• Problem PFblockerNG 2.0.17 WAN/LAN

    2
    0 Votes
    2 Posts
    1k Views
    BBcan177B
    If you restored a config from a different box, maybe the interfaces are different in this hardware. Check the interface assignments in pfSense, as the package reads those pfSense settings.
  • PfBlockerNG service not starting but widget showing data

    3
    0 Votes
    3 Posts
    2k Views
    S
    And that's where I went wrong.  I thought that by enabling it on the General Tab that enabled everything.  I should have checked the DNSBL tab since, you know, that's the service that wasn't running.  I guess it's because in my previous build it didn't have the extra options.  Am I correct in seeing that pfBlockerNG General is IP and Region blocking and that the DNSBL blocks based on DNS categories like Advertising?  I guess it's changed a lot since my last setup!  I don't usually do the updates since things tend to break when I do but then I get thrown when there are extra things I'm not expecting.  Good Job!
  • PfB_Top_v4.txt contains bad data

    3
    0 Votes
    3 Posts
    2k Views
    M
    Seemed to work.  Thanks for your speedy reply.
  • Trouble with pfBlockerNG v2.0.17 w/DNSBL

    5
    0 Votes
    5 Posts
    2k Views
    D
    Thanks so much! The more I read the more I realize how little I know.  I'll be doing a gob of reading over the next month.
  • Lists for pfblockerNG

    3
    0 Votes
    3 Posts
    24k Views
    S
    check these threads, have tons of lists https://forum.pfsense.org/index.php?topic=102470.0 https://forum.pfsense.org/index.php?topic=86212.0
  • PfBlockerNG Rules Not Applied to OpenVPN Interface

    5
    0 Votes
    5 Posts
    3k Views
    R
    @BBcan177: Is your OpenVPN a "Server" or "Client" configuration?  Do you want both "Inbound" and "Outbound" auto-rules to be created? I have a fix that will add "Outbound" auto-rules for a OpenVPN "Server" config, and add both "In/Outbound" auto-rules for a "Client" configuration…. Typically, with OpenVPN, you assign an interface in the Interface tab, and it will show in the pfBlockerNG In/Outbound Interface options. The checkbox option, is for some corner-cases where there is no interface assigned and there is no Interface listed in the drop-down menu. My OpenVPN is a server configuration (think "road warrior" setup with mobile clients connecting).  So my use case is that I want to apply the same PFBlockerNG outbound rules I use for local clients to road warrior clients connected through the VPN for ad-blocking and content blocking purposes.  So it sounds like your fix would address my problem.
  • PfBlocker log indicates "FAILED" update to IPv4 list

    5
    0 Votes
    5 Posts
    2k Views
    BBcan177B
    Sent you a PM …
  • PfBlockerNG Alerts page not working in 2.3.2

    5
    0 Votes
    5 Posts
    1k Views
    T
    Looks good on today's snapshot. Thanks Chris!
  • PfBlockerNG rule ordering issue

    4
    0 Votes
    4 Posts
    1k Views
    BBcan177B
    I have been working on some new features, so I will most likely submit it all at once… So it probably won't be for atleast a few more weeks... Been really busy lately...
  • PfBlocker - Prevent rules from re-sorting

    5
    0 Votes
    5 Posts
    1k Views
    S
    I chose the first rule. I also created an alias (pfsense, not pfbng) to allow the particular IP's I want and put that as the first rule. Everything works like a charm for an hour, then the CRON job resorts to the Rule Order. Looks like I can accomplish the same thing through pfbng's alias system.  Wasn't aware that's what the ipv4 and ipv6 tabs were for. btw, the help link on the ipv4 tab is broken (https://<url to="" pfsense="">/help.php?page=/pfblockerng/pfblockerng_v4lists.xml) Thanks for your help - I'll tinker from here until I get it.</url>
  • Pfblockerng and domain lists

    21
    0 Votes
    21 Posts
    10k Views
    L
    Confirmed that the DNSBL VIP will not be accessible when Pfsense is in bridge mode even when the Bridge logical interface is used for DNSBL listening. It works fine in Layer 3 mode and DNSBL alerts are visible.
  • PfBlockerNG Missing .txz

    4
    0 Votes
    4 Posts
    1k Views
    J
    Thank you cmb - you're right it just needed a package list update. Here's to hoping Chinese port scanners never bother me again!
  • 0 Votes
    8 Posts
    2k Views
    P
    Solved, it's a bug, just upgrade to latest version.
  • PfBlockerNG Changing Floating Rule Order

