Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfBlockerNG-devel v2.2.5_18

    Scheduled Pinned Locked Moved pfBlockerNG
    20 Posts 9 Posters 5.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JeGrJ
      JeGr LAYER 8 Moderator
      last edited by JeGr

      Alright, just a moment :)

      Edit:

      Done. Redid the Wizard. WAN and LAN were selected. After step 4 auto-updated triggered just like the first time. No errors in update log, completed normally. Afterwards were skimming through it and spotted it:

      Unable to apply rules. Outbound interface option not configured.

      But all interfaces in all screens relevant are configured?

      Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

      If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

      BBcan177B 1 Reply Last reply Reply Quote 0
      • BBcan177B
        BBcan177 Moderator @JeGr
        last edited by

        @jegr said in pfBlockerNG-devel v2.2.5_18:

        Unable to apply rules. Outbound interface option not configured.

        After the wizard ran, is the Outbound interface selected in the IP Tab?

        grep "<outbound_interface" /conf/config.xml
        

        "Experience is something you don't get until just after you need it."

        Website: http://pfBlockerNG.com
        Twitter: @BBcan177  #pfBlockerNG
        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

        1 Reply Last reply Reply Quote 0
        • JeGrJ
          JeGr LAYER 8 Moderator
          last edited by

          Tried again:

          1. complete uninstall with keep settings UNchecked so full uninstall
          2. new install
          3. wizard, wan/lan selected, alternative ip 10.20.30.4 used (as the lan is within 10.10.10.x range)
          4. waited for updating

          After 4) I checked wizard.log -> all clear, no errors.
          Checked pfblockerng.log -> same error as above in between the update jobs.

          [ Talos_BL_v4 ]			 Downloading update .. 200 OK. completed ..
            ------------------------------
            Original Master     Final     
            ------------------------------
            1382     1297       1297        [ Pass ] 
            -----------------------------------------------------------------
          
          
          
          *Unable to apply rules. Outbound interface option not configured.
          
          
          ===[  Aliastables / Rules  ]==========================================
          
          No changes to Firewall rules, skipping Filter Reload
          

          In the IP tab:

          • inbound: WAN IF is selected with option block
          • outbound: LAN IF is selected with option reject

          WAN/LAN don't have their standard "names", but are selected nevertheless. LAN is also selected as webserver IF in DNSBL tab.

          Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

          If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

          1 Reply Last reply Reply Quote 0
          • T
            tagit446
            last edited by

            I just updated an existing install of 2.2.5_17 to the new version and I to am having the same issue now. The previous version was working great.

            I am also seeing the "Unable to apply rules. Outbound interface option not configured.". I checked and found the outbound interface options are still set correctly. All of my pfb aliases are now gone.

            No errors in the logs that I can see.

            BBcan177B 1 Reply Last reply Reply Quote 0
            • BBcan177B
              BBcan177 Moderator @tagit446
              last edited by

              @tagit446 said in pfBlockerNG-devel v2.2.5_18:

              I just updated an existing install of 2.2.5_17 to the new version and I to am having the same issue now. The previous version was working great.
              I am also seeing the "Unable to apply rules. Outbound interface option not configured.". I checked and found the outbound interface options are still set correctly. All of my pfb aliases are now gone.
              No errors in the logs that I can see.

              I submitted a PR which is waiting on approval:
              https://github.com/pfsense/FreeBSD-ports/pull/586

              Run this command to download a patched file:

              fetch -o /usr/local/pkg/pfblockerng/pfblockerng.inc "https://gist.githubusercontent.com/BBcan177/15383a6b67b0b24154997a7ad5c3c66a/raw"
              

              "Experience is something you don't get until just after you need it."

              Website: http://pfBlockerNG.com
              Twitter: @BBcan177  #pfBlockerNG
              Reddit: https://www.reddit.com/r/pfBlockerNG/new/

              T 1 Reply Last reply Reply Quote 1
              • T
                tagit446 @BBcan177
                last edited by

                @bbcan177 said in pfBlockerNG-devel v2.2.5_18:

                fetch -o /usr/local/pkg/pfblockerng/pfblockerng.inc "https://gist.githubusercontent.com/BBcan177/15383a6b67b0b24154997a7ad5c3c66a/raw"

                This appears to have fixed the issue.

                It's seriously only been a few minutes since i posted, thanks so much for the speedy reply and fix!

                1 Reply Last reply Reply Quote 0
                • BBcan177B
                  BBcan177 Moderator
                  last edited by

                  @tagit446 said in pfBlockerNG-devel v2.2.5_18:

                  It's seriously only been a few minutes since i posted, thanks so much for the speedy reply and fix!

                  Your welcome!

                  "Experience is something you don't get until just after you need it."

                  Website: http://pfBlockerNG.com
                  Twitter: @BBcan177  #pfBlockerNG
                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                  1 Reply Last reply Reply Quote 0
                  • TECHEDGE59T
                    TECHEDGE59
                    last edited by

                    I need to change the "CN_DNSBL" default self signed certificate by a one coming from my own internal certificate authority on lan network. Is it possible ? And how to do it ? By the GUI it looks impossible, so by entering console commands ? If you can help, thanks a lot !
                    I would also like to congratulate you on your excellent work on Pfblockerng !

