Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Custom IP4 List

    Scheduled Pinned Locked Moved pfBlockerNG
    15 Posts 3 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jmanatee @Gertjan
      last edited by

      @gertjan

      pfsense says I am on the latest version:

      2.4.5-RELEASE-p1 (amd64)
      built on Tue Jun 02 17:51:17 EDT 2020
      FreeBSD 11.3-STABLE
      The system is on the latest version.
      Version information updated at Mon May 31 7:15:33 EDT 2021

      pfblocker offers a developer version but i only run releases not betas.

      The IPs in question are in a WAN alias list created by pfblocker
      There are no "NAT" firewall rules above this block-alias rule.
      There are no floating rules.
      I have confirmed multiple time the IP is in the list.

      It is strange

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @jmanatee
        last edited by

        @jmanatee said in Custom IP4 List:

        pfsense says I am on the latest version:

        Netgate Site or Get pfSense or this forum ...

        Troubleshooting Upgrades

        @jmanatee said in Custom IP4 List:

        pfblocker offers a developer version but i only run releases not betas.

        Only the "3" series is maintained by the author, and after 16 revisions ( 3.0.0_16 ) now stable - IMHO.
        3.0.0_16 isn't beta. It's released.

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 0
        • J
          jmanatee
          last edited by

          @gertjan said in Custom IP4 List:

          Only the "3" series is maintained by the author, and after 16 revisions ( 3.0.0_16 ) now stable - IMHO.
          3.0.0_16 isn't beta. It's released.

          I guess you are saying that the failure to block an IP in a alias list is caused by the version I am running?

          This would be a pretty big bug and well documented wouldn't you think?

          GertjanG 1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @jmanatee
            last edited by Gertjan

            @jmanatee said in Custom IP4 List:

            I guess you are saying that the failure to block an IP in a alias list is caused by the version I am running?
            This would be a pretty big bug and well documented wouldn't you think?

            The latter : very true so no bug ;)

            The first : I'm saying that er are very few that are working with the "2" series. So, the chance some answers is 'as big' .... ;)

            But, the issue isn't "pfblocker" here, I guess.
            pfblocker is huge, but actually nothing : it prepares lists with IPs, to be fed to the firewall 'pf' and DNSBL lists, to be used by the Resolver (unbound).

            For the rest of the time, "pfblocker" gathers some statistics to make nice pages

            If you have no WAN rules ( == no NAT rules), the default 'block all' rules blocks everything and everybody. Why adding extra rules (with aliases) ?
            But, how can the mail server be reached from the outside ? How do you receive mail ?

            edit : please, details all lists, rules etc.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            J 1 Reply Last reply Reply Quote 0
            • J
              jmanatee @Gertjan
              last edited by

              @gertjan said in Custom IP4 List:

              @jmanatee said in Custom IP4 List:

              I guess you are saying that the failure to block an IP in a alias list is caused by the version I am running?
              This would be a pretty big bug and well documented wouldn't you think?

              The latter : very true so no bug ;)

              The first : I'm saying that er are very few that are working with the "2" series. So, the chance some answers is 'as big' .... ;)

              But, the issue isn't "pfblocker" here, I guess.
              pfblocker is huge, but actually nothing : it prepares lists with IPs, to be fed to the firewall 'pf' and DNSBL lists, to be used by the Resolver (unbound).

              For the rest of the time, "pfblocker" gathers some statistics to make nice pages

              If you have no WAN rules ( == no NAT rules), the default 'block all' rules blocks everything and everybody. Why adding extra rules (with aliases) ?
              But, how can the mail server be reached from the outside ? How do you receive mail ?

              edit : please, details all lists, rules etc.

              I didn't say I had no rules, I said I had no rules above the pfblocker rules. I have many rules allowing for mail server access (pop3, smtp, imap, etc) but they are all below the pfblocker rules. My understanding on how rules worked were first match top to bottom an ip or port is accepted or rejected.

              Is this wrong? Why would this work for the bulk of IPs in the pfblocker alias?

              1 Reply Last reply Reply Quote 0
              • J
                jmanatee
                last edited by

                BTW I remember why I didn't update to pfsense 2.5 there was some problem with OpenVPN, I have not looked into it since then not sure if they fixed this problem yet

                GertjanG 1 Reply Last reply Reply Quote 0
                • GertjanG
                  Gertjan @jmanatee
                  last edited by

                  @jmanatee

                  Like this :

                  f293ff27-75de-4ec3-82d2-e6bdfa4a3434-image.png

                  The first rule, using an Alias called "IP_List_with_nasty_guys", will block any TCP coming from the IP's present in the alias.

