Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfBlockerNG Devel 2.2.1 upgrade fails to start pfb_dnsbl service

    Scheduled Pinned Locked Moved pfBlockerNG
    31 Posts 4 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • RonpfSR
      RonpfS
      last edited by

      And when you disable DNSBL, does the resolver works fine ?
      Maybe post your Resolver configuration.

      How much memory on the box? Check the memory usage with Diagnostics System Activity and Status Monitoring.

      To keep the configuration and clear the database:

      • Disable PfBlockerNG and Keep Settings, save.

      • Enable PfBlockerNG and Keep Settings, save

      • Force Reload All.

      2.4.5-RELEASE-p1 (amd64)
      Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
      Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

      1 Reply Last reply Reply Quote 0
      • M
        mcampbell
        last edited by

        2gb of ram:
        0_1534116719304_9ac5e6c0-ed8e-4887-a1a7-082c0a98e142-image.png

        DNS Resolver config (when pfblockerNG is running):
        0_1534115729398_bf6c7b66-ea27-428f-a2d1-33d015ca19c3-image.png
        0_1534115802876_3813a965-90fc-4048-ba7f-9453dc7e22b4-image.png
        0_1534115864211_21c810a5-d682-4c07-8317-b7bc32bba033-image.png

        RonpfSR 1 Reply Last reply Reply Quote 0
        • M
          mcampbell
          last edited by

          forgot to mention that I restarted dns resolver with pfblockerNG disabled, and the errors in resolving stopped showing up in the logs... maybe it was because nothing else uses it, not sure.

          1 Reply Last reply Reply Quote 0
          • RonpfSR
            RonpfS
            last edited by RonpfS

            @bbcan177 said in PfBlockerNG v2.0 w/DNSBL:

            pfSense has two types of DNS Services

            • DNS Forwarder

            • DNS Resolver

            If you plan on using the DNSBL feature, you will need to use the DNS Resolver for your DNS queries, the DNS Forwarder is not an option for DNSBL. Its probably best to ensure that the DNS Resolver is working before using DNSBL.

            The DNS Resolver is developed by NLnet Labs and is named 'Unbound'. It is a validating, recursive and caching DNS resolver. https://www.unbound.net/index.html

            Some recommendations:

            • The DNS Resolver can also be used in 'Forwardering mode'; however its best to not use this 'Forwarding mode' and keep it in 'resolver mode' as this will query the Root DNS servers for the DNS queries instead of relying on an ISPs DNS etc…

            • If you use the 'DNS Resolver Forwarder mode', only configure 'DNSSEC' if the configured DNS servers support DNSSEC. The enabling of 'DNSSEC' to harden your DNS security is highly recommended.

            • Disable the two "DHCP registrations" checkboxes, unless you really require those options.

            Here is a good primer about the DNS Resolver (Unbound) https://calomel.org/unbound_dns.html

            Disable DHCP Registrations as every new lease will restart Unbound
            Static registration will restart unbound on DHCP services modification.

            2.4.5-RELEASE-p1 (amd64)
            Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
            Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

            1 Reply Last reply Reply Quote 0
            • RonpfSR
              RonpfS @mcampbell
              last edited by

              @mcampbell said in pfBlockerNG Devel 2.2.1 upgrade fails to start pfb_dnsbl service:

              2gb of ram:

              Well this isn't much memory for DNSBL usage.
              You are also using RAM Disk for /var and /tmp, so they are competing for RAM with unbound when a Reload or Cron update is running.

              2.4.5-RELEASE-p1 (amd64)
              Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
              Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

              1 Reply Last reply Reply Quote 0
              • M
                mcampbell
                last edited by

                I never had a problem with it before on the non devel version of pfblockerNG. I was using the standard version of pfblockerNG for months without issues--except when trying to use the the Amazon app on my phone on the network--it was constantly giving errors. My desire for greater visibility into what exactly was being blocked is what prompted me to upgrade to the devel version. Unless you're saying the new version is that much more memory intensive? At any rate, I can probably upgrade the ram without much issues... it's a little bookshelf type PC, but it should support up to 4GB of RAM.

                QinnQ 1 Reply Last reply Reply Quote 0
                • QinnQ
                  Qinn @mcampbell
                  last edited by Qinn

                  @mcampbell Maybe it's an idea to reinstall the 2.2.1 develop and only enable DNSBL_ADs in DNSBL (certianly not TLD) and the force an update (my 2 cents),

                  btw what's your pfSense version?

