Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfBlocker

    pfSense Packages
    143
    896
    1.3m
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • marcellocM
      marcelloc
      last edited by

      @nsconsulting:

      is it possible to activate a list for a specific service?
      P.S. I guess you'll answer me to create an alias and use it in my custom rule but If you could add it straight in the
      list wizard I guess would be perfect anyway:)

      for now, only via alias and custom rules  :)

      Treinamentos de Elite: http://sys-squad.com

      Help a community developer! ;D

      1 Reply Last reply Reply Quote 0
      • P
        pf3000
        last edited by

        Hello marcelloc & tommyboy180, thanks for pfBlocker. There used to be a Windows iblocklist manager over a decade ago(!) ; )

        I was testing the pfBlocker package and I went only so far as almost adding a custom iBlocklist. Unfortunately the maximum list update interval is 24 hours (only). iBlocklist has recently begun restricting update interval themselves. Besides, shouldn't we make fair use of free resources like iblocklist and more…

        Unfortunately, due to the increasingly heavy traffic they have been sustaining for us, they will be forced to start limiting list downloads for all users, effective Tuesday September 24th.  After this date, free users will only be able to download updated lists once per week.  If you sign up for their IBlockList Subscription program however

        1 Reply Last reply Reply Quote 0
        • D
          dbmdl
          last edited by

          Thanks so much for this package. It really saves us from a lot of spam!!

          That being said, who would I report issues to.  Until yesterday we were able to send email to an Hurricane Electric subscriber. Now the ip is being blocked. After adding the individual IP address for the smtp server into the "Lists" section/tab and selecting allow outbound, now we are able to communicate once again.

          All that to say, which forum moderate the ipblocker list to have that range re-identified.  I have us as an allowed range, but for some reason, at least, this one range is being id as not us.

          Thanks

          Daniel

          1 Reply Last reply Reply Quote 0
          • R
            Ramosel
            last edited by

            Marcello or anyone with a good idea,
            I am pulling my hair out over one new (to me) LIST.

            http://doc.emergingthreats.net/pub/Main/RussianBusinessNetwork/RussianBusinessNetworkIPs.txt

            I've created, combined, deleted and used dozens of lists, both gz and txt, and had no issues.  I can get THIS list built in pfBlocker but it never populates in rules, alias or in the dashboard widget.  I've looked around the logs and not seen anything (good chance I'm looking in the wrong place).  I know its a big list but some of yours are sizeable too.  Per a discussion around snort on another thread I even bumped up my "Firewall Max Tables" and "Firewall Max Tables Entries".  I'm running a 64bit copy of 2.1 with 4G memory that is only about 24% used.

            I've made it a standalone rule, I've tried it in "deny" and "alias only" modes; neither way works.  I've included it in another list under a single alias.  Random selection of IPs from this list never make it into the tables.  I've not had any problems with any other lists.  I can get to THIS list from any browser behind the router/UTM so access through the network doesn't seem to be an issue.  Any ideas?  Am I missing something?

            TIA,
            Rick

            1 Reply Last reply Reply Quote 0
            • R
              Ramosel
              last edited by

              Bump!

              OK, so I've tried other avenues and just can't get this list to build correctly.  It shows in the list of "Lists" but just doesn't seem to go beyond that.  I've killed off every other "added" list and started new with this one.  All others build accordingly, this one just does nothing.

              • I"ve checked every log I can find but don't see any errors relating to this.  Does anyone know exactly where an error would post if it is being logged?

              • could there be a corrupt marker somewhere that I need to kill?  where would that be?

              Thanks for any help or ideas?

              Rick

              Edit:  had the time today so on the advice of two others I completely removed pfBlocker.  Removed its files/directories. Reinstalled the whole package.  Rebuilt all the lists I wanted under the lists tab… some txt, some gz.  Every list rebuilt fine except this @#$$&#^ Russian Business Networks list.  Unless someone has an idea, I'm going to throw in the towel on this one and just go with the RBN rules under SNORT.  Marcello?  Tommyboy?
              Add:  Does anyone have a confirmed instance of this list actually working??

              1 Reply Last reply Reply Quote 0
              • F
                fragged
                last edited by

                I for one can't get the mentioned list to work. I've posted a php error related to the list on this thread when pfSense 2.1 was still in beta and it was showing the php error that occurs with said list.

                1 Reply Last reply Reply Quote 0
                • D
                  daxpfacc
                  last edited by

                  Hi, got exactly the same problem, since a long ago, tried everything but this list http://doc.emergingthreats.net/pub/Main/RussianBusinessNetwork/RussianBusinessNetworkIPs.txt never loaded. This morning found this list http://rules.emergingthreats.net/blockrules/rbn-ips.txt that loads flawlessy. In my opinion it is quite the same listing. Try it.

