Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    New PFSense user needs PFBlockerNG advice

    Scheduled Pinned Locked Moved pfSense Packages
    37 Posts 5 Posters 6.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      doktornotor Banned
      last edited by

      Yeah, the unknown YT video produced by god knows who is just stupid when it suggests to use a huge blacklist instead of tiny whitelist.

      1 Reply Last reply Reply Quote 0
      • ?
        Guest
        last edited by

        @doktornotor:

        Yeah, the unknown YT video produced by god knows who is just stupid when it suggests to use a huge blacklist instead of tiny whitelist.

        So where are instructions on how to use PFBlockerNG that state what you said? I used the documentation offered by the PFSense site. Plus please point to an explanation of why a whitelist is better than the elaborate configuration made possible in the PFBlockerNG interface?

        A whitelist implies I can only get to a few sites and all others are blocked. That kind of defeats the purpose of a home internet connection. Or it makes it real hard to connect via OpenVPN from public wifi halfway across the country.

        Edit: I just found I-Blocklist. I suspect some or all of the lists I use came from there or are also posted there. Is there a limit to the number of lists before it is too many?

        1 Reply Last reply Reply Quote 0
        • D
          doktornotor Banned
          last edited by

          @jim1000:

          So where are instructions on how to use PFBlockerNG that state what you said?

          I already asked you for the NAT/WAN rules so that we are able to provide relevant advise…

          @jim1000:

          I used the documentation offered by the PFSense site.

          No, you used some nonsensical YT video, apparently.

          @jim1000:

          why a whitelist is better than the elaborate configuration made possible in the PFBlockerNG interface?

          $ wc -l /usr/pbi/pfblockerng-amd64/share/GeoIP/* | grep total
            388144 total

          $ wc -l /usr/pbi/pfblockerng-amd64/share/GeoIP/US_v4.txt
            36270 /usr/pbi/pfblockerng-amd64/share/GeoIP/US_v4.txt

          Hope that it'd be clear now why whitelisting 36K subnets is better than blacklisting 350K subnets.

          @jim1000:

          A whitelist implies I can only get to a few sites and all others are blocked. That kind of defeats the purpose of a home internet connection.

          So why are you setting pfBNG to "deny inbound and outbound"?! Regardless, it won't make any difference, you've already denied the entire world except the US by your badly designed rules. The only difference the whitelist makes here is not wasting loads of system resources for nothing.

          1 Reply Last reply Reply Quote 0
          • ?
            Guest
            last edited by

            inbound and outbound …

            First, that was a new user question. Not a master plan to start a flame war. Look at the original post again for more info. To me, these seemed like a reasonable and rather polite request for feedback for a newbie to PFSense.

            Second, my assumption was that these lists are for bad sites that nobody should visit. If I somehow link there, the list will prevent a connection. This would prevent a poisoned DNS server from being effective. Plus the edu lists from I-blocklists will keep OUT University of Michigan scanners and others who play with internet scanning software.

            third, the country blocking comes from elaborate configuration pages within PFBlockerNG. If they aren't meant to be used, why put them there? THis will keep out the Chinese by seemingly making me look invisible, as opposed to inaccessible due to NAT. Plus, I have a few ports open. If someone finds them and knows of a hack to get through, the country blocks will assist in keeping them out.

            1 Reply Last reply Reply Quote 0
            • D
              doktornotor Banned
              last edited by

              1/ So, I take it we just won't see the damned screenshot of the rules. Despite requested 3 times by now. I won't keep begging for them. RTFM and help yourself.
              2,3/ I figure you have no clue what's inbound and outbound and what's default deny.

              1 Reply Last reply Reply Quote 0
              • ?
                Guest
                last edited by

                @doktornotor:

                1/ So, I take it we just won't see the damned screenshot of the rules. Despite requested 3 times by now. I won't keep begging for them. RTFM and help yourself.
                2,3/ I figure you have no clue what's inbound and outbound and what's default deny.

                Your post here makes it look like you're confusing NAT rules with PFBlockerNG operations. The lists include the Spamhaus DROP and EDROP, and others. There's nothing to screen print. The country blocking is from pre-configured pages within the package.

                The questions involve the proper use of PFBlockerNG, as I am still a new user.

                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by

                  Your posts and total lack of basic undestanding of firewalls waste mine - and everyone else's - time. I was willing to provide screenshots of exact settings required to allow whatever WAN access you need inbound to your LAN.  That is impossible without seeing the damned NAT/WAN rules, since I lack a crystal ball. Noone asked you to provide any screenshots of pfBNG country lists or any similar nonsense.

                  Stop posting useless shit and provide requested information. Otherwise, GTFO, frankly.

                  1 Reply Last reply Reply Quote 0
                  • ?
                    Guest
                    last edited by

                    @doktornotor:

                    Your posts and total lack of basic undestanding of firewalls waste mine - and everyone else's - time. I was willing to provide screenshots of exact settings required to allow whatever WAN access you need inbound to your LAN.  That is impossible without seeing the damned NAT/WAN rules, since I lack a crystal ball. Noone asked you to provide any screenshots of pfBNG country lists or any similar nonsense.

