PfBlockerNG v2.0 w/DNSBL
-
Greetings,
I am new to PFblockerNg, but started running based on a recommendation from a friend. I am using a Supermicro D525 server with PFsense 2.2.6 64-bit.
Issues:
1. The first time I installed and configured PFBlocker, the following issues showed up:
- No entries were added under either the Firewall or Aliases –> URLs.
- On reboot of the firewall, NTPD did not automatically start. (Neither did pfBlockerNG DNSBL Web Server)
2. Uninstalled
3. Reinstalled and reconfigured the package.
4. Issues encountered this time:
- Firewall and Aliases --> URLs rules were added
- NTPD <u>does not automatically</u> startup when firewall is rebooted and must be started manuallyDoes anyone have any ideas on how to address these issues? My configuration matches the configuration being used on a WatchGuard X700 running pfsense 2.2.4 32-bit.
I am not sure if there are additional logs that I need to provide for troubleshooting purposes?
Thanks!
capedcrsdr -
Hi dgarsys/capedcrsdr,
To use DNSBL make sure that you are using the DNS Resolver (Unbound) as the DNS service. Also ensure that you have defined the DNSBL VIP and ports in the DNSBL Tab.
Also note, that you need to run "Force Update" in the Update tab for the settings to be executed.
-
Not using DNSBL - that's not activated, just the pfblock stuff.
-
Not using DNSBL - that's not activated, just the pfblock stuff.
Once you install pfBlockerNG, the service will show as "Down" since DNSBL is not enabled. If you don't use DNSBL, then you can safely ignore the downed state. I haven't figured out a way to remove the DNSBL service when its not enabled.
-
OK. Thank you BB.
I WAS missing something.
Now to verify Squidguard and PFblock are actually working. I can do that tomorrow.
-
Is anyone using DNSBL & SquidGuard at the same time? Would this be considered redundant?
Having switched from SquidGuard to pfBlocker DNSBL to try it out, I'm struggling to find a configuration/solution for content filtering. Previously we used Shalla's Black List in SquidGuard to selectively block content by category. Is something like this possible in DNSBL & perhaps I'm just missing it?
If not, is there any reason why I would not want to run pfBlocker DNSBL & SquidGuard at the same time?
Thank you for your thoughts on this!
Best-
-
Is anyone using DNSBL & SquidGuard at the same time? Would this be considered redundant?
Having switched from SquidGuard to pfBlocker DNSBL to try it out, I'm struggling to find a configuration/solution for content filtering. Previously we used Shalla's Black List in SquidGuard to selectively block content by category. Is something like this possible in DNSBL & perhaps I'm just missing it?
If not, is there any reason why I would not want to run pfBlocker DNSBL & SquidGuard at the same time?
Hi darrenkdean,
There is no issue with Squid and DNSBL running at the same time… DNSBL is primarily a lite-weight solution to block 'Malicious Domains' and ADvert servers without adding the issues of running a proxy...
Currently, DNSBL does not block sub-domains. So if ads.yahoo.com is in a DNSBL blocklist, its not appropriate to block yahoo.com by adding the following, as it will obviously create issues…
local-zone: "yahoo.com" redirect local-data: "yahoo.com 60 IN A 10.10.10.1"
Its possible to use a list like Shallalist or dsi.ut-capitole.fr in DNSBL, by downloading the feed into /var/db/pfblockerng and extracting it into a subfolder. You can then manually add each category as a "localfile" in DNSBL.
The DNSBL blocklist will also require both "example.com" and "www . example.com" to be added. Here is a patch to auto add "www" to each domain.
https://forum.pfsense.org/index.php?topic=86212.msg581562#msg581562Hope that helps!
-
I don't know exactly what to do with "DNSBL Virtual IP". The LAN network is 10.10.10.x range. Must this VIP be an active IP? Read something about 1x1 image that is served? Does the pfBlockerNG handle this ip? Should it be in another private network range than the one in use? Tutorials and documentation about pfBlockerNG are non existing it seems?
-
There is plenty of documentation in the pfblockerNG tabs.
From the pfBlockerNG: DNSBL: Settings
DNSBL Virtual IP
Example ( 10.10.10.1 )
Enter a single IPv4 VIP address that is RFC1918 Compliant.This address should be in an Isolated Range than what is used in your Network.
Rejected DNS Requests will be forwarded to this VIP (Virtual IP)
RFC1918 Compliant - (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16)Read this Topic and also https://forum.pfsense.org/index.php?topic=86212.0 go get more information.
-
I'm sorry.. there is not. A google of pfblockerng setup or tutorial ends up with lots of single posts. Not once consistent story.