                  1 Reply Last reply Reply Quote 0
                  • P
                    phil.davis
                    last edited by

                    I just made a URL Table Alias with http://doc.emergingthreats.net/pub/Main/RussianBusinessNetwork/RussianBusinessNetworkIPs.txt on a 2.1-RELEASE Alix nanoBSD. The table loads into pf with 9252 entries. Used it as source in a block rule on WAN and it works. So the list itself is not bad. And you can easily use it anyway without pfBlocker, just using the ordinary URL Table Alias and Firewall Rules features of pfSense.

                    As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                    If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                    1 Reply Last reply Reply Quote 0
                    • M
                      Mr. Jingles
                      last edited by

                      @phil.davis:

                      I just made a URL Table Alias with http://doc.emergingthreats.net/pub/Main/RussianBusinessNetwork/RussianBusinessNetworkIPs.txt on a 2.1-RELEASE Alix nanoBSD. The table loads into pf with 9252 entries. Used it as source in a block rule on WAN and it works. So the list itself is not bad. And you can easily use it anyway without pfBlocker, just using the ordinary URL Table Alias and Firewall Rules features of pfSense.

                      Probably a stupid question (you are used to that coming from me by now  ;D) but what actually is the added value of pfBlocker, given that obviously you can do the same that does without it, given your comment.

                      6 and a half billion people know that they are stupid, agressive, lower life forms.

                      1 Reply Last reply Reply Quote 0
                      • P
                        phil.davis
                        last edited by

                        I can run this to see what happens getting the files:

                        $url_list1 = file("http://rules.emergingthreats.net/blockrules/rbn-ips.txt");
                        var_dump(count($url_list1));
                        $url_list2 = file("http://doc.emergingthreats.net/pub/Main/RussianBusinessNetwork/RussianBusinessNetworkIPs.txt");
                        var_dump(count($url_list2));
                        

                        and I get:

                        int(9194)
                        
                        Warning: file(http://doc.emergingthreats.net/pub/Main/RussianBusinessNetwork/RussianBusinessNetworkIPs.txt): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden
                         in /usr/local/www/exec.php(246) : eval()'d code on line 7
                        int(1)
                        

                        rbn-ips.txt is fetched OK by PHP into an array of 9194 entries.
                        RussianBusinessNetworkIPs.txt does not come, something blocking it from being read with PHP file()

                        Additional info: If I change pfblocker.inc sync_package_pfblocker() to use the function download_file() from pfsense-utils.inc, downloading it first to a local file then letting the rest of the code parse a local copy, then it works. So the code in /etc/inc/pfsense-utils.inc:download_file() is able to download the list OK, getting 9251 entries.

                        Maybe pfblocker should use download_file() rather than PHP file()?
                        (That would need testing against a bunch of things people are using - some other list download might break???)

                        As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                        If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                        1 Reply Last reply Reply Quote 0
                        • R
                          Ramosel
                          last edited by

                          @daxpfacc:

                          Hi, got exactly the same problem, since a long ago, tried everything but this list http://doc.emergingthreats.net/pub/Main/RussianBusinessNetwork/RussianBusinessNetworkIPs.txt never loaded. This morning found this list http://rules.emergingthreats.net/blockrules/rbn-ips.txt that loads flawlessy. In my opinion it is quite the same listing. Try it.

                          Thanks!  had no problem getting this one to load either.  Looking at the site, at least this one seems more current as well.  It's just a couple weeks old, not 2 years.  I had brought the offend file local so I randomly picked about 30 addresses and they were in both so I'll hope the slightly lower line item count is because of newer data.

                          Rick

                          1 Reply Last reply Reply Quote 0
                          • ?
                            A Former User
                            last edited by

                            using pfblocker for the list management allows you to enter all the lists in a single alias. This is not possible for the regular aliases (url + url table). It's either many small lists, or one huge list, with those.

                            I'll start using http://rules.emergingthreats.net/blockrules/rbn-ips.txt since it causes fewer problems with people. Thanks for the info. Expect the update to come with the next blueprint update.

                            EDIT: Just checked and http://doc.emergingthreats.net/pub/Main/RussianBusinessNetwork/emerging-rbn-malvertisers.txt should be http://rules.emergingthreats.net/blockrules/rbn-malvertisers-ips.txt, so it's 2 upcoming updates to the blueprint.
                            As far as I can remember those 2 were chosen because of lack of the rules.emergingthreats.net lists.

                            1 Reply Last reply Reply Quote 0
                            • R
                              Ramosel
                              last edited by

                              @jflsakfja:

                              using pfblocker for the list management allows you to enter all the lists in a single alias. This is not possible for the regular aliases (url + url table). It's either many small lists, or one huge list, with those.

                              I'll start using http://rules.emergingthreats.net/blockrules/rbn-ips.txt since it causes fewer problems with people. Thanks for the info. Expect the update to come with the next blueprint update.

