Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfBlockerNG v2.0 w/DNSBL

    Scheduled Pinned Locked Moved pfBlockerNG
    1.1k Posts 192 Posters 1.9m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pfcode
      last edited by

      @renegade:

      @BBcan177:

      @renegade:

      I think i found out, why my network is so slow and unresponseful sometimes.
      The Unbound seems to restart pretty often

      Do you have DHCP Registration enabled in the Resolver? Maybe try it without those two checkboxes… Are you running it in Resover or Forwarder mode? Is DNSSEC enabled?

      I am running the DNS in Resolver Mode. Forwarding is disabled. DNSSEC is enabled; but was disabled before and i had the same problems.
      Yes, i have both boxes checked. (I need this).
      I can try to disable the checkboxes. This morning my whole network had problems, because the Unbound stopped and did not restart.

      There is a serious issue in the unbound service package, you will have to disable DNSBL, so that the line "server:include: /var/unbound/pfb_dnsbl.conf" is removed from Custom Options in the Unbound, to make unbound restart properly when your modem is rebooted or your IPv4/IPv6 WAN IP got renewed.

      Release: pfSense 2.4.3(amd64)
      M/B: Supermicro A1SRi-2558F
      HDD: Intel X25-M 160G
      RAM: 2x8Gb Kingston ECC ValueRAM
      AP: Netgear R7000 (XWRT), Unifi AC Pro

      1 Reply Last reply Reply Quote 0
      • BBcan177B
        BBcan177 Moderator
        last edited by

        @renegade:

        @BBcan177:

        @renegade:

        I think i found out, why my network is so slow and unresponseful sometimes.
        The Unbound seems to restart pretty often

        Do you have DHCP Registration enabled in the Resolver? Maybe try it without those two checkboxes… Are you running it in Resover or Forwarder mode? Is DNSSEC enabled?

        I am running the DNS in Resolver Mode. Forwarding is disabled. DNSSEC is enabled; but was disabled before and i had the same problems.
        Yes, i have both boxes checked. (I need this).
        I can try to disable the checkboxes. This morning my whole network had problems, because the Unbound stopped and did not restart.

        Check the Resolver.log for additional details… You might have to increase the Log Verbosity to get it to show more details to help diagnose the issue.

        "Experience is something you don't get until just after you need it."

        Website: http://pfBlockerNG.com
        Twitter: @BBcan177  #pfBlockerNG
        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

        1 Reply Last reply Reply Quote 0
        • BBcan177B
          BBcan177 Moderator
          last edited by

          @pfcode:

          There is a serious issue in the unbound service package, you will have to disable DNSBL, so that the line "server:include: /var/unbound/pfb_dnsbl.conf" is removed from Custom Options in the Unbound, to make unbound restart properly when your modem is rebooted or your IPv4/IPv6 WAN IP got renewed.

          Please post this issue in Redmine. Its the best way to help get this resolved.

          https://redmine.pfsense.org/projects/pfsense

          "Experience is something you don't get until just after you need it."

          Website: http://pfBlockerNG.com
          Twitter: @BBcan177  #pfBlockerNG
          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

          1 Reply Last reply Reply Quote 0
          • R
            renegade
            last edited by

            So i would have to disable DNSBL every morning after my 24h disconnect, restart unbound and enable DNSBL again…?
            I do not really understand this bug, so i think that i am not the eligible person to file an issue.

