PfBlockerNG configuration for a newbie :)
-
Hello.
I finally managed to install and briefly configure pfBlockerNG.
It seems to work if I try to browse directly to a blocked website (see logs below) and I am getting the black page.
But when the domain shows as an ad into a webpage, it seems that it's not blocked.
Am I doing something wrong or it needs more config?DNSBL Reject,Dec 30 09:44:16,www.steepto.com,10.10.10.40, | / | Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/62.0.3202.94 Safari/537.36 OPR/49.0.2725.64
DNSBL Reject,Dec 30 09:44:16,www.steepto.com,10.10.10.40,http://www.steepto.com/ | /favicon.ico | Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/62.0.3202.94 Safari/537.36 OPR/49.0.2725.64
DNSBL Reject,Dec 30 09:44:31,www.steepto.com,10.10.10.40, | /ghits | Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/62.0.3202.94 Safari/537.36 OPR/49.0.2725.64
DNSBL Reject,Dec 30 09:52:05,trafficfactory.biz,10.10.10.40, | / | Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/62.0.3202.94 Safari/537.36 OPR/49.0.2725.64
–-
DNSBL Reject,Dec 30 10:43:25,www.iwanttodeliver.com,10.10.10.40, | / | Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/62.0.3202.94 Safari/537.36 OPR/49.0.2725.64
DNSBL Reject,Dec 30 10:43:26,www.iwanttodeliver.com,10.10.10.40,http://www.iwanttodeliver.com/ | /favicon.ico | Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/62.0.3202.94 Safari/537.36 OPR/49.0.2725.64 -
Some other logs:
DNSBL Reject HTTPS,Dec 30 11:08:56,aax-us-east.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:08:56,aax-us-east.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:08:56,aax-us-east.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:08:56,aax-us-east.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:08:57,aax-us-east.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:08:57,aax-us-east.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:08:58,aax-us-east.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:08:59,s.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:08:59,s.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:09:17,s.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:09:17,s.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:10:28,cm.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:10:28,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:10:28,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:10:28,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:10:30,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:10:30,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:10:30,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:10:30,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:10:30,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:10:30,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:10:30,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:10:30,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,cm.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:01,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:11:28,aax-us-east.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:11:28,aax-us-east.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:11:28,aax-us-east.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:11:28,aax-us-east.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:11:30,s.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:11:30,s.amazon-adsystem.com
DNSBL Reject HTTPS,Dec 30 11:15:08,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,cm.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:15:09,googleads.g.doubleclick.net
DNSBL Reject HTTPS,Dec 30 11:26:48,googleads.g.doubleclick.net -
Hello.
I finally managed to install and briefly configure pfBlockerNG.
It seems to work if I try to browse directly to a blocked website (see logs below) and I am getting the black page.
But when the domain shows as an ad into a webpage, it seems that it's not blocked.
Am I doing something wrong or it needs more config?Blocking depends on what Feeds you add to DNSBL…
You can test with from pfSense:
host -t A example.com
or in Windows:
whois example.com
If its blocked via DNSBL, it will reply with the DNSBL VIP address that you configured.
If you see an AD in the browser, right-click on it, and click Inspect…. This will show the Domain name (if its based on a remote domain) and you can see if that Domain is listed in your DNSBL Feeds:
grep "example\.com" /var/db/pfblockerng/dnsbl/*
-
Thanks for your answer.
The domain in discussion is www.steepto.com and it is blocked as per below (domain is listed in my feeds, 192.168.0.1 is my VIP):
[2.4.2-RELEASE][root@pfsense]/root: grep "steepto.com" /var/db/pfblockerng/dnsbl/*
/var/db/pfblockerng/dnsbl/ad_servers.txt:local-data: "imgg.steepto.com 60 IN A 192.168.0.1"
/var/db/pfblockerng/dnsbl/easylist.txt:local-data: "steepto.com 60 IN A 192.168.0.1"…or from a host within LAN:
user@host_name ~ $ host -t A steepto.com
steepto.com has address 192.168.0.1user@host_name ~ $ nslookup steepto.com
Server: 10.10.10.100
Address: 10.10.10.100#53Non-authoritative answer:
Name: steepto.com
Address: 192.168.0.1But when browsing to a website (http://filmehd.net) that uses this domain for ads, the ads are still showing.
