Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Block Apps over Wi-Fi (Facebook-Instagram..)

    Scheduled Pinned Locked Moved pfBlockerNG
    22 Posts 3 Posters 6.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      felipepipers
      last edited by

      Firstly, sorry for my English.
      I would like some help with PfBlocker. This package, is it possible to block Social Network Applications by Wi-Fi, on Smartphones? Thanks.

      1 Reply Last reply Reply Quote 0
      • D
        dma_pf
        last edited by

        Yes pfblocker can do this in several ways.

        1. You can use a UTI category (Firewall/pfBlockerNG/DNSBL/DNSBL Category/ and select select Social Networks:

        169c3989-6f31-41ae-a1cd-68c44d6669b1-image.png

        (Don't use the Shallalist...they have discontinued their service)

        1. You can create an IP alias of the ASN's for the different social networks that you want to block. The use the alias in a firewall rule as the destination to block those IP addressed from being reached.

        2. Enable DNSBL and create a DNS Block Group with the domain names (facebook.com, www.facebook.com, etc.) of the networks you want to block.

        Here's a video that explains in more detail how pfblocker works: https://www.youtube.com/watch?v=xizAeAqYde4

        M F 2 Replies Last reply Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @dma_pf
          last edited by

          @dma_pf From the question, it looks like he wants to block social networks by VLAN (subnets). Not for the entire network.
          This is possible within unbound (there is a pinned conversation for that).

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          F 1 Reply Last reply Reply Quote 0
          • F
            felipepipers @dma_pf
            last edited by

            @dma_pf Hi thanks for answer.

            I tryed the first option. But in a Wifi Network, Sites are Block Normally in the browsers, But when i use a Smartphone and i open a App ( Facebook, Instagram), the block dont occur.

            M D 2 Replies Last reply Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @felipepipers
              last edited by

              @felipepipers Are the smartphones using pfsense as their DNS ?

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              F 1 Reply Last reply Reply Quote 0
              • F
                felipepipers @michmoor
                last edited by

                @michmoor @michmoor Hi, thanks for the help.

                I'm not using VLANs. Just one network normally.

                What I need is when a user opens an APP on their smartphone (Facebook, Instagram..) PfBlocker manages to block this access. Testing on the same network (via WiFi), in browsers the blocking occurs correctly but when we open the Apps, it does not.

                1 Reply Last reply Reply Quote 0
                • F
                  felipepipers @michmoor
                  last edited by

                  @michmoor Yes. all via DHCP, correctly, exemple :
                  IP 10.80.2.xx/22
                  GW 10.80.0.1
                  DNS 10.80.0.1

                  The Wi Fi Router is in Access Point Mode. The DHCP is the PfSense.

                  1 Reply Last reply Reply Quote 0
                  • D
                    dma_pf @felipepipers
                    last edited by dma_pf

                    @felipepipers said in Block Apps over Wi-Fi (Facebook-Instagram..):

                    But when i use a Smartphone and i open a App ( Facebook, Instagram), the block dont occur.

                    I don't know for sure if this is the issue, but it might be that those apps are using DOT or DOH to redirect the DNS queries to other providers (8.8.8.8,1.1.1.1, etc.). You could figure that out by doing a packet capture on the smartphone, or log the allowed outbound traffic from your smartphone network then filter the logs for ports 53, 853 and 443. If they redirecting DNS then there might be ways to address that. Let us know what you find out.

                    Also, those apps might be sending traffic out to a hard coded IPs. In that case the UTI option would not work as there would be no DNS lookup...the traffic would be sent right out. In that case you would need to use option 2 and create firewall rules.

                    F M 2 Replies Last reply Reply Quote 0
                    • F
                      felipepipers @dma_pf
                      last edited by felipepipers

                      @dma_pf Of course, I hope to do it correctly.

