Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Having problems with Firewall Aliases URLs not working since update to 2.4.5-p1

    Scheduled Pinned Locked Moved Firewalling
    13 Posts 3 Posters 1.7k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • viktor_gV Offline
      viktor_g Netgate
      last edited by

      are you able to fetch it manually from pfSense?

      # fetch  https://www.ipdeny.com/ipblocks/data/aggregated/cn-aggregated.zone
      

      in command line

      IsaacFLI 1 Reply Last reply Reply Quote 0
      • IsaacFLI Offline
        IsaacFL @viktor_g
        last edited by

        @viktor_g said in Having problems with Firewall Aliases URLs not working since update to 2.4.5-p1:

        fetch https://www.ipdeny.com/ipblocks/data/aggregated/cn-aggregated.zone

        This is the error I got:

        Certificate verification failed for /C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
        34374270280:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:/build/ce-crossbuild-245/sources/FreeBSD-src/crypto/openssl/ssl/s3_clnt.c:1269:
        fetch: https://www.ipdeny.com/ipblocks/data/aggregated/cn-aggregated.zone: Authentication error
        
        IsaacFLI viktor_gV 2 Replies Last reply Reply Quote 0
        • IsaacFLI Offline
          IsaacFL @IsaacFL
          last edited by

          When I open the link on a browser, it says the certificate is valid. Both Edge Chromium and Firefox.

          IsaacFLI 1 Reply Last reply Reply Quote 0
          • IsaacFLI Offline
            IsaacFL @IsaacFL
            last edited by

            Changing https to http does allow it to work.

            Seems to be an issue with verifying the certificate?

            IsaacFLI 1 Reply Last reply Reply Quote 0
            • IsaacFLI Offline
              IsaacFL @IsaacFL
              last edited by

              I do have Check certificate of aliases URLs Enabled.

              Verify HTTPS certificates when downloading alias URLs Make sure the certificate is valid for all HTTPS addresses on aliases. If it's not valid or is revoked, do not download it.

              Not sure when I did that.

              1 Reply Last reply Reply Quote 0
              • IsaacFLI Offline
                IsaacFL
                last edited by

                fetch https://www.spamhaus.org/drop/dropv6.txt
                yields:
                dropv6.txt 1068 B 14 MBps 00s

                So it works for some sites.

                1 Reply Last reply Reply Quote 0
                • bmeeksB Offline
                  bmeeks
                  last edited by bmeeks

                  I'm not a pfBlockerNG user, but I've seen this particular problem posted about previously, and the cause is the expired AddTrust certificate. There are apparently two solutions. One involves finding and manually deleting that expired certificate in the pfSense CLI. The other solution used by some was to change the URL mode in pfBlockerNG so that the cert is not validated. While not the most secure way of doing things, it was a "working" workaround for the folks posting.

                  IsaacFLI 1 Reply Last reply Reply Quote 0
                  • IsaacFLI Offline
                    IsaacFL @bmeeks
                    last edited by

                    @bmeeks I am not using pfBlockerNG either.

                    Just trying to download Alias/URL Table.

                    Does get me something google, but for now I just changed my urls from https to http. Which to be honest it isn't needed to encrypt a list of ips.

                    I assume there will be a fix at some point.

                    1 Reply Last reply Reply Quote 0
                    • viktor_gV Offline
                      viktor_g Netgate @IsaacFL
                      last edited by

                      @IsaacFL ipdeny.com https server is misconfigured and is offering an expired CA certificate (AddTrust) in the chain.

                      you can try this workaround: https://redmine.pfsense.org/issues/10616#note-3

                      more about AddTrust expriration issue: https://www.ssl.com/blogs/addtrust-external-ca-root-expired-may-30-2020/

                      IsaacFLI 1 Reply Last reply Reply Quote 1
                      • IsaacFLI Offline
                        IsaacFL @viktor_g
                        last edited by

                        @viktor_g

                        Once I read about the cert issue, and that it is an external issue, I decided to just use the http (80) link to ipdeny at least for now.

                        I am not concerned about the country ip list being encrypted and figure they will probably fix it at some point.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.