PfBlockerNG rules is going downwards in the firewall rule everyday
-
Hi, BB
Got your file. It worked like a charm. Thanks much for the fix, well done.
-
The current setting is the default. Doesn't that option mean to keep the BLOCK/REJECT rules at the TOP? It is not doing that. It is MOVING THEM DOWN AUTOMATICALLY.
Hopeless. Explained ~10 times by now.
@pfcode: Need a translator, perhaps? Getting absolutely ridiculous. With what the OP configured, yes, it will ALWAYS get moved. Because he configured that this way. PEBKAC. OSI Layer 8 error. ::)
I don't think you've explained anything at all here. The option selected is supposed to ensure that BLOCK/REJECT rules are at the TOP. It does not do that. The BLOCK/REJCET RULE IS BEING MOVED DOWN!!!! What exactly do you think you have explained?
-
OMG. No, the option will put whatever pfBNG rules to the top. There clearly is a whole lot of people who should never use this package, because it's way over they head and they have no clue what they are doing. Those "I've blocked the entire world minus my country" guys are another example.
P.S. Need a replacement keyboard? Seems like you have a key stuck.
-
The block/reject rule to which I am referring is a pfBNG rule, is it not? It is named pFB_Block_IPs. According to your statement and to the wording of the actual automatic ordering option, it should be placed at the top of the firewall rule stack. The ordering rule looks like this:
pfB_Block/Reject | All other rules | Original format
Does that not mean that the pfB_Block rule would be first?
-
I made a few changes to the rule ordering code… When using the first order format, it will put the pfB Block/Reject before the pfB Permit rules... also a couple other improvements...
You can fetch the changed files from my gist:
First copy the existing file as backup:
cp /usr/local/pkg/pfblockerng/pfblockerng.inc /usr/local/pkg/pfblockerng/pfblockerng.inc.bk
Fetch the new file and execute a 'Force Update' cmd:
fetch -o /usr/local/pkg/pfblockerng/pfblockerng.inc "https://gist.githubusercontent.com/BBcan177/cf6af30af46fedd37d07/raw"
-
that seems to be working on our server that had the issue
did you do any other changes to the package, other then the ordering issue ?
should i be aware of any other issues ?
finally, id love if you can add support for FQDN in a list, and have a "resolver" resolve the FQDN every x amount of time, and the resolved IP should be whitelisted or blacklisted, based on the rules of the list
?
-
that seems to be working on our server that had the issue
did you do any other changes to the package, other then the ordering issue ?
should i be aware of any other issues ?
finally, id love if you can add support for FQDN in a list, and have a "resolver" resolve the FQDN every x amount of time, and the resolved IP should be whitelisted or blacklisted, based on the rules of the list
?
Thanks for the feedback… This fix will be in v2.0 which is just around the corner... v2.0 will have DNSBL domain name blocking via Unbound Resolver. It also allows conversion of an AS number into its respective IP Addresses.
Could always add another beta tester should you be interested to test it out? Send me a PM....
Thanks!
-
BBcan177,
We have been testing the patch on one instance of pfsense in our environment. igoldstein added a new BLOCK rule to the access list on that instance. For some reason, now that rule gets moved down during 'update'. We think it might be because it's not a pfB rule, so pfB allow rules get ordered in front of it. See screenshot. The second rule, blocking access to port 22 is the one that we now have to move up nightly.
Is there an ordering option that will keep all block rules at the top even if they are not pfB rules? Perhaps we are doing something wrong here. Please advise. Thank you.
-
dsmithson,
Create that other Block rule in pfBNG, and you can set those required settings in Adv. Inbound Options…
-
BBcan177,
the problem is, the SAME list is also used to ALLOW traffic, its a WHITELIST
but i also use the same list in my rule to block for port 22, but there im saying if it does NOT match the IP's from this list, then it should block it
here take a look at the screen shot of the rule
-
the problem is, the SAME list is also used to ALLOW traffic, its a WHITELIST
but i also use the same list in my rule to block for port 22, but there im saying if it does NOT match the IP's from this list, then it should block it
Not enough information in this one screenshot to help you :)
-
I had this problem of rule being moved down. Just uncheck "Floating Rules" in pfBlockerNG's main settings page. In other words, don't use floating rules. I hope it works for you, as it did for me.
For me, everytime cron or reload happens, my custom pfBNG rule would move from somewhere on top where I saved it, to the very bottom, in the floating rules tab. To narrow it down, it only happens to custom deny/reject pfBNG rules, and not custom pass/match pfBNG rules. My rule order is default setting.
I'm sure BBcan177 will have a workaround in a future version.
-
Hi pf3000… igoldstein's setup is too complicated to auto sort the rules in pfBNG. I recommended that he use "Alias type rules" for his setup as that will allow for a more fine-grain configuration.