The URL from "inspect element" is:Somehow it slips through configuration.
I was wondering if there is a way to particularly block this "steepto.com" domain within "filmehd.net"... some custom configuration for this site only.
Thank you
-
The issue is that you don't have the TLD option enabled. So as is, it's only blocking the exact domain/sub-domain that is listed in the feeds. You can see from the grep command above that "www." is not listed, so it's not blocked.
When TLD is enabled it will check each domain that is listed in the selected feeds to determine if it should block the whole sub-domain with a Redirect Zone in the resolver.
So you have two choices. Add the "www." domain to a DNSBL customlist to get that domain blocked. Or enable TLD.
-
Thanks for your suggestions.
I enabled TLD, even added www.steepto.com into TLD blacklist, it showed up in update logs, but ads still showing on that website :(
–----------------------------------------
Assembling database... completed
Executing TLD
Blocking full TLD/Sub-Domain(s)... |www.steepto.com| completed
TLD analysis. completed
Finalizing TLD... completed[2.4.2-RELEASE][root@pfsense]/root: grep "steepto.com" /var/db/pfblockerng/dnsbl/*
/var/db/pfblockerng/dnsbl/DNSBL_TLD.txt:www.steepto.com
/var/db/pfblockerng/dnsbl/easylist.txt:local-data: "steepto.com 60 IN A 192.168.0.1"–---------------------------------------
Stumped...
-
Without TLD enabled, you add www.steepto.com to custom whitelist
With TLD Enabled it's steepto.com that is the TLD not www.steepto.com
/var/unbound/pfb_dnsbl.conf:898777:local-zone: "steepto.com" redirect local-data: "steepto.com 60 IN A 10.10.10.1"
DNSBL Update gathers (and remove) all the *.steepto.com domain names from the tables and configure Outbound to answer the VIP for any request ending in .steepto.com.
So if your custom whitelist has .steepto.com it will disable blocking for all *.steepto.com domain names.
Now if you place steepto.com into the TLD exclude list, DNSBL Update gathers all the *.steepto.com as listed from the tables. You might end up with 100s of domains in the block list as TLD didn't consolidate the domain names. At this point if you put .steepto.com into the custom whitelist, this will whitelist all sub-domains.
However, you can just put www.steepto.com and/or steepto.com into the DNSBL Custom Whitelist and leave all other *.steepto.com domain names blocked.
-
Hello again,
Thanks for both solutions from BBcan177 and RonpfS, unfortunately none works.
I am sure I am doing something wrong…
Browsing to http://filmehd.net still serves me with ads from www.steepto.com.
Watching what happens in a terminal (tail -f /var/log/pfblockerng/dnsbl.log) when I access filmehd.net, doesn't log any ads blocked as compared with many other sites...
It looks like the domain (www.steepto.com) is whitelisted or there is a rule that ignores ads on filmehd.net completely.
Presently, steepto.com is in TLD blacklist with TLD enabled.[2.4.2-RELEASE][root@pfsense]/root: grep "steepto.com" /var/db/pfblockerng/dnsbl/*
/var/db/pfblockerng/dnsbl/DNSBL_TLD.txt:steepto.com
/var/db/pfblockerng/dnsbl/easy_list.txt:local-data: "steepto.com 60 IN A 192.168.0.1"I apologize if I am being too insistent on this, it's really important for me that I block ads on that specific website (filmehd.net).

 -
Here is my infoblock about TLD :
TLD
Enable This is an Advanced process to determine if all Sub-Domains should be blocked for each listed Domain.
Click infoblock before enabling this feature!
This Feature is not recommended for Low-Perfomance/Low-Memory installations!
Definition: TLD - represents the last segment of a domain name. IE: example.com (TLD = com), example.uk.com (TLD = uk.com)The 'Unbound Resolver Reloads' can take several seconds or more to complete and may temporarily interrupt DNS Resolution until the Resolver has been fully Reloaded with the updated Domain changes. Consider updating the DNSBL Feeds 'Once per Day', if network issues arise.
When enabled and after all downloads for DNSBL Feeds have completed; TLD will process the Domains.
TLD uses a predetermined list of TLDs, to determine if the listed Domain should be configured to block all Sub-Domains.