                      Below

                      %(#1a3e66)[17:39:17.941896 IP 10.80.2.5.49476 > 10.80.0.1.53: UDP, length 33
                      17:39:17.968887 IP 10.80.0.1.53 > 10.80.2.5.49476: UDP, length 96
                      17:39:17.976292 IP 10.80.2.5.51801 > 157.240.12.52.443: UDP, length 1232
                      17:39:17.979722 IP 10.80.2.5.37642 > 157.240.12.52.443: tcp 0
                      17:39:18.000014 IP 157.240.12.52.443 > 10.80.2.5.51801: UDP, length 1232
                      17:39:18.002059 IP 157.240.12.52.443 > 10.80.2.5.51801: UDP, length 1232
                      17:39:18.002132 IP 157.240.12.52.443 > 10.80.2.5.51801: UDP, length 1232
                      17:39:18.002167 IP 157.240.12.52.443 > 10.80.2.5.51801: UDP, length 1232
                      17:39:18.002385 IP 157.240.12.52.443 > 10.80.2.5.51801: UDP, length 1033
                      17:39:18.002458 IP 157.240.12.52.443 > 10.80.2.5.51801: UDP, length 56
                      17:39:18.006260 IP 157.240.12.52.443 > 10.80.2.5.37642: tcp 0
                      17:39:18.008229 IP 10.80.2.5.37642 > 157.240.12.52.443: tcp 0
                      17:39:18.013969 IP 10.80.2.5.51801 > 157.240.12.52.443: UDP, length 45
                      17:39:18.029222 IP 10.80.2.5.37642 > 157.240.12.52.443: tcp 218
                      17:39:18.029346 IP 10.80.2.5.51801 > 157.240.12.52.443: UDP, length 85
                      17:39:18.029347 IP 10.80.2.5.51801 > 157.240.12.52.443: UDP, length 73
                      17:39:18.050633 IP 157.240.12.52.443 > 10.80.2.5.51801: UDP, length 42
                      17:39:18.050640 IP 157.240.12.52.443 > 10.80.2.5.51801: UDP, length 84
                      17:39:18.050712 IP 157.240.12.52.443 > 10.80.2.5.51801: UDP, length 26
                      17:39:18.051011 IP 157.240.12.52.443 > 10.80.2.5.51801: UDP, length 250
                      17:39:18.055308 IP 157.240.12.52.443 > 10.80.2.5.37642: tcp 0
                      17:39:18.056624 IP 10.80.2.5.51801 > 157.240.12.52.443: UDP, length 35
                      17:39:18.056868 IP 157.240.12.52.443 > 10.80.2.5.37642: tcp 1380
                      17:39:18.056939 IP 157.240.12.52.443 > 10.80.2.5.37642: tcp 1380
                      17:39:18.056941 IP 157.240.12.52.443 > 10.80.2.5.37642: tcp 734
                      17:39:18.059929 IP 10.80.2.5.37642 > 157.240.12.52.443: tcp 0
                      17:39:18.060977 IP 10.80.2.5.37642 > 157.240.12.52.443: tcp 0
                      17:39:18.061100 IP 10.80.2.5.37642 > 157.240.12.52.443: tcp 0
                      17:39:18.068071 IP 10.80.2.5.37642 > 157.240.12.52.443: tcp 64
                      17:39:18.072308 IP 10.80.2.5.51801 > 157.240.12.52.443: UDP, length 1232
                      17:39:18.072431 IP 10.80.2.5.51801 > 157.240.12.52.443: UDP, length 620
                      17:39:18.093549 IP 157.240.12.52.443 > 10.80.2.5.37642: tcp 0
                      17:39:18.094099 IP 157.240.12.52.443 > 10.80.2.5.37642: tcp 182
                      17:39:18.094274 IP 157.240.12.52.443 > 10.80.2.5.37642: tcp 80
                      17:39:18.094350 IP 157.240.12.52.443 > 10.80.2.5.51801: UDP, length 32
                      17:39:18.116787 IP 10.80.2.5.37642 > 157.240.12.52.443: tcp 0
                      17:39:18.117802 IP 10.80.2.5.51801 > 157.240.12.52.443: UDP, length 954
                      17:39:18.139522 IP 157.240.12.52.443 > 10.80.2.5.51801: UDP, length 31
                      17:39:18.141482 IP 10.80.2.5.51801 > 157.240.12.52.443: UDP, length 35
                      17:39:18.250613 IP 10.80.2.5.42379 > 10.80.0.1.53: UDP, length 34
                      17:39:18.250709 IP 10.80.0.1.53 > 10.80.2.5.42379: UDP, length 74
                      17:39:18.254432 IP 10.80.2.5.34464 > 157.240.12.13.443: tcp 0
                      17:39:18.258263 IP 10.80.2.5.47670 > 157.240.12.35.443: tcp 0
                      17:39:18.269797 IP 10.80.2.5.47534 > 157.240.12.13.443: UDP, length 1232
                      17:39:18.273434 IP 10.80.2.5.34468 > 157.240.12.13.443: tcp 0
                      17:39:18.277222 IP 10.80.2.5.47674 > 157.240.12.35.443: tcp 0
                      17:39:18.279693 IP 157.240.12.35.443 > 10.80.2.5.47670: tcp 0
                      17:39:18.280724 IP 157.240.12.13.443 > 10.80.2.5.34464: tcp 0
                      17:39:18.282448 IP 10.80.2.5.47670 > 157.240.12.35.443: tcp 0
