• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

pfblockerNG Question(s)

Scheduled Pinned Locked Moved pfBlockerNG
26 Posts 3 Posters 1.8k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    SteveITS Galactic Empire @djtech2k
    last edited by Jan 8, 2025, 12:56 AM

    @djtech2k DNSBL uses DNS so there should not be firewall rules. Blocked domains can for instance resolve to a block page if you browse using http (https of course will have a certain error).

    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
    Upvote 👍 helpful posts!

    1 Reply Last reply Reply Quote 0
    • D
      djtech2k
      last edited by Jan 8, 2025, 1:37 AM

      Yeah I realize it’s a DNS black hole essentially. I’m just trying to get a better understanding of how it works. For example, let’s say foo.com was on a DNSBL blacklist. If I open a browser on my laptop and try to go to foo.com, what happens? My DNS in pfsense is setup with DNS Resolver with a conditional forwarder for 1 specific FQDN to go to a different DNS server on my network. Other than that, DNS Resolver is set to forward requests to the upstream DNS server from DHCP.

      In that situation, how does my dns query for foo.com get sent to the DNSBL web server in pfblocker? And what should I expect to see in my browser requesting foo.com?

      I know the private IP assigned to the DNSBL web server so I tried it in the browser. It just shows a web page with a table with 1 row and a message that says the page is blocked by admins. Is that normal?

      G S 2 Replies Last reply Jan 8, 2025, 8:08 AM Reply Quote 0
      • G
        Gertjan @djtech2k
        last edited by Jan 8, 2025, 8:08 AM

        @djtech2k said in pfblockerNG Question(s):

        If I open a browser on my laptop and try to go to foo.com, what happens?

        To make a pretty important story short, you actually want to know what DNS (really) is.

        First, check with the settings of your browser (all browser you use) what DNS it is using.

        For example, whne visiting about:preferences#privacy on a Firefox browsers, on the bottiom of that page, you might be in for a big surprise.
        If it isn't :

        86ea64e5-3597-4c5a-8c00-dd3890cac08d-image.png

        then the browser will completely bypass pfSense (== the resolver (unbound) and thus pfBlockerng).

        When "Off" is selected, the browser will use the DNS that your device obtained by a DHCP lease (or whatever you've set it if you use a static IP setup)

        Next test, still on your device : ask your device what (who) the system DNS it :

        C:\Users\Gauche>nslookup www.google.com
        Serveur :   pfSense.bhf.tld
        Address:  2a01:cb19:907:xxyy:92ec:77ff:fe29:392c
        
        Réponse ne faisant pas autorité :
        Nom :    www.google.com
        Addresses:  2a00:1450:4007:80c::2004
                  172.217.20.164
        

        Every line is important here.

        Serveur : pfSense.bhf.tld = is the host name of my pfSense.
        Address: 2a01:cb19:907:xxyy:92ec:77ff:fe29:392c : sorry for this, normally, it should be 192.168.1.1, the IPv4 address of my pfSense. But IPv4 start t be phased out so ... here it is, my pfSense LAN IPv6 ...

        And then the two answers :
        An A (IPv4) and an AAAA (IPv6) record : these are the answers.

        Check also this :

        ipconfig /all
        ......
           Serveurs DNS. . .  . . . . . . . . . . : 2a01:cb19:907:xxyy:92ec:77ff:fe29:392c
                                               192.168.1.1
        .....
        

        which means that the DJCP server (pfSense) gave these two DNS server IP's to my device.
        Keep in mind : my 192.168.1.1 is the same interface as 2a01:cb19:907:xxyy:92ec:77ff:fe29:392c.

        So, now I k,ow that my device will use pfSense as it's DNS source.

        On pfSense : if you use the default Resolver settings, as they ware present when you installed pfSense, your good.

        There are several ways to check if DNS requests from your LAN device are handled by the resolver :
        Goto Services > DNS Resolver > Advanced Settings page and select :

        e08faac0-1083-4953-a6ef-1fca9a2d4432-image.png

        WARNING : do not forget to set this back to "Level 1" when you're done - The DNS (Resolvers) log will get huge very fast !

        and now visit : Status > System Logs > System > DNS Resolver and you'll see all DNS requests handled by the resolver listed.

        Or visit : Firewall > pfBlockerNG > Alerts and go to the Unified page.
        You'll see all DNS requests that are handled by the Resolver (and thus handled by pfBlockerng).

        Also, be ware, none of the people that created DNS (they are still there !) can be found on toctic.
        You can see them here : https://www.youtube.com/results?search_query=DNS

        This one How DNS Works - Computerphile, is, IMHO, gold. But there are many more.
        Look at a couple more, let it sink in, and look some more over time.

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 0
        • D
          djtech2k
          last edited by djtech2k Jan 8, 2025, 1:31 PM Jan 8, 2025, 1:27 PM

          Thanks for the detail.

