Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfBlockerNG

    Scheduled Pinned Locked Moved pfBlockerNG
    1.2k Posts 211 Posters 2.1m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      tonymorella
      last edited by

      @scott@hosiermail.com:

      I am currently blocking Asia and have hired a developer in India. How can I exclude his subnet and still have the rest of India blocked.
      I have India( CTRL + CLICK to unselect countries) at the moment so he has access.

      Just create a new floating rule and add his subnet as the source for incoming traffic for your WAN interface.

      Tony

      1 Reply Last reply Reply Quote 0
      • P
        pfcode
        last edited by

        HI,

        I have found that if I'm using RAMDisk, After a pfSense start/restart, the pfBlockerNG Alerts page list 'No match' on all alerts until I manually do a force update. I thought the lists should be all loaded after a root/start. Obviously it didn't when using RAMDisk.  No issue when not using RAM Disk.  This is annoying.  Am I missing something?

        Release: pfSense 2.4.3(amd64)
        M/B: Supermicro A1SRi-2558F
        HDD: Intel X25-M 160G
        RAM: 2x8Gb Kingston ECC ValueRAM
        AP: Netgear R7000 (XWRT), Unifi AC Pro

        1 Reply Last reply Reply Quote 0
        • BBcan177B
          BBcan177 Moderator
          last edited by

          @pfcode:

          HI,

          I have found that if I'm using RAMDisk, After a pfSense start/restart, the pfBlockerNG Alerts page list 'No match' on all alerts until I manually do a force update. I thought the lists should be all loaded after a root/start. Obviously it didn't when using RAMDisk.  No issue when not using RAM Disk.  This is annoying.  Am I missing something?

          Well this is the issue with RamDisk installations… On a reboot the /var folder is wiped out… That would include any other packages that store data there...

          I have added a workaround to copy the final "/var/db/aliastables/pfB_*" files… and restore those after a reboot so that the tables and firewall rules don't have any issues...

          However, the rest of the files are gone, and the only way to recover is with a "Force Reload" or wait for the next Cron task to execute. The issue with a RamDisk is always size, so Its not appropriate to try and archive all the files and restore them... Not to mention that any time Cron ran, or you used a "Force" command, it would archive the files and take some time (I assume) depending on how many Lists you use...  Whats the benefit to use a Ramdisk anyways?

          "Experience is something you don't get until just after you need it."

          Website: http://pfBlockerNG.com
          Twitter: @BBcan177  #pfBlockerNG
          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

          1 Reply Last reply Reply Quote 0
          • P
            pfcode
            last edited by

            @BBcan177:

            @pfcode:

            HI,

            I have found that if I'm using RAMDisk, After a pfSense start/restart, the pfBlockerNG Alerts page list 'No match' on all alerts until I manually do a force update. I thought the lists should be all loaded after a root/start. Obviously it didn't when using RAMDisk.  No issue when not using RAM Disk.  This is annoying.  Am I missing something?

            Well this is the issue with RamDisk installations… On a reboot the /var folder is wiped out… That would include any other packages that store data there...

            I have added a workaround to copy the final "/var/db/aliastables/pfB_*" files… and restore those after a reboot so that the tables and firewall rules don't have any issues...

            However, the rest of the files are gone, and the only way to recover is with a "Force Reload" or wait for the next Cron task to execute. The issue with a RamDisk is always size, so Its not appropriate to try and archive all the files and restore them... Not to mention that any time Cron ran, or you used a "Force" command, it would archive the files and take some time (I assume) depending on how many Lists you use...  Whats the benefit to use a Ramdisk anyways?

            Thanks for the clarification. My pfSense box is using SSD, and 16GB RAM, lots of memory, so I thought why not use RAM Disk.

            Release: pfSense 2.4.3(amd64)
            M/B: Supermicro A1SRi-2558F
            HDD: Intel X25-M 160G
            RAM: 2x8Gb Kingston ECC ValueRAM
            AP: Netgear R7000 (XWRT), Unifi AC Pro

            1 Reply Last reply Reply Quote 0
            • T
              The cosmic gate
              last edited by

              Could somebody help me, i'am using a few firewall rules and set them in the wat they work correctely.
              After for example 1 hour everything is set again to the default alphabeticly
              Whats wrong /or what i'am doing wrong .