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  J 1 Reply Last reply Reply Quote 0
                  • J
                    jmanatee @Gertjan
                    last edited by

                    @gertjan

                    My list is the pfB_ASSPBlock, (there are several pfblocker ip4 lists) it contains the IPs in question and they still get through. Not all of them just a few of them.

                    Image1.jpg

                    JeGrJ 1 Reply Last reply Reply Quote 0
                    • JeGrJ
                      JeGr LAYER 8 Moderator @jmanatee
                      last edited by

                      @jmanatee said in Custom IP4 List:

                      My list is the pfB_ASSPBlock, (there are several pfblocker ip4 lists) it contains the IPs in question and they still get through. Not all of them just a few of them.

                      That screenshot shows hits for that rule with that alias. So what exactly is the problem?

                      Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                      If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                      J 1 Reply Last reply Reply Quote 0
                      • J
                        jmanatee @JeGr
                        last edited by

                        @jegr

                        There are like 4460 IPs on that list and some of the IPs (5-8) still get past pfsense to the server and continue attempts to login to the mail server

                        GertjanG JeGrJ 2 Replies Last reply Reply Quote 0
                        • GertjanG
                          Gertjan @jmanatee
                          last edited by

                          @jmanatee said in Custom IP4 List:

                          @jegr

                          There are like 4460 IPs on that list and some of the IPs (5-8) still get past pfsense to the server and continue attempts to login to the mail server

                          Humm. That's scarry.

                          What if you take the IP you use when VPN-in - as I see you have the OpenVPN server.
                          If you add your Client OpenVPN IP to the pfB_ASSPBlock, you couldn't enter anymore, right ?! The firewall wall log would show the hit.

                          On the Firewall > pfBlockerNG > IP page, do you have this one activated :

                          ea6e796f-87a0-42d3-89af-618890c31270-image.png

                          ?

                          Can't find another reasons ... and refuse to believe that pf, that is FreeBSD itself, is broken .... :(

                          No "help me" PM's please. Use the forum, the community will thank you.
                          Edit : and where are the logs ??

                          J 1 Reply Last reply Reply Quote 0
                          • JeGrJ
                            JeGr LAYER 8 Moderator @jmanatee
                            last edited by

                            @jmanatee said in Custom IP4 List:

                            @jegr

                            There are like 4460 IPs on that list and some of the IPs (5-8) still get past pfsense to the server and continue attempts to login to the mail server

                            Did you actually check the content of the list IN pfsense or do you just assume it has to have 4460 IPs? Did you check the table pfblocker creates if those IPs that get past pfSense are actually in the table or somehow got filtered out?

                            Go to Diagnostics / Table and search your Table and check if there's the IPs/CIDR entries that went through or if they are missing. If they are missing either pfB didn't update the list or merged or optimized it with another list etc.

                            Also enable the logging for the pfB rules so you can better catch hits/misses of that IPs.

                            Cheers
                            \jens

                            Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                            If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                            1 Reply Last reply Reply Quote 0
                            • J
                              jmanatee @Gertjan
                              last edited by

                              @gertjan said in Custom IP4 List:

                              @jmanatee said in Custom IP4 List:

                              @jegr

                              There are like 4460 IPs on that list and some of the IPs (5-8) still get past pfsense to the server and continue attempts to login to the mail server

                              Humm. That's scarry.

                              What if you take the IP you use when VPN-in - as I see you have the OpenVPN server.
                              If you add your Client OpenVPN IP to the pfB_ASSPBlock, you couldn't enter anymore, right ?! The firewall wall log would show the hit.

                              On the Firewall > pfBlockerNG > IP page, do you have this one activated :

                              ea6e796f-87a0-42d3-89af-618890c31270-image.png

                              ?

                              Can't find another reasons ... and refuse to believe that pf, that is FreeBSD itself, is broken .... :(

                              Yes it will definitely block me on vpn I have done that accidentally a couple times.

                              Kill states was not enabled, I enabled it I will continue to watch it.

                              This was probably the problem.

                              Thanks

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.