Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfBlockerNG v2.0 w/DNSBL

    Scheduled Pinned Locked Moved pfBlockerNG
    1.1k Posts 192 Posters 1.7m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      Panja
      last edited by

      BBcan177 no worries!
      We all have lives to live.  8)
      So no pressure mate. Just wanted to check.
      Good to hear it's coming. I'll just wait. I'm a patient dude.  ;)

      1 Reply Last reply Reply Quote 0
      • J
        Jamerson
        last edited by

        @BBcan177:

        @Jamerson:

        thank you so much for your answer,
        the check list is already enabled ,
        I've checked the as show but can't seem the find the location on the code to add the red line
        below is what it shows on the dnsbl.sh file

        Jamerson,  sorry about that… you can disregard those instructions... The key point here is that these lines in the dnsbl.sh file (in red) file are correct...

        if [ -f '[color=red]/var/unbound/pfb_dnsbl_lighty.conf' ]; then
              /usr/local/sbin/lighttpd_pfb -f '/var/unbound/pfb_dnsbl_lighty.conf'
        fi

        I sent you a PM to see if we can work out this issue offline, and I can go from there… Thanks!

        much appreciate your support,
        will reply on the PM

        1 Reply Last reply Reply Quote 0
        • C
          csircc
          last edited by

          Hi,

          i had installed pfblockerNG and setup  IPv4 Alias/List Configuration to create  IPv4 Lists (for example source: http://list.iblocklist.com/?list=xshktygkujudfnjfioro&fileformat=p2p&archiveformat=gz).But this rule block my important website (like Hotmail and  other ) i don't want to disable or delete this list. Do i have any other method?(like whitelist and how to do) Thanks!

          1 Reply Last reply Reply Quote 0
          • J
            Jamerson
            last edited by

            @Jamerson:

            @BBcan177:

            @Jamerson:

            thank you so much for your answer,
            the check list is already enabled ,
            I've checked the as show but can't seem the find the location on the code to add the red line
            below is what it shows on the dnsbl.sh file

            Jamerson,  sorry about that… you can disregard those instructions... The key point here is that these lines in the dnsbl.sh file (in red) file are correct...

            if [ -f '[color=red]/var/unbound/pfb_dnsbl_lighty.conf' ]; then
                  /usr/local/sbin/lighttpd_pfb -f '/var/unbound/pfb_dnsbl_lighty.conf'
            fi

            I sent you a PM to see if we can work out this issue offline, and I can go from there… Thanks!

            much appreciate your support,
            will reply on the PM

            thank you so much for your help,
            I didn't read the instruction carefully ,
            the servers is on and everything is working fine

            thank you so much BBCAN

            1 Reply Last reply Reply Quote 0
            • G
              Gerard64
              last edited by

              @BBcan177:

              Sorry to hear that… Did you have DHCP registration enabled in the Resolver? There seems to be some underlying issues with that feature in the Resolver. DNSBL just does a Resolver reload to get its updates into the Resolver. Take a look at the resolver.log and the system.log to see what the error messages were... I added notes about this in the instructions posted in this thread.

              I do not have a lot of extra configuration in the Resolver for overrides and thats why I suggest you ask in the DNS forum as those guys live that stuff every day and can better reply to that particular issue...

              In regards to your issue with WLANs, make sure that those other LAN segments can see the DNSBL VIP or else DNSBL will not function. You can click the checkbox in the DNSBL tab to auto create a Floating firewall rule for that... But also make sure there are no other rules that can block access to the DNSBL VIP. Try to ping the DNSBL IP from thhe WLAN as a test...

              On another note: Seems someone recently gave a negative smite….  ???

              Thank you BBcan177 for the information I wil try it soon again. I had to do a full backup restore to get pfSense back on track. I have to get some new courage to give it another shot.

              I selected all the network segments and as long as the wlan client were still connected they could reach the vip address the dnsbl webserver. Wen the wlan client reconnects it got a authentication error because pfsense could not reach the local radius server. I searched for hours to find what cause this but couldn't find it.

              It wasn't me btw who gave you the childish smite you do and did a GREAT job!

              1 Reply Last reply Reply Quote 0
              • D
                doktornotor Banned
                last edited by

                @csircc:

                i had installed pfblockerNG and setup  IPv4 Alias/List Configuration to create  IPv4 Lists (for example source: http://list.iblocklist.com/?list=xshktygkujudfnjfioro&fileformat=p2p&archiveformat=gz).But this rule block my important website (like Hotmail and  other ) i don't want to disable or delete this list. Do i have any other method?(like whitelist and how to do) Thanks!

                1 Reply Last reply Reply Quote 0
                • SoloamS
                  Soloam
                  last edited by

                  Passing my comment from the other topic to this one

                  Somtimes the reporting of the Alerts misses the list matching! I had this problem today.

