Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfBlockerNG not blocking ADs

    Scheduled Pinned Locked Moved pfBlockerNG
    16 Posts 3 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      wc2l @Gertjan
      last edited by

      @Gertjan I'm getting more confused!!
      I have a maxmind account.
      62d8c27f-5e70-4c05-9fc2-5e5b0f1128e5-image.png
      So it shoiuld be working. New keys don't work. Test again this morning
      My have to go back to see if I have other notes. I think I used this post to create my last key:
      https://forum.netgate.com/topic/149343/pfblockerng-maxmind-registration-required-to-continue-to-use-the-geoip-functionality

      I have this setup:
      7f6df6d2-3200-4bf8-95f1-3d945fa60e73-image.png

      My
      bc4d2b09-1e4f-49ab-aa49-4c6881a8fe4f-image.png

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @wc2l
        last edited by

        @wc2l said in pfBlockerNG not blocking ADs:

        https://forum.netgate.com/topic/149343/pfblockerng-maxmind-registration-required-to-continue-to-use-the-geoip-functionality

        Already 5 years go ... 😧
        But yeah, that's the one I used to upgrade me GeoIP account.

        3fd0953d-7ea0-447b-929a-b8d2841bedfd-image.png

        b1d56ef5-ed39-4727-b332-04301a247f52-image.png

        How do you use this ?

        My case :

        24da3bd7-ca75-4c65-b23b-f0fa0b417f5b-image.png

        and I use these list with 'french' IPs so I can use it like this :

        f851635f-e219-4527-99c1-0b4f4830e306-image.png

        My goal is to allow only french IPv4 to access my OpenVPN port.

        Why would you "Deny Inbound" ?
        Why not using "the build in free of maintenance, good for everybody" default block all rule (on your WAN interface).

        if the context of this "Deny Inbound" is used for your WAN (it is, right ?) that, normally', everybody and everything is already blocked.
        Except : your exceptions, like NAT rules.
        Why do you make exceptions for "Top Spammers" ? Do you host a mail server behind pfSense or something like that ?

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        W 1 Reply Last reply Reply Quote 0
        • W
          wc2l @Gertjan
          last edited by

          @Gertjan
          Here is my floating rules:
          e334be1f-893c-43de-9474-a7a6acbd5dfc-image.png

          I don't remember changing or why changed the GeoIP Stuff
          Now I have switched it back.
          a7e2a153-8f4c-4456-9138-f091a9d709f5-image.png

          Now to chase down the DNSBL & Maxmind issues.
          When I run the command: nslookup www.marrketstrategy.com
          The results are:
          Server: one.one.one.one
          Address: 1.1.1.1
          Non-authoritative answer:
          Name: marrketstrategy.com
          Address: 209.38.99.34
          Aliases: www.marrketstrategy.com

          [ MaxMind_BD_Proxy_v4 ] Downloading update .. 403 Forbidden
          [ pfB_PRI3_v4 - MaxMind_BD_Proxy_v4 ] Download FAIL
          DNSBL, Firewall, and IDS (Legacy mode only) are not blocking download.
          The Following List has been REMOVED [ MaxMind_BD_Proxy_v4 ]

          GertjanG 1 Reply Last reply Reply Quote 0
          • U
            Uglybrian
            last edited by

            It looks like Doh is being utilized. Maybe in your DNS settings or in your web browser.
            My result using resolver
            Screenshot from 2025-01-08 07-50-05.png

            Look here for some insight into firefox Doh: https://forum.netgate.com/topic/133679/heads-up-be-aware-of-trusted-recursive-resolver-trr-in-firefox

            W 1 Reply Last reply Reply Quote 0
            • W
              wc2l @Uglybrian
              last edited by

              @Uglybrian
              I wasn't using Firefox.
              That was just a PS terminal.. I will reread stuff.

              So what are you using for DNS servers? ISP?
              Do you point your clients to your Netgate device?
              Maybe that is what has changed in mine??

              1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan @wc2l
                last edited by Gertjan

                @wc2l said in pfBlockerNG not blocking ADs:

                When I run the command: nslookup www.marrketstrategy.com
                The results are:
                Server: one.one.one.one
                Address: 1.1.1.1
                Non-authoritative answer:
                Name: marrketstrategy.com
                Address: 209.38.99.34
                Aliases: www.marrketstrategy.com

                Lol.
                You control your pfSense, you can install things like pfBlockerng and do all kind of nifty DNS trick ...
                And then some one decides that your LAN devices should use 1.1.1.1 as their DNS (1.1.1.1 is not pfSense) thus totally bypassing your DNS, so pfBlocker would never be able to see, and act upon your DNS request (from this LAN device).
                Go call 1.1.1.1 and ask if they can install pfBlockerng on their system for you ?
                (ok, was joking )

                You can also remove this one :

                947c1ef5-2eb7-4337-832c-1bd7a88f5504-image.png

                as this floating rule operates on WAN, traffic coming from the alias IP list "pfB_PRI_v4".
                All these IPs will be blocked anyway. You should lose any CPU cycles on them.

