are blacklisted.  I have outgoing Russia and China blocked and allow US incoming.  Guess I'll have the fine tune the incoming.  If you have any links on further reading on that topic I would appreciate it.
  • PfBlockerNG Count reset on Widget

    4
    0 Votes
    4 Posts
    1k Views
    BBcan177B
    There should be a trashcan icon beside the Packets Title.
  • Good sites for finding IP, DNS, and adblock formatted lists

    2
    0 Votes
    2 Posts
    1k Views
    T
    Thanks for the suggestion. I tried these out, but the level1 list blocks 192.168.0.0/16, which prevents local traffic. Edit: God, and the webserver one blocked 8.8.8.8, which is Google DNS…
  • Baby Steps to Implement pfBlockerNG

    11
    0 Votes
    11 Posts
    3k Views
    J
    A good source for IP blocklists is http://iplists.firehol.org/ Personally, I use their merged lists since they merge a lot of the actively maintained lists out there: DENY BOTH firehol_level1 firehol_level2 firehol_level3 firehol_proxies firehol_anonymous firehol_level4 (sometimes I've changed this one to be just DENY INBOUND but whatever.
  • Inbound Port Rule above DNSBL

    6
    0 Votes
    6 Posts
    946 Views
    L
    I believe I got it by adding my server's IP address and doing "Inverse" on the rule. Thanks for helping out this newb! :)
  • Blocking TLD's

    4
    0 Votes
    4 Posts
    2k Views
    P
    I'd like to chime in here.  I think the TLD blocking is primarily for "outbound" traffic not inbound.  It's used with unbound DNS resolve. So if you setup your systems like this you can screen nasty TLD's from your end users like this:  (Block TLD:  .top, .party, .ms <– which blocks skype auth, etc)... PC DNS points to DNS server > DNS server DNS forwarder points to PFSense which uses Unbound, checks the TLD and decides > PFSense's DNS looks to your ISP or some other DNS provider like OpenDNS, Comodo, etc. It's mean to protect internal LAN assets not block external ones. NOW...if you want to block external TLD's form your mail server what type of mail server do you have? You can block junk TLD's by parsing your log files or sometimes spam filters like mail cleaner let you just put the TLD's in there.  For POSTFIX you can do it like this:  https://whackersforhackers.com/2017/03/08/tld-blocking-in-postfix-mta/ There are more ways to TLD block BUT I'd suggest not using PFSense and TLD blocking in PFBlocker to do it because that's not what PFBlocker is trying to do here (I don't think with respect to TLD's and how DNSBL works). Good luck!
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.