                  Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
                  Firmware: Latest-stable-pfSense CE (amd64)
                  Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

                  1 Reply Last reply Reply Quote 0
                  • BBcan177B
                    BBcan177 Moderator
                    last edited by

                    Check the pfSense system log and the resolver.log for any error messages. For unbound, suggest to increase the Adv setting "Log Verbosity" to "2".

                    You can also run the following command to see if it reports and errors:

                    /usr/local/etc/rc.d/pfb_dnsbl.sh restart
                    

                    "Experience is something you don't get until just after you need it."

                    Website: http://pfBlockerNG.com
                    Twitter: @BBcan177  #pfBlockerNG
                    Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                    1 Reply Last reply Reply Quote 0
                    • M
                      mcampbell
                      last edited by

                      @Qinn , when I uninstalled everything, including settings, it still wasn't starting up, even with no settings loaded. I would think it should start up then. 2.4.3-RELEASE-p1 is what I'm currently on, though when I started this venture, I was on 2.4.3.

                      @BBcan177 , thanks for the advice, I will definitely try those out. I am linux savvy, so I know my way around on the linux side of things, but wasn't sure where the scripts ran on pfsense. I will happily try it out.

                      1 Reply Last reply Reply Quote 0
                      • M
                        mcampbell
                        last edited by

                        it already bore unexpected fruit:

                        [2.4.3-RELEASE][root@pfsense.home]/usr/local/etc/rc.d: ./pfb_dnsbl.sh restart
                        2018-08-14 21:35:14: (network.c.313) can't bind to socket: 10.1.10.2:443 Can't assign requested address
                        

                        I don't believe anything is bound to that IP. Worth trying a different one?

                        1 Reply Last reply Reply Quote 0
                        • M
                          mcampbell
                          last edited by

                          Holy smokes, tried 3 or 4 very different IPs within the 10.x.x.x subnet, all ones that are not being used by my pfsense for any of its networks, before I finally decided to try 10.254.254.254. That did it! it's actually running. No idea why it wasn't working with any of the others... I'll take it though. Thanks everyone for helping me out!

                          0_1534297986033_7c402917-6da3-4992-b6c7-353714676b71-image.png

                          1 Reply Last reply Reply Quote 0
                          • BBcan177B
                            BBcan177 Moderator
                            last edited by BBcan177

                            What does this report? What IP range did you use for Openvpn? You don't need to stay in the 10 range... Can also try 192.168 or any other private IP range (RFC1918)

                            ifconfig
                            

                            "Experience is something you don't get until just after you need it."

                            Website: http://pfBlockerNG.com
                            Twitter: @BBcan177  #pfBlockerNG
                            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                            1 Reply Last reply Reply Quote 0
                            • M
                              mcampbell
                              last edited by

                              So it looks like the openvpn range had the range it was last configured for, but not some of the others that had failed.

                              [2.4.3-RELEASE][root@pfsense.home]/root: ifconfig | grep inet
                                      inet6 fe80::224:b2ff:fedf:a196%bge0 prefixlen 64 scopeid 0x1
                                      inet 73.82.108.146 netmask 0xfffffe00 broadcast 255.255.255.255
                                      inet6 fe80::2e0:66ff:fe6a:c58f%bge1 prefixlen 64 scopeid 0x2
                                      inet 10.10.0.1 netmask 0xffffff00 broadcast 10.10.0.255
                                      inet 10.254.254.254 netmask 0xffffffff broadcast 10.254.254.254
                                      inet6 ::1 prefixlen 128
                                      inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3
                                      inet 127.0.0.1 netmask 0xff000000
                                      inet6 fe80::2e0:66ff:fe6a:c58f%bge1.2 prefixlen 64 scopeid 0x7
                                      inet 10.1.0.1 netmask 0xffffff00 broadcast 10.1.0.255
                                      inet6 fe80::2e0:66ff:fe6a:c58f%bge1.5 prefixlen 64 scopeid 0x8
                                      inet 10.2.0.1 netmask 0xffffff00 broadcast 10.2.0.255
                                      inet6 fe80::224:b2ff:fedf:a196%ovpns1 prefixlen 64 scopeid 0x9
                                      inet 10.2.10.1 --> 10.2.10.2  netmask 0xffffffff
                                      inet6 fe80::224:b2ff:fedf:a196%ovpns2 prefixlen 64 scopeid 0xa
                                      inet 10.1.10.1 --> 10.1.10.2  netmask 0xffffffff
                              

                              I think that my choice works out fine though, 10.254.254.254 is way out of the way.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.