              Or is the only way to solve this, to create floating rules ?

              1 Reply Last reply Reply Quote 0
              • D
                doktornotor Banned
                last edited by

                If you need a particular sorting, then use one of the Alias actions and create the rules manually, instead of using Block/Reject.

                1 Reply Last reply Reply Quote 0
                • BBcan177B
                  BBcan177 Moderator
                  last edited by

                  @The:

                  Could somebody help me, i'am using a few firewall rules and set them in the wat they work correctely.
                  After for example 1 hour everything is set again to the default alphabeticly
                  Whats wrong /or what i'am doing wrong .

                  Or is the only way to solve this, to create floating rules ?

                  Did you try to change the "Rule Order" in the General Tab?  Otherwise for more complicated setups, you will need to use "Alias" type rules as Dok indicated.

                  "Experience is something you don't get until just after you need it."

                  Website: http://pfBlockerNG.com
                  Twitter: @BBcan177  #pfBlockerNG
                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                  1 Reply Last reply Reply Quote 0
                  • T
                    The cosmic gate
                    last edited by

                    @The:

                    Could somebody help me, i'am using a few firewall rules and set them in the wat they work correctely.
                    After for example 1 hour everything is set again to the default alphabeticly
                    Whats wrong /or what i'am doing wrong .

                    Or is the only way to solve this, to create floating rules ?

                    Just to be sure what i'am trying to reach:
                    This is the standard setting:

                    I changed this otherwise G-mail / e-mail wont arrive on the Zimbra server i run:

                    after for example 1 hour everything is the same as the standard setting en e-mail stop's arriving .

                    What to do ?
                    Create some floating rules (as i read in the Wiki)
                    create some alias as you replied ?

                    1 Reply Last reply Reply Quote 0
                    • T
                      The cosmic gate
                      last edited by

                      @BBcan177:

                      @The:

                      Could somebody help me, i'am using a few firewall rules and set them in the wat they work correctely.
                      After for example 1 hour everything is set again to the default alphabeticly
                      Whats wrong /or what i'am doing wrong .

                      Or is the only way to solve this, to create floating rules ?

                      Did you try to change the "Rule Order" in the General Tab?  Otherwise for more complicated setups, you will need to use "Alias" type rules as Dok indicated.

                      I change this rules order using: firewall -> rules

                      1 Reply Last reply Reply Quote 0
                      • D
                        doktornotor Banned
                        last edited by

                        Why the hell are you blocking the entire world? Please, read this thread on the implicit "default deny" rule on WAN and general sane usage notes.

                        1 Reply Last reply Reply Quote 0
                        • BBcan177B
                          BBcan177 Moderator
                          last edited by

                          @The:

                          What to do ?
                          Create some floating rules (as i read in the Wiki)
                          create some alias as you replied ?

                          In v1.10 I added some additional text to the TOP20 tab to help with this issue. (See Note:)

                          Instead of blocking the world, you can change all of the "Deny" rule(s) to be a single "Permit Inbound" Rule…

                          For example: It seems like you want to allow South America only to hit your Zimbra mail server, follow the instructions below:    (  BTW: Big fan of Zimbra!!  )

                          • Remove all of your existing Country Blocking Rules.

                          • Remove all of your existing "Pass" Firewall rules for Zimbra.
                            You could also just disable these pass rules and keep them there as a backup, if pfBNG is disabled for any reason.

                          • Goto "South America" Country Tab.

                          • Select the IPv4/6 Countries that you want to allow access.

                          • List Action: "Permit Inbound"

                          • In "Advanced Inbound Firewall Rule Settings":

                            • Enable the Custom Port checkbox

                              Click the link "Click here to add/edit Aliases" and add a new pfSense Alias called "Mail_Ports" (Change the alias name to what ever you wish), and enter all of the Mail ports in the alias.