                      17:39:18.283610 IP 10.80.2.5.34464 > 157.240.12.13.443: tcp 0
                      17:39:18.285786 IP 10.80.2.5.47670 > 157.240.12.35.443: tcp 407
                      17:39:18.288802 IP 10.80.2.5.41501 > 10.80.0.1.53: UDP, length 36
                      17:39:18.288890 IP 10.80.0.1.53 > 10.80.2.5.41501: UDP, length 81
                      17:39:18.290077 IP 10.80.2.5.34464 > 157.240.12.13.443: tcp 405
                      17:39:18.297160 IP 157.240.12.13.443 > 10.80.2.5.47534: UDP, length 1232
                      17:39:18.298037 IP 157.240.12.13.443 > 10.80.2.5.47534: UDP, length 1232
                      17:39:18.298113 IP 157.240.12.13.443 > 10.80.2.5.47534: UDP, length 169
                      17:39:18.298121 IP 157.240.12.13.443 > 10.80.2.5.47534: UDP, length 55
                      17:39:18.298948 IP 157.240.12.13.443 > 10.80.2.5.34468: tcp 0
                      17:39:18.301927 IP 157.240.12.35.443 > 10.80.2.5.47674: tcp 0
                      17:39:18.304932 IP 10.80.2.5.34468 > 157.240.12.13.443: tcp 0
                      17:39:18.305054 IP 10.80.2.5.47674 > 157.240.12.35.443: tcp 0
                      17:39:18.306722 IP 157.240.12.35.443 > 10.80.2.5.47670: tcp 0
                      17:39:18.307177 IP 157.240.12.35.443 > 10.80.2.5.47670: tcp 212
                      17:39:18.307978 IP 10.80.2.5.47534 > 157.240.12.13.443: UDP, length 1232
                      17:39:18.308147 IP 10.80.2.5.47670 > 157.240.12.35.443: tcp 0
                      17:39:18.316059 IP 157.240.12.13.443 > 10.80.2.5.34464: tcp 0
                      17:39:18.316347 IP 10.80.2.5.59157 > 10.80.0.1.53: UDP, length 38
                      17:39:18.316369 IP 10.80.0.1.53 > 10.80.2.5.59157: UDP, length 83
                      17:39:18.316450 IP 157.240.12.13.443 > 10.80.2.5.34464: tcp 212
                      17:39:18.317685 IP 10.80.2.5.34468 > 157.240.12.13.443: tcp 407
                      17:39:18.326146 IP 10.80.2.5.34464 > 157.240.12.13.443: tcp 0
                      17:39:18.326358 IP 10.80.2.5.47674 > 157.240.12.35.443: tcp 409
                      17:39:18.326359 IP 10.80.2.5.47534 > 157.240.12.13.443: UDP, length 84
                      17:39:18.326489 IP 10.80.2.5.47534 > 157.240.12.13.443: UDP, length 72
                      17:39:18.326491 IP 10.80.2.5.47670 > 157.240.12.35.443: tcp 64
                      17:39:18.326492 IP 10.80.2.5.34464 > 157.240.12.13.443: tcp 64
                      17:39:18.342847 IP 157.240.12.13.443 > 10.80.2.5.34468: tcp 0
                      17:39:18.342970 IP 157.240.12.13.443 > 10.80.2.5.34468: tcp 212
                      17:39:18.343898 IP 10.80.2.5.34468 > 157.240.12.13.443: tcp 0
                      17:39:18.345520 IP 10.80.2.5.34468 > 157.240.12.13.443: tcp 64
                      17:39:18.347036 IP 157.240.12.35.443 > 10.80.2.5.47670: tcp 0
                      17:39:18.347528 IP 157.240.12.35.443 > 10.80.2.5.47670: tcp 179
                      17:39:18.347765 IP 157.240.12.35.443 > 10.80.2.5.47670: tcp 80
                      17:39:18.348808 IP 10.80.2.5.47670 > 157.240.12.35.443: tcp 0
                      17:39:18.350849 IP 157.240.12.35.443 > 10.80.2.5.47674: tcp 0
                      17:39:18.350949 IP 157.240.12.35.443 > 10.80.2.5.47674: tcp 212
                      17:39:18.351849 IP 157.240.12.13.443 > 10.80.2.5.34464: tcp 0
                      17:39:18.351899 IP 10.80.2.5.47674 > 157.240.12.35.443: tcp 0
                      17:39:18.352270 IP 157.240.12.13.443 > 10.80.2.5.47534: UDP, length 42
                      17:39:18.352340 IP 157.240.12.13.443 > 10.80.2.5.47534: UDP, length 84
                      17:39:18.352374 IP 157.240.12.13.443 > 10.80.2.5.47534: UDP, length 26
                      17:39:18.352543 IP 157.240.12.13.443 > 10.80.2.5.47534: UDP, length 247
                      17:39:18.352622 IP 157.240.12.13.443 > 10.80.2.5.34464: tcp 179
                      17:39:18.352716 IP 157.240.12.13.443 > 10.80.2.5.34464: tcp 80
                      17:39:18.353532 IP 10.80.2.5.47674 > 157.240.12.35.443: tcp 64
                      17:39:18.354510 IP 10.80.2.5.34464 > 157.240.12.13.443: tcp 0
                      17:39:18.355204 IP 10.80.2.5.47534 > 157.240.12.13.443: UDP, length 35
                      17:39:18.370087 IP 157.240.12.13.443 > 10.80.2.5.34468: tcp 0
                      17:39:18.370496 IP 157.240.12.13.443 > 10.80.2.5.34468: tcp 179]

