• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

PfBlocker

pfSense Packages
143
896
1.3m
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    BBcan177 Moderator
    last edited by Sep 21, 2014, 2:55 PM

    @simby:

    Hi!

    How can i fix this on PF 2.2 BETA?

    Crash report begins.  Anonymous machine information:

    amd64
    10.1-PRERELEASE
    FreeBSD 10.1-PRERELEASE #28 30e366f(HEAD)-dirty: Fri Sep 19 23:30:48 CDT 2014    root@pf22-amd64-snap:/usr/obj.amd64/usr/pfSensesrc/src/sys/pfSense_SMP.10

    Crash report details:

    PHP Errors:
    in /usr/local/pkg/pfblocker.inc on line 256

    This error doesn't seem to be related to Country Blocking. Maybe its one of your Lists that is failing? Which lists are you using?

    "Experience is something you don't get until just after you need it."

    Website: http://pfBlockerNG.com
    Twitter: @BBcan177  #pfBlockerNG
    Reddit: https://www.reddit.com/r/pfBlockerNG/new/

    1 Reply Last reply Reply Quote 0
    • F
      f34rinc
      last edited by Sep 22, 2014, 12:06 AM Sep 21, 2014, 3:38 PM

      Thank you BBcan177 I don't believe I have the skill set to accomplish this

      Edit - I took the country list of top spammers from http://www.projecthoneypot.org/spam_server_top_countries.php and made a script to make my own replacement for the pfBlocker top spammers list.  Please use the link from my previous post above.

      1 Reply Last reply Reply Quote 0
      • W
        wbennett77
        last edited by Sep 28, 2014, 8:58 PM

        Hi there,
        Total newbie to Pfsense here. I have installed Pfblocker but and added a few countries to block. It is enabled, logging enabled and "deny inbound" is selected for the countries I chose. When I look at the status i see that the status is a red arrow (down). Am I missing something?
        Thanks

        Dell Optiplex 390 Pfsense 2.2 / Asus AC56U Wireless AP / Asus Switch

        1 Reply Last reply Reply Quote 0
        • B
          BBcan177 Moderator
          last edited by Sep 28, 2014, 9:05 PM

          PfBlocker will not add an Inbound Rule if there are no other rules on the WAN. So you just need to create a dummy rule and it will populate the Auto Rules.

          "Experience is something you don't get until just after you need it."

          Website: http://pfBlockerNG.com
          Twitter: @BBcan177  #pfBlockerNG
          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

          1 Reply Last reply Reply Quote 0
          • W
            wbennett77
            last edited by Sep 28, 2014, 9:39 PM Sep 28, 2014, 9:16 PM

            @BBcan177:

            PfBlocker will not add an Inbound Rule if there are no other rules on the WAN. So you just need to create a dummy rule and it will populate the Auto Rules.

            Being a eager to learn newbie, how and where would I create a dummy rule. Sorry if this has been asked before.

            Update: Got it working. Dummy rule created on the wan did the trick. I disabled the rule after pfblocker started working and all is still good.

            Cheers!

            Dell Optiplex 390 Pfsense 2.2 / Asus AC56U Wireless AP / Asus Switch

            1 Reply Last reply Reply Quote 0
            • B
              BBcan177 Moderator
              last edited by Sep 28, 2014, 9:35 PM

              You need to goto the Firewall rules Tab and create a dummy Block Rule on the Wan interface. If you hover over the pfBlocker Inbound rule that was created. You can use one of those IPs to copy/paste into the dummy rule.

              If you edit the inbound rule. It will give you an idea on how to configure the new WAN Block Rule.

              "Experience is something you don't get until just after you need it."

              Website: http://pfBlockerNG.com
              Twitter: @BBcan177  #pfBlockerNG
              Reddit: https://www.reddit.com/r/pfBlockerNG/new/

              1 Reply Last reply Reply Quote 0
              • W
                wbennett77
                last edited by Sep 28, 2014, 9:47 PM

                @BBcan177:

                You need to goto the Firewall rules Tab and create a dummy Block Rule on the Wan interface. If you hover over the pfBlocker Inbound rule that was created. You can use one of those IPs to copy/paste into the dummy rule.

                If you edit the inbound rule. It will give you an idea on how to configure the new WAN Block Rule.

                Once pfblocker is working can I delete the dummy rule I created. Also, how does the list of ip addresses get updated?

                Thanks!

                Dell Optiplex 390 Pfsense 2.2 / Asus AC56U Wireless AP / Asus Switch

                1 Reply Last reply Reply Quote 0
                • D
                  dstroot
                  last edited by Oct 28, 2014, 5:23 PM

                  @wcrowder:

                  It is being very actively forked, we will just have to wait for an announcement from the author doing the update… Or, you could read this thread more carefully.  ;D Did you read the thread I posted to you Panz?  :-*

                  This is a 58 page thread and the link is a long thread also - why not not just enlighten us? ;D

                  Cheers!

