• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Bypassing DNSBL for specific IPs

Scheduled Pinned Locked Moved pfBlockerNG
114 Posts 28 Posters 77.1k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G
    GodAtum
    last edited by May 18, 2020, 6:24 PM

    Hi, been reading through this post but confused. I want to allow my IP 192.168.1.16 to bypass the blocker, is this correct?

    Go to Services/DNS resolver/General Settings then in Custom options write:

    server:include: /var/unbound/pfb_dnsbl.*conf
    access-control-view: 192.168.1.16/24 bypass
    access-control-view: 192.168.1.16/24 dnsbl
    
    view:
      name: "bypass"
      view-first: yes
    view:
      name: "dnsbl"
      view-first: yes
    
    1 Reply Last reply Reply Quote 0
    • H
      horse2370
      last edited by horse2370 May 18, 2020, 8:41 PM May 18, 2020, 8:40 PM

      server:
      access-control-view: 192.168.1.16/32 bypass
      access-control-view: 192.168.1.0/24 dnsbl
      
      view:
        name: "bypass"
        view-first: yes
      view:
        name: "dnsbl"
        view-first: yes
        include: /var/unbound/pfb_dnsbl.*conf
      

      The changes are: -

      access-control-view: 192.168.1.16/32 bypass
      

      Matches the host you want to bypass with a /32 to make it ONLY match the single address.

      access-control-view: 192.168.1.0/24 dnsbl
      

      Matches the rest of the subnet, assuming a 255.255.255.0 mask.

      Moved the include: to the "dnsbl" view

      G 1 Reply Last reply Nov 16, 2020, 6:34 PM Reply Quote 0
      • G
        GodAtum
        last edited by May 18, 2020, 9:54 PM

        Thanks very much! Is it possible to something more fine grained. Like allow 192.168.1.16 to www.blockedwebsite.com?

        1 Reply Last reply Reply Quote 0
        • M
          Mi88Shz
          last edited by May 28, 2020, 1:05 PM

          I have tried the following file and it appears to work, by adding a local-data entry in the view, and not allowing it to fall back to the global local-data entries . It has the benefit of keeping the pfblockerng-generated entry

          # Allow these hosts to bypass pfblockerng
          server:access-control-view: 192.168.0.2/32 bypass
          
          view:
            name: bypass
            view-first: no
            local-data: "dummy.entry 60 IN A 10.10.10.1"
          
          server:include: /var/unbound/pfb_dnsbl.*conf
          
          1 Reply Last reply Reply Quote 0
          • S
            SmokinMoJoe
            last edited by Jun 27, 2020, 12:00 PM

            Hi All,

            I see this thread has been ongoing for a few years.  How is that?  Is there a systematic way to make suggestions so this gets added to pfBlockerNG-Devel?  It seems like a reasonable request.  If we can't get this added to the GUI is there something else the customer can do?  i.e. whitelist the host for 15-60 minutes so they can get the info they need without getting blocked?

            having end users manually point to a different DNS server just makes it a pain in the ass.  Asking end users to run Opera in VPN mode is also extra steps and eventually I would want to block that as well except for a few users/ip addresses.  Having a separate machine or VM on a different network is something our users would call us out on.

            Do all the edits to these text files migrate during version upgrades or do we have to remember to re-do all the custom stuff we tinker with?

            Thanks,
            Joe

            M 1 Reply Last reply Mar 11, 2022, 5:04 PM Reply Quote 1
            • H
              HiteshJain @Gertjan
              last edited by Jun 28, 2020, 3:04 PM

              @Gertjan I had this working 4 months back:

              server:
                  access-control-view: 192.168.0.20/32 bypass
                  access-control-view: 192.168.0.0/24 dnsbl
              view:
                  name: "bypass"
                  view-first: yes
              view:
                  name: "dnsbl"
                  view-first: yes
                  include: /var/unbound/pfb_dnsbl.*conf
              

              but later HDD of my custom firewall crashed, and Covid-19 lockdown began.

