Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNSBL Virtual IP: Address must be in an isolated Range that is not used in your Network.

    Scheduled Pinned Locked Moved pfBlockerNG
    30 Posts 5 Posters 10.0k Views 5 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S Offline
      snore @RonpfS
      last edited by

      @RonpfS said in DNSBL Virtual IP: Address must be in an isolated Range that is not used in your Network.:

      That rules isn't generated by pfblockerNG. pfblockerNG use 177000* numbers.

      And you don't have TLD enabled ?! 🤔

      Ok, then I must have added it by myself a long time ago based on some (probably misunderstood) forum post. But the fact remains: it does get hit.

      No, I don't have TLD enabled:

      pfb_vip_fw_basic_settings2.jpg

      1 Reply Last reply Reply Quote 0
      • RonpfSR Offline
        RonpfS
        last edited by

        This post is deleted!
        1 Reply Last reply Reply Quote 0
        • RonpfSR Offline
          RonpfS @RonpfS
          last edited by

          @snore said in DNSBL Virtual IP: Address must be in an isolated Range that is not used in your Network.:

          But the fact remains: it does get hit.

          When was the last time you rebooted, maybe you have something that is hanged.

          You could try to stop and restart pfBlockerNG DNSBL service from the Status/Services tab

          Again, you what to do a Force Reload DNSBL when you change DNSBL settings. 😌

          1 Reply Last reply Reply Quote 0
          • cybrnookC Offline
            cybrnook
            last edited by cybrnook

            Bumping an older thread, but seeing the same behavior.

            I am running 2.4.4 p3, and have been for some time. I have a dual WAN config with a WAN failover group. I also have a VPN interface with Mullvad that is acting as my default gateway. Mullvad is being provision on a 10.10.0.* IP.

            Until yesterday I was running fine with pfblockerng 2.1.4_17. I decided to make the jump to devel, and followed the advice on @BBcan177 's blog to make sure "save settings" was checked, perform the uninstall, then install the new devel. That all went fine, and every was seemingly working fine.

            Today I decided I wanted to add one more block list to my feed, and remove an old one (Zeus which is no longer maintained). I made that update, and also decided to disable Top 1M domain whitelist. When I went to "Save" the change, I got barked at that my DNSBL IP needed to be in its own isolated range, even though this is the same config it's been for almost 2 years now? Only difference is I uninstalled and installed the new devel. I have now had to change to 10.0.0.1 (from what was 10.10.10.1) and that seems to work, I can save and force reload. But now I am wondering why it thinks the 10.10.10 subnet is in use on my network?

            Any help would be appreciated.

            7b777de3-1f97-47ca-8221-2811ece0270c-image.png

            59b21f8e-50d6-4e8b-a177-6c3c2f1b9291-image.png

            71b4f814-70c4-4677-b4b1-a4564e259b0c-image.png

            1 Reply Last reply Reply Quote 0
            • cybrnookC Offline
              cybrnook
              last edited by cybrnook

              My brains tired, but trying to figure out how the check is coming to the conclusion that 10.10.10.1 is in use. I've checked my state table, my ARP Table, active sessions, only thing close is my VPN on 10.10.0.*, but that's a different subnet, so it should not be flagged. I don't see "where_is_ipaddr_configured" as a stored procedure, so not sure what logic it's using? :

              https://github.com/pfsense/FreeBSD-ports/blob/76b7ae7ab673f8e255bcdce91ee4d044071ccd20/net/pfSense-pkg-pfBlockerNG-devel/files/usr/local/www/pfblockerng/pfblockerng_dnsbl.php#L156-L165

              		// Validate DNSBL VIP address
              		if (!is_ipaddrv4($_POST['pfb_dnsvip'])) {
              			$input_errors[] = 'DNSBL Virtual IP: A valid IPv4 address must be specified.';
              		}
              		else {
              			$ip_validate = where_is_ipaddr_configured($_POST['pfb_dnsvip'], '' , true, true, '');
              			if (count($ip_validate)) {
              				$input_errors[] = 'DNSBL Virtual IP: Address must be in an isolated Range that is not used in your Network.';
              			}
              		}
              
              1 Reply Last reply Reply Quote 0
              • cybrnookC Offline
                cybrnook
                last edited by cybrnook

                @BBcan177 , looking at this line:

                $ip_validate = where_is_ipaddr_configured($_POST['pfb_dnsvip'], '' , true, true, '');
                

                Am I reading it correctly, you are defining variable ip_validate by comparing where_is_ipaddr_configured output, and then the logic is then to take the output ($_POST) of value pfb_dnsvip (which is already defined as 10.10.10.1 in line 114 of your php already)? I am trying to google php and figure out what's happening with the double quotes and the true true double quotes, but I see you are taking the output of that and counting the value in the next line to conclude is pfb_dnsvip is isloated or not. Just a little help on how you are doing this, so I can trace down on my end where the determination was made that 10.10.10.1 is NOT isolated on my env, please?