          My DNS Resolver is set to "Enable Forwarding Mode". I thought that would be best for my situation, but again I am relatively new to pfsense. I have a DNS server on my network that only has records for a specific domain, so I have a conditional forwarder (Domain Override) setup in my DNS Resolver for that domain. Otherwise, I set the "Enable Forwarding Mode" option because I assume using my ISP DNS servers is the best option. So I assumed that my internal domain will get DNS forwarded to my DNS server and all other DNS queries will get sent to the DNS servers provided by my ISP DHCP.

          Am I misunderstanding this or is that config not the best way to go? Specifically, should I not have the Forwarding mode enabled? Does this config cause pfblocker to not work as expected or cause other issues?

          Here are my DNS settings in pfsense:

          b89e7b7d-ca7b-4031-a8fe-3ee1c5cf86e2-image.png

          371c013c-7104-4048-9db1-9b40e9f64d24-image.png

          As for my main question here, it was really about how the DNS requests get sent to the DNSBL webserver. In my example, if any device requests foo.com and foo.com is on a blacklist, how does pfblocker send that request to the pfblocker dnsbl webserver instead of the normal DNS resolver path? Since its not a FW rule, I cannot see it there. Unless I am misunderstanding, something must happen behind the scenes that sends the DNS request for foo.com to the dnsbl webserver.

          G 1 Reply Last reply Jan 8, 2025, 3:03 PM Reply Quote 0
          • S
            SteveITS Galactic Empire @djtech2k
            last edited by Jan 8, 2025, 2:53 PM

            @djtech2k said in pfblockerNG Question(s):

            If I open a browser on my laptop and try to go to foo.com, what happens?

            A blocked hostname resolves to the configured IP address:
            c7aed0cc-7fa5-4f2d-a852-6c047f82c9f9-image.png

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote 👍 helpful posts!

            G 1 Reply Last reply Jan 8, 2025, 3:22 PM Reply Quote 0
            • G
              Gertjan @djtech2k
              last edited by Jan 8, 2025, 3:03 PM

              @djtech2k said in pfblockerNG Question(s):

              I thought that would be best for my situation

              And that's fine of course.
              Just keep in mind that you also thought that you know better then a company called Netgate that made pfSense.
              After all, if "forwarding" to "what ever (commercial) DNS server" is more secure as resolving, then it would be the default setting.

              Guess what, it wasn't set like that.
              Netgate even activated DNSSEC, for security reasons.

              But get me right, there might be conditions that forwarding to a (commercial) DNS server is better.

              All the big players (the local government, your ISP, your favorite VPN, etc etc) already always know "where" you go. So asking the road ( .. no, the IP ^^) to these places is pretty much the same thing.

              @djtech2k said in pfblockerNG Question(s):

              Otherwise, I set the "Enable Forwarding Mode" option because I assume using my ISP DNS servers is the best option

              That option exists, IMHO, for ancient reasons.

              Another adds another misunderstanding these days I guess.
              "In the past", when we had 9600 or 33k6 modem bit rate counted, every byte counted. You paid per bit, remember ?
              Most ISPs made available their won local DNS servers so resolving would speed up a bit. Our own ISP interlink connections were also very slow.
              These days : most ISPs still offer DNS functionalities as these servers bring in some extra cash ^^
              An ISP that forces you to use their DNS : leave them.

              With the new, multiple Mbytes /sec ISP connection these days, we can do at home with pfSense what everybody already did back in the past on the big systems : we use DNS as it was meant to be used : we resolve.
              pfSense, out of the box, resolves

              If you wanted to know the phone number of Paul, why would you ask Joo ?
              Why not asking Paul directly ?

              Ok, you get it, I'm a resolving fan.
              I can't, of course, say that forwarding is bad and resolving is good. Both have their advantages, and disadvantages.
              Resolving + DNSSEC (if available) is good enough for me.
              Also, its the most simple setup : out of the box the system - pfSense - is ok.
              And Netgate told already many times that I'm not smarter as they are ^^ So, for me, resolving it will be.

              Extra info : I also have my own domain name servers for my domain names (for my websites, mail reverse and so on). I wanted to do the DNSSEC (and a lot of other stuff) 'myself', as implementing DNS myself was what I did to learn about DNS.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              S 1 Reply Last reply Jan 8, 2025, 3:06 PM Reply Quote 0
              • S
                SteveITS Galactic Empire @Gertjan
                last edited by Jan 8, 2025, 3:06 PM

                DNSSEC

                Speaking of which, disable DNSSEC if you are forwarding. It can cause false positives.

                https://forum.netgate.com/topic/190742/should-i-enable-dnssec-in-pfsense-when-using-quad9-and-full-dns-hijacking/2

                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                Upvote 👍 helpful posts!

                1 Reply Last reply Reply Quote 0
                • D
                  djtech2k
                  last edited by Jan 8, 2025, 3:06 PM

                  Ok so something behind the scenes must pickup that DNS query and resolve it to the VIP instead of sending it on to a DNS server to get resolved as the real IP. Is that right? What about the URI's in the dnsbl blacklist? For example, there are entries like "/ad/" or something like that. Is there like a script that does a regex or something before the DNS query gets sent to the resolver?