              Meanwhile, I took firewall home, replaced HDD, upgraded pfSense to 2.4.5, upgraded pfblockerng-devel to 2.2.5_33. Now my bypass doesnt work. Everytime Firewall restarts or Enable/Disable pfblockerng, it changes unbound custom option to:

              server:
                  access-control-view: 192.168.0.20/32 bypass
                  access-control-view: 192.168.0.0/24 dnsbl
              view:
                  name: "bypass"
                  view-first: yes
              view:
                  name: "dnsbl"
                  view-first: yes
              server:include: /var/unbound/pfb_dnsbl.*conf
              

              i.e. it adds another server: clause in the last line. You mentioned that there can't be multiple server: clause.
              bypass still doesnt work. Can you please help?

              1 Reply Last reply Reply Quote 0
              • G
                Gertjan
                last edited by Jun 29, 2020, 5:15 AM

                Try this :

                server:
                    access-control-view: 192.168.0.20/32 bypass
                    access-control-view: 192.168.0.0/24 dnsbl
                    include: /var/unbound/pfb_dnsbl.*conf
                view:
                    name: "bypass"
                    view-first: yes
                view:
                    name: "dnsbl"
                    view-first: yes
                

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                H 1 Reply Last reply Jun 29, 2020, 10:21 AM Reply Quote 0
                • H
                  HiteshJain @Gertjan
                  last edited by Jun 29, 2020, 10:21 AM

                  Thanks @Gertjan for responding quickly.

                  I tried what you suggested, but bypass still not working.

                  Additionally, when i tried to enable/disable pfBlockerNG(with above custom option), it moved the include: to the last line, with additional server: clause.

                  server:
                      access-control-view: 192.168.0.16/30 bypass
                      access-control-view: 192.168.0.26/32 bypass
                      access-control-view: 192.168.0.0/24 dnsbl
                  view:
                      name: "bypass"
                      view-first: yes
                  view:
                      name: "dnsbl"
                      view-first: yes
                  server:include: /var/unbound/pfb_dnsbl.*conf
                  

                  Anymore ideas worth trying?

                  1 Reply Last reply Reply Quote 0
                  • S
                    SmokinMoJoe @Gertjan
                    last edited by Jun 29, 2020, 10:58 AM

                    @Gertjan said in Bypassing DNSBL for specific IPs:

                    Most easy solution : stop login the hits on the default block rules. (see Log > Settings )

                    Sorry Gertjan, I am not following your suggestion here. Do you mean "the Settings tab under Status > System Logs"

                    G 1 Reply Last reply Jun 29, 2020, 11:57 AM Reply Quote 0
                    • G
                      Gertjan @SmokinMoJoe
                      last edited by Gertjan Jun 29, 2020, 11:59 AM Jun 29, 2020, 11:57 AM

                      @SmokinMoJoe said in Bypassing DNSBL for specific IPs:

                      Do you mean "the Settings tab under Status > System Logs"

                      Yep, this one:

                      439ab09d-da5f-4c63-a37d-4efcc492c88f-image.png

                      @HiteshJain said in Bypassing DNSBL for specific IPs:

                      when i tried to enable/disable pfBlockerNG

                      pfBlockerNG is a program.

                      It's adds "server:include: /var/unbound/pfb_dnsbl.*conf" without taken in account if you have anything else already in there.

                      Normally, this isn't a big issue, because, normally, you do not need to enable and disable pfBlockerNG all the time.
                      And if you do, you have to visit the Resolver config page afterwards to "correct" the custom config options somewhat - if you have other, your own config settings entered.
                      The syntax has to be correct for unbound, who parses the config file.

                      Btw : My proposition about how to format is : how I should do it.
                      There is another forum thread that details how to do so already, use that one to compare it with yours.

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      M 1 Reply Last reply Jun 29, 2020, 12:06 PM Reply Quote 0
                      • M
                        Mi88Shz @Gertjan
                        last edited by Mi88Shz Jun 29, 2020, 12:07 PM Jun 29, 2020, 12:06 PM

                        @HiteshJain I have evolved the config I posted last month. It still allows pfblockerng to regenerate the configuration correctly, without corrupting it, and adds in a few addtional files which were needed.

