Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Where to submit need feed for pfBlockerNG

    Scheduled Pinned Locked Moved pfBlockerNG
    15 Posts 4 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      Patch
      last edited by

      @shoulders said in Where to submit need feed for pfBlockerNG:

      https://github.com/dibdot/DoH-IP-blocklists

      @nollipfsense said in Where to submit need feed for pfBlockerNG:

      pfBlockerNG menu, you'll find it

      I run pfBlockerNG-devel v3.1.0_4 under pfsense v2.6.0
      Looking in
      pfsense -> Firewall -> pfBlockerNG -> Feeds
      I can find IPv4, IPv6, DNSBL feeds for DoH but none appear to use github.com/dibdot

      Is there somewhere else I'm suppose to look?

      S NollipfSenseN 2 Replies Last reply Reply Quote 0
      • S
        shoulders @Patch
        last edited by shoulders

        @patch

        I know how to add a custom feed 😄 but thanks for the clear answer.

        I want to get this feed added as a list within the pfBlockerNG package under the Alias/Group DoH and not a custom group.

        This list is bigger than the others and updated more recently.

        These are examples of Pre-rolled Alias/Groups under the feeds TAB.

        • Cryptojackers
        • DNS_6
        • EaslyList
        • Firebog_Malicious
        • DoH (which has 'The Great Wall', 'Bambenek Consulting', 'Dallas Haselhorst.)

        I might look at https://redmine.pfsense.org/issues

        This is also so other people can benefit.

        NogBadTheBadN P 2 Replies Last reply Reply Quote 0
        • NogBadTheBadN
          NogBadTheBad @shoulders
          last edited by

          @shoulders

          Here:-

          https://www.reddit.com/r/pfBlockerNG/

          Andy

          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

          1 Reply Last reply Reply Quote 1
          • S
            shoulders
            last edited by

            I have just also done some feature request for these at https://redmine.pfsense.org/issues

            1 Reply Last reply Reply Quote 0
            • P
              Patch @shoulders
              last edited by

              @shoulders said in Where to submit need feed for pfBlockerNG:

              I know how to add a custom feed

              Sorry about being cryptic, that post was not aimed at you as you had already said that is what you have done but rather addressing

              @nollipfsense said in Where to submit need feed for pfBlockerNG:

              If you explore the pfBlockerNG menu, you'll find it...no one will hold you hands and lead you to the promised land.

              @shoulders said in Where to submit need feed for pfBlockerNG:

              I have just also done some feature request for these at https://redmine.pfsense.org/issues

              That is unlikely to achieve your aims.

              • The default feeds in pfBlockerNG-devel are in pfBlockerNG-devel not pfsense.

              • To identify required changes in pfsense use https://redmine.pfsense.org/issues

              • Changes to pfBlockerNG-devel are done by the pfBlockerNG-devel developer BBcan177

              • I do not know how the github.com/dibdot feed compares to those already included in pfBlockerNG-devel nor what criterion BBcan177 uses when selecting feeds to include.

              1 Reply Last reply Reply Quote 1
              • NollipfSenseN
                NollipfSense @Patch
                last edited by

                @patch said in Where to submit need feed for pfBlockerNG:

                s there somewhere else I'm suppose to look?

                I am not at my machine presently to take a screen shot; however, there is no DOH list or a need for such list. Why, cause if one configures one's pfSense to be the only source to resolve DNS, then all that's need in pfBlockerNG is to turn on "don't allow DoH."

                pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                S 1 Reply Last reply Reply Quote 0
                • S
                  shoulders @NollipfSense
                  last edited by

                  @nollipfsense

                  The quick version:
                  There is a small list (Great Wall, Oneoffdallas_DoH, Bambenek_DoH ) and you need to employ block lists to beat DoH. DoT and external DNS queries can be blocked with standard firewall rules. You need to do all of these and then configure your resolver to use encryption (DoT) to an external secure full recursive resolver such as Quad9 that supports DNSSEC to get any protection from DNS being sent out by malicious software on your network.

                  "don't allow DoH." - This is just a block list but is not a very large one. I assume that you are on about the one in SafeSearch.

                  Hope this point you in the right direction

                  NollipfSenseN 1 Reply Last reply Reply Quote 0
                  • NollipfSenseN
                    NollipfSense @shoulders
                    last edited by NollipfSense

                    @shoulders Okay there is a list; however, all that you're doing can be done with pfSense in my case. I don't have any malicious software on my network that is limited to out family, no one else. All devices must use pfSense to resolve DNS request, no deviation. I have a guest network for such purpose that is separate from my personal network. If one chooses to use external DNS, that's find but is totally unnecessary...see screen shots below.

                    Screen Shot 2022-05-07 at 9.26.13 PM.png

                    Screen Shot 2022-05-07 at 9.27.39 PM.png

                    Screen Shot 2022-05-07 at 9.28.24 PM.png

                    pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                    pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                    1 Reply Last reply Reply Quote 0
                    • S
                      shoulders
                      last edited by

                      @nollipfsense

                      From the picture above, you are only blocking DoH servers in FireFox because the canary domain is selected. No other DoH server seems to be selected.

                      Try this example from a browser that is not FireFox:

                      https://dns.google.com/resolve?name=www.potaroo.net&type=A

                      NollipfSenseN 1 Reply Last reply Reply Quote 0
                      • NollipfSenseN
                        NollipfSense @shoulders
                        last edited by

                        @shoulders So, you're saying select all? I do mostly use Firefox and had disabled Doh in the browser itself but don't recall selecting it as the screen shot suggested. I will select all then later

                        pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                        pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                        S 1 Reply Last reply Reply Quote 0
                        • S
                          shoulders @NollipfSense
                          last edited by

                          @nollipfsense

                          Yes you need to select all because you are only telling the Firefox browser to not use DoH. This is not by force, but by an inbuilt mechanism in FF (canary domain), chrome and the other browsers don't use this.

                          All other devices on your network will still potentially be able to use DoH even with the whole list selected as it is not the largest list.

                          This list will stop a lot of DoH traffic but it will not stop all of it.

                          sorry for the delay, I am not getting email notification.

                          NollipfSenseN 1 Reply Last reply Reply Quote 0
                          • NollipfSenseN
                            NollipfSense @shoulders
                            last edited by

                            @shoulders Cool, thanks.

                            pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                            pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.