                  I did a quick test and did a nslookup on a domain name that I know is on the list and getting blocked via he pfblocker reports. The IP return is 0.0.0.0 but I expected it to be the VIP IP of the dnsbl webserver. Is that expected? Here are my settings:

                  73a835ba-8db4-494f-bf28-bf9de7184aad-image.png

                  6bca4c44-2d33-4e34-a7ae-866928d3b500-image.png

                  59a5d099-de4a-41b4-b80c-e7e7bb3e3241-image.png

                  I am unclear on when a request would get sent to the dnsbl webserver or the "blocked webpage".

                  S 1 Reply Last reply Jan 8, 2025, 3:14 PM Reply Quote 0
                  • S
                    SteveITS Galactic Empire @djtech2k
                    last edited by Jan 8, 2025, 3:14 PM

                    @djtech2k The unbound DNS server loads the DNSBL lists and essentially uses them as overrides.

                    Not sure about your other questions offhand.

                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                    Upvote 👍 helpful posts!

                    1 Reply Last reply Reply Quote 0
                    • G
                      Gertjan @SteveITS
                      last edited by Gertjan Jan 10, 2025, 6:13 AM Jan 8, 2025, 3:22 PM

                      @SteveITS

                      This "10.10.10.1" is an option that will get ditched soon.
                      edit 2024-01-10 : That is me saying that, as this functionality only works well with http interception.
                      The thing is : there are no public https (se no https) web sites any more ... right ?
                      https interception : won't work, as per design.
                      end edit.

                      02a55b89-694c-45ad-a67c-7d61f0de335d-image.png

                      I use this :

                      df6fa93f-450e-47ef-a1b4-13b4380d7c94-image.png

                      A browser on your LAN wants to visit facebook.com
                      But you, as the pfSense admin, have blocked "facebook.com" (as a DNSBL)

                      Do you think that a page like this :

                      f67137b8-6c17-422b-ba7b-9d7c69d443c6-image.png

                      will pop up to warn the user in its browser that 'facebook' has been blocked ?
                      Now way ! Because you, me and nobody can't break TLS. Remember, https is used. The browser want to visit facebook.com but it gets an answer back from some guy called "10.10.10.1". That is interception, and that is bad. The browser will bark.
                      And not showing any pages - no way, it will throw the complex and scary messages on the screen .... (we all know them)

                      So, the admin that start to understand what TLS (= https) is, doesn't care about what the pfBlockerng web server "10.10.10.1" has to offer.
                      "10.10.10.1" was nice in the good old http days.
                      There are no http server anymore, they have been shut down (actually : they are still there doing just one thing : redirecting you to the https counterpart, as http traffic can be redirected.

                      That's why I "Null log".

                      Btw : Null logging means : return 0.0.0.0 (means : doesn't exist, don't insist - do nothing)

                      cf706ddc-954e-4629-9dcb-5e06f7e52b29-image.png

                      means : return "10.10.10.1" - which is, imho, as I exposed above, pretty useless.

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      1 Reply Last reply Reply Quote 0
                      • D
                        djtech2k
                        last edited by Jan 8, 2025, 6:32 PM

                        Ok so just curious why my nslookup to a known blacklisted domain name would come back with 0.0.0.0 as the IP? I thought with my options as posted above, it would come back to the 10.x address of the webserver?

                        On a side note about DNS, I posted my config in DNS Resolved and the General DNS server settings. I understand the concepts of all the settings but I am unclear on which ones take precedence. So on the General DNS Server settings, I have the checkbox (Allow DNS server list to be overridden by DNCP..." and the DNS Resolution Behavior is set to Local then remote DNS. I then have the DNS Resolver setting "DNS Query Forwarding" enabled. I understand what all those things mean but I am unclear on how they work together.

                        I enabled the forwarding because my thought was that if I did not, pfsense would be running its own DNS server, which I felt like it would be unneeded functionality or attack surface, so I thought sending those requests to my ISP would be fine. I do not care where my DNS queries get resolved as long as its as secure as it can be AND I can continue to use the conditional forwarder I mentioned above. I just don't know the net effect of these 3 different DNS settings. I am not opposed to changing them as long as it meets the need in the best way I can.

                        S 1 Reply Last reply Jan 8, 2025, 7:13 PM Reply Quote 0
                        • S
                          SteveITS Galactic Empire @djtech2k
                          last edited by Jan 8, 2025, 7:13 PM

                          @djtech2k Do you have the null block set, as noted above?

                          On pfSense only allowed (LAN etc.) clients can access it for DNS, and they need to do so if forwarding also. Unless you allow port 53 on WAN, all traffic arriving on WAN is blocked by default.

                          You can have LAN clients not use pfSense/Unbound at all, but then DNSBL won't work. (side note: if their browsers use DoH then they will bypass DNSBL)

                          If DNS forwarding is enabled then Unbound will forward the queries to the configured DNS servers instead of asking the root servers.

                          If you have allowed WAN DHCP to override the DNS server list then it will use the DNS servers your ISP says to use:
                          https://docs.netgate.com/pfsense/en/latest/config/general.html#dns-resolution-behavior
                          (there's a ? icon on each page that links to the doc page)

                          Normally we set to forward because we forward to Quad9. Others have different opinions of what is preferable.