The predetermined TLD list can be found in /usr/local/pkg/pfblockerng/dnsbl_tldTo exclude a TLD/Domain from the TLD process, add the TLD/Domain to the TLD Exclusion. The specific Domain will be Blocked, but all other Sub-Domains will only be blocked if they are listed elsewhere. Whitelisting a Domain in the Custom Domain Whitelist can also be used to bypass TLD, however, the listed Domain will not be Blocked.
TLD Blacklist, can be used to block whole TLDs. IE: xyz
TLD Whitelist is only used in conjunction with TLD Blacklist and is used to allow access to a Domain that is being blocked by a TLD Blacklist.When Enabling/Disabling TLD, a Force Reload - DNSBL is required.
Once the TLD Domain limit below is exceeded, the balance of the Domains will be listed as-is. IE: Blocking only the listed Domain (Not Sub-Domains)
TLD Domain Limit Restrictions:< 1.0GB RAM - Max 100k Domains
< 1.5GB RAM - Max 150k Domains
< 2.0GB RAM - Max 200k Domains
< 2.5GB RAM - Max 250k Domains
< 3.0GB RAM - Max 400k Domains
< 4.0GB RAM - Max 600k Domains
< 5.0GB RAM - Max 1.0M Domains
< 6.0GB RAM - Max 1.5M Domains
< 7.0GB RAM - Max 2.5M Domains
> 7.0GB RAM - > 2.5M DomainsHere is my infoblock about TLD Blacklist/Whitelist :
Note:
The TLD Blacklist is used to block a whole TLD (IE: pw).
The TLD Whitelist is used to allow access to the specific domain/sub-domains that is blocked by a TLD Blacklist; while blocking all others.
TLD Blacklist/Whitelist: A static zone entry is used in the DNS Resolver for this feature, therefore no Alerts will be generated.Enter one TLD per line. ie: xyz
No Regex Entries and no leading/trailing 'dot' allowed!TLD Blacklist is to use for TOP TLD domains likes .ru .cn .pw etc. As stated no alerts are generated for these domains.
Your configuration doesn't even do that as the steepto.com isn't a Static zone. As it is now, only http://steepto.com will be blocked, not other subdomain.
If I look at my setup, all subdomains of steepto.com are blocked with a redirect zonegrep steepto.com /var/db/pfblockerng/dnsbl/*.txt /var/db/pfblockerng/dnsblorig/*.orig /var/unbound/pfb_dnsbl.conf /usr/local/pkg/pfblockerng/dnsbl_tld /var/db/pfblockerng/dnsbl/EasyListWOE.txt:local-data: "steepto.com 60 IN A 10.10.10.1" /var/db/pfblockerng/dnsblorig/ADs_SquidBL.orig:steepto.com /var/db/pfblockerng/dnsblorig/ADs_hpHosts_ads.orig:127.0.0.1 imgg.steepto.com /var/db/pfblockerng/dnsblorig/EasyListWOE.orig:||steepto.com^$third-party /var/db/pfblockerng/dnsblorig/EasyList_French.orig:||steepto.com^$popup,third-party /var/db/pfblockerng/dnsblorig/Malic2_JL_BD.orig:127.0.0.1 imgg.steepto.com /var/db/pfblockerng/dnsblorig/Malic2_Quidsup_Trackers.orig:steepto.com /var/unbound/pfb_dnsbl.conf:local-zone: "steepto.com" redirect local-data: "steepto.com 60 IN A 10.10.10.1"
So in you case if you want to block all subdomains, first remove steepto.com from the TLD Exclude list, run a Force Reload DNSBL, then see what is in pfb_dnsbl.conf, as long as it is in a table (dnsblorig) you should end up with something similar to my setup
If you don't have steepto.com in your table, you can add it to the table DNSBL Custom_List.