                  List 1 - Alias_Deny (De-Duplication enabled)
                  List 2 - Alias_Native

                  Interface 1
                  Block List 1

                  The IP1 is in both lists, because Alias_Native does not passes by the De-Duplication process.

                  I had a hit on Interface 1 of IP1 and in the alert tab appeared the information that the hit is from List 2 (that does not even appears on the Interface)

                  Thank You all

                  1 Reply Last reply Reply Quote 0
                  • SoloamS
                    Soloam
                    last edited by

                    One extra that would be very useful is the ability to export (automatic) the lists to the webserver of PFSense, that way I could use the same list on other computers and only maintain it in pfsense. This is useful because when I'm not at home I like to use on my personal laptop the lists with PeerBlock!

                    Nice Job

                    1 Reply Last reply Reply Quote 0
                    • P
                      pfcode
                      last edited by

                      Hi, BBCan77

                      I got first crash report since upgraded to v2:

                      PHP Errors:
                      [27-Nov-2015 12:14:53 America/Toronto] PHP Fatal error:  Maximum execution time of 900 seconds exceeded in /usr/local/pkg/pfblockerng/pfblockerng.inc on line 1662

                      Release: pfSense 2.4.3(amd64)
                      M/B: Supermicro A1SRi-2558F
                      HDD: Intel X25-M 160G
                      RAM: 2x8Gb Kingston ECC ValueRAM
                      AP: Netgear R7000 (XWRT), Unifi AC Pro

                      1 Reply Last reply Reply Quote 0
                      • J
                        Jamerson
                        last edited by

                        Thank you BBCAN,
                        I've tested it and it works fine really clean internet.
                        the only think I notice is the DHCP server stops sharing IPS,
                        is this related to the DNSBL ?
                        please advise.

                        1 Reply Last reply Reply Quote 0
                        • P
                          pfcode
                          last edited by

                          Any1 has the issue about failed to download Snort rules from Snort website since Nov. 24?  It seemed this is an issue after upgrading to pfBlockerNG v2.0. but I'm not sure, don't know which dns feed block it, and I don't have any clue from the Alert tab either.

                          EDIT:  Its the DNS: s3.amazonaws.com, was blocked by the DNSBL MPatrol feed. Adding it to the suppression list solves.

                          Release: pfSense 2.4.3(amd64)
                          M/B: Supermicro A1SRi-2558F
                          HDD: Intel X25-M 160G
                          RAM: 2x8Gb Kingston ECC ValueRAM
                          AP: Netgear R7000 (XWRT), Unifi AC Pro

                          1 Reply Last reply Reply Quote 0
                          • J
                            JohnPFsense
                            last edited by

                            I've sorted the issue with the snortBL by setting the state to FLEX. It had a curl ssl error code 200 . This could be seen in view log in the update tab. So setting to FLEX also resolves a curl 200 status code.

                            -John-

                            1 Reply Last reply Reply Quote 0
                            • BBcan177B
                              BBcan177 Moderator
                              last edited by

                              @pfcode:

                              Any1 has the issue about failed to download Snort rules from Snort website since Nov. 24?  It seemed this is an issue after upgrading to pfBlockerNG v2.0. but I'm not sure, don't know which dns feed block it, and I don't have any clue from the Alert tab either.

                              I posted in the IDS forum… Try to avoid double posting...

                              @JohnPFsense:

                              I've sorted the issue with the snortBL by setting the state to FLEX.

                              The issue that pfcode is having, is with the Snort VRT rulesets for the IDS/IPS Snort… not the snort IP list. But yes the Snort IP list needs to use 'Flex'... Would be nice if Snort actually had a proper cert for their HTTPS site :)

                              "Experience is something you don't get until just after you need it."

                              Website: http://pfBlockerNG.com
                              Twitter: @BBcan177  #pfBlockerNG
                              Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                              1 Reply Last reply Reply Quote 0
                              • BBcan177B
                                BBcan177 Moderator
                                last edited by

                                @Jamerson:

                                Thank you BBCAN,
                                I've tested it and it works fine really clean internet.
                                the only think I notice is the DHCP server stops sharing IPS,
                                is this related to the DNSBL ?
                                please advise.

                                Not related to DNSBL… Only thing that I suggest, is not to use the two "DHCP Registration" checkboxes in the Resolver, as that seems to have issues on Reload.

                                "Experience is something you don't get until just after you need it."

                                Website: http://pfBlockerNG.com
                                Twitter: @BBcan177  #pfBlockerNG
                                Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                1 Reply Last reply Reply Quote 0
                                • BBcan177B
                                  BBcan177 Moderator
                                  last edited by

                                  @soloam:

                                  One extra that would be very useful is the ability to export (automatic) the lists to the webserver of PFSense, that way I could use the same list on other computers and only maintain it in pfsense. This is useful because when I'm not at home I like to use on my personal laptop the lists with PeerBlock!