                    Stop posting useless shit and provide requested information. Otherwise, GTFO, frankly.

                    Reported to moderator. Your reply was uncalled for and completely mystifying.

                    1 Reply Last reply Reply Quote 0
                    • D
                      doktornotor Banned
                      last edited by

                      @jim1000:

                      Reported to moderator. Your reply was uncalled for and completely mystifying.

                      Yeah, feel free. Now, just piss off and help yourself. Incredible. What a waste of time.

                      1 Reply Last reply Reply Quote 0
                      • ?
                        Guest
                        last edited by

                        @doktornotor:

                        @jim1000:

                        Reported to moderator. Your reply was uncalled for and completely mystifying.

                        Yeah, feel free. Now, just piss off and help yourself. Incredible. What a waste of time.

                        Same to you. Looked at NAT rules. Still nothing to screen print. PFBlockerNG makes no entries there. For 3500+ posts, you sure don't seem to know very much.

                        Edit: looked at firewall rules. PFBlockerNG made a few entries there, but they seemed to be related to the package, not thousands of individual rules. Only a few that looked pretty standard relative to the package.

                        So, back to the original question at entry #1 about the proper configuration of PFBlockerNG from someone who knows what they are talking about this time.

                        1 Reply Last reply Reply Quote 0
                        • D
                          doktornotor Banned
                          last edited by

                          Indeed, I'm just a stupid beta tester of this damned package. Welcome to my ignore list.

                          1 Reply Last reply Reply Quote 0
                          • ?
                            Guest
                            last edited by

                            @doktornotor:

                            Indeed, I'm just a stupid beta tester of this damned package. Welcome to my ignore list.

                            Watch me cry – Not.

                            1 Reply Last reply Reply Quote 0
                            • P
                              pfcode
                              last edited by

                              Hi, Jim

                              Before doing anything to set up your first pfSense, you need to understand what 'inbound' and 'outbound' are.  Make it simple, 'Inbound' is the ones from outside world to your WAN, 'outbound' is the ones from your LAN to outside world. By default pfSense blocks all the 'inbound' ones, so your 'Deny inbound' is useless, basically you just need to 'Deny outbound'. Thats what doktornotor told you.  The only thing that you need to 'Deny inbound/both' is that you have setup NAT port forwarding or something like that, thats why doktornotor ask you to give some your NAT screenshots.

                              BTW,  instead of denying all except US, why don't you just allow US only, thats simplify your firewall NAT rules, thats also doktornotor suggested to you.

                              I recommended that you really need to understand the basic firewall thing first before setting up pfSense and all the add on packages.

                              Release: pfSense 2.4.3(amd64)
                              M/B: Supermicro A1SRi-2558F
                              HDD: Intel X25-M 160G
                              RAM: 2x8Gb Kingston ECC ValueRAM
                              AP: Netgear R7000 (XWRT), Unifi AC Pro

                              1 Reply Last reply Reply Quote 0
                              • ?
                                Guest
                                last edited by

                                @pfcode:

                                Hi, Jim

                                Before doing anything to set up your first pfSense, you need to understand what 'inbound' and 'outbound' are.  Make it simple, 'Inbound' is the ones from outside world to your WAN, 'outbound' is the ones from your LAN to outside world. By default pfSense blocks all the 'inbound' ones, so your 'Deny inbound' is useless, basically you just need to 'Deny outbound'. Thats what doktornotor told you.  The only thing that you need to 'Deny inbound/both' is that you have setup NAT port forwarding or something like that, thats why doktornotor ask you to give some your NAT screenshots.

                                BTW,  instead of denying all except US, why don't you just allow US only, thats simplify your firewall NAT rules, thats also doktornotor suggested to you.

                                I recommended that you really need to understand the basic firewall thing first before setting up pfSense and all the add on packages.

                                I completely understand the difference between outbound and inbound. Countries are denied inbound. SPI allows me to still get out and communicate with them if I initiate the contact. All malicious site lists and the like are denied outbound and inbound.

                                As I have recently discovered, everyone on earth is scanning the internet all the time and searching for open vulnerabilities. Zmap can scan the entire internet in minutes if you have a large enough pipe. Not everyone has noble educational purposes in mind.

                                Your answers raise the question about why this firewall feature is even required if NAT and SPI are all you need, which is your answer by implication. Ditto with snort, by implication.

                                Please explain why PFSense does more than a $20 router and is preferable, as you imply the $20 router with NAT and SPI are all anyone needs.

                                I don't want to whitelist a few sites and be incapable of accessing a few I forgot.  I want to blacklist a lot of bad ones. That's why I mentioned the new router specs as I understand more power is needed if you ask for more services and the speed of your connection matters as well.

