Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfBlockerNG

    Scheduled Pinned Locked Moved pfBlockerNG
    1.2k Posts 211 Posters 2.1m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      hmh
      last edited by

      How-to block social networks with pfBlockerNG

      Install package Cron
      Install FreeBSD package manager https://doc.pfsense.org/index.php/Installing_FreeBSD_Packages

      
      pkg install whois
      
      

      Add Cron task

      
      /usr/local/bin/mwhois -h whois.radb.net -i origin as32934 | grep -Eo "([0-9.]+){4}/[0-9]+" | sort -n > /var/db/pfblockerng/facebook_cidr.raw
      /usr/local/bin/mwhois -h whois.radb.net -i origin as49988 | grep -Eo "([0-9.]+){4}/[0-9]+" | sort -n > /var/db/pfblockerng/odnoklassniki_cidr.raw
      /usr/local/bin/mwhois -h whois.radb.net -i origin as47541 | grep -Eo "([0-9.]+){4}/[0-9]+" | sort -n > /var/db/pfblockerng/vk_com_cidr.raw
      
      

      My config
      update lists once a week on friday

      In pfBlockerNG add IPv4 List

      With
      List Action: Alias Match
      And
      Update Frequency: Weekly

      Add firewall rule:

      Thats it!

      P.S.
      If you already have list (for example) Top20 with List Action: Alias Match, processing of files will be skipped
      Because nets from facebook_cidr.raw already in list Top20

      Will be cool if developers add option to block networks by AS number
      It is very useful

      1 Reply Last reply Reply Quote 0
      • BBcan177B
        BBcan177 Moderator
        last edited by

        Yes v2.0 has whois support built-in… :)

        "Experience is something you don't get until just after you need it."

        Website: http://pfBlockerNG.com
        Twitter: @BBcan177  #pfBlockerNG
        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

        1 Reply Last reply Reply Quote 0
        • SoloamS
          Soloam
          last edited by

          BBcan177, first of all great work on this package, it's a must have to all pfsense boxes.

          I found a bug! If we can call it a bug, it can be only miss configuration.

          Lets assume this scenario. 2 Lists, 2 Interfaces.

          I have list 1 (IP's)
          1.2.3.4
          5.6.7.8

          I have list 2(IP's)
          1.2.3.4
          9.10.11.12

          Both have IP 1.2.3.4

          I make use of De-Duplication.

          I set list 1 as Deny on Interface LAN1
          I set list 2 as Deny on Interface LAN2

          The logs are all messed up, because He can't find out that from what interface the block 1.2.3.4 is.

          Best Regards

          1 Reply Last reply Reply Quote 0
          • BBcan177B
            BBcan177 Moderator
            last edited by

            @soloam:

            I found a bug! If we can call it a bug, it can be only miss configuration.

            Hi soloam,

            Its not a bug. When you use de-duplication, only one of the Lists will have IP 1.2.3.4
            If you want a second list to skip de-duplication, you will need to use "Alias Native" and manually create the firewall rule…

            "Experience is something you don't get until just after you need it."

            Website: http://pfBlockerNG.com
            Twitter: @BBcan177  #pfBlockerNG
            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

            1 Reply Last reply Reply Quote 0
            • SoloamS
              Soloam
              last edited by

              That was my solution. :)

              Thank you BBcan177.

              Best Regards
              Soloam

              1 Reply Last reply Reply Quote 0
              • SoloamS
                Soloam
                last edited by

                Hello all, just to make one question.

                I what to see the complete list of IP's on a alias. So i'm looking at Diagnostics > Tables and selecting the alias table. When I do this I get  a blank page and in pfsense the alert:

                
                Crash report details:
                
                PHP Errors:
                [15-Oct-2015 15:55:19] PHP Fatal error:  Allowed memory size of 268435456 bytes exhausted (tried to allocate 115824003 bytes) in /usr/local/www/csrf/csrf-magic.php on line 157
                
                

                Can any one tell me if it's possible to resolve this?

                Thank you.
                Best Regards

                1 Reply Last reply Reply Quote 0
                • H
                  heliop100
                  last edited by

                  Hi,

                  Are there same way to get Alerts auto-refresh with one filter applied saved?

                  Thanks.

                  1 Reply Last reply Reply Quote 0
                  • D
                    deepakaagrwal
                    last edited by

                    pfblocker NG blocking client of my NAT rule, I have Put  allow NAT rule above any of the pfblocker rules. it is worked but after next cron update, NAT Rule comes down under pfblocker rules automatically. how to resolve it please help.

