Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfBlocker

    Scheduled Pinned Locked Moved pfSense Packages
    896 Posts 143 Posters 1.3m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      LinuxTracker
      last edited by

      Just an FYI.

      I looked around a lot for a versatile, online IP converter.
      The only one I ever found is by Bluetack and it never showed up in any of my Google search queries.

      http://www.bluetack.co.uk/converter/

      1 Reply Last reply Reply Quote 0
      • S
        S_D
        last edited by

        Hi there,

        Sorry if I'm being a bit thick here and/or this question has already been asked, but can i use this package download blocklists, create Aliases against them, and then use standard pfsense firewall rules to block those ranges talking to/from just ONE port on a particular IP address (ie, allow it for all other ports)?

        Thanks!

        1 Reply Last reply Reply Quote 0
        • marcellocM
          marcelloc
          last edited by

          S_D,

          Sure you can, just configure pfblocker and set action to alias only.

          This way pfblocker download,create the lists and you can assgin these aliases to your own rules.

          att,
          Marcello Coutinho

          Treinamentos de Elite: http://sys-squad.com

          Help a community developer! ;D

          1 Reply Last reply Reply Quote 0
          • S
            S_D
            last edited by

            Perfect! Thanks for the reply. I'll set it up tonight.

            1 Reply Last reply Reply Quote 0
            • nesenseN
              nesense
              last edited by

              Hi  :)

              issue with system being stuck at "configuring firewall…" after reboot/startup with WAN interface down(or having wrong IP config)
              using ctrl-c at console doesn't help.

              i think the issue is pf tries to grab the lists but keeps waiting?

              I tried uninstalling pfblocker and it worked fine with WAN down.
              removed aliases + used deny inbound did not help

              I'm using pfblocker 1.0.2 and pfs nanobsd 2.0.1

              Thank u!

              1 Reply Last reply Reply Quote 0
              • marcellocM
                marcelloc
                last edited by

                I've pushed an update to avoid downloads during boot process, reinstall the package and test again.

                att,
                Marcello Coutinho

                Treinamentos de Elite: http://sys-squad.com

                Help a community developer! ;D

                1 Reply Last reply Reply Quote 0
                • nesenseN
                  nesense
                  last edited by

                  @marcelloc:

                  I've pushed an update to avoid downloads during boot process, reinstall the package and test again.

                  att,
                  Marcello Coutinho

                  I tried reinstalling but package version is still 1.0.2 and I faced the same issue.

                  Thank u

                  1 Reply Last reply Reply Quote 0
                  • marcellocM
                    marcelloc
                    last edited by

                    Try to get some info on system logs.

                    Treinamentos de Elite: http://sys-squad.com

                    Help a community developer! ;D

                    1 Reply Last reply Reply Quote 0
                    • nesenseN
                      nesense
                      last edited by

                      php: : The command '/usr/bin/grep -v '^#' '/var/db/aliastables/pfBlockerspyware.txt.tmp' > '/var/db/aliastables/pfBlockerspyware.txt'' returned exit code '2', the output was ''
                      php: : The command '/usr/bin/fetch -T 5 -q -o '/var/db/aliastables/pfBlockerspyware.txt.tmp' 'https://127.0.0.1:443/pfblocker.php?pfb=pfBlockerspyware'' returned exit code '1', the output was 'fetch: transfer timed out'
                      php: : The command '/sbin/pfctl -nf /tmp/rules.test.packages' returned exit code '1', the output was 'no IP address found for grep: /tmp/rules.test.packages:17: file "/var/db/aliastables/pfBlockerTopSpammers.txt" contains bad data no IP address found for grep: /tmp/rules.test.packages:19: file "/var/db/aliastables/pfBlockerads.txt" contains bad data no IP address found for grep: /tmp/rules.test.packages:21: file "/var/db/aliastables/pfBlockerspyware.txt" contains bad data no IP address found for grep: /tmp/rules.test.packages:23: file "/var/db/aliastables/pfBlockerhijacked.txt" contains bad data no IP address found for grep: /tmp/rules.test.packages:25: file "/var/db/aliastables/pfBlockerdshield.txt" contains bad data'

                      1 Reply Last reply Reply Quote 0
                      • marcellocM
                        marcelloc
                        last edited by

                        Pfsense is trying to update urltables applied by pfblocker during boot.

                        I'll try to find a way to prevent this if there is no link/ip/webserver up.

                        Treinamentos de Elite: http://sys-squad.com

                        Help a community developer! ;D

                        1 Reply Last reply Reply Quote 0
                        • T
                          TrickyWidget
                          last edited by

                          I got the dreaded error trying to load the Level 1 list:

                          There were error(s) loading the rules: /tmp/rules.debug:16: cannot define table pfBlockerLevel1:
                           Cannot allocate memory pfctl: Syntax error in config file: pf rules not loaded - The line in question reads
                           [16]: table <pfblockerlevel1> persist file "/var/db/aliastables/pfBlockerLevel1.txt"</pfblockerlevel1>
                          

                          My Firewall Maximum Table Entries is set to 4294967295 and still no love.  Freshly installed pfSense and pfBlocker, most everything at defaults.  Just the one block list.  512MB of RAM, only 32% in use.  1GHZ CPU.