                          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                          Upvote 👍 helpful posts!

                          1 Reply Last reply Reply Quote 0
                          • D
                            djtech2k
                            last edited by Jan 8, 2025, 8:22 PM

                            No, I have it set to go to the webserver but when I tried the nslookup to a known blacklisted domain, it came back with 0.0.0.0 as the IP, which surprised me based on my config.

                            526acefc-4d02-42db-995a-1f22ea8cb3d9-image.png

                            16d0c2e8-f8fb-4d49-ba14-f24fe00f97f4-image.png

                            bcb43a2f-bfe6-44a4-b630-80e978473941-image.png

                            As for DNS, the pfsense value seems to be DNS Override enabled, Local >then> Remote in the DNS Behavior settings in the General Setup section, which is exactly how mine is set. So the only deviation I have from the default is the forwarding enabled in the DNS Resolver config. So I guess the real difference is that my DNS queries will be sent to the DNS servers from my ISP DHCP lease and if I uncheck the forwarder box, pfsense will try to resolve it from cache and then look for root hints for resolution. Does that sound accurate?

                            All of my DNS discussion is on the LAN side. Its all blocked on the WAN by default.

                            I think my gap in knowledge on this is mainly around the "Unbound" part and how DNSBL works, along with a little but about how the DNS Resolver (and its options) work in pfsense. As long as my override/conditional forwarder will work, it sounds like I can use the forwarder option or remove it. Like I said, I just initially thought it was a component/work that I did not need pfsense to do so i was thinking forwarding would be better. I could be wrong all along anyway.

                            G 1 Reply Last reply Jan 9, 2025, 7:31 AM Reply Quote 0
                            • G
                              Gertjan @djtech2k
                              last edited by Gertjan Jan 9, 2025, 7:32 AM Jan 9, 2025, 7:31 AM

                              @djtech2k said in pfblockerNG Question(s):

                              it came back with 0.0.0.0 as the IP, which surprised me based on my config.

                              Hummm.
                              DNSBL files - with the Webserver IP 10.100.1.1, or 0.0.0.0 = Null block, depending on your choice, are (re) build when you do a Force reload All.

                              edit : as you said yourself :

                              3dde1d9f-f993-4375-be07-9aee7a215ef4-image.png

                              No "help me" PM's please. Use the forum, the community will thank you.
                              Edit : and where are the logs ??

                              1 Reply Last reply Reply Quote 0
                              • D
                                djtech2k
                                last edited by Jan 9, 2025, 8:16 PM

                                I did a force reload and repeated the nslookup for a blacklisted site. It still comes back as 0.0.0.0. Its blocked, which is what I want, but I am expecting it to go to the 10.x webserver but it doesn't seem to be.

                                G 1 Reply Last reply Jan 10, 2025, 6:34 AM Reply Quote 0
                                • G
                                  Gertjan @djtech2k
                                  last edited by Gertjan Jan 10, 2025, 6:38 AM Jan 10, 2025, 6:34 AM

                                  @djtech2k said in pfblockerNG Question(s):

                                  but I am expecting it to go to the 10.x webserver

                                  I agree. pfBockerng is out smarting you ;)
                                  Not so bad, as You've read this, right ?

                                  I did a test :

                                  I switched to :

                                  8b50999c-00a2-41a4-8f79-1d38202737ef-image.png

                                  Global setting is :

                                  8e9000d1-7ad3-4f3c-b5cf-8b13c25f31bd-image.png

                                  and I executed a Force Reload All.

                                  I picked a test site from the "Easylist" (https://easylist-downloads.adblockplus.org/easylist_noelemhide.txt) : adxprtz.com and checked it :

                                  C:\Users\Gauche>nslookup adxprtz.com
                                  Serveur :   pfSense.bhf.tld
                                  Address:  2a01:cb19:dead:beef:92ec:77ff:fe29:392c
                                  
                                  Réponse ne faisant pas autorité :
                                  Nom :    adxprtz.com
                                  Address:  10.10.10.1
                                  

                                  so that looks fine.

                                  I pasted it in the browser

                                  fd1e96d3-10e4-45f7-9678-1b5fa82a2d5b-image.png

                                  Cool.
                                  The site doesn't do a http to https redirect, so it could be safely redirected.
                                  As many domains, it's actually a dead site (the domain name is probably paid for, but abandoned, there is no real add server behind it anymore - and this goes for most of the listed domain names)

                                  The more serious blacklisted domains that are actually active and these are the ones you want to be blocked as they really serve adds, like "googleaddservices" won't have this treatment, you'll see an ugly web browser error. No nice 10.10.10.1 page.

                                  Ok, fine, I went back :

                                  Set :

                                  e34a6274-10fe-4b10-80a4-a681f0186cb9-image.png

                                  and then a Force Reload All

                                  New test on the PC command line :

                                  C:\Users\Gauche>nslookup adxprtz.com
                                  Serveur :   pfSense.bhf.tld
                                  Address:  2a01:cb19:dead:beef:77ff:fe29:392c
                                  
                                  Réponse ne faisant pas autorité :
                                  Nom :    adxprtz.com
                                  Address:  0.0.0.0
                                  

                                  Note that I even didn't do a

                                  ipconfig /flushdns
                                  

                                  as the TTL was probably already set very low by pfBlockerng so it vanishes from the local PC DNS cache in no time.

