Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfBlockerNG

    Scheduled Pinned Locked Moved pfBlockerNG
    1.2k Posts 211 Posters 2.1m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N8LBVN
      N8LBV
      last edited by

      @RonpfS:

      Check the installation logs, /var/log/pfblockerng/*, Dashboard for crash report etc.
      and look here https://forum.pfsense.org/index.php?topic=102470.msg647719#msg647719

      Been a busy week not had any time to dig into the issue yet. 
      Looks like many people are having to change or increase memory limits and PHP stuff?
      I'm guessing that may be the direction that I may need to go?

      Please forgive my newbieness here but isn't the point of an installable package that they should just work?
      Should not the package install itself modify memory settings as/if needed? and anything else?

      I don't have any other packages installed nor am I doing anything crazy memory hungry. 
      Wasn't going to do anything fancy with the blocker either just wanted to try it out and only have it block the "top ten" fist and see how that worked.

      I'm also reading that uninstalling the package and/or reinstalling it is an absolute NO-NO and can break things even worse!!!  WTF! :) 
      So being a package I'm not able to just uninstall it or reinstall it.   
      I'll reference this if need be but right now I just noticed mention of it in a few threads I read.

      I feel more like I do now.

      1 Reply Last reply Reply Quote 0
      • RonpfSR
        RonpfS
        last edited by

        An update to the package is now available https://forum.pfsense.org/index.php?topic=115357.msg649167#msg649167 & https://forum.pfsense.org/index.php?topic=115357.msg649605#msg649605

        2.4.5-RELEASE-p1 (amd64)
        Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
        Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

        1 Reply Last reply Reply Quote 0
        • M
          metalliqaz
          last edited by

          Is there any real documentation for this package?

          I installed it and all it seemed to do was destroy DNS lookups for all clients, including the firewall itself, for about 45 minutes.  The configuration page is a huge array of settings that are unexplained.  The package doesn't seem to be doing anything at all.  There are no new rules in the firewall, there seems to be no way of viewing any block lists at all.  I can't even find any obvious setting to tell it which sources to use.  Serously, where did everyone learn how to use this?

          1 Reply Last reply Reply Quote 0
          • RonpfSR
            RonpfS
            last edited by

            @metalliqaz:

            Is there any real documentation for this package?

            I installed it and all it seemed to do was destroy DNS lookups for all clients, including the firewall itself, for about 45 minutes.  The configuration page is a huge array of settings that are unexplained.  The package doesn't seem to be doing anything at all.  There are no new rules in the firewall, there seems to be no way of viewing any block lists at all.  I can't even find any obvious setting to tell it which sources to use.  Serously, where did everyone learn how to use this?

            Start with the first pages of each of these threads:
            pfBlockerNG
            pfBlockerNG v2.0 w/DNSBL
            pfBlockerNG v2.1 w/TLD
            And over time ;) why not read all pages.

            Also there are plenty of Information boxes on almost every page, click on them.
            And start slowly, go with one feature at a time, IPV4, IPV6, GeoIP, DNSBL until you get things running.

            Go to Firewall / pfBlockerNG / Log Browser, there you can see the log file and pfBlockerNG files. Also visit the Diagnostics /Tables.

            InfoBox1.JPG
            InfoBox1.JPG_thumb
            InfoBox2.JPG
            InfoBox2.JPG_thumb

            2.4.5-RELEASE-p1 (amd64)
            Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
            Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

            1 Reply Last reply Reply Quote 0
            • M
              metalliqaz
              last edited by

              Those are only useful if you already know the function of the config page in the first place.

              Firewall / pfBlockerNG / Update / Update Settings:

              Well, it obviously schedules a cron job, but what does the cron job do?  No indication whatsoever.
              What's the difference between update, cron, and reload?  No idea.

              Firewall / pfBlockerNG / Alerts / Alert Settings:

              Well, each category gets a number.  What that number means is not explained.  Doesn't seem to matter though, because there is nothing in any alert queue.

              Firewall / pfBlockerNG / Alerts / IPv4:

              What does this do? It's just an "Add" button.  Probably IPv4 rules?  Okay lets make a rule, click Add:
              Good lord.  Apparently I need to find lists myself, unlike ABP in my browser.  What format does it need? What are valid sources? What is the purpose of country codes?

              Can you, being serious and honest with yourself, say that anyone could come in completely cold and actually be able to configure something that works?

              Nah, I don't have time.  The mysterious disruption of DNS site-wide gives me an uneasy feeling, and the lack of documentation and a homepage seals it.

              1 Reply Last reply Reply Quote 0
              • RonpfSR
                RonpfS
                last edited by

                Again if you clicked on some infobox you would get many answers.
                As for finding the lists, yes I could go thru the posts and fetch them to you, but you are probably able to do that on you own.

