Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    help with youlube streaming

    Scheduled Pinned Locked Moved General pfSense Questions
    23 Posts 5 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 4
      4o4rh @stephenw10
      last edited by

      @stephenw10 how can i see which rule set it is in. It is also blocking some of my voip i see.

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        You can see it in the Snort Alerts. There is a link there to disable the rule directly. The red X icon.
        https://docs.netgate.com/pfsense/en/latest/ids-ips/setup-snort-package.html#getting-to-know-the-alerts

        Steve

        1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks
          last edited by bmeeks

          Several of the HTTP_INSPECT rules are overly aggressive in today's web application climate. Many web sites and web API services don't fully honor all the RFC standards, and this can cause some of the HTTP_INSPECT rules that enforce those standards to falsely trigger.

          If you search the IDS/IPS sub-forum within the Packages forum you will find a Master Suppress List thread containing suggested rules to be disabled and/or suppressed in order to reduce false positives.

          4 1 Reply Last reply Reply Quote 1
          • 4
            4o4rh @bmeeks
            last edited by

            @bmeeks thanks for that. i disabled 120.3 and 120.8 which fixed the snort problem with downloading maps. but i still need to disable the pfblockerNG for the map download to work. I can't see what is causing it in the logs, cause the IP address doesn't show.

            bmeeksB 1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks @4o4rh
              last edited by

              @gwaitsi said in help with youlube streaming:

              @bmeeks thanks for that. i disabled 120.3 and 120.8 which fixed the snort problem with downloading maps. but i still need to disable the pfblockerNG for the map download to work. I can't see what is causing it in the logs, cause the IP address doesn't show.

              I'm not a pfBlockerNG expert, but from what I do know it works by creating firewall rules to block IP addresses found on lists of bad IP actors. You should see whatever pfBlockerNG blocks in the firewall logs (and possibly elsewhere if it has its own alert logs).

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Yes, make sure logging for it is enabled in pfBlocker and you should see exactly which rule it blocking it.

                Steve

                4 1 Reply Last reply Reply Quote 0
                • 4
                  4o4rh @stephenw10
                  last edited by

                  @stephenw10 i don't see the map address in firewall logs at all. the address is in the vpn bypass list and goes over the wan interface. it doesn't show in the dnsbl alerts either.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Run a packet capture for that IP on the WAN. Make sure that traffic actually is blocked by the firewall and isn't leaving and just getting no response.

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • bmeeksB
                      bmeeks
                      last edited by bmeeks

                      You mentioned a VPN bypass list. Be aware that unless you configure pfSense to NOT pull routes from your VPN provider, then all of your traffic (both VPN and regular) will bounce through the default gateway provided by your VPN provider. Some services (in fact, quite a few) block the IP subnets of known VPN provider networks. So any traffic from your firewall, even non-VPN traffic, it it routes through your VPN provider's network can be dropped by the destination (in this case your maps service).

                      Here is a link to the specifics in the pfSense documentation about not pulling VPN routes: https://docs.netgate.com/pfsense/en/latest/book/openvpn/openvpn-configuration-options.html#don-t-pull-routes

                      4 1 Reply Last reply Reply Quote 1
                      • 4
                        4o4rh @bmeeks
                        last edited by

                        @bmeeks this forum blocks vpn access and is in the vpnbypass alias i setup. the fact i am writing means the vpn bypass is working. the snort aspect has been eliminated via the two rules deactived and is now done to simply toggling BlockerNG. i.e. turning off, makes the download work, and on makes it not but i can't see any alerts or blocks in the rules

                        bmeeksB 1 Reply Last reply Reply Quote 0
                        • bmeeksB
                          bmeeks @4o4rh
                          last edited by bmeeks

                          @gwaitsi said in help with youlube streaming:

                          @bmeeks this forum blocks vpn access and is in the vpnbypass alias i setup. the fact i am writing means the vpn bypass is working. the snort aspect has been eliminated via the two rules deactived and is now done to simply toggling BlockerNG. i.e. turning off, makes the download work, and on makes it not but i can't see any alerts or blocks in the rules

                          pfBlockerNG blocks thing using two methods. The first is a set of firewall rules that block IP addresses found on the IP lists you subscribe to and load into pfBlockerNG. The other method implements a customization of the Unbound DNS resolver using the DNSBL (DNS Blacklist). IP addresses found on this list will not resolve to their real IP address. I think they instead resolve to an internal web page on the firewall. If this is what is happening, then you won't find an alert in the firewall blocks logs. Look instead at the Unbound and DNSBL logging.

                          4 1 Reply Last reply Reply Quote 0
                          • 4
                            4o4rh @bmeeks
                            last edited by

                            @bmeeks i run netstat on the android device and found a number of ports being redirected to 10.10.10.1, unfortunately i see that as the destination IP, so am still trying to work out what the original IP was.

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              That's the replacement page hosted on pfSense. That implies it's being resolved to that by DNSBL.

                              So one of the feeds you have added to DNSBL is blocking that URL. It implies mostly serves stuff you don't want, ads malware etc. You might reconsider whether you actually need that...

                              Steve

                              1 Reply Last reply Reply Quote 0
                              • bmeeksB
                                bmeeks
                                last edited by bmeeks

                                @stephenw10 is correct. It seems the DNSBL feature of pfBlockerNG is intercepting the attempted domain-to-IP lookup made by your phone and instead of sending your phone the real IP of the domain it is redirecting your phone to the internal web page hosted by the DNSBL code. That's what the 10.10.10.1 address is.

                                This is the problem that can result from using tools that use IP blacklists as the basis for their block decisions. Many of these lists are not always 100% accurate, and they sometimes tend to broad-brush when marking IP subnets as malicious. What I mean by that is they can unintentionally blacklist an IP address that is actually OK but just happens to be located within a larger block the blacklist is marking as bad. Of course it is also possible that DNSBL is flagging the IP block because it serves up ads.

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.