                    1 Reply Last reply Reply Quote 0
                    • F
                      f34rinc
                      last edited by

                      @deepakaagrwal:

                      pfblocker NG blocking client of my NAT rule, I have Put  allow NAT rule above any of the pfblocker rules. it is worked but after next cron update, NAT Rule comes down under pfblocker rules automatically. how to resolve it please help.

                      From pfBlockerNG General tab scroll down to Rule order and change it to
                      |pfSense Pass/Match | pfB_pass/Match | pfB_Block/Reject|

                      Click save and go check your rule order it should be the way you want it

                      1 Reply Last reply Reply Quote 0
                      • F
                        Fesoj
                        last edited by

                        @BBcan177:

                        Well its kind of what the name of the package implies :)
                        So to answer your question, yes the package can create firewall rules to "Block/Reject/Permit/Match"…

                        Need more info on how you have configured it to help you further.

                        I am currently studying the thing. Once I think that I know what is going I'll be back…

                        Some IPs are actually blocked, but I don't know exactly why. I am using "| pfB_Block/Reject | All other Rules | (original format)"

                        1 Reply Last reply Reply Quote 0
                        • BBcan177B
                          BBcan177 Moderator
                          last edited by

                          @heliop100:

                          Are there same way to get Alerts auto-refresh with one filter applied saved?

                          Currently, no… That would require creating a cookie so that when the Alerts Tab reloads each minute, it could load any filter settings stores in the cookie... Maybe in a future release...

                          "Experience is something you don't get until just after you need it."

                          Website: http://pfBlockerNG.com
                          Twitter: @BBcan177  #pfBlockerNG
                          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                          1 Reply Last reply Reply Quote 0
                          • BBcan177B
                            BBcan177 Moderator
                            last edited by

                            @soloam:

                            I what to see the complete list of IP's on a alias. So i'm looking at Diagnostics > Tables and selecting the alias table. When I do this I get  a blank page and in pfsense the alert:

                            Loading really large files into the browser can cause issues… Try to use the pfBlocker Log tab (Which also might have issues with these large files) or view the files from the shell. Files are located in the following folders:

                            /var/db/pfblockerng/deny  or /permit or /match or /native

                            You can view these files with your choice of file editor like vi or ee…

                            "Experience is something you don't get until just after you need it."

                            Website: http://pfBlockerNG.com
                            Twitter: @BBcan177  #pfBlockerNG
                            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                            1 Reply Last reply Reply Quote 0
                            • H
                              hulleyrob
                              last edited by

                              Sometimes after cron has run and i read the log file it has a very small number at the end which does not correspond to the total addition of the numbers on the block files.

                              This is fixed with a force reload and the number matches the number above in the log file. (its usually about 1/8th the number)

                              Another thing I've noticed is the number on the widget shown after deny does not correspond to either of these numbers and I'm not using de-duplication so why is that? And is there anything i can do to investigate?

                              Thanks

                              Rob

                              UPDATE: BBcan177 confirmed this issue is just a timing issue and how to check it.

                              1 Reply Last reply Reply Quote 0
                              • F
                                fher98
                                last edited by

                                Hello eveybody,

                                So im trying to block TOR, I wrote this script to collect TOR exit nodes, and write it to a txt in a web server. So pfBlocker goes and downloads this file and adds the IPs, as shown below;

                                CRON  PROCESS  START [ 10/22/15 16:55:48 ]
                                [ TOR01 ]
                                  Remote timestamp: Thu, 22 Oct 2015 22:53:58 GMT
                                  Local  timestamp: Wed, 21 Oct 2015 21:03:50 GMT
                                  Updates Found
                                UPDATE PROCESS START

                                [ TOR01 ] Downloading New File –--------------------------------------------------------
                                Original  Masterfile Outfile    [ Post Duplication count ] 
                                –--------------------------------------------------------
                                7375      6416      6416        [ Passed ]                 
                                –--------------------------------------------------------

                                ===[  Aliastables / Rules  ]================================

                                No Changes to Firewall Rules, Skipping Filter Reload

                                Updating: pfB_TOR
                                1131 addresses added.783 addresses deleted.

