• pfBlockerNG fills pfsense config history

    4
    2 Votes
    4 Posts
    1k Views
    L

    I've filed a bug report with a potential patch:
    https://redmine.pfsense.org/issues/14409

  • DNSBL Wildcard TLD Domain Count Limit Setting

    1
    0 Votes
    1 Posts
    258 Views
    No one has replied
  • pfBlocker country Aliases

    1
    0 Votes
    1 Posts
    206 Views
    No one has replied
  • Detect blocked IP / Exceptions/Whitelist

    3
    0 Votes
    3 Posts
    382 Views
    J

    @nollipfsense

    Hello and thank you for your reply.

    The access is from outside via an IP address to an internal client. (Nat)

  • pfBlockerNG wildcard blocking implementation is wack ?

    4
    0 Votes
    4 Posts
    1k Views
    NollipfSenseN

    @emikaadeo Had the impression you created the post on Reddit. Whenever there is a design implementation and one ask why, one should immediately ask oneself, why not. I see no issue(s) with how it's done. If I were those maintainers, I would directly ask BBcan177 instead of publicly claiming it's wack as well as share how they would do it differently...simple respect, isn't it?

  • How to block web site, simple step by step

    20
    0 Votes
    20 Posts
    3k Views
    andrzejlsA

    @johnpoz Of course, it is just a "test" :) hahaha. I am also testing cbs,nbc, and other main stream media.

  • IP Block Stats Empty

    1
    0 Votes
    1 Posts
    292 Views
    No one has replied
  • pfBlockerNG CA export or custom cert

    1
    0 Votes
    1 Posts
    245 Views
    No one has replied
  • Failure when starting pfb_dnsbl service

    11
    2 Votes
    11 Posts
    2k Views
    M

    @bigsy said in Failure when starting pfb_dnsbl service:

    @cmcdonald Working for me now on 23.05-RC (lighttpd: 1.4.69 -> 1.4.69_1). Many thanks!

    Same here.

  • pfAllower? 185.156.72.32

    1
    0 Votes
    1 Posts
    271 Views
    No one has replied
  • GeoIP Rules Missing

    21
    0 Votes
    21 Posts
    3k Views
    S

    @spyderturbo007 Can you post one update attempt from your pfblockerng.log log file? (pfB/Logs tab)

  • Regex logs

    11
    0 Votes
    11 Posts
    1k Views
    S

    I went through and re-organized my list, strengthened the character sets on a few hundred lines to combine and eliminate others and added a few, de-duplicated what was left, so far no errors on either box. All was gathered from through the communities, slightly tweaked, and here for any whom want to use, test, or improve upon. pfSene pfBlockerng regex list 5-4-23.txt

  • disable reverse lookups (PTR) and some odd dns

    2
    0 Votes
    2 Posts
    878 Views
    D

    I hoped there was a configuration setting in pfblocker to disable reverse lookups and repeat lookups, but it has been a while since I posted to the forums and there have been no replies, so I assume there is not.

    I created a workaround because I enjoy tinkering, but, unless you have my same use case, there is no reason to take this route. Please just stick with PFBlocker.

    That said, I uninstalled pfblocker and did the following...

    [1] get the priority 1 threat lists
    [2] normalize the output and put it on a webserver
    [3] use a pfsense firewall alias and fetch it as a URL table [gui]
    [4] update this to hourly on pfsense cron [cli]
    [5] change the file time hourly [cli]
    [6] create firewall rules to block using this alias [gui]

    NOTE: I used a debian linux machine for steps 1-2 (because I already had it generating other URL lists and it was just easier to do it there). Steps 3-6 are done on the pfsense.

    I had fun doing it and I learned a few things about how pfsense works in the process. If you want the details of how I did it in case you need to do something similar, then read on. Otherwise, this forum post is probably done.

    Cheers

    [STEP 1] script 1 (feedlist-fetch.sh)

    #!/bin/bash # start in the right place cd /home/donutjustice/PFSENSE-scripts/quietblocker/ # get the lists curl -s https://feodotracker.abuse.ch/downloads/ipblocklist_recommended.txt > ips-feodo.txt curl -s https://sslbl.abuse.ch/blacklist/sslipblacklist.txt > ips-sslbl.txt curl -s https://cinsarmy.com/list/ci-badguys.txt > ips-cinsarmy.txt curl -s https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt > ips-ET-emerging.txt curl -s https://rules.emergingthreats.net/blockrules/compromised-ips.txt > ips-ET-compromised.txt curl -s https://isc.sans.edu/block.txt > ips-isc-block.txt curl -s https://www.spamhaus.org/drop/drop.txt > ips-spamhaus-drop.txt curl -s https://www.spamhaus.org/drop/edrop.txt > ips-spamhaus-edrop.txt curl -L -s https://talosintelligence.com/documents/ip-blacklist > ips-talos.txt

    [STEP 2] script 2 (quietblocker.sh)