                        # Allow these hosts to bypass pfblockerng
                        server:access-control-view: 192.168.0.2/32 bypass
                        
                        # A view to bypass pfblockerng
                        view:
                            name: bypass
                            view-first: no
                            # This is needed to prevent falling back to the
                            # global 'local-data' settings
                            local-data: "dummy.entry 60 IN A 10.10.10.1"
                            # Static host entries
                            include: /var/unbound/host_entries.conf
                            # dhcp lease entries
                            include: /var/unbound/dhcpleases_entries.conf
                            # Domain overrides
                            include: /var/unbound/domainoverrides.conf
                        
                        server:include: /var/unbound/pfb_dnsbl.*conf
                        
                        H 1 Reply Last reply Jun 29, 2020, 2:01 PM Reply Quote 0
                        • H
                          HiteshJain @Mi88Shz
                          last edited by Jun 29, 2020, 2:01 PM

                          @Mi88Shz Even this config is unable to bypass for me.

                          Moreover, your config contains 2 server: clause which as per @Gertjan cant be multiple.

                          Are you able to bypass for specific IPs?

                          G 1 Reply Last reply Jun 29, 2020, 2:20 PM Reply Quote 0
                          • G
                            Gertjan @HiteshJain
                            last edited by Gertjan Jun 29, 2020, 2:21 PM Jun 29, 2020, 2:20 PM

                            @HiteshJain said in Bypassing DNSBL for specific IPs:

                            2 server: clause which as per @Gertjan cant be multiple.

                            I actually said this :

                            @Gertjan said in Bypassing DNSBL for specific IPs:

                            "server:" clause can't (there is only one server)

                            I guess I dive back into the manual ....

                            But before that : I've seen thousands of these type of files : you've seen one, you've seen them all.

                            See :

                            505b8be2-1edf-4143-8dc8-85150a5e51df-image.png

                            server clause - not server clauses.

                            Maybe several server: "Attribute keywords" can exist .... you tell me ;)

                            In real world examples I see only one ...

                            No "help me" PM's please. Use the forum, the community will thank you.
                            Edit : and where are the logs ??

                            H 1 Reply Last reply Jun 30, 2020, 6:20 AM Reply Quote 0
                            • H
                              HiteshJain @Gertjan
                              last edited by Jun 30, 2020, 6:20 AM

                              @Gertjan I didnt mean to offend you by quoting you. I apologize :). Probably, I misunderstood your statement because I dont have any idea on how Unbound works or even configured.
                              I got to read about Unbound only because google results directed me to pages where people more experienced than me mentioned about using custom options of Unbound to bypass few IPs , and I wanted exactly same in my pfSense.

                              @Gertjan The way you explained in one of the earlier replies of yours, gave an impression that you know a lot about Unbound(& related stuff) and that impression is still maintained. I'd like to Thank you that you take time out to respond to newbie like me.

                              I tried to look at Unbound manual, but I gave up just after scrolling the page down to bottom of earth.

                              BTW, I am still searching for the right configuration thread from which I could compare my config. Current thread is most appropriate thread i could find so far.
                              Do you mind sharing the link of thread you mentioned earlier?

                              1 Reply Last reply Reply Quote 0
                              • G
                                Gertjan
                                last edited by Jun 30, 2020, 6:43 AM

                                @HiteshJain said in Bypassing DNSBL for specific IPs:

                                I didnt mean

                                Don't worry, non taken.
                                But I probably fckd up anyway. Have a look at the first messages in this thread :
                                The "include: /var/unbound/pfb_dnsbl.*conf" line should be part of the view: part that handles the "dnsbl".

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                H 1 Reply Last reply Jul 1, 2020, 3:53 PM Reply Quote 0
                                • H
                                  HiteshJain @Gertjan
                                  last edited by HiteshJain Jul 2, 2020, 2:25 PM Jul 1, 2020, 3:53 PM

                                  @Gertjan Unfortunately, bypass is still not working. ☹

                                  I have also tried to reinstall pfBlockerNG twice, once with 'Keep Settings' checked, another without it.
                                  My pfSense doesnt seems to like bypassing IP.
                                  ☹

                                  H 1 Reply Last reply Sep 4, 2020, 8:43 AM Reply Quote 0
                                  • H
                                    HiteshJain @HiteshJain
                                    last edited by HiteshJain Sep 4, 2020, 8:44 AM Sep 4, 2020, 8:43 AM

                                    I finally figured out the reason why the bypass and block wasn't working properly. It was silly mistake(s) on my part 😖

                                    The reason why bypass wasnt working:
                                    In TCP/IP->DNS setting I entered the IP address of my server which is also domain controller for windows logins.
                                    Since the DNS request was going to the DC controller first which in turn responds with 10.10.10.1 (blocked) because DC server was itself in the blocked list in Unbound settings.
                                    I have now changed theTCP/IP settings to 'Obtain settings automatically', which is causing the DNS request being sent to Pfsense directly for resolution, and give me bypassed ip address.

