Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNSBL Virtual IP: Address must be in an isolated Range that is not used in your Network.

    Scheduled Pinned Locked Moved pfBlockerNG
    30 Posts 5 Posters 9.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • cybrnookC
      cybrnook
      last edited by cybrnook

      Bumping an older thread, but seeing the same behavior.

      I am running 2.4.4 p3, and have been for some time. I have a dual WAN config with a WAN failover group. I also have a VPN interface with Mullvad that is acting as my default gateway. Mullvad is being provision on a 10.10.0.* IP.

      Until yesterday I was running fine with pfblockerng 2.1.4_17. I decided to make the jump to devel, and followed the advice on @BBcan177 's blog to make sure "save settings" was checked, perform the uninstall, then install the new devel. That all went fine, and every was seemingly working fine.

      Today I decided I wanted to add one more block list to my feed, and remove an old one (Zeus which is no longer maintained). I made that update, and also decided to disable Top 1M domain whitelist. When I went to "Save" the change, I got barked at that my DNSBL IP needed to be in its own isolated range, even though this is the same config it's been for almost 2 years now? Only difference is I uninstalled and installed the new devel. I have now had to change to 10.0.0.1 (from what was 10.10.10.1) and that seems to work, I can save and force reload. But now I am wondering why it thinks the 10.10.10 subnet is in use on my network?

      Any help would be appreciated.

      7b777de3-1f97-47ca-8221-2811ece0270c-image.png

      59b21f8e-50d6-4e8b-a177-6c3c2f1b9291-image.png

      71b4f814-70c4-4677-b4b1-a4564e259b0c-image.png

      1 Reply Last reply Reply Quote 0
      • cybrnookC
        cybrnook
        last edited by cybrnook

        My brains tired, but trying to figure out how the check is coming to the conclusion that 10.10.10.1 is in use. I've checked my state table, my ARP Table, active sessions, only thing close is my VPN on 10.10.0.*, but that's a different subnet, so it should not be flagged. I don't see "where_is_ipaddr_configured" as a stored procedure, so not sure what logic it's using? :

        https://github.com/pfsense/FreeBSD-ports/blob/76b7ae7ab673f8e255bcdce91ee4d044071ccd20/net/pfSense-pkg-pfBlockerNG-devel/files/usr/local/www/pfblockerng/pfblockerng_dnsbl.php#L156-L165

        		// Validate DNSBL VIP address
        		if (!is_ipaddrv4($_POST['pfb_dnsvip'])) {
        			$input_errors[] = 'DNSBL Virtual IP: A valid IPv4 address must be specified.';
        		}
        		else {
        			$ip_validate = where_is_ipaddr_configured($_POST['pfb_dnsvip'], '' , true, true, '');
        			if (count($ip_validate)) {
        				$input_errors[] = 'DNSBL Virtual IP: Address must be in an isolated Range that is not used in your Network.';
        			}
        		}
        
        1 Reply Last reply Reply Quote 0
        • cybrnookC
          cybrnook
          last edited by cybrnook

          @BBcan177 , looking at this line:

          $ip_validate = where_is_ipaddr_configured($_POST['pfb_dnsvip'], '' , true, true, '');
          

          Am I reading it correctly, you are defining variable ip_validate by comparing where_is_ipaddr_configured output, and then the logic is then to take the output ($_POST) of value pfb_dnsvip (which is already defined as 10.10.10.1 in line 114 of your php already)? I am trying to google php and figure out what's happening with the double quotes and the true true double quotes, but I see you are taking the output of that and counting the value in the next line to conclude is pfb_dnsvip is isloated or not. Just a little help on how you are doing this, so I can trace down on my end where the determination was made that 10.10.10.1 is NOT isolated on my env, please?

          A friend help me find the procedure of where_is_ip_configured, via a bug: https://redmine.pfsense.org/issues/7430
          But that still doesn't make sense, since my Interfaces are LAN (192.168.1.1/24), WAN1, WAN2, and MULLVAD, and only MULLVAD comes in with a subnet of 10.10.0.* (not 10.10.10.*).

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            @cybrnook said in DNSBL Virtual IP: Address must be in an isolated Range that is not used in your Network.:

            LAN (192.168.1.1/32), WAN1, WAN2, and MULLVAD, and only MULLVAD comes in with a subnet of 10.10.0.* (not 10.10.10.*).