                            • Enable Custom Destination checkbox

                              Click the link "Click here to add/edit Aliases" and add a new pfSense Alias called "Mail_IPs"
                              (Change the alias name to what ever you wish), and enter all of the Mail Destination IPs (ie: the 192.x.x.x address from your screenshot above)

                            • Custom Protocol: Select "TCP/UDP" (Or as required)

                          Hope that helps!

                          "Experience is something you don't get until just after you need it."

                          Website: http://pfBlockerNG.com
                          Twitter: @BBcan177  #pfBlockerNG
                          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                          1 Reply Last reply Reply Quote 0
                          • T
                            The cosmic gate
                            last edited by

                            @doktornotor:

                            Why the hell are you blocking the entire world? Please, read this thread on the implicit "default deny" rule on WAN and general sane usage notes.

                            Just to be sure ;-)
                            I followed soms YouTube configuration instructions that told me to configure it this wat
                            Yesterday i start reading this topic, stopped at page 20, but at this moment there's nothing about the default een rule :( or maybe i was to tired to find it ?

                            1 Reply Last reply Reply Quote 0
                            • T
                              The cosmic gate
                              last edited by

                              @BBcan177:

                              @The:

                              What to do ?
                              Create some floating rules (as i read in the Wiki)
                              create some alias as you replied ?

                              In v1.10 I added some additional text to the TOP20 tab to help with this issue. (See Note:)

                              Instead of blocking the world, you can change all of the "Deny" rule(s) to be a single "Permit Inbound" Rule…

                              For example: It seems like you want to allow South America only to hit your Zimbra mail server, follow the instructions below:    (  BTW: Big fan of Zimbra!!  )

                              • Remove all of your existing Country Blocking Rules.

                              • Remove all of your existing "Pass" Firewall rules for Zimbra.
                                You could also just disable these pass rules and keep them there as a backup, if pfBNG is disabled for any reason.

                              • Goto "South America" Country Tab.

                              • Select the IPv4/6 Countries that you want to allow access.

                              • List Action: "Permit Inbound"

                              • In "Advanced Inbound Firewall Rule Settings":

                                • Enable the Custom Port checkbox

                                  Click the link "Click here to add/edit Aliases" and add a new pfSense Alias called "Mail_Ports" (Change the alias name to what ever you wish), and enter all of the Mail ports in the alias.

                                • Enable Custom Destination checkbox

                                  Click the link "Click here to add/edit Aliases" and add a new pfSense Alias called "Mail_IPs"
                                  (Change the alias name to what ever you wish), and enter all of the Mail Destination IPs (ie: the 192.x.x.x address from your screenshot above)

                                • Custom Protocol: Select "TCP/UDP" (Or as required)

                              Hope that helps!

                              Big thnx for this ! I'll changed the configuration exactly as above.
                              What should be the list action for the rest of the clean selected country's : deny inbound ?

                              Btw the only reason why i need N.A enabled is to recieve mail from gmail users who mail me at the Zimbra server

                              1 Reply Last reply Reply Quote 0
                              • D
                                doktornotor Banned
                                last edited by

                                @The:

                                What should be the list action for the rest of the clean selected country's : deny inbound ?

                                ZOMG. What's not allowed is already denied by default… You need no other action.

                                1 Reply Last reply Reply Quote 0
                                • A
                                  apbirch67
                                  last edited by

                                  Hello, I was using pfBlocker and had a list that was built for just VZW Ip's. Here is the list as it is still in the firewall.

                                  https://127.0.0.1:443/pfblocker.php?pfb=pfBlockerVZW_Custom

                                  Is this still be updated?  If not how do I find the source of that list to rebuild it in NG under the IPV4 Ailias tab

                                  Thanks for the pointers.

                                  1 Reply Last reply Reply Quote 0
                                  • BBcan177B
                                    BBcan177 Moderator
                                    last edited by

                                    @apbirch67:

                                    Hello, I was using pfBlocker and had a list that was built for just VZW Ip's. Here is the list as it is still in the firewall.