            1 Reply Last reply Reply Quote 0
            • T
              trumee
              last edited by

              I have the following list in 'Whitelist' for slickdeals, but still the links are not being whitelisted:

              
              dotomi.com
              dpbolvw.net
              evyy.net
              doubleclick.net
              avantlink.com
              tkqlhce.com
              pjatr.com
              shareasale.com
              pntrack.com
              ojrq.net
              clickserve.cc-dt.com
              jdoqocy.com
              pntrac.com
              affiliatefuture.com
              anrdoezrs.net
              gan.doubleclick.net
              emjcd.com
              commission-junction.com
              cj.com
              apmebf.com
              gopjn.com
              bfast.com
              redirect.at
              redirectingat.com
              7eer.net
              linksynergy.com
              kqzyfj.com
              cc-dt.com
              altfarm.mediaplex.com
              onenetworkdirect.net
              go2jump.org
              pntra.com
              pjtra.com
              qksrv.net
              ad.doubleclick.net
              cj.dotomi.com
              
              

              The following link failed:

              
              http://www.tkqlhce.com/click-4485850-11886886-1423272259000?sid=941dcd3e509111e69c477a73c7e879150INT&url=http%3A%2F%2Fwww.newegg.com
              
              
              1 Reply Last reply Reply Quote 0
              • BBcan177B
                BBcan177 Moderator
                last edited by

                @trumee:

                I have the following list in 'Whitelist' for slickdeals, but still the links are not being whitelisted:

                The following link failed:

                
                http://www.tkqlhce.com/click-4485850-11886886-1423272259000?sid=941dcd3e509111e69c477a73c7e879150INT&url=http%3A%2F%2Fwww.newegg.com
                
                

                You also need to Whitelist:
                    www.tkqlhce.com

                add that to the Whitelist, and run a "Force Reload - DNSBL"

                "Experience is something you don't get until just after you need it."

                Website: http://pfBlockerNG.com
                Twitter: @BBcan177  #pfBlockerNG
                Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                1 Reply Last reply Reply Quote 0
                • T
                  trumee
                  last edited by

                  Is it possible to have a regex like *tkqlhce.com to block all the subdomains?

                  1 Reply Last reply Reply Quote 0
                  • T
                    tjbaudio
                    last edited by

                    Hello, new member here.  Long time linux user with a solid understanding of networking and Vlans but I am brand new to pfsense and complex firewall configs.  Currently I am trying to set up a new firewall for my home.  Ultimate goals are to filter ads, block M$ spying and IOT back doors, separate Vlan or nic for IP cameras, and VPN access for said cameras.

                    Currently I am stuck at the ad filtering.  Ad's are blocked but page loads are very long and none are logged.  The VIP is timing out on :80 and :443, connection reset error on :8443.  :8081 serves up just fine and is logged in alerts correctly. Given the service is up and running and :8081 works and ads are blocked  I think DNSBL is up and running just fine.  I suspect a firewall rule or NAT is not correct.  I have done the same install twice with the same results both times.  Since this package is fairly new GOOGLE is coming up short but I will keep trying.

                    I am using P4 1.8 GHz with 768 meg ram.  Fresh install of PFsense 2.3.1 upgraded to  2.3.1-RELEASE-p5 (i386).  Basic ip and interface settings working.  Installed the latest  pfBlockerNG package 2.0.17.  Configured per post 18 of this thread skipping Alxea.  The only oops was I enabled pfBNG a couple of steps early.  Reboot after initial setup for good measure.

                    Again, every thing works as expected other than browsing to 10.10.10.1:80 or 10.10.10.1:443 has to time out during page loads.  I have looked around and I think I see the rules in place for this but I still think one is wrong or I am missing something simple.  Included below are some snips from the config XML.

                    Thank you very much for any help or hints you can give.

                     <nat><outbound><mode>automatic</mode></outbound> 
                     <rule><source>
                     <any><destination><address>10.10.10.1</address>
                    
                    <port>80</port></destination> 
                    <protocol>tcp</protocol>
                    <target>127.0.0.1</target>
                    <local-port>8081</local-port>
                    <interface>lan</interface>
                    
                     <associated-rule-id><natreflection>purenat</natreflection></associated-rule-id></any></rule> 
                     <rule><source>
                     <any><destination><address>10.10.10.1</address>
                    