-
RonpfS, thanks for your suggestion, will remove steepto.com from TLD blacklist, apparently I didn't understand properly the function…
Funny thing, I have similar output for a grep for this domain in my setup:[2.4.2-RELEASE][root@pfsense]/root: grep steepto.com /var/db/pfblockerng/dnsbl/.txt /var/db/pfblockerng/dnsblorig/.orig /var/unbound/pfb_dnsbl.conf /usr/local/pkg/pfblockerng/dnsbl_tld
/var/db/pfblockerng/dnsbl/DNSBL_TLD.txt:steepto.com
/var/db/pfblockerng/dnsbl/easy_list.txt:local-data: "steepto.com 60 IN A 192.168.0.1"
/var/db/pfblockerng/dnsblorig/ad_servers.orig:127.0.0.1 imgg.steepto.com
/var/db/pfblockerng/dnsblorig/easy_list.orig:||steepto.com^$third-party
/var/db/pfblockerng/dnsblorig/easylist.orig:||steepto.com^$third-party
/var/db/pfblockerng/dnsblorig/hpHosts.orig:127.0.0.1 imgg.steepto.com
/var/db/pfblockerng/dnsblorig/hpHosts_ads.orig:127.0.0.1 imgg.steepto.com
/var/unbound/pfb_dnsbl.conf:local-zone: "steepto.com" redirect local-data: "steepto.com 60 IN A 192.168.0.1"Will let you know of the results later.
Thanks again for assistance!
-
From your LAN device, what do you get with this command:
host -t A steepto.com
It should reply with the DNSBL VIP address of 192.168.0.1…
I assume that you are not using this address range 192.168.0.x in your network, as the DNSBL VIP needs to be in a unique IP Range...
If you browse to "www.steepto.com" or "steepto.com" it should get the 1x1 pix.
Do you have an Antivirus package installed that might be overriding the DNS requests?
-
Hi again,
Removing steepto.com from TLD blocking and force reloading does not do the trick…
My LAN is as follows:
Pfsense as gateway/firewall/dhcp/pfblocker/squid/squidguard/dns resolver in forwarding mode. There is a clamd embedded in squid proxy though. No other antivirus inside LAN.
Another Ubuntu 16.04 server with bind9 dns server installed but this is forwarding all DNS requests from LAN to the pfsense DNS. All LAN devices are Linux mint and they are getting DNS servers automatically along with a fixed IP address from pfsense dhcp in this order: ubuntu first, pfsense second.
True, I don't use the 192.168.x.x range in my LAN, I use 10.10.x.x, that's why I set the 192.168.0.1 as VIP.Now, I come to realise there are some weird behaviours in my LAN.
To start, if I browse directly to www.steepto.com from any device within LAN, I get the 1x1 pixel page. Up to here we're good.Doing whois steepto.com from LAN device, I get:
user@lan_machine ~ $ whois steepto.com
Domain Name: STEEPTO.COM
Registry Domain ID: 1848412964_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2017-10-31T16:39:37Z
Creation Date: 2014-02-27T11:22:59Z
Registry Expiry Date: 2018-02-27T11:22:59Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: abuse@godaddy.com
Registrar Abuse Contact Phone: 480-624-2505
Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Name Server: NS.STEEPTO.COM
Name Server: NS3.STEEPTO.COM
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/Last update of whois database: 2018-01-03T23:03:29Z <<<
For more information on Whois status codes, please visit https://icann.org/epp
NOTICE: The expiration date displayed in this record is the date the
registrar's sponsorship of the domain name registration in the registry is
currently set to expire. This date does not necessarily reflect the expiration
date of the domain name registrant's agreement with the sponsoring
registrar. Users may consult the sponsoring registrar's Whois database to
view the registrar's reported date of expiration for this registration.TERMS OF USE: You are not authorized to access or query our Whois
database through the use of electronic processes that are high-volume and
automated except as reasonably necessary to register domain names or
modify existing registrations; the Data in VeriSign Global Registry
Services' ("VeriSign") Whois database is provided by VeriSign for
information purposes only, and to assist persons in obtaining information
about or related to a domain name registration record. VeriSign does not
guarantee its accuracy. By submitting a Whois query, you agree to abide
by the following terms of use: You agree that you may use this Data only