                      Note:
                      The Host 10.80.2.5 is my Smartphone.

                      Test: First iplay the capture.
                      Open The Instagram APP
                      Close Instagram APP
                      Open Facebook APP
                      Stop the capture.

                      D 1 Reply Last reply Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @dma_pf
                        last edited by

                        @dma_pf agreed on this. Doh/DoT might be in play. You can still block both of those with pfblocker.

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        D 1 Reply Last reply Reply Quote 2
                        • D
                          dma_pf @felipepipers
                          last edited by dma_pf

                          This:

                          17:39:17.941896 IP 10.80.2.5.49476 > 10.80.0.1.53: UDP, length 33
                          17:39:17.968887 IP 10.80.0.1.53 > 10.80.2.5.49476: UDP, length 96

                          and this:

                          17:39:18.316347 IP 10.80.2.5.59157 > 10.80.0.1.53: UDP, length 38
                          17:39:18.316369 IP 10.80.0.1.53 > 10.80.2.5.59157: UDP, length 83

                          are definitely DNS queries by your smartphone.

                          The question is why aren't the being blocked by the UTI list? We won't know for sure unless you look at the packets in wireshark which will show what the domain was that the app queried. It could be that the app is doing DNS query to some CNAME that is not in the UTI list.

                          Are you using pfblocker in python mode? If so try enabling this setting in Firewall/pfBlockerNG/DNSBL:

                          e10d2957-2d44-41fa-b87c-445967439f0d-image.png

                          Then do a Force/Reload of pfblocker and see if they are then blocked.