            Your lan is a /32??? How is that suppose to work? And what is your subnet on this 10.10.0/16 would overlap 10.10.10.x

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            cybrnookC 1 Reply Last reply Reply Quote 0
            • cybrnookC
              cybrnook @johnpoz
              last edited by cybrnook

              @johnpoz

              Thanks a ton for the response (I know you are quite knowledgeable here in the forums), and sorry I updated the last reply (it's 24 not 32) my apologies on dumping incorrect info in too quick I guess, mind goes faster than my fingers.

              So, you are hitting right where I am suspecting, that the subnet that mullvad is pushing is what is the trigger. However, from my end, I don't believe that is a configurable, more a server push. Would you happen to know where I can find that out?

              I want to note, DNSBL is working fine for me, and has been for years. It's just after upgrading to the devel package, the config I have been using for years is suddenly not good enough anymore. So perhaps the fact that I added the VPN later in time after pfblocker was installed, it was a chicken/egg scenario? Since mullvad likes to be on 10.10.0, perhaps any new modification I made in pfblocker would have barked at me, but I wouldn't know since it's been set it and forget it for so long. So, VPN is on 10.10.0, pfblocker says 10.10.10 is too close, and I changed to 10.0.0.1 and that works fine. I am just more focused on the "why", and maybe either it really IS overlapping subnet, OR perhaps one layer deeper could be used in pfblockers qualification of an isolated subnet? I am just a sticky person as my friend always says, that's all.

              The base config for that interface is rather bare bones, no asking of subnet to be specified so I think it's pushed or either assigned by pfsense by default. The last octet for Mullvad is always the floating variable. I have never once seen it assign me an IP in the third octet, that's always 0:

              Interface
              51778853-6e71-446d-aa93-f1e5d6aa7eba-image.png

              OvpnClient
              cb32dd3d-5933-46fd-b8c0-79f0e4adb7e1-image.png
              0e557e4e-066a-4ed6-b155-257c887a9056-image.png
              e1120933-8218-4b0f-9c93-61806c4f9181-image.png

              1 Reply Last reply Reply Quote 0
              • BBcan177B
                BBcan177 Moderator
                last edited by

                Goto pfSense Diagnostics / Execute PHP Commands and enter the following:

                $ip_validate = where_is_ipaddr_configured('10.10.10.1', '' , true, true, '');
                print_r($ip_validate);
                

                Then hit "Execute"

                This will report back if the DNSBL VIP address overlaps with any existing IPs that you have configured.

                "Experience is something you don't get until just after you need it."

                Website: http://pfBlockerNG.com
                Twitter: @BBcan177  #pfBlockerNG
                Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                cybrnookC 1 Reply Last reply Reply Quote 1
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by johnpoz

                  Looking at the status interfaces should show you what your mullvad interface is.

                  vpninterface.png

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 1
                  • cybrnookC
                    cybrnook @BBcan177
                    last edited by cybrnook

                    @BBcan177 said in DNSBL Virtual IP: Address must be in an isolated Range that is not used in your Network.:

                    Goto pfSense Diagnostics / Execute PHP Commands and enter the following:

                    $ip_validate = where_is_ipaddr_configured('10.10.10.1', '' , true, true, '');
                    print_r($ip_validate);
                    

                    Then hit "Execute"

                    This will report back if the DNSBL VIP address overlaps with any existing IPs that you have configured.

                    Well, that answers that :-) Just like your sig says, experience is something you don't get until after you need it!

                    Array
                    (
                        [0] => Array
                            (
                                [if] => opt2
                                [ip_or_subnet] => 10.10.0.5/16
                            )
                    
                    )
                    

                    So, it IS my Mullvad VPN that it is colliding with.

                    With that now being brought to light and confirmed, is there anything that I, or other users, can do to avoid that and stick with your hard coded default?

                    BBcan177B 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by johnpoz

                      That they would use a /16 is just moronic!!!

                      So they have 65k some clients hitting the same vpn server?

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      cybrnookC 1 Reply Last reply Reply Quote 0
                      • cybrnookC
                        cybrnook @johnpoz
                        last edited by cybrnook

                        @johnpoz

                        Yeah....... but, what's a user to do? They offer wireguard, as well as OVPN, port forwarding, and the service is pretty stable.... I wish there was a way on the client side I could override?

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          Can you ask them why they are using a /16 - say it overlaps one of your local networks.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          cybrnookC 1 Reply Last reply Reply Quote 0
                          • cybrnookC
                            cybrnook @johnpoz
                            last edited by cybrnook

                            @johnpoz

                            Sure, worth a shot. If they come back, I'll update.