for lawful purposes and that under no circumstances will you use this Data
to: (1) allow, enable, or otherwise support the transmission of mass
unsolicited, commercial advertising or solicitations via e-mail, telephone,
or facsimile; or (2) enable high volume, automated, electronic processes
that apply to VeriSign (or its computer systems). The compilation,
repackaging, dissemination or other use of this Data is expressly
prohibited without the prior written consent of VeriSign. You agree not to
use electronic processes that are automated and high-volume to access or
query the Whois database except as reasonably necessary to register
domain names or modify existing registrations. VeriSign reserves the right
to restrict your access to the Whois database in its sole discretion to ensure
operational stability. VeriSign may restrict or terminate your access to the
Whois database for failure to abide by these terms of use. VeriSign
reserves the right to modify these terms at any time.The Registry database contains ONLY .COM, .NET, .EDU domains and
Registrars.Doing whois steepto.com from pfsense, I get:
[2.4.2-RELEASE][root@pfsense]/root: whois steepto.com
% IANA WHOIS server
% for more information on IANA, visit http://www.iana.org
% This query returned 1 objectrefer: whois.verisign-grs.com
domain: COM
organisation: VeriSign Global Registry Services
address: 12061 Bluemont Way
address: Reston Virginia 20190
address: United Statescontact: administrative
name: Registry Customer Service
organisation: VeriSign Global Registry Services
address: 12061 Bluemont Way
address: Reston Virginia 20190
address: United States
phone: +1 703 925-6999
fax-no: +1 703 948 3978
e-mail: info@verisign-grs.comcontact: technical
name: Registry Customer Service
organisation: VeriSign Global Registry Services
address: 12061 Bluemont Way
address: Reston Virginia 20190
address: United States
phone: +1 703 925-6999
fax-no: +1 703 948 3978
e-mail: info@verisign-grs.comnserver: A.GTLD-SERVERS.NET 192.5.6.30 2001:503:a83e:0:0:0:2:30
nserver: B.GTLD-SERVERS.NET 192.33.14.30 2001:503:231d:0:0:0:2:30
nserver: C.GTLD-SERVERS.NET 192.26.92.30 2001:503:83eb:0:0:0:0:30
nserver: D.GTLD-SERVERS.NET 192.31.80.30 2001:500:856e:0:0:0:0:30
nserver: E.GTLD-SERVERS.NET 192.12.94.30 2001:502:1ca1:0:0:0:0:30
nserver: F.GTLD-SERVERS.NET 192.35.51.30 2001:503:d414:0:0:0:0:30
nserver: G.GTLD-SERVERS.NET 192.42.93.30 2001:503:eea3:0:0:0:0:30
nserver: H.GTLD-SERVERS.NET 192.54.112.30 2001:502:8cc:0:0:0:0:30
nserver: I.GTLD-SERVERS.NET 192.43.172.30 2001:503:39c1:0:0:0:0:30
nserver: J.GTLD-SERVERS.NET 192.48.79.30 2001:502:7094:0:0:0:0:30
nserver: K.GTLD-SERVERS.NET 192.52.178.30 2001:503:d2d:0:0:0:0:30
nserver: L.GTLD-SERVERS.NET 192.41.162.30 2001:500:d937:0:0:0:0:30
nserver: M.GTLD-SERVERS.NET 192.55.83.30 2001:501:b1f9:0:0:0:0:30
ds-rdata: 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CFC41A5766whois: whois.verisign-grs.com
status: ACTIVE
remarks: Registration information: http://www.verisigninc.comcreated: 1985-01-01
changed: 2017-10-05
source: IANADomain Name: STEEPTO.COM
Registry Domain ID: 1848412964_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2017-10-31T16:39:37Z
Creation Date: 2014-02-27T11:22:59Z
Registry Expiry Date: 2018-02-27T11:22:59Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: abuse@godaddy.com
Registrar Abuse Contact Phone: 480-624-2505
Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Name Server: NS.STEEPTO.COM
Name Server: NS3.STEEPTO.COM
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/Last update of whois database: 2018-01-03T23:04:28Z <<<
Domain Name: STEEPTO.COM
Registrar URL: http://www.godaddy.com
Registrant Name: Bedigital Corporation
Registrant Organization: Bedigital Corporation
Name Server: NS.STEEPTO.COM
Name Server: NS3.STEEPTO.COM
DNSSEC: unsignedFor complete domain details go to:
http://who.godaddy.com/whoischeck.aspx?domain=STEEPTO.COMThe data contained in GoDaddy.com, LLC's WhoIs database,
while believed by the company to be reliable, is provided "as is"
with no guarantee or warranties regarding its accuracy. This
information is provided for the sole purpose of assisting you
in obtaining information about domain name registration records.