                A friend help me find the procedure of where_is_ip_configured, via a bug: https://redmine.pfsense.org/issues/7430
                But that still doesn't make sense, since my Interfaces are LAN (192.168.1.1/24), WAN1, WAN2, and MULLVAD, and only MULLVAD comes in with a subnet of 10.10.0.* (not 10.10.10.*).

                1 Reply Last reply Reply Quote 0
                • johnpozJ Online
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  @cybrnook said in DNSBL Virtual IP: Address must be in an isolated Range that is not used in your Network.:

                  LAN (192.168.1.1/32), WAN1, WAN2, and MULLVAD, and only MULLVAD comes in with a subnet of 10.10.0.* (not 10.10.10.*).

                  Your lan is a /32??? How is that suppose to work? And what is your subnet on this 10.10.0/16 would overlap 10.10.10.x

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 25.07 | Lab VMs 2.8, 25.07

                  cybrnookC 1 Reply Last reply Reply Quote 0
                  • cybrnookC Offline
                    cybrnook @johnpoz
                    last edited by cybrnook

                    @johnpoz

                    Thanks a ton for the response (I know you are quite knowledgeable here in the forums), and sorry I updated the last reply (it's 24 not 32) my apologies on dumping incorrect info in too quick I guess, mind goes faster than my fingers.

                    So, you are hitting right where I am suspecting, that the subnet that mullvad is pushing is what is the trigger. However, from my end, I don't believe that is a configurable, more a server push. Would you happen to know where I can find that out?

                    I want to note, DNSBL is working fine for me, and has been for years. It's just after upgrading to the devel package, the config I have been using for years is suddenly not good enough anymore. So perhaps the fact that I added the VPN later in time after pfblocker was installed, it was a chicken/egg scenario? Since mullvad likes to be on 10.10.0, perhaps any new modification I made in pfblocker would have barked at me, but I wouldn't know since it's been set it and forget it for so long. So, VPN is on 10.10.0, pfblocker says 10.10.10 is too close, and I changed to 10.0.0.1 and that works fine. I am just more focused on the "why", and maybe either it really IS overlapping subnet, OR perhaps one layer deeper could be used in pfblockers qualification of an isolated subnet? I am just a sticky person as my friend always says, that's all.

                    The base config for that interface is rather bare bones, no asking of subnet to be specified so I think it's pushed or either assigned by pfsense by default. The last octet for Mullvad is always the floating variable. I have never once seen it assign me an IP in the third octet, that's always 0:

                    Interface
                    51778853-6e71-446d-aa93-f1e5d6aa7eba-image.png

                    OvpnClient
                    cb32dd3d-5933-46fd-b8c0-79f0e4adb7e1-image.png
                    0e557e4e-066a-4ed6-b155-257c887a9056-image.png
                    e1120933-8218-4b0f-9c93-61806c4f9181-image.png

                    1 Reply Last reply Reply Quote 0
                    • BBcan177B Offline
                      BBcan177 Moderator
                      last edited by

                      Goto pfSense Diagnostics / Execute PHP Commands and enter the following:

                      $ip_validate = where_is_ipaddr_configured('10.10.10.1', '' , true, true, '');
                      print_r($ip_validate);
                      

                      Then hit "Execute"

                      This will report back if the DNSBL VIP address overlaps with any existing IPs that you have configured.

                      "Experience is something you don't get until just after you need it."

                      Website: http://pfBlockerNG.com
                      Twitter: @BBcan177  #pfBlockerNG
                      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                      cybrnookC 1 Reply Last reply Reply Quote 1
                      • johnpozJ Online
                        johnpoz LAYER 8 Global Moderator
                        last edited by johnpoz

                        Looking at the status interfaces should show you what your mullvad interface is.

                        vpninterface.png

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 25.07 | Lab VMs 2.8, 25.07

                        1 Reply Last reply Reply Quote 1
                        • cybrnookC Offline
                          cybrnook @BBcan177
                          last edited by cybrnook

                          @BBcan177 said in DNSBL Virtual IP: Address must be in an isolated Range that is not used in your Network.:

                          Goto pfSense Diagnostics / Execute PHP Commands and enter the following:

                          $ip_validate = where_is_ipaddr_configured('10.10.10.1', '' , true, true, '');
                          print_r($ip_validate);
                          

                          Then hit "Execute"

                          This will report back if the DNSBL VIP address overlaps with any existing IPs that you have configured.

                          Well, that answers that :-) Just like your sig says, experience is something you don't get until after you need it!

                          Array
                          (
                              [0] => Array
                                  (
                                      [if] => opt2
                                      [ip_or_subnet] => 10.10.0.5/16
                                  )
                          
                          )
                          

                          So, it IS my Mullvad VPN that it is colliding with.