                2.4.5-RELEASE-p1 (amd64)
                Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
                Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

                1 Reply Last reply Reply Quote 0
                • T
                  tdi
                  last edited by

                  metalliqaz does have a point.

                  Digging through forum threads is never a fun task.

                  It would be really good to have detailed info on package configuration and updated lists in one place.

                  1 Reply Last reply Reply Quote 0
                  • RonpfSR
                    RonpfS
                    last edited by

                    @BBcan177:

                    Its what "Open Source" is all about, and I encourage more people to get involved.

                    2.4.5-RELEASE-p1 (amd64)
                    Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
                    Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

                    1 Reply Last reply Reply Quote 0
                    • C
                      coliflower
                      last edited by

                      @doktornotor:

                      @Asterix:

                      Educate me where you see the default deny inbound global (all countries) rule on a base pfSense install.

                      Nowhere. It's not visible, it's implicit. Anything not allowed is denied by default. Unless you have some "allow from any" rule you wish to restrict via country blocking on your WAN, there's just no point in creating inbound country-based rules at all.

                      If everything is blocked on WAN-inbound per default / implicit, what is there reason (need) of having two recommended / additional rules on WAN ?

                      1. Block private networks and loopback addresses
                      2. Block boon networks

                      Unless you have some "allow from any“ rule …

                      Do you mean on WAN-interface or on LAN-interface ?

                      Thanks a lot in advance !

                      APU1D4 | pfSense 2.3.4 (amd64) | LAGG (LACP) <-> HP-1820-24G | pfBlockerNG | Suricata | WAN DOWN/UP 100/10

                      1 Reply Last reply Reply Quote 0
                      • M
                        Mr. Jingles
                        last edited by

                        It's either a bug or a feature (old IT joke from when I was younger  ;D ).

                        pfbl67anp.jpg
                        pfbl67anp.jpg_thumb

                        6 and a half billion people know that they are stupid, agressive, lower life forms.

                        1 Reply Last reply Reply Quote 0
                        • RonpfSR
                          RonpfS
                          last edited by

                          I have some alerts like that in dnsbl.log, last one was Aug 9

                          DNSBL Reject HTTPS,Aug 09 19:21:32,watson.microsoft.com
                          

                          That was probably with pfBlockerNG-2.1.1_1, what version are you using now?

                          From the Info infoblock under Firewall / pfBlockerNG / DNSBL

                          So not a bug or a feature, more a limitation of the pfBlockerNG DNSBL Web Server.

                          InfoBoxDNSBL.png
                          InfoBoxDNSBL.png_thumb

                          2.4.5-RELEASE-p1 (amd64)
                          Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
                          Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

                          1 Reply Last reply Reply Quote 0
                          • C
                            coliflower
                            last edited by

                            Just finished to read the whole thread, uff ..
                            Thanks to BBCan for the package and this thread, I am quit new to pfSense so I learned a lot!

                            WAN = INbound, don’t BLOCK the world, the world ist blocked by default, PASS only what you need and take care on that …
                            LAN = OUTbound, PASS what you need first and BLOCK all afterwards.

                            That two rules are most important to me, afterwards I can take care on the scenarios I need.

                            Thanks once again !!

                            APU1D4 | pfSense 2.3.4 (amd64) | LAGG (LACP) <-> HP-1820-24G | pfBlockerNG | Suricata | WAN DOWN/UP 100/10

                            1 Reply Last reply Reply Quote 0
                            • C
                              coliflower
                              last edited by

                              Maybe there is one who is able to answer to me why are there two BLOCK-rules, bogon-networks and private-networks if the WAN is BLOCKED by default …?

                              Thanks again in advance !!

                              @coliflower:

                              @doktornotor:

                              @Asterix:

                              Educate me where you see the default deny inbound global (all countries) rule on a base pfSense install.

                              Nowhere. It's not visible, it's implicit. Anything not allowed is denied by default. Unless you have some "allow from any" rule you wish to restrict via country blocking on your WAN, there's just no point in creating inbound country-based rules at all.

                              If everything is blocked on WAN-inbound per default / implicit, what is there reason (need) of having two recommended / additional rules on WAN ?

                              1. Block private networks and loopback addresses
                              2. Block boon networks

                              Unless you have some "allow from any“ rule …

                              Do you mean on WAN-interface or on LAN-interface ?

                              Thanks a lot in advance !

                              APU1D4 | pfSense 2.3.4 (amd64) | LAGG (LACP) <-> HP-1820-24G | pfBlockerNG | Suricata | WAN DOWN/UP 100/10

                              1 Reply Last reply Reply Quote 0
                              • D
                                digdug3
                                last edited by

                                Those can be enabled/disabled on the interface itself.