Any use of this data for any other purpose is expressly forbidden without the prior written
permission of GoDaddy.com, LLC. By submitting an inquiry,
you agree to these terms of usage and limitations of warranty. In particular,
you agree not to use this data to allow, enable, or otherwise make possible,
dissemination or collection of this data, in part or in its entirety, for any
purpose, such as the transmission of unsolicited advertising and
and solicitations of any kind, including spam. You further agree
not to use this data to enable high volume, automated or robotic electronic
processes designed to collect or compile this data for any purpose,
including mining this data for your own personal or commercial purposes.Please note: the registrant of the domain name is specified
in the "registrant" section. In most cases, GoDaddy.com, LLC
is not the registrant of domain names listed in this database.But…
Doing a "dig steepto.com" from any machine within LAN, I get (please note the answering DNS is Ubuntu and the IP address returned is my VIP, 182.168.0.1):
user@lan_machine ~ $ dig steepto.com
; <<>> DiG 9.10.3-P4-Ubuntu <<>> steepto.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8485
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 13, ADDITIONAL: 16;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;steepto.com. IN A;; ANSWER SECTION:
steepto.com. 9 IN A 192.168.0.1;; AUTHORITY SECTION:
com. 74130 IN NS b.gtld-servers.net.
com. 74130 IN NS e.gtld-servers.net.
com. 74130 IN NS c.gtld-servers.net.
com. 74130 IN NS h.gtld-servers.net.
com. 74130 IN NS k.gtld-servers.net.
com. 74130 IN NS a.gtld-servers.net.
com. 74130 IN NS d.gtld-servers.net.
com. 74130 IN NS i.gtld-servers.net.
com. 74130 IN NS l.gtld-servers.net.
com. 74130 IN NS f.gtld-servers.net.
com. 74130 IN NS m.gtld-servers.net.
com. 74130 IN NS j.gtld-servers.net.
com. 74130 IN NS g.gtld-servers.net.;; ADDITIONAL SECTION:
a.gtld-servers.net. 7499 IN A 192.5.6.30
a.gtld-servers.net. 5006 IN AAAA 2001:503:a83e::2:30
b.gtld-servers.net. 17421 IN A 192.33.14.30
c.gtld-servers.net. 77756 IN A 192.26.92.30
d.gtld-servers.net. 79 IN A 192.31.80.30
e.gtld-servers.net. 2470 IN A 192.12.94.30
f.gtld-servers.net. 990 IN A 192.35.51.30
g.gtld-servers.net. 3781 IN A 192.42.93.30
h.gtld-servers.net. 82835 IN A 192.54.112.30
i.gtld-servers.net. 8375 IN A 192.43.172.30
j.gtld-servers.net. 17421 IN A 192.48.79.30
k.gtld-servers.net. 2470 IN A 192.52.178.30
l.gtld-servers.net. 3810 IN A 192.41.162.30
l.gtld-servers.net. 1840 IN AAAA 2001:500:d937::30
m.gtld-servers.net. 17426 IN A 192.55.83.30;; Query time: 0 msec
;; SERVER: 10.10.10.100#53(10.10.10.100)
;; WHEN: Wed Jan 03 18:07:46 EST 2018
;; MSG SIZE rcvd: 544Doing "dig @pfsense steepto.com" (directing dig to pfsense DNS) from the same LAN machine, I get:
user@lan_machine ~ $ dig @pfsense steepto.com
; <<>> DiG 9.10.3-P4-Ubuntu <<>> @pfsense steepto.com
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47814
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;steepto.com. IN A;; ANSWER SECTION:
steepto.com. 60 IN A 192.168.0.1;; Query time: 0 msec
;; SERVER: 10.10.10.1#53(10.10.10.1)
;; WHEN: Wed Jan 03 18:08:13 EST 2018
;; MSG SIZE rcvd: 56Please notice again the IP address returned for steepto.com is my VIP.
Other tools are reporting the same result:
user@lan_machine ~ $ host steepto.com
steepto.com has address 192.168.0.1user@lan_machine ~ $ nslookup steepto.com
Server: 10.10.10.100
Address: 10.10.10.100#53Non-authoritative answer:
Name: steepto.com
Address: 192.168.0.1Redirecting DNS query to pfsense DNS:
user@lan_machine ~ $ nslookup steepto.com pfsense
Server: pfsense
Address: 10.10.10.1#53Name: steepto.com
Address: 192.168.0.1I read somewhere that pfblockerng does not like running together with squid/squidguard. Could this be my issue?