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                1 Reply Last reply Reply Quote 0
                • U
                  Uglybrian
                  last edited by Uglybrian

                  I am using the authoritative name servers directly via the PF Sense resolver. Instead of asking Google or my ISP and having them answer either by their cache or them asking the name servers for me. I just use PFS to go to the name servers directly.PFS will answer from its cash or ask the name servers. I have no other typed in DNS servers And all clients point to PFS for their DNS. In addition, I also have firewall rules blocking all known Doh servers along one rule blocking the Dot port.
                  And all web browsers have an option for Doh usage that is usually switched on by default. You have to go into the browser settings and manually turn it off. This is not just on Firefox, but every web browser.

                  W 1 Reply Last reply Reply Quote 0
                  • W
                    wc2l @Uglybrian
                    last edited by

                    @Uglybrian
                    I made sure there was nothing being added to my DHCP server, I need to figure out what is happening. Maybe I will open a ticket and see if that can help. Something is amiss...

                    pfBlockerNG update is still giving me errors not matter what I do. I will go back and look again. Still getting the ADs in one of the pages that used to be blocked :-(

                    GertjanG 1 Reply Last reply Reply Quote 0
                    • U
                      Uglybrian
                      last edited by Uglybrian

                      Does your resolver settings look like this?

                      Screenshot from 2025-01-08 09-18-39.png

                      From what I see you have something on your network using Cloudflare DNS, thus bypassing PFBlocker as Gertjan has pointed out.

                      I also use this firewall rule found in the PFS configuration recipes
                      https://docs.netgate.com/pfsense/en/latest/recipes/dns-block-external.html

                      Another layer I have is a floating firewall rule blocking DOH servers in the outbound direction.
                      Screenshot from 2025-01-08 09-39-09.png

                      W 1 Reply Last reply Reply Quote 0
                      • W
                        wc2l @Uglybrian
                        last edited by

                        @Uglybrian
                        Took me a bit to figure where "DNS Resolution Behavior" was.. Mine was to "fall back to remote". I may have to clear cache and few other things. I need to look at the other settings yet.

                        1 Reply Last reply Reply Quote 0
                        • GertjanG
                          Gertjan @wc2l
                          last edited by

                          @wc2l said in pfBlockerNG not blocking ADs:

                          I made sure there was nothing being added to my DHCP server, I need to figure out what is happening. Maybe I will open a ticket and see if that can help. Something is amiss...

                          On a device on your LAN :

                          When I run the command: nslookup www.marrketstrategy.com
                          The results are:
                          Server: one.one.one.one
                          Address: 1.1.1.1
                          

                          so that device uses 1.1.1.1 as it DNS source.
                          1.1.1.1 can come from two sources :

                          1. The device user has set up the device with static DNS parameters, he entered 1.1.1.1.
                          2. It was given by the pfSense (?) DHCP server. So the admin has set that "1.1.1.1" as the DNS to be given to the LAN DHCP clients.

                          For both reasons, there is no need to open a ticket 😊

                          You said that 2) isn't possible, so you have to deal with device's owner.
                          Or use a firewall rule ^^
                          "On LAN, block all DNS requests that are not directed to pfSense" and bye bye the 1.1.1.1 issue.

                          The owner of the device will ask for you very soon, and a discussion will take place.
                          He wants to circumvent your pfSense DNS.
                          You want his DNS requests to go to to pfSense, so you can filter it with pfBlockerng.

                          As the device's user is using your network, you will win. The discussion will end with : "if not happy, go elsewhere" as you can decides what happens on your network.

                          No "help me" PM's please. Use the forum, the community will thank you.
                          Edit : and where are the logs ??

                          W 1 Reply Last reply Reply Quote 0
                          • W
                            wc2l @Gertjan
                            last edited by

                            @Gertjan
                            Looks like the issue is resolved. changing from "fall back to remote" to "ignore remote". I also made sure that there was NO other references for external DNS servers.

                            I've also been working on making sure that all of the downloads are working. I have found that some have changed policies or paths.

                            THANK YOU!

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.