                    <port>443</port></destination> 
                    <protocol>tcp</protocol>
                    <target>127.0.0.1</target>
                    <local-port>8443</local-port>
                    <interface>lan</interface>
                    
                     <associated-rule-id><natreflection>purenat</natreflection></associated-rule-id></any></rule> 
                     <separator></separator></nat> 
                     <filter><rule><type>pass</type>
                    <ipprotocol>inet</ipprotocol>
                    
                    <interface>lan</interface>
                    <tracker>0100000101</tracker>
                    <source>
                    <network>lan</network>
                    
                     <destination><any></any></destination></rule> 
                     <rule><type>pass</type>
                    <ipprotocol>inet6</ipprotocol>
                    
                    <interface>lan</interface>
                    <tracker>0100000102</tracker>
                    <source>
                    <network>lan</network>
                    
                     <destination><any></any></destination></rule></filter> 
                     <shaper><ipsec><aliases><alias><name>pfB_DNSBLIP</name>
                     <url>https://127.0.0.1:443/pfblockerng/pfblockerng.php?pfb=pfB_DNSBLIP</url> 
                    <updatefreq>32</updatefreq>
                    
                    <address>
                    
                    <type>urltable</type>
                     <detail></detail> 
                    
                     <proxyarp>```
                     <pfblockerngdnsblsettings><config><pfb_dnsbl>on</pfb_dnsbl>
                    <pfb_dnsvip>10.10.10.1</pfb_dnsvip>
                    <pfb_dnsport>8081</pfb_dnsport>
                    <pfb_dnsport_ssl>8443</pfb_dnsport_ssl>
                    <dnsbl_interface>lan</dnsbl_interface>
                     <pfb_dnsbl_rule><dnsbl_allow_int>lan</dnsbl_allow_int>
                    <action>Deny_Both</action>
                    <aliaslog>enabled</aliaslog>
                     <autoaddrnot_in><autoports_in><aliasports_in><autoaddr_in><autonot_in><aliasaddr_in><autoproto_in><agateway_in>default</agateway_in>
                     <autoaddrnot_out><autoports_out><aliasports_out><autoaddr_out><autonot_out><aliasaddr_out><autoproto_out><agateway_out>default</agateway_out>
                     <alexa_enable><alexa_count>1000</alexa_count>
                    <alexa_inclusion>ca,co,com,io,net,org</alexa_inclusion></alexa_enable></autoproto_out></aliasaddr_out></autonot_out></autoaddr_out></aliasports_out></autoports_out></autoaddrnot_out></autoproto_in></aliasaddr_in></autonot_in></autoaddr_in></aliasports_in></autoports_in></autoaddrnot_in></pfb_dnsbl_rule></config></pfblockerngdnsblsettings> 
                    
                     <pfblockerng><config><enable_cb>on</enable_cb>
                    <pfb_keep>on</pfb_keep>
                    <pfb_interval>24</pfb_interval>
                    <pfb_min>0</pfb_min>
                    <pfb_hour>0</pfb_hour>
                    <pfb_dailystart>0</pfb_dailystart>
                     <enable_dup><enable_agg><suppression><enable_log><database_cc><skipfeed>0</skipfeed>
                    <log_maxlines>20000</log_maxlines>
                    <inbound_interface>lan</inbound_interface>
                    <inbound_deny_action>block</inbound_deny_action>
                    <outbound_interface>wan</outbound_interface>
                    <outbound_deny_action>reject</outbound_deny_action>
                     <openvpn_action><enable_float><pass_order>order_0</pass_order>
                    <autorule_suffix>autorule</autorule_suffix>
                     <killstates></killstates></enable_float></openvpn_action></database_cc></enable_log></suppression></enable_agg></enable_dup></config></pfblockerng> 
                    
                     <virtualip><vip><mode>ipalias</mode>
                    <interface>lan</interface>
                    
                    <type>single</type>
                    <subnet_bits>32</subnet_bits>
                    <subnet>10.10.10.1</subnet></vip></virtualip> 
                    
                    ```</proxyarp></address></alias></aliases></ipsec></shaper> 
                    
                    1 Reply Last reply Reply Quote 0
                    • BBcan177B
                      BBcan177 Moderator
                      last edited by

                      @trumee:

                      Is it possible to have a regex like *tkqlhce.com to block all the subdomains?

