• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

PfBlocker

Scheduled Pinned Locked Moved pfSense Packages
896 Posts 143 Posters 1.3m Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    marcelloc
    last edited by Nov 14, 2011, 2:04 AM Nov 14, 2011, 2:02 AM

    ipv6kid,

    Also check lists description. Level1 ipblocklist includes only 'good' networks.

    Blocking a grey list may not be a good choice.

    Treinamentos de Elite: http://sys-squad.com

    Help a community developer! ;D

    1 Reply Last reply Reply Quote 0
    • I
      ipv6kid
      last edited by Nov 14, 2011, 2:13 AM

      First, thanks for the reply. I have set the maximum Firewall tables to 550,000 just to be safe but under Diagnostics > Tables there is no PFblocker drop down selection.

      I am still getting memory allocation errors even though I've done all of this and reset the states. Could it be anything else?

      1 Reply Last reply Reply Quote 0
      • I
        ipv6kid
        last edited by Nov 14, 2011, 2:15 AM

        You said to make sure I didn't have double "table-entries", what if I used the same list to deny inbound and outbound? Would that cause this error?

        1 Reply Last reply Reply Quote 0
        • M
          marcelloc
          last edited by Nov 14, 2011, 2:24 AM

          If you need to inbound and outbound rules on same table, choose alias on list action and then create a manual rule in wan and other in lan.

          If you still want list1, you may need 1.000.000 or more.

          You can't see pfBlocker table because you got erros during apply.

          Treinamentos de Elite: http://sys-squad.com

          Help a community developer! ;D

          1 Reply Last reply Reply Quote 0
          • I
            ipv6kid
            last edited by Nov 14, 2011, 2:34 AM Nov 14, 2011, 2:32 AM

            Yeah I just noticed some of these lists run into the hundreds of thousands of tables. I am running an old clunky dell laptop from 2003-ish. With only 768 MB of RAM, and when I enabled more states into the 2 million range, RAM usage shot up and it started swapping.

            I'm also running SNORT on top of this, so I'm going to need a gateway with more RAM.

            It seems to be working without errors now, I've disabled and re-enabled PFblocker… after deleting all the large block lists.

            I can now see the pFblocker "tables" under Diagnostics > Tables.

            I also think some of these "debug" errors were due to logging being enabled, so if anybody else is still having issues, try disabling that. Where does this even log to anyways? I couldn't find where it was logging to in the console unless it was going directly to system logs.

            Thank you very much!

            1 Reply Last reply Reply Quote 0
            • T
              tommyboy180
              last edited by Nov 14, 2011, 3:04 AM

              FYI,

              I'm running Level1, Level2, and Level3 on a system with only 256MB RAM. You don't need more RAM, just increase your Firewall Maximum Table Entries.

              marcelloc,
              Level1, Level2, and Level3 lists do have 'good' guys in the list but it's an Anti-P2P list. All the IPs have been involved in anti-P2P behavior. That's why I always run Level1 lists at a min. It's actually one of the main reasons why I made IP-Blocklist.

              -Tom Schaefer
              SuperMicro 1U 2X Intel pro/1000 Dual Core Intel 2.2 Ghz - 2 Gig RAM

              Please support pfBlocker | File Browser | Strikeback

              1 Reply Last reply Reply Quote 0
              • R
                RonpfS
                last edited by Nov 14, 2011, 3:27 AM

                I use dshield, drop, hijacked etc on Pfsense Box.

                I use the level 1, badpeers, etc on Seed Box with PeerBlock.

                2.4.5-RELEASE-p1 (amd64)
                Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
                Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

                1 Reply Last reply Reply Quote 0
                • M
                  marcelloc
                  last edited by Nov 14, 2011, 4:02 AM

                  I know it's quite off topic but 'Companies which anti-p2p activity has been seen from' for me means:
                  Companies that try to detect p2p users, so if you block it, they cant' find your p2p activity.

                  Isn't better using this list to block torrent search like pirate bay?

                  Treinamentos de Elite: http://sys-squad.com

                  Help a community developer! ;D

                  1 Reply Last reply Reply Quote 0
                  • T
                    tommyboy180
                    last edited by Nov 14, 2011, 4:13 AM

                    @marcelloc:

                    I know it's quite off topic but 'Companies which anti-p2p activity has been seen from' for me means:
                    Companies that try to detect p2p users, so if you block it, they cant' find your p2p activity.

                    Isn't better using this list to block torrent search like pirate bay?

                    We're talking about two different things here. This is a bit off topic so I won't go into much detail but basically…

                    • If you don't want to get sued for downloading copyrighted material then you block Anti-P2P groups using Level1 among using many other protection techniques

                    • If you want to prevent network users from using P2P then you implement Layer7 filtering

                    Blocking sites like TPB do nothing to prevent P2P traffic from using TPB's trackers. It's moot. That's why Level1 lists has all bad IPs.
                    I hope this clears it up.

                    -Tom Schaefer
                    SuperMicro 1U 2X Intel pro/1000 Dual Core Intel 2.2 Ghz - 2 Gig RAM

                    Please support pfBlocker | File Browser | Strikeback

                    1 Reply Last reply Reply Quote 0
                    • I
                      ipv6kid
                      last edited by Nov 14, 2011, 7:39 PM

                      Is it possible to currently use host name block lists with PFblocker?

                      I'd like to include some known malware URL's. Can that be a feature in an upcoming version?

