Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfBlockerNG and Chrome

    Scheduled Pinned Locked Moved pfBlockerNG
    10 Posts 5 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      A Former User
      last edited by

      Hello
      I have been searching a long time why the pfBlockerNG was NOT blocking sites in my DNSBL blacklist.... it was completly transparent as if pfBlockerNG was not there???
      Then I discover in the parameters of Chrome the following

      e85d6126-09d4-4c9f-88fb-baa46e66dd40-image.png

      And there was the "solution" if I turn that off in Chrome all my bad sites where blocked as expected if I turn it back on the sites where not blocked anymore!

      Is there something to overcome that because as different users will connect to my network I have no waty to check the setting of that Chrome parameter ?

      Thanks for your help
      Pierre

      DaddyGoD 1 Reply Last reply Reply Quote 0
      • DaddyGoD
        DaddyGo @A Former User
        last edited by DaddyGo

        @pierrelyon said in pfBlockerNG and Chrome:

        pfBlockerNG was NOT blocking sites in my DNSBL blacklist..

        Hi,

        welcome to the real world ๐Ÿ˜‰

        itโ€™s the sleazy Chrome, uses ilyne stuff like DoH (a hat sucks), do this:
        https://forum.netgate.com/topic/157500/blocking-dns-over-https-seems-the-only-way-is-to-fire-a-shotgun-at-it

        there is no way to solve your question at once, no AD

        +++edit:

        it is very important that all DNS requests point to the pfSense box, manually or via DHCP, no matter

        Cats bury it so they can't see it!
        (You know what I mean if you have a cat)

        1 Reply Last reply Reply Quote 0
        • D
          Draco
          last edited by

          Does that switch in Chrome force DNS over HTTPS or just TLS (Port 853)? I have a separate VLAN for all of my IoT devices, and use a NAT forward to reroute ports 53 & 853 to pfSense for DNS. But I've seen some devices (e.g. Neato) hardware 8.8.8.8 over 443 for all DNS requests. No way to capture/fix that.

          DaddyGoD T 2 Replies Last reply Reply Quote 0
          • DaddyGoD
            DaddyGo @Draco
            last edited by DaddyGo

            @Draco said in pfBlockerNG and Chrome:

            Does that switch in Chrome force DNS over HTTPS or just TLS (Port 853)?

            Chrome switch = DoT

            and DoH
            Chrome disable DoH:

            chrome://flags/#dns-over-https

            Check: https://www.cloudflare.com/ssl/encrypted-sni/

            FireFox:
            about:config
            network.trr.mode 5

            https://support.mozilla.org/en-US/kb/firefox-dns-over-https#firefox:win10:fx82

            with IoT,...... you probably won't be able to do anything because the built - in firmware is dependent on DNS request via DoH-use in this case

            if you disable the device's predefined DNS method (by an external device or method) way, it will not work

            I recommend it to you again:
            https://forum.netgate.com/topic/157500/blocking-dns-over-https-seems-the-only-way-is-to-fire-a-shotgun-at-it/30

            Cats bury it so they can't see it!
            (You know what I mean if you have a cat)

            1 Reply Last reply Reply Quote 0
            • DaddyGoD
              DaddyGo
              last edited by

              @Draco said in pfBlockerNG and Chrome:

              Does that switch in Chrome force DNS over HTTPS or just TLS (Port 853)?

              Chrome switch = DoT

              and DoH
              Chrome disable DoH:

              chrome://flags/#dns-over-https

              Check: https://www.cloudflare.com/ssl/encrypted-sni/

              FireFox:
              about:config
              network.trr.mode 5

              https://support.mozilla.org/en-US/kb/firefox-dns-over-https#firefox:win10:fx82

              with IoT you probably won't be able to do anything because the built - in firmware is dependent on DNS request via DoH-use in this case

              if you disable the device's predefined DNS method (by an external device or method) way, it will not work

              I recommend it to you again:
              https://forum.netgate.com/topic/157500/blocking-dns-over-https-seems-the-only-way-is-to-fire-a-shotgun-at-it/30