                          With that now being brought to light and confirmed, is there anything that I, or other users, can do to avoid that and stick with your hard coded default?

                          BBcan177B 1 Reply Last reply Reply Quote 0
                          • johnpozJ Online
                            johnpoz LAYER 8 Global Moderator
                            last edited by johnpoz

                            That they would use a /16 is just moronic!!!

                            So they have 65k some clients hitting the same vpn server?

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 25.07 | Lab VMs 2.8, 25.07

                            cybrnookC 1 Reply Last reply Reply Quote 0
                            • cybrnookC Offline
                              cybrnook @johnpoz
                              last edited by cybrnook

                              @johnpoz

                              Yeah....... but, what's a user to do? They offer wireguard, as well as OVPN, port forwarding, and the service is pretty stable.... I wish there was a way on the client side I could override?

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ Online
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                Can you ask them why they are using a /16 - say it overlaps one of your local networks.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 25.07 | Lab VMs 2.8, 25.07

                                cybrnookC 1 Reply Last reply Reply Quote 0
                                • cybrnookC Offline
                                  cybrnook @johnpoz
                                  last edited by cybrnook

                                  @johnpoz

                                  Sure, worth a shot. If they come back, I'll update.

                                  BTW, Thanks @johnpoz and @BBcan177

                                  cybrnookC 1 Reply Last reply Reply Quote 0
                                  • johnpozJ Online
                                    johnpoz LAYER 8 Global Moderator
                                    last edited by johnpoz

                                    No problem, glad you got it worked out what it was ;) My way in finding it easier, but have to admit bbcan177 way more geeky - hehehe

                                    Not sure why they would be even using normal rfc1918 space... Why would they not just use say part of 100.64.0.0/10 (https://tools.ietf.org/html/rfc6598), they should be sure it doesn't overlap with users local rfc1918 space that way.

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 25.07 | Lab VMs 2.8, 25.07

                                    1 Reply Last reply Reply Quote 1
                                    • BBcan177B Offline
                                      BBcan177 Moderator @cybrnook
                                      last edited by BBcan177

                                      @cybrnook

                                      With that now being brought to light and confirmed, is there anything to I, or other users, can do to avoid that and stick with your hard coded default?

                                      Its just a default setting. There is no magic in using that IP or any other RFC1918 address.

                                      "Experience is something you don't get until just after you need it."

                                      Website: http://pfBlockerNG.com
                                      Twitter: @BBcan177  #pfBlockerNG
                                      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                      1 Reply Last reply Reply Quote 1
                                      • cybrnookC Offline
                                        cybrnook @cybrnook
                                        last edited by cybrnook

                                        @cybrnook @johnpoz @BBcan177

                                        Here is the response, not bad.

                                        /16 was selected due to the fact that /24 is too small, and the 10
                                        network was used primarily because it was the default (for OpenVPN) and
                                        also assigning in the 100.64/10 can create more conflicts with devices
                                        that use cgnat.
                                        
                                        That said, each OpenVPN server port uses a different /16, so a simple
                                        solution is to connect to for instance port 1194, which would then give
                                        you 10.8.0.0/16 range, and you would not have the conflict in your network.
                                        
                                        Here are the ranges used:
                                        
                                        tcp_1401_10.22.0.0
                                        tcp_443_10.5.0.0
                                        tcp_80_10.6.0.0
                                        udp_1194_10.8.0.0
                                        udp_1195_10.9.0.0
                                        udp_1196_10.10.0.0
                                        udp_1197_10.11.0.0
                                        udp_1300_10.14.0.0
                                        udp_1301_10.15.0.0
                                        udp_1302_10.16.0.0
                                        udp_1303_10.17.0.0
                                        udp_1400_10.21.0.0
                                        udp_53_10.7.0.0
                                        

                                        And of course 🤘 🤘 🤘 🤘
                                        750faf8c-b339-4cfe-95aa-9b2ba17949bb-image.png

                                        fa50f79e-51c8-4a6a-847c-d1dd1cfb5f5e-image.png

                                        78b89de5-53f0-4c92-9b49-41d1fed91aea-image.png

                                        1 Reply Last reply Reply Quote 0
                                        • johnpozJ Online
                                          johnpoz LAYER 8 Global Moderator
                                          last edited by johnpoz

                                          So they didn't answer about the /16 - so they have some 65k some clients connecting to the same server?

                                          /24 yeah ok too small what about a /20 or 19, etc.. /19 would be 8k some IPs..

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 25.07 | Lab VMs 2.8, 25.07

                                          cybrnookC 2 Replies Last reply Reply Quote 0
                                          • cybrnookC Offline
                                            cybrnook @johnpoz
                                            last edited by

                                            @johnpoz

                                            Nope! I did follow up, but haven't gotten a response yet.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.