Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Blocking on non-selected interface?

    Scheduled Pinned Locked Moved pfBlockerNG
    13 Posts 4 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      AR15USR
      last edited by

      Kinda not making sense. I have not selected the interface in the config section, so nothing on that interface should be able to reach the DNSBL VIP. There is also no automatic "pfB_PRI1_v4" rule on that interface so nothing should get rejected, no?


      2.6.0-RELEASE

      1 Reply Last reply Reply Quote 0
      • RonpfSR
        RonpfS
        last edited by RonpfS

        Ok it souldn't reach the VIP, but the answer it gets from unbound on the pfsense DNSBL is still the VIP for the blocked domains.

        If you want to allow access to blocked domains, you need to use another DNS Resolver that doesn't block those domains.

        Maybe you can look at : https://forum.netgate.com/topic/129365/bypassing-dnsbl-for-specific-ips

        2.4.5-RELEASE-p1 (amd64)
        Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
        Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

        1 Reply Last reply Reply Quote 0
        • R
          Rob Beckers
          last edited by Rob Beckers

          Same issue here, we have a number of VLANs and some should be excluded from DNSBL.

          If not to select the interfaces that participate in DNSBL, what exactly is the purpose of the setting for "permit firewall rules"? It would seem the logical place, also from the description that's in there, to rule interfaces in or out...

          -Rob-

          RonpfSR 1 Reply Last reply Reply Quote 0
          • RonpfSR
            RonpfS @Rob Beckers
            last edited by

            @rob-beckers The Firewall rules allow the network to reach the DNSBL VIP httpd service.

            2.4.5-RELEASE-p1 (amd64)
            Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
            Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

            A 1 Reply Last reply Reply Quote 0
            • A
              AR15USR @RonpfS
              last edited by

              @ronpfs said in Blocking on non-selected interface?:

              @rob-beckers The Firewall rules allow the network to reach the DNSBL VIP httpd service.

              I think what he is saying is why have the ability to select networks if they are all affected anyhow?


              2.6.0-RELEASE

              RonpfSR 1 Reply Last reply Reply Quote 0
              • RonpfSR
                RonpfS @AR15USR
                last edited by RonpfS

                @ar15usr Well did you look at the pfB_DNSBLIP_v4 auto rule to see if something is wrong?

                Did you traceroute from the devices that are not specified in you Permit Firewall Rules ?

                2.4.5-RELEASE-p1 (amd64)
                Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
                Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

                1 Reply Last reply Reply Quote 0
                • A
                  AR15USR
                  last edited by

                  A traceroute to yahoo.com results as expected. A traceroute to e.crashlytics.com traces to 10.10.10.1 meaning it is getting blocked.

                  There is no auto generated rule on this interface in the firewall rules fyi. I can post a screenshot of the floating rules if you like, let me know.


                  2.6.0-RELEASE

                  BBcan177B 1 Reply Last reply Reply Quote 0
                  • BBcan177B
                    BBcan177 Moderator @AR15USR
                    last edited by BBcan177

                    @ar15usr @rob-beckers

                    pfBlockerNG has two main components:

                    1. IP
                    2. DNSBL

                    In the DNSBL tab, there is a DNSBL_IP option that will collect any IPs found in the DNSBL (Domain based) feeds and add those to an IP Firewall rule to be blocked. The IP settings allow configuring which Interface IP rules are assigned to.

                    Don't mix up IP Blocking and Domain blocking.

                    To bypass a DNSBL Block, you either need to whitelist those Domains, or have the LAN devices use an alternative DNS server for DNS resolution. If your LAN and other segments are using pfSense Unbound for DNS resolution, then they will be filtered via DNSBL.

                    The DNSBL VIP and Interface selection is only used to define where the DNSBL Web server is located to sinkhole the DNSBL domains. All Lan segments should have access to this web server IP or else there can be timeout in browsing.

                    You can manually follow the steps in this post below to create "views" in Unbound that will only filter DNS requests for the selected network segments.

                    https://forum.netgate.com/topic/129365/bypassing-dnsbl-for-specific-ips

                    "Experience is something you don't get until just after you need it."

                    Website: http://pfBlockerNG.com
                    Twitter: @BBcan177  #pfBlockerNG
                    Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                    1 Reply Last reply Reply Quote 0
                    • A
                      AR15USR
                      last edited by

                      Well I tried that but any of those advanced options in that thread resulted in not being able to resolve anything. Now I cant remember the default line in the advanced options and the DNS Resolver is erroring out when trying to save the options.

                      Can you please remind me what the default line that pfBlockerNG adds there?

                      is it:

                      server: /var/unbound/pfb_dnsbl.*conf
                      

                      or

                      server: 
                      include: /var/unbound/pfb_dnsbl.*conf
                      

                      or something else?


                      2.6.0-RELEASE

                      RonpfSR 1 Reply Last reply Reply Quote 0
                      • RonpfSR
                        RonpfS @AR15USR
                        last edited by RonpfS

                        @ar15usr This what I have with pfblockerNG-Devel

                        server:include: /var/unbound/pfb_dnsbl.*conf
                        

                        2.4.5-RELEASE-p1 (amd64)
                        Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
                        Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

                        A 1 Reply Last reply Reply Quote 0
                        • A
                          AR15USR @RonpfS
                          last edited by

                          @ronpfs OK back up now, thanks..


                          2.6.0-RELEASE

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.