                          F 3 Replies Last reply Reply Quote 1
                          • D
                            dma_pf @michmoor
                            last edited by

                            @michmoor said in Block Apps over Wi-Fi (Facebook-Instagram..):

                            Doh/DoT might be in play. You can still block both of those with pfblocker.

                            Definitely!

                            1 Reply Last reply Reply Quote 1
                            • F
                              felipepipers @dma_pf
                              last edited by

                              @dma_pf said in Block Apps over Wi-Fi (Facebook-Instagram..):

                              This:

                              17:39:17.941896 IP 10.80.2.5.49476 > 10.80.0.1.53: UDP, length 33
                              17:39:17.968887 IP 10.80.0.1.53 > 10.80.2.5.49476: UDP, length 96

                              and this:

                              17:39:18.316347 IP 10.80.2.5.59157 > 10.80.0.1.53: UDP, length 38
                              17:39:18.316369 IP 10.80.0.1.53 > 10.80.2.5.59157: UDP, length 83

                              are definitely DNS queries by your smartphone.

                              The question is why aren't the being blocked by the UTI list? We won't know for sure unless you look at the packets in wireshark which will show what the domain was that the app queried. It could be that the app is doing DNS query to some CNAME that is not in the UTI list.

                              Are you using pfblocker in python mode? If so try enabling this setting in Firewall/pfBlockerNG/DNSBL:

                              e10d2957-2d44-41fa-b87c-445967439f0d-image.png

                              Then do a Force/Reload of pfblocker and see if they are then blocked.

                              1 Reply Last reply Reply Quote 0
                              • F
                                felipepipers @dma_pf
                                last edited by

                                @dma_pf Yes, the PFBL is using Python mode. I will do what you indicated. I'll try to capture by Wireshark and post here as soon as possible.

                                1 Reply Last reply Reply Quote 0
                                • F
                                  felipepipers @dma_pf
                                  last edited by felipepipers

                                  @dma_pf said in Block Apps over Wi-Fi (Facebook-Instagram..):

                                  This:

                                  17:39:17.941896 IP 10.80.2.5.49476 > 10.80.0.1.53: UDP, length 33
                                  17:39:17.968887 IP 10.80.0.1.53 > 10.80.2.5.49476: UDP, length 96

                                  and this:

                                  17:39:18.316347 IP 10.80.2.5.59157 > 10.80.0.1.53: UDP, length 38
                                  17:39:18.316369 IP 10.80.0.1.53 > 10.80.2.5.59157: UDP, length 83

                                  are definitely DNS queries by your smartphone.

                                  The question is why aren't the being blocked by the UTI list? We won't know for sure unless you look at the packets in wireshark which will show what the domain was that the app queried. It could be that the app is doing DNS query to some CNAME that is not in the UTI list.

                                  Are you using pfblocker in python mode? If so try enabling this setting in Firewall/pfBlockerNG/DNSBL:

                                  e10d2957-2d44-41fa-b87c-445967439f0d-image.png

                                  Then do a Force/Reload of pfblocker and see if they are then blocked.


                                  I'll post the results of the tests I did here.

                                  First, the following screen is from Wireshark (PfSense Packet Capture).:
                                  WSRK_Instagram.png

                                  The second is the DNSBL Real Time (Alerts and Unified) screen:
                                  PFBL_RealTimeReport01.png PFBL_RealTimeReport02.png

                                  The last one is DNSBL settings:
                                  dnsbl_conf.png

                                  Thanks

                                  D 1 Reply Last reply Reply Quote 0
                                  • D
                                    dma_pf @felipepipers
                                    last edited by

                                    @felipepipers Sorry for my delay in getting back to you. I had a very busy evening last night.

                                    I looked over the items in your last post and I have to admit that I'm at a loss of what is happening. The wireshark capture clearly shows that dns requests are being routed to pfsense. I don't see anything that would lead me to believe that this is a DOT or DOH issue. In you packet capture the dns query was asking for the IP address of i.instagram.com.

