• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Monster pfBlockerNG import script pfBlockerNG_import_gravity.php 224 lists

Scheduled Pinned Locked Moved pfBlockerNG
21 Posts 9 Posters 5.1k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • T
    tonymorella
    last edited by Oct 3, 2016, 4:55 AM Sep 18, 2016, 6:59 AM

    pfBlockerNG_import_gravity.php Copyright (C) 2016 gravity@demarctech.com All rights reserved.
    URL and Header data pull from firehole project file update-ipsets.in https://github.com/firehol/firehol
    Orginal pfBlockerng_import.php script pfBlockerNG Copyright (C) 2014 BBcan177@gmail.com All rights reserved.

    Total 224, 36 Organisations rest block lists for Ads, Abuse, Reputation, SPAM/Bots/PHP, TOR, Anonymizers and bogons
    Notes: Includes all the lists from the original script

    1. ssh into the pfSense console
    2. Type 8 to get to the shell
    3. Paste```
      curl https://raw.githubusercontent.com/tonymorella/pfsense_scipts/master/pfBlockerNG_import_gravity.php > pfBlockerNG_import_gravity.php

    4\. Paste```
    php -f ./pfBlockerNG_import_gravity.php
    

    5. Press Return
    6. Will return pfBlockerNG Alias List Import Completed
    7. Exit pfSense console
    8. Select Firewall>pfBlockerNG>IPv4
    9. Enable Level_1 and Level_2 to have the least amount of false positives, select Deny_Outbound action with update time of 1 hour
    10. Enable Attacks and Malware, but expect to have false positives and update white lists, select Deny_Outbound action with update time of 8 hours.
    11. Enable Ads if you want to back ads select Deny_Outbound action with update time of EveryDay

    Enjoy :)

    Tony

    10/3/2016 UPDATE: Moved a bunch of lists into Level 1, primarily used for to block bad ips outbound i.e. browsers.

    1 Reply Last reply Reply Quote 0
    • P
      pfcode
      last edited by Sep 18, 2016, 3:33 PM

      Appreciated, is it only for firehol or is it for firehol + original ones from BBCan77? Since I have original ones installed, don't want to be screwed. Thanks.

      Release: pfSense 2.4.3(amd64)
      M/B: Supermicro A1SRi-2558F
      HDD: Intel X25-M 160G
      RAM: 2x8Gb Kingston ECC ValueRAM
      AP: Netgear R7000 (XWRT), Unifi AC Pro

      1 Reply Last reply Reply Quote 0
      • T
        tonymorella
        last edited by Sep 18, 2016, 6:40 PM

        It includes the ones from the original, but under different alias and header names so it will not overwrite

        Tony

        1 Reply Last reply Reply Quote 0
        • P
          pfcode
          last edited by Sep 18, 2016, 9:54 PM

          @tonymorella:

          It includes the ones from the original, but under different alias and header names so it will not overwrite

          Tony

          Thanks, is it possible to just import the firehol ones?

          Release: pfSense 2.4.3(amd64)
          M/B: Supermicro A1SRi-2558F
          HDD: Intel X25-M 160G
          RAM: 2x8Gb Kingston ECC ValueRAM
          AP: Netgear R7000 (XWRT), Unifi AC Pro

          1 Reply Last reply Reply Quote 0
          • T
            tonymorella
            last edited by Sep 18, 2016, 10:01 PM

            @pfcode:

            @tonymorella:

            It includes the ones from the original, but under different alias and header names so it will not overwrite

            Tony

            Thanks, is it possible to just import the firehol ones?

            Could just do the import and turn off the ones you don't want, the Alias are disabled so they will not run until you set them to. Or modify the script before doing the import, delete the ones you don't need.