                                  Nice Job

                                  Peerblock would probably need the files to be formatted in a certain way? There is a file in:    /var/db/pfblockerng/mastercat  which is a complete list of IPs (Deny).

                                  "Experience is something you don't get until just after you need it."

                                  Website: http://pfBlockerNG.com
                                  Twitter: @BBcan177  #pfBlockerNG
                                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                  1 Reply Last reply Reply Quote 0
                                  • BBcan177B
                                    BBcan177 Moderator
                                    last edited by

                                    @soloam:

                                    Passing my comment from the other topic to this one

                                    Somtimes the reporting of the Alerts misses the list matching! I had this problem today.

                                    List 1 - Alias_Deny (De-Duplication enabled)
                                    List 2 - Alias_Native

                                    Interface 1
                                    Block List 1

                                    The IP1 is in both lists, because Alias_Native does not passes by the De-Duplication process.

                                    I had a hit on Interface 1 of IP1 and in the alert tab appeared the information that the hit is from List 2 (that does not even appears on the Interface)

                                    Thank You all

                                    This is a hard one to solve when "Alias Native" lists are used since multiple lists can have the same IP.. Alerts tab is not superhuman :)

                                    "Experience is something you don't get until just after you need it."

                                    Website: http://pfBlockerNG.com
                                    Twitter: @BBcan177  #pfBlockerNG
                                    Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                    1 Reply Last reply Reply Quote 0
                                    • J
                                      JohnPFsense
                                      last edited by

                                      Trouble with whitelist

                                      Since the update to pfBlockerNG v2.0 w/DNSBL I'm having a problem whitelisting some IPs. I'm not sure exactly if the problem started before I tried using the DNS blocklist option, or purely from updating pfBlockerNG.
                                      I turned off the dns forwarder and turned on the dns resolver and the DNSBL worked nicely, some alerts appeared in the alert tab. Besides updating PfBlockerNG and trying the DNSBL option I did not change anything to my IP blocklists or whitelist.
                                      I noticed that my whitelist wasn't working anymore. No more green icons in the firewall log dashboard gadget and nothing in the permit section of the pfBlockerNG: Alerts tab. I disabled the DNSBL and went back to the dns forwarder. This didn't help. I tried rebooting, flusing the firewall state table and reinstalling pfBlockerNG (keeping the settings tab checked). This didn't help either.

                                      When I look at the iplist update log, my whitelist shows up in the Permit List with the correct number of IPs.
                                      The blocked IPs that I want to whitelist  are blocked by the country list.

                                      Does anyone have the same problem? Searching the forum I get the impression this is not a universal problem.

                                      Suggestions would be greatly appreciated.

                                      • John -
                                      1 Reply Last reply Reply Quote 0
                                      • BBcan177B
                                        BBcan177 Moderator
                                        last edited by

                                        JohnPFsense,

                                        For this whitelist, did you select "permit_outbound" in the alias? Does it create a firewall permit rule in the outbound firewall tab? Also ensure that the 'Rule order' is set to order the Permit rules above the block/reject rules.

                                        "Experience is something you don't get until just after you need it."

                                        Website: http://pfBlockerNG.com
                                        Twitter: @BBcan177  #pfBlockerNG
                                        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                        1 Reply Last reply Reply Quote 0
                                        • J
                                          JohnPFsense
                                          last edited by

                                          @BBcan177:

                                          JohnPFsense,

                                          For this whitelist, did you select "permit_outbound" in the alias? Does it create a firewall permit rule in the outbound firewall tab? Also ensure that the 'Rule order' is set to order the Permit rules above the block/reject rules.

                                          I did select permit_outbound, I also tried permit_both just to check. That did not help. I can see a permit rule in the Firewall: Rules tab.  After some fiddling around I figured it out thanks to your suggestion. It was te "Rule order" The original setting apparently doesn't work as it used to. I left it at default after my pfBlockerNG update.
                                          I also figured out that using the pfSense Pass/Match first order totally negates any block rule if "default pass LAN to any rule" is present. This could not be seen in the firewall dashboard widget. The last blocked packet was shown from before the settings change. Some vague memories about ipchains are coming to the surface, but I am not a networking expert.

                                          Thanks a lot for your quick response, knowing what to do and teaching me something on top of it.

                                          • John -
                                          1 Reply Last reply Reply Quote 0
                                          • A
                                            azmo
                                            last edited by

                                            I get an error when updating the BBC_DGA list as follows:

                                            [ DNSBL FAIL ] [ Skipping : BBC_DGA  ]

                                            /var/unbound/check.conf:6: error: cannot open include file '/var/db/pfblockerng/dnsbl/BBC_DGA': No such file or directory
                                            /var/unbound/check.conf:6: error: unknown keyword '.bk'
                                            read /var/unbound/check.conf failed: 2 errors in configuration file

                                            Anyone got a clue ?

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.