                                    i.instagram.com is not in the UT1 Social Networks list. It is possible that the dns request might not have gotten caught by a TLD block and therefore the DNS request succeeded thereby providing an IP address to the app. Once that would happen then traffic would be routed using the IP address and (unless there was an IP block rule in the firewall rules) with that Ip address then traffic would continue to instagram.

                                    Can your try this for me? In pfsense go to Diagnostics/DNS Lookup and do a lookup for instagram.com and i.instagram.com. Let me know the results you get, and check the alerts tab in pfblocker and let me know what you see there.

                                    Also, what other lists do you have activated (IP or DNSBL)? I see that there is a Feed/Group in the Alerts picture that you posted called DNS_TLD. What is that?

                                    I'm assuming that the blocked alerts you posted are all from using the browser on the phone. Is that correct, or are you seeing some things blocked in the app?

                                    F 1 Reply Last reply Reply Quote 0
                                    • F
                                      felipepipers @dma_pf
                                      last edited by

                                      @dma_pf said in Block Apps over Wi-Fi (Facebook-Instagram..):

                                      @felipepipers Sorry for my delay in getting back to you. I had a very busy evening last night.

                                      No problem my friend. You are helping me very much.

                                      I looked over the items in your last post and I have to admit that I'm at a loss of what is happening. The wireshark capture clearly shows that dns requests are being routed to pfsense. I don't see anything that would lead me to believe that this is a DOT or DOH issue. In you packet capture the dns query was asking for the IP address of i.instagram.com.

                                      Ok, understud

                                      i.instagram.com is not in the UT1 Social Networks list. It is possible that the dns request might not have gotten caught by a TLD block and therefore the DNS request succeeded thereby providing an IP address to the app. Once that would happen then traffic would be routed using the IP address and (unless there was an IP block rule in the firewall rules) with that Ip address then traffic would continue to instagram.

                                      Can your try this for me? In pfsense go to Diagnostics/DNS Lookup and do a lookup for instagram.com and i.instagram.com. Let me know the results you get, and check the alerts tab in pfblocker and let me know what you see there.

                                      Here

                                      25851adb-a806-4572-845e-101953879433-image.png

                                      And i.instagram.com
                                      16e02af9-ec31-46db-94b6-94da37903662-image.png

                                      Also, what other lists do you have activated (IP or DNSBL)? I see that there is a Feed/Group in the Alerts picture that you posted called DNS_TLD. What is that?

                                      I Believe this is the List of DNSBL ( TLD) Domains. Im using in this moment.

                                      Below my settings from my PfBlocker.

                                      d375e07f-95eb-4945-b4a7-899de78e2549-image.png
                                      15f504c4-4bb1-47fa-a614-5af0139b8368-image.png
                                      b9d0df3f-c029-4788-bd78-49fa0520dec7-image.png
                                      bb8da970-64ff-4815-ac97-547f554ad3ca-image.png
                                      dc219d84-f074-487a-aac7-0300ab0a04a1-image.png
                                      8d7e1042-cc79-4b88-b51b-167a064e60a5-image.png
                                      c7ed0abe-5b33-4275-8bd5-89341afb1732-image.png 4a9ddf87-ca76-4fd6-9ca1-660706daab83-image.png

                                      I'm assuming that the blocked alerts you posted are all from using the browser on the phone. Is that correct, or are you seeing some things blocked in the app?
                                      No. I wiil sent here screen from my smartphone, using Vysor to extend the screen to Desktop to be possible to me do prints for send here.

                                      Updating:
                                      I'd like to report something that got me a little excited. Last night, I did some tests on mobile and monitoring pFsense (DNSBL).

                                      After enabling again what you told me, (CNAME validation), and along with this, the DNSBL blacklist (in the answer further up the screen), the behavior of pFblocker has changed positively. Apps opened, but Feed, videos and chat were not loaded! Voila! (is that right?) But no lock screen or error like in browsers, but at least it doesn't load the APPS anymore. On facebook, in Videos, it showed an image of "No internet connection".