                      The pending version 2.1.1 has the option to Whitelist all Sub-Domains by prefixing the Whitelisted Domain with a "dot"…  Just waiting for the Devs to merge the new changes... See this thread:

                      https://forum.pfsense.org/index.php?topic=115357.0

                      "Experience is something you don't get until just after you need it."

                      Website: http://pfBlockerNG.com
                      Twitter: @BBcan177  #pfBlockerNG
                      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                      1 Reply Last reply Reply Quote 0
                      • BBcan177B
                        BBcan177 Moderator
                        last edited by

                        @tjbaudio:

                        Again, every thing works as expected other than browsing to 10.10.10.1:80 or 10.10.10.1:443 has to time out during page loads.  I have looked around and I think I see the rules in place for this but I still think one is wrong or I am missing something simple.  Included below are some snips from the config XML

                        Since you are using multiple VLANS, you need to ensure that all VLANs can hit the DNSBL VIP… There is an option in the DNSBL Tab, to add a Permit Floating rule... Ensure that you select all of the VLANs in the selection menu...  You will have slow browsing issues if you can't get ping the DNSBL VIP and Browse to the DNSBL VIP and get the 1x1 pix....

                        "Experience is something you don't get until just after you need it."

                        Website: http://pfBlockerNG.com
                        Twitter: @BBcan177  #pfBlockerNG
                        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                        1 Reply Last reply Reply Quote 0
                        • T
                          tjbaudio
                          last edited by

                          @BBcan177:

                          @tjbaudio:

                          Again, every thing works as expected other than browsing to 10.10.10.1:80 or 10.10.10.1:443 has to time out during page loads.  I have looked around and I think I see the rules in place for this but I still think one is wrong or I am missing something simple.  Included below are some snips from the config XML

                          Since you are using multiple VLANS, you need to ensure that all VLANs can hit the DNSBL VIP… There is an option in the DNSBL Tab, to add a Permit Floating rule... Ensure that you select all of the VLANs in the selection menu...  You will have slow browsing issues if you can't get ping the DNSBL VIP and Browse to the DNSBL VIP and get the 1x1 pix....

                          My apologies.  That is my ultimate goal.  At this point I just have a stock install with 2 nics, WAN and LAN nics.  No Vlan's. Just default settings+ pfBNG installed.
                          Edit to add:
                          I can ping 10.10.10.1 from LAN.
                          In states I get:
                          LAN tcp 10.10.10.1:8081 <- 192.168.1.101:50268 ESTABLISHED:ESTABLISHED 5 / 4 587 B / 576 B
                          When loading 10.10.10.1:8081 in a browser.

                          LAN tcp 127.0.0.1:8443 (10.10.10.1:443) <- 192.168.1.135:50120 CLOSED:SYN_SENT 3 / 0 152 B / 0 B
                          When loading 10.10.10.1:80 in a browser.

                          LAN tcp 127.0.0.1:8443 (10.10.10.1:443) <- 192.168.1.101:35768 CLOSED:SYN_SENT 2 / 0 120 B / 0 B
                          LAN tcp 127.0.0.1:8443 (10.10.10.1:443) <- 192.168.1.101:35770 CLOSED:SYN_SENT 2 / 0 120 B / 0 B
                          When loading 10.10.10.1 in a browser.