Thanks for your suggestions.
-
I asked to run a "whois example.com" but I guess my brain was somewhere else when I wrote that :o
Should run a "host -t A" or nslookup or dig or ping command to see if the Domains reply with the DNSBL VIP…
So I see from your commands that its replying with the DNSBL VIP.... so that part is working... You just need to see if the proxy or something else is causing your issue? Do you have an AV solution that is protecting for DNS sinkhole behaviour?
-
LOL, yes, it sounded strange in my brain too…
Yes, there is the clamd antivirus that's embedded into squid proxy, and it's enabled but I fail to see why that would interfere with dnsbl.
Funny thing, in my endeavours of blocking this steepto.com domain, I was actually blocking it in squid access control lists too under "blacklist" but that didn't make any difference so I removed it.
To test, I disabled first clamd. No difference. Then I disabled squid proxy and squidguard. No difference as well....and yes, my pfblocker is working beautifully except this stubborn domain...
I am stumped again...
-
I posted a pic with all the services I have enabled in pfsense. Do you see anything that could intefere?
Also, when the lists are reloaded, I see that the hard limit of domains is overpassed, could that be an issue too?
–----------------------------------------
Assembling database... completed
Executing TLD
TLD analysis....xxxxxxxxxxx completed
** TLD Domain count exceeded. [ 400000 ] All subsequent Domains listed as-is **
Finalizing TLD… completed
-
Did you guys do anything to the lists?!?!?
My pfblocker started blocking ads from steepto.com in filmehd.net all of a sudden without me doing anything…
Now ads in facebook.com started showing again... lol
Am I doing something wrong? LOL
-
Did you guys do anything to the lists?!?!?
You have to ask that question to the "guys" who maintain the lists.
Also, when the lists are reloaded, I see that the hard limit of domains is overpassed, could that be an issue too?
–----------------------------------------
Assembling database... completed
Executing TLD
TLD analysis....xxxxxxxxxxx completed
** TLD Domain count exceeded. [ 400000 ] All subsequent Domains listed as-is **
Finalizing TLD… completedThat's because you don't have enough memory to get a complete TLD set. So from Cron update to Cron Update, some more domains are converted to TLD and that may demand different whitelisting.
So look at the logs to see what lists were downloaded when steepto.com became blocked.
Try a Force Reload DNSBL to see if things change.
Lower the total number of DNSBL entries by removing some big lists.
-
Thanks RonpfS for your suggestions. Will try tonight.
I was asking the "guys" here because I have some lists made or maintained by BBcan177.
…and you are right, I am running pfsense on a tiny microcomputer with only 4GB of RAM, but that's going to change soon, will upgrade to 8GB. I only found out about pfblocker after I purchased the hardware.
-
Thanks RonpfS for your suggestions. Will try tonight.
I was asking the "guys" here because I have some lists made or maintained by BBcan177.
…and you are right, I am running pfsense on a tiny microcomputer with only 4GB of RAM, but that's going to change soon, will upgrade to 8GB. I only found out about pfblocker after I purchased the hardware.
TLD requires more memory as Unbound creates a pointer in memory for each Zone entry. To prevent Unbound from consuming all of the available memory and crashing the box, I have defined conservative Zone limit according to the amount of memory available.
So as soon as you reach the the max TLD limit, no further Zones are created and the balance of the Domains will be blocked as per the explicit domain entry and not the whole sub-domain as TLD is intended to accomplish.
So, as TLD is processing, this domain might have been processed before the TLD limit and then added as a Zone. And at times it might be processed after the TLD limit at which time it won't be blocking the whole sub-domain.
So you either need more memory, or put the most important Domains to be processed by TLD first so that they will be added as a Zone before the TLD limit is reached.
-
Thanks for suggestions BBcan177.
I upgraded to 8 GB the other day, but steepto.com still shows on that filmehd.net website…
I apologize but I didn't understand much of your explanation other than upgrading RAM will help... lol, too technical, and my knowledge is somewhat limited in TLD (learning now).
One good news, there is no hard limit message anymore when TLD list is processed.