              Cats bury it so they can't see it!
              (You know what I mean if you have a cat)

              1 Reply Last reply Reply Quote 0
              • T
                Tzvia @Draco
                last edited by

                @Draco
                There are some feeds in PFBLOCKER now that you can use to block IPV4 and IPV6 DNS, 'The GreatWall' lists. I also use https://public-dns.info/nameservers.txt. I block port 53 and 443 to these lists, and 853 is not allowed out - as I am using resolving so am not forwarding to any public DNS servers. Just using the root servers for DNS which is the PFSense default. And of course, the NAT redirect of 53. I can see my IOT stuff (Kindles, phones) hitting my DNS servers in IPV4 and IPV6, and see some NAT redirects. Just run around plugging the holes, and the IOT stuff ends up using my DNS because there is nothing else.

                Tzvia

                Current build:
                Hunsn/CWWK Pentium Gold 8505, 6x i226v 'micro firewall'
                16 gigs ram
                500gig WD Blue nvme
                Using modded BIOS (enabled CSTATES)
                PFSense 2.72-RELEASE
                Enabled Intel SpeedShift
                Snort
                PFBlockerNG
                LAN and 5 VLANS

                D 1 Reply Last reply Reply Quote 0
                • D
                  Draco @Tzvia
                  last edited by

                  @Tzvia Oh, I like that idea -- blocking SSL to DNS servers. Unfortunately for my IoT devices that hardwire that into their code, I suspect they might fail if I did that. I think I'll try just logging those requests for awhile to see what I find. Thanks!

                  T 1 Reply Last reply Reply Quote 0
                  • T
                    Tzvia @Draco
                    last edited by

                    @Draco Watching will show you that they are going to hard-coded DNS, but we know that already. The only way to tell if they will fall back to DHCP options or the default gateway is to block and see what they do. I ran around the house power cycling everything (and rebooting PFSense to clear cache/states and start fresh) and tested them all. My IOT is printers, TVs, phones, blueray players, Kindles and the old playstation3. So far, so good, none of them barfed at my settings. The newer things seem to fall back to what is in DHCP options, querying my DNS servers in ipv6, and the older stuff in ipv4. I see the occasional 8.8.8.8 on 53 being redirected, and some MDNS broadcasts on 5353 but everything is working.

                    Tzvia

                    Current build:
                    Hunsn/CWWK Pentium Gold 8505, 6x i226v 'micro firewall'
                    16 gigs ram
                    500gig WD Blue nvme
                    Using modded BIOS (enabled CSTATES)
                    PFSense 2.72-RELEASE
                    Enabled Intel SpeedShift
                    Snort
                    PFBlockerNG
                    LAN and 5 VLANS

                    1 Reply Last reply Reply Quote 0
                    • I
                      ihavealegohead
                      last edited by

                      Temporary fix is to disable secure DNS in chrome here:

                      chrome://settings/security

                      Scroll down the page until you see :

                      Use secure DNS
                      Determines how to connect to websites over a secure connection

                      And disable it.

                      I believe this is because PfBLOCKER uses an unsecure page to display a note to the user:

                      Screenshot_25.png

                      I haven't figured out yet how to make PfBlocker display a secure page.

                      1 Reply Last reply Reply Quote 0
                      • D
                        Draco
                        last edited by

                        @ihavealegohead: Yes, I know about the Chrome settings, but I am more concerned with dealing with this globally, not browser by browser. Also with my IoT devices that hardwire access (e.g. 8.8.8.8 over HTTPS). It seems I've gotten rid of the last of those devices, since a floating rule I put in place to detect HTTPS connections to DNS servers is no longer getting hits.

                        As for pfBlocker displaying a secure page: if it blocks an HTTPS page, your browser will never show it to you. The certificate in use at that moment is an internal pfBlocker cert, while the browser is expecting to see a certificate for the domain name you entered (while it is asked to show the internal pfBlocker SITE BLOCKED page). Ergo there will always be a certificate mismatch.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.