                          1 Reply Last reply Reply Quote 0
                          • R
                            renegade
                            last edited by

                            @BBcan177:

                            @pfcode:

                            There is a serious issue in the unbound service package, you will have to disable DNSBL, so that the line "server:include: /var/unbound/pfb_dnsbl.conf" is removed from Custom Options in the Unbound, to make unbound restart properly when your modem is rebooted or your IPv4/IPv6 WAN IP got renewed.

                            Please post this issue in Redmine. Its the best way to help get this resolved.

                            https://redmine.pfsense.org/projects/pfsense

                            Okay guys, what can i do here?
                            I am really sad that i cannot use DNSBL, because my provider cuts my line every day…
                            Do i have to post a bounty and refer to that forum post?

                            1 Reply Last reply Reply Quote 0
                            • T
                              tjbaudio
                              last edited by

                              I think I have traced my problem to NAT reflection.  DNSBL is responding with the VIP address when tested with a known add site.  The VIP server is up and responds as it should when using ports 8081 and 8443.
                              The firewall states show it forwarding when using 80 and 443. but nothing ever comes back.
                              I have tested this with wget, firefox, and chrom.

                              I love how DNSBL and pfBlockerNG are working.  I am just going to have to go back over my pfsense setup to figure out the NAT reflection problem.

                              1 Reply Last reply Reply Quote 0
                              • BBcan177B
                                BBcan177 Moderator
                                last edited by

                                @renegade:

                                Okay guys, what can i do here?
                                I am really sad that i cannot use DNSBL, because my provider cuts my line every day…
                                Do i have to post a bounty and refer to that forum post?

                                Hi renegade,

                                You don't need to post a bounty. The redmine link is a site to post bugs/features for pfSense. The issue at hand seems to be related to the base pfSense software and not with the package. I don't have a similar network environment to debug this issue. So that's why I suggested that someone with the issue post in redmine to help sort out this issue.  In the meantime try to reduce the number of feeds used for DNSBL which might reduce the unbound resolver load time.

                                "Experience is something you don't get until just after you need it."

                                Website: http://pfBlockerNG.com
                                Twitter: @BBcan177  #pfBlockerNG
                                Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                1 Reply Last reply Reply Quote 0
                                • BBcan177B
                                  BBcan177 Moderator
                                  last edited by

                                  @tjbaudio:

                                  I think I have traced my problem to NAT reflection.

                                  From an earlier post, it seems like you reversed the in/outbound interfaces in the pkg General tab. Not sure if that's related. Also try to enable suppression in the general tab and run a "Force Reload -All". This will remove any loopback addresses that could potentially be in the DNSBL IP aliastable.

                                  "Experience is something you don't get until just after you need it."

                                  Website: http://pfBlockerNG.com
                                  Twitter: @BBcan177  #pfBlockerNG
                                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                  1 Reply Last reply Reply Quote 0
                                  • T
                                    tjbaudio
                                    last edited by

                                    Thank you for the recommendations.  These did not work.  Unfortunately I may not have much time over the next week to work on this.  I am thinking I may try a fresh install again when I do.  Taking screen shots the whole way.  If it works you can use them for a how to, if not I will know what I did :o

                                    1 Reply Last reply Reply Quote 0
                                    • D
                                      D0X
                                      last edited by

                                      Problem here;

                                      Running pfsense 2.3.1 with pfblockerng.

                                      Did set up IPV4 with two lists, EasyList and EasyPrivacy.
                                      I also have DNSBL enabled with Easylist.

                                      But now when browsing I continuously get Safari telling me the certificate is invalid (as shown in the attached picture, it is in Dutch but I think you'll get it).
                                      The certificate seems to me just the thing you'd like to have being blocked. How do I fix this, it is bugging the hell out of me.