                                  Can you show the last Reload sequence (at the bottom) of this log :

                                  3dd22ffb-c1fa-42a0-9bd6-d1643550c9d3-image.png

                                  ?

                                  No "help me" PM's please. Use the forum, the community will thank you.
                                  Edit : and where are the logs ??

                                  1 Reply Last reply Reply Quote 0
                                  • G Gertjan referenced this topic on Jan 10, 2025, 6:34 AM
                                  • D
                                    djtech2k
                                    last edited by djtech2k Jan 10, 2025, 1:34 PM Jan 10, 2025, 1:27 PM

                                    I did read the post and understand that the webserver may be a thing of the past. I am fine to change that setting BUT while I am trying to learn pfblocker better, I'd like to figure out why the results do not seem to match the settings I have. Working through figuring that out will help me better understand pfblocker.

                                    Here is the reload section of my log from yesterday:

                                    0afb201e-c6d7-4909-9fba-0bdfe8f0bb85-image.png

                                    I just went back and changed my feed group setting to null block (logging) and did a reload under update. I flushed DNS client cache and tried the nslookup to collector.github.com, which is on the EasyPrivacy list. It came back 0.0.0.0. So I then reverted the setting back to the webserver and did the force reload again I ran the same nslookup and it also goes to 0.0.0.0. So I do not understand why its getting 0.0.0.0 and not my 10.100.x.x webserver.

                                    G 1 Reply Last reply Jan 10, 2025, 1:35 PM Reply Quote 0
                                    • G
                                      Gertjan @djtech2k
                                      last edited by Jan 10, 2025, 1:35 PM

                                      @djtech2k

                                      The complete logs is at a minimum 3, 4 of 5 hundred lines.
                                      Instead of posting a 1 Mega byte pixel size image that won't fit nowhere, post it like this :

                                      Here is mine : 2 k of text :

                                      [ Force Reload Task - All ]
                                      UPDATE PROCESS START [ v3.2.1_20 ] [ 01/10/25 07:29:37 ]
                                      
                                      ===[  DNSBL Process  ]================================================
                                      
                                      Loading DNSBL Statistics... completed
                                      Loading DNSBL SafeSearch... enabled
                                      Loading DNSBL Whitelist... completed
                                      Blacklist database(s) ... exists.
                                      
                                      [ UT1_agressif ]		 Reload [ 01/10/25 07:29:38 ] . completed ..
                                       ----------------------------------------------------------------------
                                       Orig.    Unique     # Dups     # White    # TOP1M    Final                
                                       ----------------------------------------------------------------------
                                       265      265        0          0          0          265                  
                                       ----------------------------------------------------------------------
                                      
                                      [ UT1_astrology ]		 Reload . completed ..
                                       ----------------------------------------------------------------------
                                       Orig.    Unique     # Dups     # White    # TOP1M    Final                
                                       ----------------------------------------------------------------------
                                       28       28         0          0          0          28                   
                                       ----------------------------------------------------------------------
                                      
                                      [ EasyList ]			 Reload . completed ..
                                       Whitelist: adnxs.net|adsafeprotected.com|amazon-adsystem.com|pips.taboola.com|
                                       ----------------------------------------------------------------------
                                       Orig.    Unique     # Dups     # White    # TOP1M    Final                
                                       ----------------------------------------------------------------------
                                       29589    29589      0          4          0          29585                
                                       ----------------------------------------------------------------------
                                      