                            BTW, Thanks @johnpoz and @BBcan177

                            cybrnookC 1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by johnpoz

                              No problem, glad you got it worked out what it was ;) My way in finding it easier, but have to admit bbcan177 way more geeky - hehehe

                              Not sure why they would be even using normal rfc1918 space... Why would they not just use say part of 100.64.0.0/10 (https://tools.ietf.org/html/rfc6598), they should be sure it doesn't overlap with users local rfc1918 space that way.

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              1 Reply Last reply Reply Quote 1
                              • BBcan177B
                                BBcan177 Moderator @cybrnook
                                last edited by BBcan177

                                @cybrnook

                                With that now being brought to light and confirmed, is there anything to I, or other users, can do to avoid that and stick with your hard coded default?

                                Its just a default setting. There is no magic in using that IP or any other RFC1918 address.

                                "Experience is something you don't get until just after you need it."

                                Website: http://pfBlockerNG.com
                                Twitter: @BBcan177  #pfBlockerNG
                                Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                1 Reply Last reply Reply Quote 1
                                • cybrnookC
                                  cybrnook @cybrnook
                                  last edited by cybrnook

                                  @cybrnook @johnpoz @BBcan177

                                  Here is the response, not bad.

                                  /16 was selected due to the fact that /24 is too small, and the 10
                                  network was used primarily because it was the default (for OpenVPN) and
                                  also assigning in the 100.64/10 can create more conflicts with devices
                                  that use cgnat.
                                  
                                  That said, each OpenVPN server port uses a different /16, so a simple
                                  solution is to connect to for instance port 1194, which would then give
                                  you 10.8.0.0/16 range, and you would not have the conflict in your network.
                                  
                                  Here are the ranges used:
                                  
                                  tcp_1401_10.22.0.0
                                  tcp_443_10.5.0.0
                                  tcp_80_10.6.0.0
                                  udp_1194_10.8.0.0
                                  udp_1195_10.9.0.0
                                  udp_1196_10.10.0.0
                                  udp_1197_10.11.0.0
                                  udp_1300_10.14.0.0
                                  udp_1301_10.15.0.0
                                  udp_1302_10.16.0.0
                                  udp_1303_10.17.0.0
                                  udp_1400_10.21.0.0
                                  udp_53_10.7.0.0
                                  

                                  And of course 🤘 🤘 🤘 🤘
                                  750faf8c-b339-4cfe-95aa-9b2ba17949bb-image.png

                                  fa50f79e-51c8-4a6a-847c-d1dd1cfb5f5e-image.png

                                  78b89de5-53f0-4c92-9b49-41d1fed91aea-image.png

                                  1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator
                                    last edited by johnpoz

                                    So they didn't answer about the /16 - so they have some 65k some clients connecting to the same server?

                                    /24 yeah ok too small what about a /20 or 19, etc.. /19 would be 8k some IPs..

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    cybrnookC 2 Replies Last reply Reply Quote 0
                                    • cybrnookC
                                      cybrnook @johnpoz
                                      last edited by

                                      @johnpoz

                                      Nope! I did follow up, but haven't gotten a response yet.

                                      1 Reply Last reply Reply Quote 0
                                      • cybrnookC
                                        cybrnook @johnpoz
                                        last edited by

                                        @johnpoz said in DNSBL Virtual IP: Address must be in an isolated Range that is not used in your Network.:

                                        So they didn't answer about the /16 - so they have some 65k some clients connecting to the same server?

                                        /24 yeah ok too small what about a /20 or 19, etc.. /19 would be 8k some IPs..

                                        Hello,
                                        
                                        To be fair, we are nowhere at that point, at most I've seen 200-300
                                        users on servers that has the highest load  (8 core 10GbE)
                                        
                                        Most servers have way below that and can use a /24 with no problem,
                                        however we do want to design in a way so we do not run into issues later on.
                                        
                                        Best regards
                                        
                                        1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator
                                          last edited by johnpoz

                                          So their servers or cluster at each pop can handle 65k users - yeah find that unlikely ;) This just a perfect example of how misuse of ipv4 space ran us into a shortage of ipv4 way before it should of ever happened..

                                          Network space should be assigned appropriately for the amount of devices that will be using that space.. Even when inside rfc1918 space (which has limits as well) Sure you allow for growth and such.. But come on their 8 core 10ge box could handle anywhere close to even 8k users? That would leave you at most 1.25mbps each user ;) Let alone 64k users ;)

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          1 Reply Last reply Reply Quote 1
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.