                                    https://127.0.0.1:443/pfblocker.php?pfb=pfBlockerVZW_Custom

                                    Is this still be updated?  If not how do I find the source of that list to rebuild it in NG under the IPV4 Ailias tab

                                    Thanks for the pointers.

                                    Hi apbirch67,

                                    The old pfBlocker files are located in the following folder:

                                    ls /usr/local/pkg/pfblocker
                                    

                                    The files are a longfile name like:

                                    a5535b15c63d449c51574971f9ab6098.txt
                                    

                                    These files are an md5 hash of the URL used for each List. View each file to determine which file is the one you are looking for.

                                    "Experience is something you don't get until just after you need it."

                                    Website: http://pfBlockerNG.com
                                    Twitter: @BBcan177  #pfBlockerNG
                                    Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                    1 Reply Last reply Reply Quote 0
                                    • T
                                      The cosmic gate
                                      last edited by

                                      @doktornotor:

                                      @The:

                                      What should be the list action for the rest of the clean selected country's : deny inbound ?

                                      ZOMG. What's not allowed is already denied by default… You need no other action.

                                      Excuse me for beeing an newbee user . But i'll try to learn everyday and want to have the network as save as possible (like all the other people here i thing ;) )
                                      The question is not that bad i think, because when you look at the rule  action it's disabled .

                                      1 Reply Last reply Reply Quote 0
                                      • BBcan177B
                                        BBcan177 Moderator
                                        last edited by

                                        Unfortunately BGP has blocked access to "non-humans".

                                        In the interim, I have posted some of these [ Domain -> IPs ] lists. I will try to keep them updated as time permits.

                                        Please use the "html" format:

                                        Facebook
                                        https://gist.githubusercontent.com/BBcan177/fb389885e4fb39508bcc/raw
                                        Twitter
                                        https://gist.githubusercontent.com/BBcan177/0caa6ae9badee2206660/raw
                                        Spotify
                                        https://gist.githubusercontent.com/BBcan177/58ae5e02838cea68de25/raw
                                        Netflix
                                        https://gist.githubusercontent.com/BBcan177/419897fb723a24323f1f/raw
                                        Dropbox
                                        https://gist.githubusercontent.com/BBcan177/3ddcf1ef916f70b9bc26/raw
                                        
                                        Also posted are two feeds which I have collected from recent Security Blogs etc:
                                        MS_1
                                        https://gist.githubusercontent.com/BBcan177/bf29d47ea04391cb3eb0/raw
                                        MS_3
                                        https://gist.githubusercontent.com/BBcan177/4a8bf37c131be4803cb2/raw
                                        
                                        

                                        "Experience is something you don't get until just after you need it."

                                        Website: http://pfBlockerNG.com
                                        Twitter: @BBcan177  #pfBlockerNG
                                        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                        1 Reply Last reply Reply Quote 0
                                        • H
                                          heliop100
                                          last edited by

                                          Hi

                                          First very thanks to BBcan177 for the package.

                                          These IP list are a strange world

                                          The list: http://list.iblocklist.com/?list=llvtlsjyoyiczbkjsxpf&fileformat=p2p&archiveformat=gz

                                          are blocking that: http://www.reputationauthority.org/toptens.php

                                          Cheers.

                                          1 Reply Last reply Reply Quote 0
                                          • BBcan177B
                                            BBcan177 Moderator
                                            last edited by

                                            @heliop100:

                                            Hi

                                            First very thanks to BBcan177 for the package.

                                            These IP list are a strange world

                                            The list: http://list.iblocklist.com/?list=llvtlsjyoyiczbkjsxpf&fileformat=p2p&archiveformat=gz

                                            are blocking that: http://www.reputationauthority.org/toptens.php

                                            Cheers.

                                            I am not a big fan of IBlock lists… They tend to have a lot of False positives... You can always send them a FP report.

                                            "Experience is something you don't get until just after you need it."

                                            Website: http://pfBlockerNG.com
                                            Twitter: @BBcan177  #pfBlockerNG
                                            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.