    #!/bin/bash # # threat feed data cleanup # copy to web server # # grab data from all the lists cd /home/donutjustice/PFSENSE-scripts/quietblocker/ `/home/donutjustice/PFSENSE-scripts/quietblocker/feedlist-fetch.sh` sleep 35 # cleanup the output cat ips-cinsarmy.txt > BUILD.txt cat ips-ET-compromised.txt >> BUILD.txt cat ips-talos.txt >> BUILD.txt grep -v \# ips-ET-emerging.txt >> BUILD.txt grep -v \# ips-feodo.txt >> BUILD.txt grep -v \# ips-sslbl.txt >> BUILD.txt grep -v '^;' ips-spamhaus-drop.txt | cut -d\; -f1 >> BUILD.txt grep -v '^;' ips-spamhaus-edrop.txt| cut -d\; -f1 >> BUILD.txt grep -v \# ips-isc-block.txt | awk -F '\t' '{ print $1 "/24" }' >> BUILD.txt # move it to the local webserver cat BUILD.txt | sort -u > /var/www/html/quietblocker/quietblocker.html

    This script is run hourly on the debian box. It runs 5 minutes before pfsense grabs the URL to ensure the threatlist is fresh.

    The local crontab looks like this:

    25 * * * * /home/donutjustice/PFSENSE-scripts/quietblocker/quietblocker.sh

    [STEP 3] In the gui set pfsense firewall alias to fetch the URL. I named mine "quietblocker" (relevant in step 5 where this becomes quietblocker.txt. If you name yours something different, just make sure it matches in step 5.) and the URL looks like this

    http://10.1.1.100/quietblocker/quietblocker.html /1

    [STEP 4] ssh to pfsense and edit /etc/crontab

    EDIT the "urltables" line from a 12 to a *. It should look like this

    30 * * * * root /usr/bin/nice -n20 /etc/rc.update_urltables

    [STEP 5] keep editing /etc/crontab (just like step 4)

    ADD a new crontab line (I suggest below the urltables). It should look like this.

    35 * * * * root /usr/bin/touch -t 1001011230 /var/db/aliastables/quietblocker.txt

    This step is necessary because the urltables script checks the timestamp on the file and won't update anything less than 1 day old. This just changes the date, so it is always old enough. I preferred this method to monkeying with the urltables script.

    [STEP 6] Now create firewall rules to meet your needs using this firewall alias.

  • PfBlockerNG block second switch

    5
    0 Votes
    5 Posts
    755 Views
    S

    @nickyw To control where rules are created, on Firewall/pfBlockerNG/IP under Inbound Firewall Rules (or Outbound) select both WAN interfaces.

    re: Alias Native, on Firewall/pfBlockerNG/IP/IPv4 open your entry and for Action choose Alias Native. That will create an alias but create no rules. Then you can create whatever rules you want in any order using that alias.

  • PF Sense, AD Blocker Help

    Moved
    8
    0 Votes
    8 Posts
    680 Views
    S

    @johnpoz Where do i find a list for YT etc?

  • Country vs Registered country

    21
    0 Votes
    21 Posts
    3k Views
    P

    @nogbadthebad

    Interesting, yes that would allow me to use all Mulvad's IP's to go through the firewall, thanks.

    I did a feature request here: https://redmine.pfsense.org/issues/14324

    Pierre

  • pfBlocker-NG-devel 3.2.0_3 not uninstalling on 23.01

    17
    0 Votes
    17 Posts
    3k Views
    M

    @lohphat Very cool.

  • PFBlockerng 3.2.0.4 and Wireguard and OpenVPN

    1
    0 Votes
    1 Posts
    366 Views
    No one has replied
  • "Your connection is not private" issue

    10
    0 Votes
    10 Posts
    916 Views
    N

    @netboy Another observation...

    I connect my iphone to wifi 172 subnet.

    Type https://www.cnn.com get "your connection is not private"...

    Turn off wifi and use the data plan that comes with my phone

    Connect to https://www.cnn.com connects like a charm

    I am going to assume this has something to do with my pfsense router....100%

    Now I connect my iphone to wifi 192 subnet and it works like a charm..

    Remember I have made ZERO changes to my router

    I am happy to troubleshoot if somebody can help me

    I "disabled" pfblockerNG and I get the same symptoms...So it appears it has to do with pfsense rather than pfblockerNG? Not sure

    SOLVED!! Nothing to do with pfsense.....I had a wifi repeater for 172 network...(nokia router in bridge mode) - rebooted it and everything worked fine......

    Close this thread please

  • VPN IP list

    4
    0 Votes
    4 Posts
    3k Views
    P

    @katinatez Thanks. That worked well.

    Ejrv_PPNv4_v4 upload.jpg

    I now have a text file with all the IP addresses in it "Ejrv_VPNv4_v4.orig" which I renamed "Ejrv_VPNv4_v4.txt". I assume not I should be able to reload this in topfBlocker if required. Ejrv_VPNv4_v4.txt

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.