                    GrimsonG 1 Reply Last reply Reply Quote 0
                    • GrimsonG
                      Grimson Banned @TECHEDGE59
                      last edited by

                      @techedge59 said in pfBlockerNG-devel v2.2.5_18:

                      I need to change the "CN_DNSBL" default self signed certificate by a one coming from my own internal certificate authority on lan network. Is it possible ?

                      Yes, but what do you hope to accomplish with that? This will not prevent certificate errors on filtered https urls, if that is what you intend to do.

                      TECHEDGE59T 1 Reply Last reply Reply Quote 0
                      • TECHEDGE59T
                        TECHEDGE59 @Grimson
                        last edited by

                        @grimson Know that... But my goals are:
                        1/ That all navigators in the lan, and especially Chrome, do not always ''alert'' the users cause of a self signed certificate. It's very important for us.
                        2/ Of course, then, if possible, remove the certificate error.

                        GrimsonG BBcan177B 2 Replies Last reply Reply Quote 0
                        • GrimsonG
                          Grimson Banned @TECHEDGE59
                          last edited by

                          @techedge59 said in pfBlockerNG-devel v2.2.5_18:

                          @grimson Know that... But my goals are:
                          1/ That all navigators in the lan, and especially Chrome, do not always ''alert'' the users cause of a self signed certificate. It's very important for us.

                          They will then alert the users that the certificate doesn't match the requested domain name.

                          2/ Of course, then, if possible, remove the certificate error.

                          https://forum.netgate.com/topic/137053/how-to-restrict-custom-websites-with-pfblockerng-devel/5

                          1 Reply Last reply Reply Quote 0
                          • perikoP
                            periko
                            last edited by

                            Hi, just wondering.
                            Does pfblockerNG have the option to setup ACL and say, this IP's alias from my LAN can have this blacklist more restricted and have other less restricted?
                            Like a proxy thing.
                            I will give a try this package, I use pi-hole but if pfsense do the job, why to have another machine in the network.
                            Thanks.

                            Necesitan Soporte de Pfsense en México?/Need Pfsense Support in Mexico?
                            www.bajaopensolutions.com
                            https://www.facebook.com/BajaOpenSolutions
                            Quieres aprender PfSense, visita mi canal de youtube:
                            https://www.youtube.com/c/PedroMorenoBOS

                            1 Reply Last reply Reply Quote 0
                            • BBcan177B
                              BBcan177 Moderator
                              last edited by

                              @periko said in pfBlockerNG-devel v2.2.5_18:

                              Does pfblockerNG have the option to setup ACL and say, this IP's alias from my LAN can have this blacklist more restricted and have other less restricted?

                              For DNSBL, you can define "views" in the Resolver (Unbound) settings to allow some devices to bypass DNSBL.
                              https://forum.netgate.com/topic/129365/bypassing-dnsbl-for-specific-ips

                              For IP Blocking, you can define the "Advanced In/Outbound" Firewall rule settings at the bottom of each Alias to configure how these Firewall rules apply to your network.

                              "Experience is something you don't get until just after you need it."

                              Website: http://pfBlockerNG.com
                              Twitter: @BBcan177  #pfBlockerNG
                              Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                              1 Reply Last reply Reply Quote 1
                              • BBcan177B
                                BBcan177 Moderator @TECHEDGE59
                                last edited by

                                @techedge59 said in pfBlockerNG-devel v2.2.5_18:

                                @grimson Know that... But my goals are:
                                1/ That all navigators in the lan, and especially Chrome, do not always ''alert'' the users cause of a self signed certificate. It's very important for us.
                                2/ Of course, then, if possible, remove the certificate error.

                                DNSBL is not going to MITM these blocked domain and serve a false certificate. See the link as indicated by @Grimson, by setting DNSBL Logging as disabled for these particular domains.

                                "Experience is something you don't get until just after you need it."

                                Website: http://pfBlockerNG.com
                                Twitter: @BBcan177  #pfBlockerNG
                                Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                S 1 Reply Last reply Reply Quote 1
                                • T
                                  talaverde
                                  last edited by

                                  Wasn't sure if you wanted feedback here or on the original thread. Anyway. One thing to note. I've been using the CARP feature. It's been working fine, the best I can see EXCEPT one blaring issue. "Failing over" to the 2nd node is fine, but when the main node takes over again and is 'master', the Carp Interface for pfB (LAN@1, 10.10.10.1) is still master on the backup node. All other connections fail back to the main node as they are supposed to but the pfB one does not. The quick work around is to disable carp on the 2nd node for a moment, then turn it back on. That forces the interface to switch back to the main node. It seems the pfB Carp interface requires a true 'disconnection' to trigger the switch. It will not auto-switch back to the main node on it's own. Not the end of the world. I can deal with it for now, but something you may want to look into for the next version. Thanks for all the hard work!

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    Su30MKI @BBcan177
                                    last edited by Su30MKI

                                    @bbcan177 If I have multiple Vlans configured and I want different rules for different Vlans, How do I do it? How do I create aliases using DNS blacklist atleast via pfblockerNG?

                                    1 Reply Last reply Reply Quote 2
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.