                                      [ StevenBlack_ADs ]		 Reload [ 01/10/25 07:29:39 ] . completed ..
                                       Whitelist: 15.taboola.com|aax-eu.amazon-adsystem.com|addthis.com|adsafeprotected.com|am-match.taboola.com|am-sync.taboola.com|am-trc-events.taboola.com|am-vid-events.taboola.com|am-wf.taboola.com|amazon-adsystem.com|api-s2s.taboola.com|api.taboola.com|assets.taboola.com|beacon.taboola.com|bs.eyeblaster.akadns.net|bs.serving-sys.com|c2.taboola.com|c3.taboola.com|cdn-yjp.taboola.com|cdn.taboola.com|cds.taboola.com|ch-match.taboola.com|ch-sync.taboola.com|ch-vid-events.taboola.com|ch-wf.taboola.com|control.kochava.com|convchmp.taboola.com|convhkmp.taboola.com|convlatbmp.taboola.com|convnjmp.taboola.com|device-metrics-us-2.amazon.com|fls-na.amazon.com|geolocation.onetrust.com|googletagmanager.com|hk-match.taboola.com|hk-sync.taboola.com|hk-vid-events.taboola.com|hk-wf.taboola.com|images-dl.taboola.com|images.taboola.com|impr.taboola.com|imprammp.taboola.com|imprchmp.taboola.com|imprhkmp.taboola.com|imprlatbmp.taboola.com|imprnjmp.taboola.com|imprsgmp.taboola.com|la-match.taboola.com|la-sync.taboola.com|la-trc-events.taboola.com|la-vid-events.taboola.com|la-wf.taboola.com|localhost.localdomain|match.taboola.com|mb.taboola.com|mpg.taboola.com|nr-events.taboola.com|nr.taboola.com|opps.taboola.com|parkingcrew.net|pi.pardot.com|pixel.adsafeprotected.com|popup.taboola.com|px.moatads.com|resources.taboola.com|secure-gl.imrworldwide.com|sg-match.taboola.com|sg-sync.taboola.com|sg-trc-events.taboola.com|sg-vid-events.taboola.com|sg-wf.taboola.com|sync-t1.taboola.com|sync.taboola.com|taboola.com|timeinc.trc.taboola.com|trace.svc.ui.com|tracking.taboola.com|trc-events.taboola.com|trc.taboola.com|us-match.taboola.com|us-sync.taboola.com|us-vid-events.taboola.com|us-wf.taboola.com|vidanalytics.taboola.com|vidstat.taboola.com|vidstatb.taboola.com|vidutils.taboola.com|wf.taboola.com|wildcard.moatads.com.edgekey.net|www.addthis.com|www.api.taboola.com|www.c2.taboola.com|www.cdn.taboola.com|www.googletagmanager.com|www.images.taboola.com|www.parkingcrew.net|www.popup.taboola.com|www.taboola.com|www.trc.taboola.com|
                                       ----------------------------------------------------------------------
                                       Orig.    Unique     # Dups     # White    # TOP1M    Final                
                                       ----------------------------------------------------------------------
                                       117135   117135     806        99         0          116230               
                                       ----------------------------------------------------------------------
                                      
                                      ------------------------------------------------------------------------
                                      Assembling DNSBL database...... completed [ 01/10/25 07:29:46 ]
                                      TLD:
                                      TLD analysis.. completed [ 01/10/25 07:29:49 ]
                                      TLD finalize...
                                      ----------------------------------------
                                      Original    Matches    Removed    Final     
                                      ----------------------------------------
                                      146108      65425      44417      101691    
                                      -----------------------------------------
                                      TLD finalize... completed [ 01/10/25 07:29:52 ]
                                      
                                      Saving DNSBL statistics... completed [ 01/10/25 07:29:53 ]
                                      Reloading Unbound Resolver (DNSBL python).
                                      Stopping Unbound Resolver.
                                      Unbound stopped in 2 sec.
                                      Additional mounts (DNSBL python):
                                       No changes required.
                                      Starting Unbound Resolver... completed [ 01/10/25 07:29:56 ]
                                      Resolver cache restored [ 01/10/25 07:29:58 ]
                                      DNSBL update [ 101691 | PASSED  ]... completed
                                      ------------------------------------------------------------------------
                                      
                                      ===[  GeoIP Process  ]============================================
                                      
                                      [ pfB_Europe_v4 ]		 Changes found... Updating
                                      
                                       Aggregation Stats:
                                       ------------------
                                       Original Final      
                                       ------------------
                                       35609    14269      
                                       ------------------
                                      
                                      
                                      ===[  IPv4 Process  ]=================================================
                                      
                                      [ MS_1_v4 ]			 Reload [ 01/10/25 07:29:59 ] . completed ..
                                      
                                       Aggregation Stats:
                                       ------------------
                                       Original Final      
                                       ------------------
                                       2866     2679       
                                       ------------------
                                       ------------------------------
                                       Original Master     Final     
                                       ------------------------------
                                       2876     2679       2679        [ Pass ] 
                                       -----------------------------------------------------------------
                                      
                                      
                                      ===[  Aliastables / Rules  ]==========================================
                                      
                                      No changes to Firewall rules, skipping Filter Reload
                                      
                                      Updating: pfB_Europe_v4
                                      no changes.
                                      Updating: pfB_PRI5_v4
                                      no changes.
                                      
                                      Saving config changes... completed
                                      ===[  Kill States  ]==================================================
                                      
                                      Firewall state(s) validation for [ 19 ] IPv4 address(es)...
                                      Firewall state(s) validation for [ 38 ] IPv6 address(es)...
                                      No matching states found
                                      
                                      ======================================================================
                                      
                                      ===[ FINAL Processing ]=====================================
                                      
                                        [ Original IP count   ]  [ 38485 ]
                                      
                                        [ Final IP Count  ]  [ 2679 ]
                                      
                                      
                                      ===[ Permit List IP Counts ]=========================
                                      
                                        14269 /var/db/pfblockerng/permit/pfB_Europe_v4.txt
                                      
                                      ===[ Deny List IP Counts ]===========================
                                      
                                         2679 /var/db/pfblockerng/deny/MS_1_v4.txt
                                      
                                      ===[ DNSBL Domain/IP Counts ] ===================================
                                      
                                       146108 total
                                       116230 /var/db/pfblockerng/dnsbl/StevenBlack_ADs.txt
                                        29585 /var/db/pfblockerng/dnsbl/EasyList.txt
                                          265 /var/db/pfblockerng/dnsbl/UT1_agressif.txt
                                           28 /var/db/pfblockerng/dnsbl/UT1_astrology.txt
                                      
