Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNSBL - Difference Unbound Mode / Unbound Python Mode

    Scheduled Pinned Locked Moved pfBlockerNG
    13 Posts 4 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GertjanG
      Gertjan @deleted
      last edited by Gertjan

      @deleted

      Resolver default settings are :

      578ad856-7fc1-4373-83bb-764e3beec0d2-image.png

      as these are the settings Netgate has chosen for you.
      They have their reasons to do so 😊

      So, nothing to do over there.

      The default pfBLockerng(devel) DNSBL mode is (but I'm not sure) :

      54193254-0c8e-4993-a116-c6b743892e8a-image.png

      Edit : the resolver "Python Module Order" Validator mode is also a python mod.
      It implements DNNSEC (DNSSEC is DNS with the guarantee that your head will hurts if you want to know what it does). Just set it and forget it.

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      D 1 Reply Last reply Reply Quote 0
      • D
        deleted @Gertjan
        last edited by

        Hi @Gertjan,

        Many thanks for all the information.

        It works very well.
        Thanks again.

        1 Reply Last reply Reply Quote 0
        • dennypageD
          dennypage
          last edited by

          Not that I recommending against Unbound python mode (it seems to be almost a requirement with Kea), but there is a slight downside to using pfBlockerNG's Unbound python mode. Even with pfBlockerNG's DNSBL logging disabled, it increases disk IO. As an example, on my system, which has very little logging activity, enabling Unbound python mode in pfBlockerNS takes my disk IO from below 13bps to a bit over 40bps.

          GertjanG 1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @dennypage
            last edited by

            @dennypage

            True.
            Most of use rarely look at this :
            The DNSBL actions are logged :

            86fda6c0-0cae-459d-9048-d5d3a5fc909e-image.png

            so the pfBlockerng candy bar system can do its work - generate this :

            27f57f3b-6091-448f-b5d2-6f1e7338f0cc-image.png

            Stats, over time, need lots of details.

            Remember the very beginning, these are my thoughts :
            There was this firewall router called pfSense.
            And we had a separate VM, or physical box with a Pi-hole.
            All that pi-hole needed, was also present on pfSense.
            So, some one decided to integrate "what pi-hiole" does into pfSense, as less (hardware) == better.

            pfBlockerng needs to write to disk (logs, or some database storage, whatever) so the admin can see what happens and when.
            After all, DNSBL feeds are loaded, so, for now on, some host names, an action is takes that blocks the outcome of a URL (DNS) request. Most common is a web browser on some LAN client device that doesn't show an publicity anymore, up until "pfSense is broken as I can't visit facebook anymore and I also loaded pfBlockerng with 'some' DNSBL feeds - what's up ?" (no joke, these questions really exist, found one yesterday).

            That said, I agree, you've mentioned an advantage of the unbound (non python) mode.

            On the other hand, also yesterday, I discovered that a 128 Gbytes SSD (not emmc) for my '4100' costs what ? 30 $ ?

            Btw : running a pi-hole on any device with an emmc device, guess what will happen ? ^^

            Maybe there should be an option where all logging and stat building can be stopped.

            Or : Plan R : create a RAM disk, and have that synced to disk only during reboot - with the risk of data (stats) loss when a power fail arrives.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            dennypageD 1 Reply Last reply Reply Quote 0
            • dennypageD
              dennypage @Gertjan
              last edited by

              @Gertjan said in DNSBL - Difference Unbound Mode / Unbound Python Mode:

              The DNSBL actions are logged
              ...
              pfBlockerng needs to write to disk (logs, or some database storage, whatever) so the admin can see what happens and when.

              The increased IO does not come from logging. I have DNSBL logging completely disabled. I.E. Null Block (no logging).

              The increased IO is intrinsic to pfBlockerNG's Unbound python mode, and comes from the write of a group counter to a sqlite3 database, /var/unbound/pfb_py_resolver.sqlite. Even if logging/reporting is completely disabled, there is no way to disable the counter update without turning off pfBlocketNG's python mode.

              RobbieTTR GertjanG 2 Replies Last reply Reply Quote 0
              • RobbieTTR
                RobbieTT @dennypage
                last edited by

                I worked-out the above the long way but nice to see the proper explanation.

                Not that I am bothered about logging as mine goes to a good SSD, rather than the eMMC, and that will never wear out from logging.

                ☕️

                1 Reply Last reply Reply Quote 0
                • D
                  deleted
                  last edited by

                  Since there is still a lot going on here, a quick question;

                  How do I delete all the entries under Reporting?
                  Everything individually in the logs?

                  1 Reply Last reply Reply Quote 0
                  • GertjanG
                    Gertjan @dennypage
                    last edited by

                    @dennypage said in DNSBL - Difference Unbound Mode / Unbound Python Mode:

                    Unbound python mode, and comes from the write of a group counter to a sqlite3 database, /var/unbound/pfb_py_resolver.sqlite.

                    👍
                    Forgot all about that one.
                    There are one (or two ?) small database files that gets updated constantly to reflect the current counters :

                    3747ec3d-0ae9-4ea2-9e27-c2755a4f9bc9-image.png

                    @deleted said in DNSBL - Difference Unbound Mode / Unbound Python Mode:

                    How do I delete all the entries under Reporting?

                    That's, afaik, not possible. Not without severe patching.
                    To minimize disk usage : in this order :
                    Use unbound mode, not python mode.
                    Do not use DNSBL,
                    Use RAM disk
                    Or, the best method : don't install any pfSense packages that use and need disk recording. After all, pfBlockerng doesn't come with pfSense pre installed, it's a option you activate by adding it yourself.

                    No "help me" PM's please. Use the forum, the community will thank you.
                    Edit : and where are the logs ??

                    RobbieTTR 1 Reply Last reply Reply Quote 0
                    • RobbieTTR
                      RobbieTT @Gertjan
                      last edited by

                      The starting advice is just to move everything to a media that can take the additional writes with ease, such as an SSD made for the job, or export stuff to a logging/monitoring service somewhere on your network.

                      The joy of pfSense is all the other things it can do to support your network needs. Don't feel the need to disable stuff that is useful to you if you can just reconfigure things.

                      ☕️

                      1 Reply Last reply Reply Quote 0
                      • D
                        deleted
                        last edited by

                        My only concern was that I generated a lot of entries during testing and I wanted to clean them up.
                        However, the idea with the SSD is good to reduce the load on the system.

                        I'll find out the best way to do this.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.