                      1 Reply Last reply Reply Quote 0
                      • T
                        tommyboy180
                        last edited by Nov 14, 2011, 8:03 PM

                        @ipv6kid:

                        Is it possible to currently use host name block lists with PFblocker?

                        I'd like to include some known malware URL's. Can that be a feature in an upcoming version?

                        Host names resolve to IP addresses. You can create your own custom list to be used with pfblocker or try to find a list that meets your needs. There are literally hundreds of lists available for free so I would bet your list is already made for you. Start looking at iblocklist.com

                        -Tom Schaefer
                        SuperMicro 1U 2X Intel pro/1000 Dual Core Intel 2.2 Ghz - 2 Gig RAM

                        Please support pfBlocker | File Browser | Strikeback

                        1 Reply Last reply Reply Quote 0
                        • S
                          sekular
                          last edited by Nov 15, 2011, 8:06 PM Nov 15, 2011, 7:58 PM

                          I have a problem where the inbound block rule does not get created for the included country lists. I have been installing and testing packages so i have installed havp and snort and uninstalled them and then reinstalled them again, due to trying to identify a problem. Outbound rules can still be created and the alias for both inbound and outbound are fine. But when i select inbound rule deny on the country lists pages it does not create the rule. Even if i stop pfblocker and remove all the lists and readd and then enable pfblocker, it creates the alias and the outbound block but not the rules on wan.

                          edit: Ok I added a random rule with port 123 on wan and then readded then the lists appeared in the rules and when i changed another country list to inbound deny it showed up. So maybe it is just my rules are not refreshing right and is not related to pfblocker.

                          1 Reply Last reply Reply Quote 0
                          • M
                            marcelloc
                            last edited by Nov 15, 2011, 8:25 PM

                            You need at least one rule created to pfBlocker work on selected interface.

                            Treinamentos de Elite: http://sys-squad.com

                            Help a community developer! ;D

                            1 Reply Last reply Reply Quote 0
                            • M
                              mentalhemroids
                              last edited by Nov 15, 2011, 9:55 PM

                              Running 2.0-RELEASE (i386) built on Tue Sep 13 17:00:00 EDT 2011 Intel(R) Xeon(TM) CPU 3.06GHz w/ 3gb RAM.

                              Just loaded and reloaded pfBlocker and I'm finding that if I set outbound to be blocked to spamlist I can still get to India or Russia located sites.  Any idea what I might need to do.  I have my firewall maximum table entries at 500000.

                              Thanks.

                              1 Reply Last reply Reply Quote 0
                              • T
                                tommyboy180
                                last edited by Nov 15, 2011, 10:31 PM

                                @mentalhemroids:

                                Running 2.0-RELEASE (i386) built on Tue Sep 13 17:00:00 EDT 2011 Intel(R) Xeon(TM) CPU 3.06GHz w/ 3gb RAM.

                                Just loaded and reloaded pfBlocker and I'm finding that if I set outbound to be blocked to spamlist I can still get to India or Russia located sites.  Any idea what I might need to do.  I have my firewall maximum table entries at 500000.

                                Thanks.

                                What are the sites?

                                -Tom Schaefer
                                SuperMicro 1U 2X Intel pro/1000 Dual Core Intel 2.2 Ghz - 2 Gig RAM

                                Please support pfBlocker | File Browser | Strikeback

                                1 Reply Last reply Reply Quote 0
                                • M
                                  mentalhemroids
                                  last edited by Nov 15, 2011, 10:46 PM

                                  @tommyboy180

                                  194.226.127.34 - http://eng.kremlin.ru
                                  203.199.104.241 - http://www.airindia.in

                                  and http://www.prodisney.ru/index.php?page=clones.php

                                  1 Reply Last reply Reply Quote 0
                                  • M
                                    marcelloc
                                    last edited by Nov 16, 2011, 12:38 AM Nov 15, 2011, 11:16 PM

                                    @mentalhemroids:

                                    Running 2.0-RELEASE (i386) built on Tue Sep 13 17:00:00 EDT 2011 Intel(R) Xeon(TM) CPU 3.06GHz w/ 3gb RAM.

                                    Just loaded and reloaded pfBlocker and I'm finding that if I set outbound to be blocked to spamlist I can still get to India or Russia located sites.  Any idea what I might need to do.  I have my firewall maximum table entries at 500000.

                                    Thanks.

                                    Are you blocking countries India and Russia or applying a spamlist from ipblocklist?

                                    Enable pfblocker widget. there you can see alias package count hit.

                                    Treinamentos de Elite: http://sys-squad.com

                                    Help a community developer! ;D

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      mentalhemroids
                                      last edited by Nov 16, 2011, 2:50 PM

                                      @marcelloc

                                      I have the spamlist all selected; I was assuming that if the country is in there the entire country would be blocked.  Am I wrong?

                                      I will take a look at the widget today.

                                      Thanks!

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        marcelloc
                                        last edited by Nov 16, 2011, 3:31 PM

                                        The default way to block spam is inbound as you do not want them to send email to you.

                                        You can also change action to alias only and create a block rule only on inbound smtp connections.

                                        Treinamentos de Elite: http://sys-squad.com

                                        Help a community developer! ;D

                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          sekular
                                          last edited by Nov 16, 2011, 3:53 PM

                                          If i enable the top spammers alias included in pfblocker on outbound those hostnames you specified are not accessible.

                                          1 Reply Last reply Reply Quote 0
                                          143 out of 896
                                          • First post
                                            143/896
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received