I did however, test the following change with another user... Would you be able to fetch this file and see if that resolves your Floating Rule issue?
Thanks!
cp /usr/local/pkg/pfblockerng/pfblockerng.inc /usr/local/pkg/pfblockerng/pfblockerng.inc.bk
Fetch the new file and execute a 'Force Update' cmd:
fetch -o /usr/local/pkg/pfblockerng/pfblockerng.inc "https://gist.githubusercontent.com/BBcan177/cf6af30af46fedd37d07/raw/ab64d4682b28dd5fdf3f84877b28fe1feeef14f5/pfblockerng.inc"
Anyone else able to test that would also help…
-
Hello
I have been dealing with this issue for some time now.
Two firewalls with default install and settings with different behavior.I have some simply allow rules above the pfBNG rules to allow my remote travelers working from random countries around the world to be able to hit the exchange OWA https site on 443.
I would like to have those rules on top permanently and not re-sort the order every time CRON runs.
Please see attached file "Rules order before Cron" I would like all the rules to stay static in that order and not resort.I am not sure but I am assuming by reading all of the above posts that I need to manage this "options" please see attached image properly to get that desired affect.
However I have a second firewall that DOES NOT behave like this with the same settings so I am confused please help before I go mad.My desired affect would be this.
Have a list of rules that are static and do not move and I manually manage them, and the pfBNG does its auto update thing.Thank you in advance I have been waiting for some one to have the same symptoms as I do.
![Rules order before Cron.JPG](/public/imported_attachments/1/Rules order before Cron.JPG)
![Rules order before Cron.JPG_thumb](/public/imported_attachments/1/Rules order before Cron.JPG_thumb)
-
@dougc420:
Hello
I have been dealing with this issue for some time now.
Two firewalls with default install and settings with different behavior.I have some simply allow rules above the pfBNG rules to allow my remote travelers working from random countries around the world to be able to hit the exchange OWA https site on 443.
I have the same thing, use the option:
| pfSense Pass/Match | pfB_Pass/Match | pfB_Block/Reject |
Works for me, but I'm using 2.0, should work on the last version also.
-
Wonderful I will test that in my LAB first thank you for that.
What is your setting for the "floating rules" enabled or disabled?
-
@dougc420:
Wonderful I will test that in my LAB first thank you for that.
What is your setting for the "floating rules" enabled or disabled?
Should work the same for both, I run floating. I have tested on both in the past. If I remember correctly, BBCan177 fixed this weeks ago, I do not know if it was updated in the 1.x series, it has been awhile since I used it. I believe it was added in an earlier pull to the 1.x branch, I can't say for sure. :)
https://forum.pfsense.org/index.php?topic=99987.msg562116#msg562116
-
Thank you again for your support.
I wish this was an easy fix really i do.
However after Cron ran the same results. I will attach screen shots.
The rules resort and my priority is changed blocking my traveler from port 443![Rules order before Cron.JPG](/public/imported_attachments/1/Rules order before Cron.JPG)
![Rules order before Cron.JPG_thumb](/public/imported_attachments/1/Rules order before Cron.JPG_thumb)
![Rules order after Cron.JPG](/public/imported_attachments/1/Rules order after Cron.JPG)
![Rules order after Cron.JPG_thumb](/public/imported_attachments/1/Rules order after Cron.JPG_thumb)
![Options before recommeded change.JPG](/public/imported_attachments/1/Options before recommeded change.JPG)
![Options before recommeded change.JPG_thumb](/public/imported_attachments/1/Options before recommeded change.JPG_thumb)
![Options after recommended change.JPG](/public/imported_attachments/1/Options after recommended change.JPG)
![Options after recommended change.JPG_thumb](/public/imported_attachments/1/Options after recommended change.JPG_thumb) -
@dougc420:
I wish this was an easy fix really i do.
It would be extremely easy to do if you designed things in a SANE way. Why the HECK are you blocking the ENTIRE WORLD via pfBNG?! Allow what you need, the rest is blocked by default. Been said like zillion times. Here we go again. Hundreds of thousands of CIDRs in firewall rules, totally useless. Absurd. Please, get some basic understanding of default deny before deploying similar WTF setups.
-
I actually do have the country's unblocked that I require and have taken the time to work out our desired flow of traffic. I do wish to globally block all traffic in the world to our exchange on port 25 and ONLY allow it to talk to our hosted mail providers. It is peace of mind to know that I do not need to worry about that.
This is a preferred configuration for us however we would like to be able to manage our rules accordingly and not have to log in every day and re sort them.
The odd thing is that the behavior on a like firewall is different. Firewall two with the same config the rules stay but on this firewall the rules resort after Crond.
What am I missing here?