                  1 Reply Last reply Reply Quote 0
                  • S
                    stephenw10 Netgate Administrator
                    last edited by Oct 28, 2014, 6:56 PM

                    Have a look here

                    https://forum.pfsense.org/index.php?topic=42543.msg439552#msg439552

                    1 Reply Last reply Reply Quote 0
                    • D
                      dstroot
                      last edited by Oct 28, 2014, 10:01 PM

                      Aha - thanks!  I found an older version of the work here: https://github.com/BBcan177/pf-IPrep

                      Hope this is progressing well!  I'd love to just install and configure a package rather all the manual steps…  ;D

                      1 Reply Last reply Reply Quote 0
                      • W
                        wcrowder
                        last edited by Oct 28, 2014, 11:56 PM

                        :)  ;D  :-*…. > :-X

                        @dstroot:

                        Aha - thanks!  I found an older version of the work here: https://github.com/BBcan177/pf-IPrep

                        Hope this is progressing well!  I'd love to just install and configure a package rather all the manual steps…  ;D

                        1 Reply Last reply Reply Quote 0
                        • B
                          BBcan177 Moderator
                          last edited by Oct 29, 2014, 2:00 AM

                          @dstroot:

                          Hope this is progressing well!  I'd love to just install and configure a package rather all the manual steps…  ;D

                          Where is the fun in that! ? Lol..

                          The version you refered to is my shell script. If you want to step into the wild side and try my pfBlockerNG package shoot me a PM.

                          "Experience is something you don't get until just after you need it."

                          Website: http://pfBlockerNG.com
                          Twitter: @BBcan177  #pfBlockerNG
                          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                          1 Reply Last reply Reply Quote 0
                          • S
                            samline
                            last edited by Nov 8, 2014, 8:43 PM

                            I am trying to upload a local .txt IP blocklist to pfBlocker. What is the correct file address location to use?

                            C:\Users\my user\Desktop\ipblocklist.txt  (example) does not work.

                            Thanks.

                            1 Reply Last reply Reply Quote 0
                            • S
                              stephenw10 Netgate Administrator
                              last edited by Nov 8, 2014, 9:59 PM

                              'Local file' means local to the pfSense box. Upload the file and then fill in the path. If you use the file upload facility in Diagnostics in the webgui it will be in /tmp.

                              Steve

                              1 Reply Last reply Reply Quote 0
                              • A
                                ashes00
                                last edited by Nov 17, 2014, 3:55 PM

                                @LinuxTracker:

                                @LinuxTracker:

                                Came across a new list of malware IPs

                                http://labs.alienvault.com/labs/index.php/projects/open-source-ip-reputation-portal/download-ip-reputation-database/

                                Looks like either the gzip ver or the plain ver - of the Generic Format - would load fine in pfBlocker.

                                Haven't tried it yet - will give it a go tonight and post back how it loads.

                                Here's my report back on the AlienVault IP Reputation list.
                                I had it block matching http/https outbound - and block matching * inbound.

                                The list is big, over 300k IPs.

                                The text version is 17MB and it added nearly a minute to my filter reload time (3Ghz PentiumD, 4GB).

                                I tried the gzip version and found it much smaller and faster.  I had no noticeable difference in filter reload times.

                                After running the list for a most of a week, I had 2 false positives.  That's not bad.

                                One was a big web host that AlienVault listed over a year ago (for serious malware distribution).
                                The IP was cleaned immediately so AlienVault must not delist IPs automatically.
                                The other false positive was a Tor directory server.

                                Conclusion:
                                Given the big database (and no auto-delisting) I'd say AlienVault has a really low false positive rate.
                                My opinion is that it's worth trying - providing you log any hits on it.

                                LinuxTracker - Sorry to bring up this 2 year old post, but I was wondering how things were going with the AlienVault IP Reputation Database (Generic), and its use as a pfBlocker list source.  I see the generic list is near 114K IPs as of 11/17/14.  I am interested in using this in pfBlocker.  Where you able to just add in the .gz url, and it work automatically like other pfBlocker lists, or did you have to massage the data?  Any other information you might have on this is greatly appreciated.  Have a great day.

                                Ash,

                                1 Reply Last reply Reply Quote 0
                                • S
                                  Supermule Banned
                                  last edited by Nov 17, 2014, 3:59 PM

                                  I suggest you get intouch with BBcan17 and talk to him about pfblockerNG as a replacement.

                                  I run it here in test mode and besides some small issues, then it works like a charm!

                                  1 Reply Last reply Reply Quote 0
                                  • W
                                    Wolf666
                                    last edited by Nov 17, 2014, 4:04 PM

                                    @Supermule:

                                    I suggest you get intouch with BBcan17 and talk to him about pfblockerNG as a replacement.

                                    I run it here in test mode and besides some small issues, then it works like a charm!

                                    it is!

                                    Been testing pfblockerNG and it's a real step forward.

                                    Modem Draytek Vigor 130
                                    pfSense 2.4 Supermicro A1SRi-2558 - 8GB ECC RAM - Intel S3500 SSD 80GB - M350 Case
                                    Switch Cisco SG350-10
                                    AP Netgear R7000 (Stock FW)
                                    HTPC Intel NUC5i3RYH
                                    NAS Synology DS1515+
                                    NAS Synology DS213+

                                    1 Reply Last reply Reply Quote 0
                                    • jdillardJ
                                      jdillard
                                      last edited by Sep 7, 2016, 8:33 PM Sep 6, 2016, 7:24 PM

                                      There is now a pfBlockerNG package that replaces pfBlocker, so I am locking this thread.

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.