            1 Reply Last reply Reply Quote 0
            • N
              n3by
              last edited by Sep 19, 2016, 7:43 AM

              Parse error: syntax error, unexpected 'infolists' (T_STRING), expecting ')' in /usr/local/www/pfBlockerNG_import_gravity.php on line 563
              
              

              … and more

              1 Reply Last reply Reply Quote 0
              • D
                djjerdog
                last edited by Sep 20, 2016, 9:53 PM

                @n3by:

                Parse error: syntax error, unexpected 'infolists' (T_STRING), expecting ')' in /usr/local/www/pfBlockerNG_import_gravity.php on line 563
                
                

                … and more

                Same error here :/

                1 Reply Last reply Reply Quote 0
                • T
                  tonymorella
                  last edited by Sep 20, 2016, 10:21 PM

                  @djjerdog:

                  @n3by:

                  Parse error: syntax error, unexpected 'infolists' (T_STRING), expecting ')' in /usr/local/www/pfBlockerNG_import_gravity.php on line 563
                  
                  

                  … and more

                  Same error here :/

                  Crud sorry about that typo on line 563

                  
                  "description"    => "Malware Expect false positives white lists will need to be created",",
                  
                  

                  Change to

                  
                  "description"    => "Malware Expect false positives white lists will need to be created",
                  
                  

                  Also update file on Github

                  1 Reply Last reply Reply Quote 0
                  • N
                    n3by
                    last edited by Sep 21, 2016, 6:08 AM

                    also change this:

                    line 680

                                        "header"     => "trustedsec_atif"),
                    

                    ->

                                        "header"     => "trustedsec_atif")),
                    

                    and
                    line 1020

                                "custom_update"      => "disabled")
                    

                    ->

                                "custom_update"      => "disabled"),
                    
                    1 Reply Last reply Reply Quote 0
                    • J
                      javcasta
                      last edited by Sep 21, 2016, 1:58 PM Sep 21, 2016, 1:21 PM

                      Hello.

                      Very good tool for pfBlockerNG :)

                      this is my debugged script that works for me, (zip file attached. or in my web: http://www.javcasta.com/?smd_process_download=1&download_id=33310 )

                      Regads.

                      pfBlockerNG_import_gravity.php.zip

                      Javier Castañón
                      Técnico de comunicaciones, soporte y sistemas.

                      Mi web: https://javcasta.com/

                      Soporte scripting/pfSense https://javcasta.com/soporte/

                      1 Reply Last reply Reply Quote 0
                      • T
                        tonymorella
                        last edited by Sep 21, 2016, 2:12 PM

                        @n3by:

                        also change this:

                        line 680

                                            "header"     => "trustedsec_atif"),
                        

                        ->

                                            "header"     => "trustedsec_atif")),
                        

                        and
                        line 1020

                                    "custom_update"      => "disabled")
                        

                        ->

                                    "custom_update"      => "disabled"),
                        

                        Thanks for the review, changes updated on github.  This is what happens when your up 24 hours straight :)

                        1 Reply Last reply Reply Quote 0
                        • I
                          iplost
                          last edited by Sep 21, 2016, 2:33 PM

                          Ok, thanks for update in github

                          One detail,  wget is not by default in pfSense 2.3.2, other way to download script:

                          
                           curl https://raw.githubusercontent.com/tonymorella/pfsense_scipts/master/pfBlockerNG_import_gravity.php > pfBlockerNG_import_gravity.php
                          
                          
                          1 Reply Last reply Reply Quote 0
                          • P
                            pfcode
                            last edited by Oct 12, 2016, 8:35 PM

                            Some of the lists blocked other lists. e.g. Malware[ransomware_feed] blocks Spam_Bots_PHP[lashback_ubl], Attacks[gofferje_sip] blocks Attacks[blueliv_crimeserver_online, blueliv_crimeserver_recent]. Totally confusion. Also, can't get access from "https://freeapi.blueliv.com"

                            Release: pfSense 2.4.3(amd64)
                            M/B: Supermicro A1SRi-2558F
                            HDD: Intel X25-M 160G
                            RAM: 2x8Gb Kingston ECC ValueRAM
                            AP: Netgear R7000 (XWRT), Unifi AC Pro

                            1 Reply Last reply Reply Quote 0
                            • T
                              tonymorella
                              last edited by Oct 13, 2016, 4:30 AM

                              @pfcode:

                              Some of the lists blocked other lists. e.g. Malware[ransomware_feed] blocks Spam_Bots_PHP[lashback_ubl], Attacks[gofferje_sip] blocks Attacks[blueliv_crimeserver_online, blueliv_crimeserver_recent]. Totally confusion. Also, can't get access from "https://freeapi.blueliv.com"

                              Good point,  by default I added all the URLs to a custom allow lists so they can not block each other :) Also you need to create and account to access the blueliv.com API

                              1 Reply Last reply Reply Quote 0
                              • P
                                pfcode
                                last edited by Oct 15, 2016, 2:48 PM

                                @tonymorella:

                                @pfcode:

                                Some of the lists blocked other lists. e.g. Malware[ransomware_feed] blocks Spam_Bots_PHP[lashback_ubl], Attacks[gofferje_sip] blocks Attacks[blueliv_crimeserver_online, blueliv_crimeserver_recent]. Totally confusion. Also, can't get access from "https://freeapi.blueliv.com"

                                Good point,  by default I added all the URLs to a custom allow lists so they can not block each other :) Also you need to create and account to access the blueliv.com API

                                Added 88.198.202.51 (blueliv.com) into the pfBlockerNG surpress list, but it was still blocked by gofferje,  What am I missing?

                                Release: pfSense 2.4.3(amd64)
                                M/B: Supermicro A1SRi-2558F
                                HDD: Intel X25-M 160G
                                RAM: 2x8Gb Kingston ECC ValueRAM
                                AP: Netgear R7000 (XWRT), Unifi AC Pro

                                1 Reply Last reply Reply Quote 0
                                • BBcan177B
                                  BBcan177 Moderator
                                  last edited by Oct 15, 2016, 6:42 PM

                                  @pfcode:

                                  Also, can't get access from "https://freeapi.blueliv.com"

                                  Added 88.198.202.51 (blueliv.com) into the pfBlockerNG surpress list, but it was still blocked by gofferje,  What am I missing?

                                  I haven't used blueliv, but your not checking the correct domain name…

                                  ping freeapi.blueliv.com

                                  PING f01.blueliv.com (88.198.51.46): 56 data bytes

                                  "Experience is something you don't get until just after you need it."

                                  Website: http://pfBlockerNG.com
                                  Twitter: @BBcan177  #pfBlockerNG
                                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                  1 Reply Last reply Reply Quote 0
                                  • P
                                    pfcode
                                    last edited by Oct 15, 2016, 11:47 PM

                                    @BBcan177:

                                    @pfcode:

                                    Also, can't get access from "https://freeapi.blueliv.com"

                                    Added 88.198.202.51 (blueliv.com) into the pfBlockerNG surpress list, but it was still blocked by gofferje,  What am I missing?

                                    I haven't used blueliv, but your not checking the correct domain name…

                                    ping freeapi.blueliv.com

                                    PING f01.blueliv.com (88.198.51.46): 56 data bytes

                                    Hi,

                                    if I manually add the ip in the suppress list and apply the changes,  Should I do a update or force reload?

                                    Release: pfSense 2.4.3(amd64)
                                    M/B: Supermicro A1SRi-2558F
                                    HDD: Intel X25-M 160G
                                    RAM: 2x8Gb Kingston ECC ValueRAM
                                    AP: Netgear R7000 (XWRT), Unifi AC Pro

                                    1 Reply Last reply Reply Quote 0
                                    • J
                                      johnabbot
                                      last edited by Oct 16, 2016, 7:17 AM

                                      I think you should put a warning about false positives on the bots and organisations ones. I had to delete them.

                                      1 Reply Last reply Reply Quote 0
                                      • T
                                        tonymorella
                                        last edited by Oct 16, 2016, 6:46 PM

                                        @johnabbot:

                                        I think you should put a warning about false positives on the bots and organisations ones. I had to delete them.

                                        Sure why not :)  I used Organisations for allow rules not block, did you notice issues with this one??

                                        1 Reply Last reply Reply Quote 0
                                        • J
                                          johnabbot
                                          last edited by Oct 18, 2016, 4:25 AM

                                          blocking emails to/from me.com from a local mail server I think it was.

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            [[user:consent.lead]]
                                            [[user:consent.not_received]]