                                ===[ FINAL Processing ]=====================================

                                [ Original count  ]  [ 7375 ]

                                [ Processed Count  ]  [ 6416 ]

                                ===[ Deny List IP Counts ]===========================

                                6416 /var/db/pfblockerng/deny/TOR01.txt

                                ====================[ Last Updated List Summary ]==============

                                Oct 22 16:53 TOR01

                                Sanity Check (Not Including IPv6)  ** These two Counts should Match! **
                                –----------
                                Masterfile Count    [ 6416 ]
                                Deny folder Count  [ 6416 ]

                                Duplication Sanity Check (Pass=No IPs reported)
                                –----------------------
                                Masterfile/Deny Folder Uniq check
                                Deny Folder/Masterfile Uniq check

                                Sync Check (Pass=No IPs reported)

                                IPv4 Alias Table IP Total

                                6416

                                IPv6 Alias Table IP Total

                                0

                                Alias Table IP Counts

                                6416 /var/db/aliastables/pfB_TOR.txt

                                pfSense Table Stats

                                table-entries hard limit  2000000
                                Table Usage Count        9765

                                UPDATE PROCESS ENDED [ 10/22/15 16:55:50 ]

                                Then it adds the rules to the firewall, but is not blocking any of the IPs.  Can you guys help me … what Im doing wrong??

                                Thanks

                                1 Reply Last reply Reply Quote 0
                                • H
                                  hulleyrob
                                  last edited by

                                  Can you show the rules that are added?

                                  1 Reply Last reply Reply Quote 0
                                  • F
                                    fher98
                                    last edited by

                                    @hulleyrob:

                                    Can you show the rules that are added?

                                    Thank you for your reply, here you go

                                    • The first screenshot is WAN, to block from the outside and just added outbound too.
                                    • Next is LAN with it its default rules plus the auto block.
                                    • The last one is for my office branch, in which the rule for 10.4.2.3 is to get  acces to the internet via squid/dansguardian at port 3128 on  that pfsense.

                                    rulespfsense1.png
                                    rulespfsense1.png_thumb
                                    rulespfsense2.png
                                    rulespfsense2.png_thumb
                                    rulespfsense3.png
                                    rulespfsense3.png_thumb

                                    1 Reply Last reply Reply Quote 0
                                    • H
                                      hulleyrob
                                      last edited by

                                      Where are you seeing these, can you post the log showing the TOR traffic entering your network?

                                      Also should the WAN only be blocking TCP TOR traffic? (because it is, not * like the others)

                                      Rob

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        jawz101
                                        last edited by

                                        Is the Reputation Settings supposed to give the option to choose all 3 :
                                        Individual List Reputation, Collective List Reputation (pMAX), Collective List Reputation (dMAX)

                                        Reading the descriptions it seems as though the dMAX makes the most sense but I can't tell what the other 2 would mean– so then I don't know if I quite understand what's going on here.

                                        Seems like that whole feature needs some fresh eyes to write the descriptions because it doesn't answer the what's and why's.

                                        Also, on the same page, is the entire Emerging Threats IQRISK IPv4 Reputation section a subscriber feature or just portions of it?  For clarity, if the section could be hidden unless a checkbox is checked or something it would help in knowing if it's relevant to those who don't pay for it.  Just a thought.

                                        Thanks!

                                        1 Reply Last reply Reply Quote 0
                                        • H
                                          heliosfa
                                          last edited by

                                          @wbennett77:

                                          [ [color=red]XML RPC Sync ] Improvements to http/https and Username. The 'General Tab settings' can also be excluded from the sync to allow for Site specific customizations.

                                          Is the XML RPC Sync meant to support sync to an IPv6 address? When I try it with just an IP v6 address the sync times out because it is trying to use the address in a non-literal format.  When I enter the address in the literal form with [] around it, I get the following error (which is the same when trying to use a host name).

                                          php-fpm[26593]: /pkg_edit.php: [pfBlockerNG] XMLRPC sync terminated due to mis-configured Replication Target IP Address or Port settings.
                                          

                                          I am already synchronising some of the pfSense config over v6 successfully.

                                          1 Reply Last reply Reply Quote 0
                                          • BBcan177B
                                            BBcan177 Moderator
                                            last edited by

                                            @heliosfa:

                                            php-fpm[26593]: /pkg_edit.php: [pfBlockerNG] XMLRPC sync terminated due to mis-configured Replication Target IP Address or Port settings.
                                            

                                            Did you enter the port field? It will log that error message if the address is not valid (IPv4/6) or if the port is not valid…

                                            Here is a snippet of that validation code:

                                            
                                                    // Validate Replication Target IP Address and Port Settings
                                            	if (!is_ipaddr($sync_to_ip) || !is_port($port)) {
                                            		log_error("[pfBlockerNG] XMLRPC sync terminated due to mis-configured Replication Target IP Address or Port settings.");
                                            		$success = FALSE;
                                            		return $success;
                                            	}
                                            
                                            

                                            "Experience is something you don't get until just after you need it."

                                            Website: http://pfBlockerNG.com
                                            Twitter: @BBcan177  #pfBlockerNG
                                            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.