    3
    0 Votes
    3 Posts
    1k Views
    N
    Thanks BBcan177.. That was it. I changed it to: |pfSense Pass/Match | pfB_Pass/Match | pfB_Block/Reject| And it works fine now. I'll look at creating aliases within pfB for my overrides. Thanks again for your help and for your work on this package! Regards, Nate D.
  • Question re pfblockerng

    1
    0 Votes
    1 Posts
    849 Views
    No one has replied
  • Small pfBlockerNG GUI typo

    2
    0 Votes
    2 Posts
    1k Views
    BBcan177B
    :)  I thought I fixed that… Dok mentioned it to me like over a year ago ... Will get that fixed in the next version...
  • PfBlocker service not restarting after cron or manual update.

    6
    0 Votes
    6 Posts
    3k Views
    G
    Once I re-enable it I will report back as to whether or not the service restarts under those conditions. So I got around to enabling DNSBL, and I think I have it working.  ;D  The DNSBL service does indeed remain running now after a CRON or forced update. I did have to add a rule to pass traffic to the DNSBL VIP as you instructed… THANK YOU for that. I do have a question: what should I see in my browser if I navigate to the VIP? All I see is a blank page, but the title bar tells me it is resolved... is that normal? See attached. I would like you to take a look at a sample of the top of my firewall rules (I am a default block guy), and tell me if you see any issues. I wan't sure about my NAT redirect for DNS (as I asked above), so I left it. I also have one VLAN interface where I have the NAT redirect pointing to opendns (my kid's clients), and that seems to still work as well. I am very happy with the adblocking that I see now, and I will be adding to the DNSBL lists as you discussed here: https://forum.pfsense.org/index.php?topic=102470.msg573159#msg573159 Please review the attached sample rule set and let me know if you see any problems with the DNS redirect or otherwise. Thank you so much for your work on this package, and for your help! -Bill [image: 1x1.JPG] [image: 1x1.JPG_thumb] [image: Rules2.JPG] [image: Rules2.JPG_thumb]
  • DNSBL through VPN

    2
    0 Votes
    2 Posts
    1k Views
    I
    I should mention that my VPN is setup as TUN, but all client traffic is forced through the tunnel. Hopefully this will help
  • PfBlockerNG - force rule update after reboot

    3
    0 Votes
    3 Posts
    2k Views
    A
    Thanks.  That would seem the sensible way to go, particularly as someone has very kindly already done a pull request for it. I couldn't see an option for the RAM disk backup/restore in pfBlockerNG itself, so I'm assuming it's always enabled.  If you have the time, I could see a benefit to implementing the DNSBL backup too if only because it seems anomalous to have some of the settings backed up but not all. Thanks for developing pfBlockerNG by the way - it really is a useful and well-used package for pfSense.
  • PfBlockerNG Running? not showing in top: no pid: no error messages

    7
    0 Votes
    7 Posts
    2k Views
    C
    I was trying to see what the process running would be pfBlockerNG that would be seen by top. The process that is running is php. Here is the real. I believe process /usr/local/bin/php -f /usr/local/pkg/pfblockerng/pfblockerng.inc dnsbl. Top would show php as the process. last pid: 18593;  load averages:  0.00,  0.01,  0.00                                                                                up 0+23:14:21  07:14:39 73 processes:  1 running, 72 sleeping CPU:  0.0% user,  0.0% nice,  0.2% system,  0.4% interrupt, 99.4% idle Mem: 104M Active, 383M Inact, 405M Wired, 256K Cache, 407M Buf, 2949M Free Swap: 8192M Total, 8192M Free   PID USERNAME  THR PRI NICE  SIZE    RES STATE  C  TIME    WCPU COMMAND 45366 squid      1  20    0  267M  167M kqread  0  0:14  0.00% squid 42679 unbound    2  20    0 55112K 28476K kqread  1  0:06  0.00% unbound 67172 root        1  52  20 17000K  2392K wait    1  0:05  0.00% sh 54987 squid      1  20    0 37752K  4084K select  1  0:03  0.00% pinger 37883 root        1  20    0  220M 33036K nanslp  0  0:03  0.00% php I was just curious why I could not see a process running. Now I know why. All I know about php that it is one of the scripting languages. Thanks for the information. If I have problems in the future I am able to dig deeper into the problem.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.