I get this silent error when 'force updating'
DNSBL enabled FAIL - restoring Unbound conf
/var/unbound/pfb_dnsbl.conf:48472: error: EOF inside quoted string
fatal flex scanner internal error–end of buffer missedFollowed the 'tutorial' in this thread about adblocking. Also nothing is seen in Alerts.
But am I interpreting this correctly? "This address should be in an Isolated Range than what is used in your Network."
So if my internal lan is 10.10.10.x I should add another private LAN range to pfSense and enter an ip in this new range in the box DNSBL Virtual IP? So a ip in an unused private range?
-
I'm sorry.. there is not. A google of pfblockerng setup or tutorial ends up with lots of single posts. Not once consistent story.
Well if you read all posts in this topic you should get a good idea on how to setup it up.
I get this silent error when 'force updating'
DNSBL enabled FAIL - restoring Unbound conf
/var/unbound/pfb_dnsbl.conf:48472: error: EOF inside quoted string
fatal flex scanner internal error–end of buffer missedFollowed the 'tutorial' in this thread about adblocking. Also nothing is seen in Alerts.
When you change something in pfblockerNG, go to the pfBlockerNG: Update tab you have the Live Log Viewer that enable you to see what is happening in the background.
You can also see the log files in the pfBlockerNG: Log Browser
But am I interpreting this correctly? "This address should be in an Isolated Range than what is used in your Network."
So if my internal lan is 10.10.10.x I should add another private LAN range to pfSense and enter an ip in this new range in the box DNSBL Virtual IP? So a ip in an unused private range?
Select something in the 192.168 or 172.16 network
-
This is the log when running a "Force Update":
UPDATE PROCESS START [ 02/20/16 19:05:52 ]
===[ DNSBL Process ]================================================
[ yoyo ] exists.
[ hpHosts_ads ] exists.
[ Adaway ] exists.
[ Cameleon ] exists. Adding Unbound Server:Include line… completed
Validating database... completed [ 02/20/16 19:05:53 ]DNSBL enabled FAIL - restoring Unbound conf
/var/unbound/pfb_dnsbl.conf:48472: error: EOF inside quoted string
fatal flex scanner internal error–end of buffer missed===[ Continent Process ]============================================
===[ Aliastables / Rules ]==========================================
No changes to Firewall rules, skipping Filter Reload
No Changes to Aliases, Skipping pfctl UpdateUPDATE PROCESS ENDED [ 02/20/16 19:05:54 ]
-
Did you select the Virtual IP outside you LAN 10.10.10.x network?
You enabled DNSBL ?Looks like you may have an error in one of the list. Enable only one list to see if the update goes thru.
-
Thanks. Indeed some entry gave that error… Seems to be working now. Still no alerts visible, but I know its blocking ads...
-
Did you enable logging in DNSBL IP Firewall Rule Settings?
-
Yup loggin is enabled. Also as test enabled "Global Enable Logging" on general tab. Still nothing. DNSBL blocks should show up on the Alerts tab right?
I also don't see any result of settings DNSBL Firewall Rule. No floathing rules are created.
So yeah a good informational best practice setup tutorial would be very welcome.
-
If your Lan is 10.10.10.x, what did you set the DNSBL VIP to? It has to be set to any other RFC1918 range for it to work.
In the general tab, the 'global logging' is only specific to IPv4/6 firewall rules. The DNSBL IP logging is only used when a DNSBL list posts IP addresses and these addresses are collected and put into an alias and a firewall rule added. It doesn't log domain based alerts..
I suggest you check your VIP and execute a 'force reload'. You should be able to ping and browse the VIP address from any LAN device. If not, then either the DNSBL service is not running or there is something preventing access to the VIP address. If you have multi-segment LAN addresses, enable the option in the DNSBL tab to create a floating firewall rule to pass the traffic from other Lan subnets.
If your still having trouble, post screenshots of the general and DNSBL tabs.
-
@bbcan177: I still have the issue that after pfsense has been rebooted with DNSBL enabled I manually have to start or restart the unbound service to get the DNS working. Any clue what cause this?
-
Hi fraglord, do you have either of the DHCP check boxes enabled in the Unbound Resolver settings tab? There seems to be some issues with those options. You can also review the pfSense System and Resolver logs for more clues.
-
Thanks for the quick reply :D I habe none of these options enabled because pfsense is not doing DHCP.
But there is something suspicious in the system logsphp-fpm[49122]: /rc.newwanip: The command '/usr/local/sbin/unbound -c /var/unbound/unbound.conf' returned exit code '1', the output was '[1456266101] unbound[78664:0] error: bind: address already in use [1456266101] unbound[78664:0] fatal error: could not open ports'