                                      ![Schermafbeelding 2016-07-25 om 12.43.09.png](/public/imported_attachments/1/Schermafbeelding 2016-07-25 om 12.43.09.png)
                                      ![Schermafbeelding 2016-07-25 om 12.43.09.png_thumb](/public/imported_attachments/1/Schermafbeelding 2016-07-25 om 12.43.09.png_thumb)

                                      1 Reply Last reply Reply Quote 0
                                      • BBcan177B
                                        BBcan177 Moderator
                                        last edited by

                                        @tjbaudio:

                                        Thank you for the recommendations.  These did not work.  Unfortunately I may not have much time over the next week to work on this.  I am thinking I may try a fresh install again when I do.  Taking screen shots the whole way.  If it works you can use them for a how to, if not I will know what I did :o

                                        With just a single WAN/LAN, it should be fairly straightforward to setup the pkg…  Double check your LAN Devices for DNS and ensure that they only have pfSense as its only DNS server setting.

                                        "Experience is something you don't get until just after you need it."

                                        Website: http://pfBlockerNG.com
                                        Twitter: @BBcan177  #pfBlockerNG
                                        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                        1 Reply Last reply Reply Quote 0
                                        • BBcan177B
                                          BBcan177 Moderator
                                          last edited by

                                          @D0X:

                                          But now when browsing I continuously get Safari telling me the certificate is invalid (as shown in the attached picture, it is in Dutch but I think you'll get it).

                                          Safari seems to be the only browser that has this issue. Doesn't seem to occur with Chrome/FF/IE/Edge etc…

                                          Are these cert popups happening when you browse to that blocked Domain directly, or when its blocking that Domain as part of the webpage?  Two checks to ensure DNBSL is working as expected... Ping the DNSBL VIP and get a proper response ... Browse to the DNSBL VIP and get the 1x1 pix...

                                          If the popups are from a few common Domains, try to whitelist those and see if that improves it.

                                          Also, in the IPv4 tab, you cannot enter any EasyList Feeds... the IPv4 tab is for IP based listed only.

                                          DNSBL is designed to block the DNS resolution to Advert/Malicious Domains. As such only a portion of the EasyList/Privacy Feeds can be used (Where the feeds lists the actual ADvert Domain). Browser-Addons like ADBlock/UBlock manipulate the elements that are displayed on the page. So they can block certain elements from a particular Domain, while DNSBL can only block the entire Domain.

                                          Only two EasyList feeds can be used with DNSBL and they are hardcoded in the EasyList Tab. There are several other DNSBL Feeds listed at the start of this thread that can fill in the gap to block the balance of the Domains from serving any ADs.  Plus its achieved at Network level, without any add-ons manipulating or potentially opening security holes in the browser.

                                          It would really be nice if Safari fixed this issue with their software... Not much I can do to fix that without killing the package logging feature and just NXDOMAIN the DNS requests.

                                          "Experience is something you don't get until just after you need it."

                                          Website: http://pfBlockerNG.com
                                          Twitter: @BBcan177  #pfBlockerNG
                                          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                          1 Reply Last reply Reply Quote 0
                                          • D
                                            D0X
                                            last edited by

                                            Safari seems to be the only browser that has this issue. Doesn't seem to occur with Chrome/FF/IE/Edge etc…

                                            Are these cert popups happening when you browse to that blocked Domain directly, or when its blocking that Domain as part of the webpage?  Two checks to ensure DNBSL is working as expected... Ping the DNSBL VIP and get a proper response ... Browse to the DNSBL VIP and get the 1x1 pix...

                                            Should the VIP be one inside the LAN subnet or outside, tried both. Only inside the subnet I am getting the 1x1 pix, both don't respond to pings.

                                            If the popups are from a few common Domains, try to whitelist those and see if that improves it.

                                            googleads.g.doubleclick.net seems to be the main culprit. Isn't there any other way to block this certificate?

                                            Also, in the IPv4 tab, you cannot enter any EasyList Feeds… the IPv4 tab is for IP based listed only.

                                            Check, only using DNSBL now.

                                            It would really be nice if Safari fixed this issue with their software… Not much I can do to fix that without killing the package logging feature and just NXDOMAIN the DNS requests.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.