                                      Below is the smartphone screens, in the test I did just now to show you: But this time, after I cleared ALL the Cache and saved data, I opened the Apps, one at a time and monitoring the logs in PfBlocker. The evidence follows in the images:
                                      FaceAPP_Cache2.PNG !
                                      instaAPP_Cache1.PNG

                                      FAceAPP_IN_Blocked.PNG "Failed to entry"

                                      Log_BLlock_Face.PNG

                                      InstagramAPP_In.PNG
                                      InstagramAPP_In.PNG

                                      Sorry for the long post, but I'm trying to be as detailed as possible, so I don't make mistakes and also help friends.

                                      I await your analysis. Thank you!

                                      D 1 Reply Last reply Reply Quote 0
                                      • D
                                        dma_pf @felipepipers
                                        last edited by

                                        @felipepipers I'm glad you got it working. It appears to me like something was not reloaded properly, or some DNS entries were cached, or there were some active states that messed up the blocking. With your playing around and reloading things you must have cleared up whatever it was. Your clearly blocking the DNS requests now as you can see from you DNS lookups that did not return an IP address.

                                        There may be other domains that are not in your TLD Blacklists that could also reach out to Facebook/Instagram. Here is a list you can look at: https://raw.githubusercontent.com/jmdugan/blocklists/master/corporations/facebook/all

                                        You could add additional TLD from that list in your TLD blacklist. Or in the alternative you could create a DNSBL Group with that list as a feed and then move your TLD domains from the TLD Blacklist to the DNSBL Custom_List like this:

                                        f6a86323-0d28-46fb-8673-b289c817b594-image.png

                                        Now keep in mind that this will only block traffic which is trying to reach facebook by using a domain name. It is still possible that someone could try to reach facebook by using an IP to route the traffic. If you are concerned about that you would need to create an IP alias and then use that alias in a firewall rule to block traffic like this:

                                        IP Alias Setup
                                        2f50eebe-3779-496c-a75c-c3e494ecb451-image.png

                                        Firewall Rule
                                        a9caaad1-d862-4e2b-b8de-bf83be833342-image.png

                                        F 1 Reply Last reply Reply Quote 1
                                        • F
                                          felipepipers @dma_pf
                                          last edited by

                                          @dma_pf said in Block Apps over Wi-Fi (Facebook-Instagram..):

                                          https://raw.githubusercontent.com/jmdugan/blocklists/master/corporations/facebook/all

                                          First, thanks for your help and suggestions below. I will study about it.

                                          About the functioning of my pfblocker, I still have some doubts. When opening the APP as you can see in the images I sent, it opens the app but does not update.

                                          Is this behavior normal?

                                          Another question, taking advantage of this topic: Is it possible to customize the DNSBL lock screen on desktop sites?

                                          1 Reply Last reply Reply Quote 0
                                          • D
                                            dma_pf
                                            last edited by

                                            @felipepipers said in Block Apps over Wi-Fi (Facebook-Instagram..):

                                            About the functioning of my pfblocker, I still have some doubts. When opening the APP as you can see in the images I sent, it opens the app but does not update.

                                            That would be the expected behavior if you block the app from communicating with facebook's servers. It wouldn't be able to update.

                                            Pfblocker can't prevent the app from opening. What it will do is prevent the app from communicating with any server that is blocked by either a DNS Blocklist (including TLDs) or IP firewall rules using an IP alias. Think of the app as a browser. It can start up but pfblocker would then prevent it from surfing to facebook (obviously, as long as the phone is connected to your network).

                                            @felipepipers said in Block Apps over Wi-Fi (Facebook-Instagram..):

                                            Another question, taking advantage of this topic: Is it possible to customize the DNSBL lock screen on desktop sites?

                                            I'm assuming you mean the page that gets displayed when a site is blocked. If so:

                                            1a041f32-e7ec-4222-a24e-5ec481ab1021-image.png

                                            You can modify the existing file above or create a new page and upload it to the folder indicated above. Keep in mind that those pages only work for HTTP connections. If the site is encrypted, HTTPS, then that page cannot be displayed. The viewer will see an error message from the browser.

                                            F 1 Reply Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.