                          Does anyone have any suggestions?

                          Thanks.

                          1 Reply Last reply Reply Quote 0
                          • T
                            TrickyWidget
                            last edited by

                            I got this suggestion from marcelloc:

                            @marcelloc:

                            Unselect the list, apply pfblocker config.

                            change again table max entries and apply config.

                            when you are sure that the new config is applied, try to enable again the list.

                            That seemed to work for a while, but the error eventually returned (or at once on reboot).

                            I've got a RAM upgrade on the way to see if going to 1GB helps any.

                            1 Reply Last reply Reply Quote 0
                            • F
                              fragged
                              last edited by

                              Hi,

                              On my physical 2.0.1 box pfblocker is making duplicate WAN rules. I only though to check after reading this thread: http://forum.pfsense.org/index.php/topic,50408.0.html . I tried to remove + reinstall the package, but it saved the config files and still keeps making duplicates.

                              pfblocker works fine on my VM, which also has floating rules though I've only used the latest version on it.

                              Is there a file / config I should also remove addition to the pfblocker package to make sure nothing is carried on.

                              Regards,
                              Joona

                              1 Reply Last reply Reply Quote 0
                              • marcellocM
                                marcelloc
                                last edited by

                                I've reduces duplicate cases and also applied some forum users patches but there are still duplicates on some cases.

                                This does not affect pfsense performance or load, is just a minor bug I could not fix 100% yet.

                                To workaround, you can change pfblocker action to alias only and create your own rules on wan just like the way you did on floating rules.

                                att,
                                Marcello Coutinho

                                Treinamentos de Elite: http://sys-squad.com

                                Help a community developer! ;D

                                1 Reply Last reply Reply Quote 0
                                • T
                                  TrickyWidget
                                  last edited by

                                  Upgrading to 1GB RAM and further increasing the firewall table entries seems to have resolved my memory issues with the level 1 list.

                                  1 Reply Last reply Reply Quote 0
                                  • marcellocM
                                    marcelloc
                                    last edited by

                                    Great! thanks for the feedback.

                                    Treinamentos de Elite: http://sys-squad.com

                                    Help a community developer! ;D

                                    1 Reply Last reply Reply Quote 0
                                    • O
                                      OldGrayandCranky
                                      last edited by

                                      I believe that a bug exists in pfBlocker 1.0.2 or maybe it is by design but I can't see why it would be.

                                      In a fresh install of pfSense 2.01, after completing the setup wizard and installing the pfBlocker package, WAN rules are not created automatically by pfBlocker unless a manually added rule already exists in the WAN rules. The Action selected was "Deny Both".

                                      The LAN rules are created without any problem. I did a complete fresh install again to verify this. Can someone confirm if this is a bug?

                                      A workaround is to manually create a rule in the WAN rules and then configure pfBlocker. Everything works fine then.

                                      Thanks for your help.  :)

                                      1 Reply Last reply Reply Quote 0
                                      • P
                                        phil.davis
                                        last edited by

                                        Each interface has an implicit "block all" rule on the end (not listed on the GUI). So if there are no WAN rules, or just other blocking rules (like Block bogon networks), then all connection attempts from WAN are being blocked already. So there is nothing to be gained by adding a pfBlocker rule (I guess it would just add extra processing for nothing). The behaviour is by design, not a bug.
                                        Once you open up something on WAN, then you need to go to pfBlocker and "Save" again. It will reprocess everything, find stuff opened up on WAN and add its blocking rules.
                                        Note: if I then delete the rules that opened things up on WAN, go to pfBlocker and "Save", then pfBlocker does not remove its rules from WAN. So you can end up with an unusual-looking state (but no security issue). If you disable pfBlocker and save, then enable and save, it cleans up any rules then puts back the essential rules, restoring the state of things to "normal".

                                        As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                                        If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                                        1 Reply Last reply Reply Quote 0
                                        • marcellocM
                                          marcelloc
                                          last edited by

                                          phil.davis,

                                          100% correct  :)

                                          Explaining the code:

                                          While applying pfblocker rules, if it does not find wan rules array, it will not create one(as default action is block). That's why you need a rule on wan before pfblocker can apply rules to it.

                                          att,
                                          Marcello Coutinho

                                          Treinamentos de Elite: http://sys-squad.com

                                          Help a community developer! ;D

                                          1 Reply Last reply Reply Quote 0
                                          • O
                                            OldGrayandCranky
                                            last edited by

                                            Thanks Phil and Marcelloc, The explanation was informative and I do agree with the logic of the design. I appreciate the time spent on the project. It fills a very important need. Thanks!

                                            On useability, I can't help thinking that allowing the "Deny Both" option to be successfully executed lures the user into a false sense of security when in fact, they need to reapply the rules to be protected.

                                            Since the package already tests to see if there are rules on the WAN, is it possible to use that logic to fail the execution if no rules exist and force the user to select an option that would meet all of the requirements? If so, the error message could instruct them to add rules to the WAN or choose another option.

                                            That extra step would improve the package and provide an extra measure of protection by default.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.