                                These are ip-addresses that should never exist on the WAN side (with the execption if you have a router on the WAN side that's not in bridge mode)

                                1 Reply Last reply Reply Quote 0
                                • C
                                  coliflower
                                  last edited by

                                  Thank you digdug3 !

                                  That helped finally:

                                  execption if you have a router on the WAN side that's not in bridge mode

                                  APU1D4 | pfSense 2.3.4 (amd64) | LAGG (LACP) <-> HP-1820-24G | pfBlockerNG | Suricata | WAN DOWN/UP 100/10

                                  1 Reply Last reply Reply Quote 0
                                  • BBcan177B
                                    BBcan177 Moderator
                                    last edited by

                                    Arbor Networks Feeds discontinued:
                                    https://forum.pfsense.org/index.php?topic=122237.0

                                    "Experience is something you don't get until just after you need it."

                                    Website: http://pfBlockerNG.com
                                    Twitter: @BBcan177  #pfBlockerNG
                                    Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                    1 Reply Last reply Reply Quote 0
                                    • mtarboxM
                                      mtarbox
                                      last edited by

                                      I know that this thread is a little older now.
                                      I utilized the php script that Dok presented.
                                      Should I go through and delete the failed downloads or what?
                                      [ pfB_MAIL - ToastedSpam ] Download FAIL [ 03/19/17 18:50:22 ] 
                                      [ pfB_MAIL - VirBL ] Download FAIL [ 03/19/17 18:45:01 ]
                                      [ pfB_SEC1 - MalwareGroup ] Download FAIL [ 03/19/17 18:35:56 ]
                                      [ pfB_PRI3 - Geopsy ] Download FAIL [ 03/19/17 18:35:33 ]
                                      [ pfB_PRI3 - VMX ] Download FAIL [ 03/19/17 18:35:31 ]
                                      [ pfB_PRI3 - DangerRulez ] Download FAIL [ 03/19/17 18:35:03 ]
                                      [ pfB_PRI2 - HoneyPot ] Download FAIL [ 03/19/17 18:34:41 ]
                                      [ pfB_PRI1 - dShield_Block ] Download FAIL [ 03/19/17 18:33:09 ]
                                      [ pfB_PRI1 - Abuse_Spyeye ] Download FAIL [ 03/19/17 18:32:51 ]
                                      [ pfB_MAIL - URIBL ] Download FAIL [ 03/19/17 18:29:37 ]
                                      [ pfB_MAIL - ToastedSpam ] Download FAIL [ 03/19/17 18:29:35 ]
                                      [ pfB_MAIL - VirBL ] Download FAIL [ 03/19/17 18:25:05 ]
                                      [ pfB_SEC1 - MalwareGroup ] Download FAIL [ 03/19/17 18:15:43 ]
                                      [ pfB_PRI3 - Geopsy ] Download FAIL [ 03/19/17 18:15:03 ]
                                      [ pfB_PRI3 - VMX ] Download FAIL [ 03/19/17 18:14:55 ]
                                      [ pfB_PRI3 - DangerRulez ] Download FAIL [ 03/19/17 18:14:17 ]
                                      [ pfB_PRI2 - HoneyPot ] Download FAIL [ 03/19/17 18:13:51 ]
                                      [ pfB_PRI1 - dShield_Block ] Download FAIL [ 03/19/17 18:11:35 ]

                                      Si vis pacem, para pactum.

                                      1 Reply Last reply Reply Quote 0
                                      • mtarboxM
                                        mtarbox
                                        last edited by

                                        I went through each one that failed, retried them, and disabled the ones that failed again,
                                        Then I attempted to go to each site, and if the site was no longer in existence, then I deleted.
                                        Answered my own question without getting yelled at!

                                        Si vis pacem, para pactum.

                                        1 Reply Last reply Reply Quote 0
                                        • BBcan177B
                                          BBcan177 Moderator
                                          last edited by

                                          @mtarbox:

                                          I went through each one that failed, retried them, and disabled the ones that failed again,
                                          Then I attempted to go to each site, and if the site was no longer in existence, then I deleted.
                                          Answered my own question without getting yelled at!

                                          The script is a little dated. Some feeds have changed…. some down... so always best to open the site in a browser and check it out....

                                          The next version of the package will have an automated Feeds Management Tab, which should make this process easier to manage.

                                          "Experience is something you don't get until just after you need it."

                                          Website: http://pfBlockerNG.com
                                          Twitter: @BBcan177  #pfBlockerNG
                                          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                          1 Reply Last reply Reply Quote 0
                                          • ?
                                            Guest
                                            last edited by

                                            The next version of the package will have an automated Feeds Management Tab, which should make this process easier to manage.

                                            +1 from me for that! This might be a cool rich Option for us all, to get taps named like Malware, Virus, ect.
                                            and insert there the links or URLs to several lists and perhaps a little "+" button to create his own new tap!
                                            Perhaps I mean ;)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.