                                1 Reply Last reply Reply Quote 0
                                • C
                                  cmb
                                  last edited by

                                  Be nice please, doktornotor.

                                  Jim - do you have any port forwards on WAN? If so, then specifying an alias with US IPs as the source is best to accomplish what you want. No need to process through millions of table entries on block rules when ~36K or so entries as a whitelist would accomplish the same end result. If you have no port forwards or allow rules on WAN, then what you're doing is pointless as everything inbound on WAN will be blocked.

                                  1 Reply Last reply Reply Quote 0
                                  • ?
                                    Guest
                                    last edited by

                                    @cmb:

                                    Be nice please, doktornotor.

                                    Jim - do you have any port forwards on WAN? If so, then specifying an alias with US IPs as the source is best to accomplish what you want. No need to process through millions of table entries on block rules when ~36K or so entries as a whitelist would accomplish the same end result. If you have no port forwards or allow rules on WAN, then what you're doing is pointless as everything inbound on WAN will be blocked.

                                    Same question as before. Why offer these packages if they are essentially worthless, as appears to be implied by your answer? Also, please look at my Zmap reference above for additional depth about my concerns.

                                    1 Reply Last reply Reply Quote 0
                                    • C
                                      cmb
                                      last edited by

                                      @jim1000:

                                      Same question as before. Why offer these packages if they are essentially worthless, as appears to be implied by your answer? Also, please look at my Zmap reference above for additional depth about my concerns.

                                      They're worthless only if you don't have anything open. Lots of people have to forward ports for mail servers, web servers, etc. and their use is a big plus there for many. If you don't have anything open on WAN, you're just adding a bunch of block stuff to process when ultimately that traffic's just going to hit the one default deny block rule and get blocked anyway.

                                      Any kind of port scanner is going to come back with nothing/"stealth" if you have no ports open/no pass rules on WAN. Adding more block rules on WAN when you're already blocking that traffic doesn't accomplish anything but using CPU unnecessarily.

                                      1 Reply Last reply Reply Quote 0
                                      • ?
                                        Guest
                                        last edited by

                                        @cmb:

                                        @jim1000:

                                        Same question as before. Why offer these packages if they are essentially worthless, as appears to be implied by your answer? Also, please look at my Zmap reference above for additional depth about my concerns.

                                        They're worthless only if you don't have anything open. Lots of people have to forward ports for mail servers, web servers, etc. and their use is a big plus there for many. If you don't have anything open on WAN, you're just adding a bunch of block stuff to process when ultimately that traffic's just going to hit the one default deny block rule and get blocked anyway.

                                        Any kind of port scanner is going to come back with nothing/"stealth" if you have no ports open/no pass rules on WAN. Adding more block rules on WAN when you're already blocking that traffic doesn't accomplish anything but using CPU unnecessarily.

                                        Thank you. This would have been a great answer for post #2.

                                        What is your opinion about malicious lists vs virus checkers? PFBlockerNG makes their use available and easy. I use sandboxie religiously so my risks are low. I'm just asking in general.

                                        also, how does snort figure into this?

                                        Also, thinking abstractly, your best guess … with zmap being so powerful and available, what about unknown risks that might become real someday. Same answer as above?

                                        Also, I am forwarding WAN, 3 ports tcp and udp,  to a couple of slingboxes and a sling player. also OpenVPN on port 443 tcp with OpenVPN handling forwarding as needed. Same answer?

                                        1 Reply Last reply Reply Quote 0
                                        • ?
                                          Guest
                                          last edited by

                                          I did a little research and read that aliases will provide better protection and PFBlockerNG is unclear with respect to being needed. What are aliases and how do you use them?

                                          There's a lot of conflicting info and it's all unclear info for the new user.

                                          I have 3 ports plus OpenVPN 443 tcp open, according to port scan sites.

                                          The open ports are for slingboxes, and along with OpenVPN,  may be used at any time by me from an IP address that can not be known beforehand. This, however, is immaterial since any open ports for any purpose from anyone are analogous.

                                          Where is info that answers these questions? I installed PFSense for additional protections that are apparently unneeded? That seems a little unlikely.

                                          How do i use PFBlockerNG for additional protection? It appears following the pfsense html page and other commonly available references will start a flame war if referenced.

                                          Edit: Based on the comments I've received so far, I have decided to disable, not remove, PFBlockerNG as it appears to be a solution in need of a problem. Please correct me if I am wrong.

                                          1 Reply Last reply Reply Quote 0
                                          • C
                                            cmb
                                            last edited by

                                            @jim1000:

                                            Also, I am forwarding WAN, 3 ports tcp and udp,  to a couple of slingboxes and a sling player. also OpenVPN on port 443 tcp with OpenVPN handling forwarding as needed. Same answer?

                                            I thought you'd mentioned earlier in the thread that you had nothing open on WAN. That changes things. Block all that if you want, but better off creating a US alias then using that as the source in all your WAN rules.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.