                                    The reason why block wasnt working properly:
                                    While trying different options to make things work, I enabled Youtube safe search option in DNSBL, which started to unblock youtube for blocked IP addresses. I have now turned it off(disabled) and things are working as expected.

                                    Now, bypass and block are working the way I wanted.👏 👏

                                    1 Reply Last reply Reply Quote 0
                                    • G
                                      GodAtum @horse2370
                                      last edited by GodAtum Nov 16, 2020, 6:44 PM Nov 16, 2020, 6:34 PM

                                      @horse2370 said in Bypassing DNSBL for specific IPs:

                                      server:
                                      access-control-view: 192.168.1.16/32 bypass
                                      access-control-view: 192.168.1.0/24 dnsbl

                                      view:
                                      name: "bypass"
                                      view-first: yes
                                      view:
                                      name: "dnsbl"
                                      view-first: yes
                                      include: /var/unbound/pfb_dnsbl.*conf

                                      I've done this buy I'm still blocked on certain websites, but not all. Wierd!

                                      Update: i had to manually add each URL in the DNSBL Whitelist

                                      H 1 Reply Last reply Nov 16, 2020, 7:00 PM Reply Quote 0
                                      • H
                                        horse2370 @GodAtum
                                        last edited by Nov 16, 2020, 7:00 PM

                                        @GodAtum

                                        Couple of things to check

                                        Make sure you do not have an extra server: statement at the very end of the DNS Resolver custom config section. This gets added by pfblockerNG automatically when it upgrades, enables etc. Sure you have, but have to ask as it still catches me out every now and then!

                                        The other thing to check, is machine that is not being bypassed using IPv6. You will need to add a bypass for that IP address as well.

                                        My example is for bypassing Roku's that are IPv4 only. If I was to bypass anything else on my network, I would need to add an additional bypass statement for the IPv6 /128 as most OS's now prefer IPv6 if it available.

                                        Let me know....

                                        G 1 Reply Last reply Nov 17, 2020, 9:37 AM Reply Quote 0
                                        • K
                                          kezzla
                                          last edited by kezzla Nov 16, 2020, 7:39 PM Nov 16, 2020, 7:38 PM

                                          I found a better solution for myself, and stopped using pfblockerng. I wanted to have better policy based dns blocking per network. I have my kids home doing school full time now thanks to covid. So I have them on their own vlan, and I block all kinds of stuff for their network. But on my own private network I just want ad-blocking only, and I can do this easily with NxFilter.

                                          You can install NxFilter on pfSense:

                                          GitHub - DeepWoods/nxfilter-pfsense: NxFilter install on pfSense
                                          https://github.com/DeepWoods/nxfilter-pfsense

                                          Then I found this vid on Youtube for a quick tutorial on setting it up:

                                          Raspberry Pi Home Server - NxFilter Tutorial - YouTube
                                          https://www.youtube.com/watch?v=l4mOFRQZoOU&t=2s

                                          So I have disabled the pfSense resolver (unbound) and pfBlocker and am only using nxfilter for dns. My pfsense memory usage has come way down, and it feels snappier while browsing. For some reason, dns resolution would hang randomly from time to time when I was using pfblocker, got sick of debugging it.

                                          Before this, I was using pfblocker for pretty much everything on my all my networks, and set up a pihole server in a VM on my freenas box. So dumb to just run a separate adblocking dns server, but that's what I did. So I have scrapped that VM now and my pfsense box is back to doing all the dns.

                                          Just thought I would share, as someone might require similar functionality.

                                          1 Reply Last reply Reply Quote 1
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received