                              EDIT: Just checked and http://doc.emergingthreats.net/pub/Main/RussianBusinessNetwork/emerging-rbn-malvertisers.txt should be http://rules.emergingthreats.net/blockrules/rbn-malvertisers-ips.txt, so it's 2 upcoming updates to the blueprint.
                              As far as I can remember those 2 were chosen because of lack of the rules.emergingthreats.net lists.

                              Don't know your name so I'll just use the first two initials and say thanks JF!!  (significant if you're a Phillip Dick fan… and how can you follow BOHP and not be a Dick fan)

                              One request;  If possible and not too much hassle, could you somehow highlight the changes from your last blueprint?

                              I must say, since switching over to your method and using the rules to do pfblocker's work, even with more rules active under SNORT, system is much faster AND using much less memory.  Which, made it possible to commit more memory to Squid which helps even more!

                              Thanks,
                              Rick

                              1 Reply Last reply Reply Quote 0
                              • B
                                breakaway
                                last edited by

                                I'm interested in the country-blocking abilities of pfBlocker.

                                I've got assets that are 99.99% of the time only accessed from within my country. So, I've added a rule with my country as the block list, then inverted the match so any traffic from OUTSIDE the country is dropped. Seems to work well enough, but can someone comment as to:

                                • Where does pfBlocker gets its IPs from?

                                • How often does pfBlocker update its IP list?

                                • What is the likelihood that an IP range will be assigned to a country but won't be picked up by pfBlocker?

                                1 Reply Last reply Reply Quote 0
                                • D
                                  doktornotor Banned
                                  last edited by

                                  @breakaway:

                                  I'm interested in the country-blocking abilities of pfBlocker.

                                  I've got assets that are 99.99% of the time only accessed from within my country. So, I've added a rule with my country as the block list, then inverted the match so any traffic from OUTSIDE the country is dropped. Seems to work well enough, but can someone comment as to:

                                  • Where does pfBlocker gets its IPs from?

                                  • How often does pfBlocker update its IP list?

                                  • What is the likelihood that an IP range will be assigned to a country but won't be picked up by pfBlocker?

                                  1/ Here - The lists are 2 years old.  ::)
                                  2/ Never, the lists have gone commercial quite some time ago.
                                  3/ Pretty high, given the above.

                                  All the country-based stuff should have been removed altogether from the package quite some time ago, useless.

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    Supermule Banned
                                    last edited by

                                    I agree or the lists should be updated.

                                    1 Reply Last reply Reply Quote 0
                                    • B
                                      breakaway
                                      last edited by

                                      That is most unfortunate. I don't suppose anyone knows if an up-to-date country list is provided somewhere?

                                      1 Reply Last reply Reply Quote 0
                                      • BBcan177B
                                        BBcan177 Moderator
                                        last edited by

                                        @breakaway:

                                        That is most unfortunate. I don't suppose anyone knows if an up-to-date country list is provided somewhere?

                                        You can add the Country Block lists from IBlock Lists.

                                        https://www.iblocklist.com/lists.php?category=country

                                        I haven't tested it, but they are listed there.

                                        "Experience is something you don't get until just after you need it."

                                        Website: http://pfBlockerNG.com
                                        Twitter: @BBcan177  #pfBlockerNG
                                        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                        1 Reply Last reply Reply Quote 0
                                        • J
                                          JWTrance
                                          last edited by

                                          Good afternoon,

                                          Great thread so far, thanks for all your great detective work.  :)

                                          Im running pfs at a minimum with pfBlocker and system patches. I'm using nested alias lists: two url aliases, Evil_Lists_1 and 2, each containing 3-5 localhost list urls. All pfBlocker lists are set to "alias only" as I prefer to create my own rules (this also seems to be a better way according to others as well). I then created two WAN rules for each list, one to block inbound traffic and another to reject outbound traffic, and also two LAN rules for each interface rejecting outbound traffic for each list. They seem to be blocking properly as far as I can tell and the correct CIDR numbers are showing in the widget at all times but the lists are always shown as down in the widget. I have tried renaming my rule descriptions based on what Marcello and others have recommended in earlier posts ("lead with pfblocker* and dont end with rule") in varying ways but it still wont show as up in the widget.

                                          Not a serious problem but I like the widget and I want it to work. Any suggestions?

                                          Also, would I be better off having a rule for each original pfBlocker alias? I prefer steamlined rules and less of them, is there any benefit to individual rules other than the widget working?

                                          Thanks again for an informative thread.

                                          1 Reply Last reply Reply Quote 0
                                          • D
                                            doktornotor Banned
                                            last edited by

                                            @JWTrance:

                                            All pfBlocker lists are set to "alias only"

                                            You won't have any such thing with aliases.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.