                                      ====================[ IPv4/6 Last Updated List Summary ]==============
                                      
                                      Dec 31	12:37	MS_1_v4
                                      Jan 10	07:29	pfB_Europe_v4
                                      
                                      ====================[ DNSBL Last Updated List Summary ]==============
                                      
                                      Jan 6	00:05	EasyList
                                      Jan 6	00:15	UT1_agressif
                                      Jan 6	00:15	UT1_astrology
                                      Jan 6	00:15	StevenBlack_ADs
                                      ===============================================================
                                      
                                      Database Sanity check [  PASSED  ]
                                      ------------------------
                                      Masterfile/Deny folder uniq check
                                      Deny folder/Masterfile uniq check
                                      
                                      Sync check (Pass=No IPs reported)
                                      ----------
                                      
                                      Alias table IP Counts
                                      -----------------------------
                                        16948 total
                                        14269 /var/db/aliastables/pfB_Europe_v4.txt
                                         2679 /var/db/aliastables/pfB_PRI5_v4.txt
                                      
                                      pfSense Table Stats
                                      -------------------
                                      table-entries hard limit   800000
                                      Table Usage Count         19757
                                      
                                      UPDATE PROCESS ENDED [ 01/10/25 07:30:00 ]
                                      

                                      No "help me" PM's please. Use the forum, the community will thank you.
                                      Edit : and where are the logs ??

                                      1 Reply Last reply Reply Quote 0
                                      • D
                                        djtech2k
                                        last edited by Jan 10, 2025, 1:38 PM

                                        This post is deleted!
                                        1 Reply Last reply Reply Quote 0
                                        • D
                                          djtech2k
                                          last edited by Jan 10, 2025, 1:46 PM

                                          I thought you only wanted that specific section. Here is the entire latest force reload section.

                                           [ Force Reload Task - DNSBL ]
                                           UPDATE PROCESS START [ v3.2.0_20 ] [ 01/10/25 08:35:44 ]
                                          ===[  DNSBL Process  ]================================================
                                           Loading DNSBL Statistics... completed
                                           Loading DNSBL SafeSearch... disabled
                                           Loading DNSBL Whitelist... completed
                                          [ EasyList ]			 Reload . completed ..
                                            ----------------------------------------------------------------------
                                            Orig.    Unique     # Dups     # White    # TOP1M    Final                
                                            ----------------------------------------------------------------------
                                            29672    29672      0          0          0          29672                
                                            ----------------------------------------------------------------------
                                            IPv4 count=101
                                          [ EasyPrivacy ]			 Reload . completed ..
                                            ----------------------------------------------------------------------
                                            Orig.    Unique     # Dups     # White    # TOP1M    Final                
                                            ----------------------------------------------------------------------
                                            41424    41423      0          0          0          41423                
                                            ----------------------------------------------------------------------
                                            IPv4 count=8
                                          Saving DNSBL statistics... completed [ 01/10/25 08:35:45 ]
                                          ------------------------------------------------------------------------
                                          Assembling DNSBL database...... completed
                                          Reloading Unbound Resolver (DNSBL python).
                                          Stopping Unbound Resolver.
                                          Unbound stopped in 2 sec.
                                          Additional mounts (DNSBL python):
                                            No changes required.
                                          Starting Unbound Resolver... completed [ 01/10/25 08:35:47 ]
                                          Resolver cache restored
                                          DNSBL update [ 71095 | PASSED  ]... completed
                                          ------------------------------------------------------------------------
                                          ===[  GeoIP Process  ]============================================
                                          ===[  IPv4 Process  ]=================================================
                                          [ Abuse_Feodo_C2_v4 ]		 exists.
                                          [ Abuse_SSLBL_v4 ]		 exists.
                                          [ CINS_army_v4 ]		 exists.
                                          [ ET_Block_v4 ]			 exists.
                                          [ ET_Comp_v4 ]			 exists.
                                          [ ISC_Block_v4 ]		 exists.
                                          [ Spamhaus_Drop_v4 ]		 exists.
                                          [ Talos_BL_v4 ]			 Downloading update .. 200 OK. completed ..
                                          [ pfB_PRI1_v4 Talos_BL_v4 ] No IPs found! Ensure only IP based Feeds are used! ]
                                          [ BDS_TOR_v4 ]			 exists. [ 01/10/25 08:35:48 ]
                                          [ DMe_TOR_EN_v4 ]		 exists.
                                          [ ET_TOR_All_v4 ]		 exists.
                                          [ ISC_TOR_v4 ]			 exists.
                                          [ PROJECT_TOR_EN_v4 ]		 exists.
                                          [ RUECKGR_TOR_All_v4 ]		 exists.
                                          [ SFS_IPs_v4 ]			 exists.
                                          [ DNSBLIP_v4 ]			 Downloading update .. completed ..
                                            Aggregation Stats:
                                            ------------------
                                            Original Final      
                                            ------------------
                                            109      72         
                                            ------------------
                                            ------------------------------
                                            Original Master     Final     
                                            ------------------------------
                                            109      72         72          [ Pass ] 
                                            -----------------------------------------------------------------
                                          ===[  Aliastables / Rules  ]==========================================
                                          No changes to Firewall rules, skipping Filter Reload
                                           Updating: pfB_DNSBLIP_v4
                                          no changes.
                                          Saving config changes... completed
                                          ===[  Kill States  ]==================================================
                                          No matching states found
                                          ======================================================================
                                          ===[ FINAL Processing ]=====================================
                                             [ Original IP count   ]  [ 207257 ]
                                             [ Final IP Count  ]  [ 174653 ]
                                          ===[ Deny List IP Counts ]===========================
                                            174654 total
                                            150429 /var/db/pfblockerng/deny/SFS_IPs_v4.txt
                                             11928 /var/db/pfblockerng/deny/CINS_army_v4.txt
                                              5404 /var/db/pfblockerng/deny/BDS_TOR_v4.txt
                                              3651 /var/db/pfblockerng/deny/ET_TOR_All_v4.txt
                                              1322 /var/db/pfblockerng/deny/ET_Block_v4.txt
                                               565 /var/db/pfblockerng/deny/DMe_TOR_EN_v4.txt
                                               562 /var/db/pfblockerng/deny/ET_Comp_v4.txt
                                               403 /var/db/pfblockerng/deny/RUECKGR_TOR_All_v4.txt
                                               294 /var/db/pfblockerng/deny/ISC_TOR_v4.txt
                                                72 /var/db/pfblockerng/deny/DNSBLIP_v4.txt
                                                 9 /var/db/pfblockerng/deny/Spamhaus_Drop_v4.txt
                                                 7 /var/db/pfblockerng/deny/ISC_Block_v4.txt
                                                 6 /var/db/pfblockerng/deny/PROJECT_TOR_EN_v4.txt
                                                 1 /var/db/pfblockerng/deny/Abuse_SSLBL_v4.txt
                                                 1 /var/db/pfblockerng/deny/Abuse_Feodo_C2_v4.txt
                                          ====================[ Empty Lists w/127.1.7.7 ]==================
                                          Abuse_SSLBL_v4.txt
                                          ===[ DNSBL Domain/IP Counts ] ===================================
                                             71204 total
                                             41423 /var/db/pfblockerng/dnsbl/EasyPrivacy.txt
                                             29672 /var/db/pfblockerng/dnsbl/EasyList.txt
                                               101 /var/db/pfblockerng/dnsbl/EasyList_v4.ip
                                                 8 /var/db/pfblockerng/dnsbl/EasyPrivacy_v4.ip
                                          ====================[ IPv4/6 Last Updated List Summary ]==============
                                          Jan 3	06:40	Abuse_SSLBL_v4
                                          Jan 9	00:30	ET_Block_v4
                                          Jan 9	06:35	Spamhaus_Drop_v4
                                          Jan 9	11:54	BDS_TOR_v4
                                          Jan 9	17:15	ET_TOR_All_v4
                                          Jan 9	17:15	ET_Comp_v4
                                          Jan 10	06:40	ISC_TOR_v4
                                          Jan 10	06:52	CINS_army_v4
                                          Jan 10	07:00	ISC_Block_v4
                                          Jan 10	07:30	PROJECT_TOR_EN_v4
                                          Jan 10	07:31	DMe_TOR_EN_v4
                                          Jan 10	07:55	Abuse_Feodo_C2_v4
                                          Jan 10	07:55	SFS_IPs_v4
                                          Jan 10	08:01	RUECKGR_TOR_All_v4
                                          Jan 10	08:35	Talos_BL_v4
                                          Jan 10	08:35	DNSBLIP_v4
                                          ====================[ DNSBL Last Updated List Summary ]==============
                                          Jan 9	21:55	EasyPrivacy
                                          Jan 9	23:54	EasyList
                                          ===============================================================
                                          Database Sanity check [  PASSED  ]
                                          ------------------------
                                          Masterfile/Deny folder uniq check
                                          Deny folder/Masterfile uniq check
                                          Sync check (Pass=No IPs reported)
                                          ----------
                                          Alias table IP Counts
                                          -----------------------------
                                            174654 total
                                            150429 /var/db/aliastables/pfB_SFS_v4.txt
                                             13830 /var/db/aliastables/pfB_PRI1_v4.txt
                                             10323 /var/db/aliastables/pfB_TOR_v4.txt
                                                72 /var/db/aliastables/pfB_DNSBLIP_v4.txt
                                          pfSense Table Stats
                                          -------------------
                                          table-entries hard limit   400000
                                          Table Usage Count         174668
                                           UPDATE PROCESS ENDED [ 01/10/25 08:35:50 ]
                                          
                                          
                                          1 Reply Last reply Reply Quote 0
                                          • S SteveITS referenced this topic on Jan 10, 2025, 3:13 PM
                                          22 out of 26
                                          • First post
                                            22/26
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received