Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Bypassing DNSBL for specific IPs

    pfBlockerNG
    27
    108
    42491
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      GodAtum @Gertjan
      last edited by

      @gertjan I'm not getting that on the page. Using v3.0.0_16 on pfsense 2.5.1

      K 1 Reply Last reply Reply Quote 0
      • K
        kezzla @GodAtum
        last edited by

        @godatum Check the reddit link posted above, there is a tip that says to switch to python mode for the option to become available:

        Preliminary DNSBL Group Policy : pfBlockerNG
        https://www.reddit.com/r/pfBlockerNG/comments/kdg5wq/preliminary_dnsbl_group_policy/

        GertjanG 1 Reply Last reply Reply Quote 1
        • GertjanG
          Gertjan @kezzla
          last edited by

          Yep, this box should be checked :

          d1778b64-3485-4e55-a19a-7a4844c344aa-image.png

          No "help me" PM's please. Use the forum, thanks.

          S 1 Reply Last reply Reply Quote 1
          • T
            turbotater19
            last edited by turbotater19

            Here from Reddit, then Mayfield IT...
            I've got a setup where I'd like to bypass pfBlockerNG for one single entire interface but keep it enabled for my other 2 interfaces. Interfaces "LAN1" (10.0.0.0 /24) and "Crapwork" (192.168.0.0 /24) should still get the full pfBlockerNG treatment (DNSBL+IPBL) while the unlucky guests on interface "BARN" (172.16.0.0 /24) won't and will have to see ads and get random IPs from bad places poking around!

            Would I need to enter the below into the "custom options" box in DNS resolver settings and then also make sure interface "BARN" is not selected (while LAN1 and Crapwork are) in the "Outbound Firewall Rules" section of IP tab under pfBlockerNG?

            server:
                access-control-view: 172.16.0.0/24 bypass
                access-control-view: 10.0.0.0/24 dnsbl
                access-control-view: 192.168.0.0/24 dnsbl
            view:
                name: "bypass"
                view-first: yes
            view:
                name: "dnsbl"
                view-first: yes
                include: /var/unbound/pfb_dnsbl.*conf
            

            Or should I update pfSense (on 2.4.5 yikes) and then update pfBlockerNG (on 2.2.5_30) and use the Bypass IPs field where I'd put (presumably) 172.16.0.0/24 and then same as above for IPBL settings?

            GertjanG 1 Reply Last reply Reply Quote 1
            • GertjanG
              Gertjan @turbotater19
              last edited by

              @turbotater19 said in Bypassing DNSBL for specific IPs:

              Or should I update pfSense (on 2.4.5 yikes)

              Back then, as for as I can remember, you had to enter the custom unbound parameters (like you showed - can't tell if they are correct, though).

              The latest pfSense, and the latest pfBlockerNG makes it possible to exclude IP (or even networks ?) using the pfBlockerNG GUI.
              Select the (DNSBL) 'Python Group Policy' option and fill in the IP's.

              No "help me" PM's please. Use the forum, thanks.

              T 1 Reply Last reply Reply Quote 1
              • T
                turbotater19 @Gertjan
                last edited by turbotater19

                @gertjan said in Bypassing DNSBL for specific IPs:

                Back then, as for as I can remember, you had to enter the custom unbound parameters (like you showed - can't tell if they are correct, though).

                The latest pfSense, and the latest pfBlockerNG makes it possible to exclude IP (or even networks ?) using the pfBlockerNG GUI.
                Select the (DNSBL) 'Python Group Policy' option and fill in the IP's.

                Thanks for the reply. I guess then what I'm asking for is if anyone thinks my code is correct for keeping DNSBL active on 2 of my 3 interfaces while the one interface gets bypassed. All the examples I've seen appear to show a single IP bypassed while the rest are blocked or 2 VLANs.

                Also, to implement this (provided I don't just update pfSense and then update pfBlockerNG), do I disable pfBlockerNG, add lines into custom options, save, then start pfBlockerNG? Or do I add this into custom options while pfBlockerNG is enabled?

                1 Reply Last reply Reply Quote 1
                • T
                  turbotater19
                  last edited by

                  I pasted my code in and initially it didn't work. Took out the leading spaces on each line and that fixed it, working as I'd hoped!

                  1 Reply Last reply Reply Quote 1
                  • O
                    Overlord @Gertjan
                    last edited by

                    @gertjan
                    I can't find it? Is it removed?

                    I'm trying to find a solution to unblock an IP, which is one of my blocklist as false positive.

                    GertjanG 1 Reply Last reply Reply Quote 0
                    • GertjanG
                      Gertjan @Overlord
                      last edited by

                      @overlord said in Bypassing DNSBL for specific IPs:

                      I can't find it?

                      Find what ?
                      The initial - see above - is "how to bypass a specific IP".
                      Reading the post shows that @Ns8h wanted to exclude a LAN device from being DNSBL'ed by pfBlocker - this was in 2018.

                      Or do you man : You want to whitelist an IP ( or DNSBL ?) from a list/feed you use ?
                      In that case, go to Firewall > pfBlockerNG > Alerts and look up the line where the IP was blocked. Example :

                      d3516bfc-b8f8-46c1-a837-4d0b86ee487d-image.png

                      if I want to unblock "8.8.8.8" blocked by the firewall rule pfB_DoH_IP_v4 (uses an alais that contains all the IPs from the TheGreatWall_DoH... DNDBL feed, I have to move the mouse to the red padlock, click and follow the instructions.
                      This measure is temporary - as stated.

                      Clicking on the black + sign is permanent :

                      187c8caa-e1a3-4a08-bc9a-0da23e7e5d27-image.png

                      Just follow the instructions.

                      No "help me" PM's please. Use the forum, thanks.

                      O 1 Reply Last reply Reply Quote 0
                      • S
                        shon @Gertjan
                        last edited by

                        @gertjan said in Bypassing DNSBL for specific IPs:

                        Yep, this box should be checked :

                        d1778b64-3485-4e55-a19a-7a4844c344aa-image.png

                        This did not work for me at all, and neither using custom unbound views. Not sure where else to look.

                        GertjanG 1 Reply Last reply Reply Quote 0
                        • GertjanG
                          Gertjan @shon
                          last edited by Gertjan

                          @shon

                          Just checking "Python Group Policy" does nothing.
                          It's stated that "Enable the Python Group Policy functionality to allow certain Local LAN IPs to bypass DNSBL"

                          So certain local IPs have to be entered.

                          Like :

                          cf606677-4183-4cf0-b0f3-c35003981277-image.png

                          edit :

                          I didn't have any DNSBIl activated, so I activated one.
                          This one :

                          80951f87-4c4d-4627-b119-1debf62b62ad-image.png

                          Take a look at the feed text, and you find the last entry :
                          avsvmcloud.com

                          On my PC with the IP 192.168.1.2 (on the policy list - see my image above) I could obtain an IP :

                          c1567ee7-b0e7-4b30-80c9-b3417a617ea0-image.png

                          Or, on another PC using IP 192.168.1.9, I obtained "0.0.0.0" == DNSBL blocked ( I'm not using the build in pfBlockerNG web server, if I was, I would have received 10.10.10.1 ).

                          My conclusion : Group policy works.

                          I did not test IPv6 here. For IPv4 it worked.

                          No "help me" PM's please. Use the forum, thanks.

                          S 2 Replies Last reply Reply Quote 0
                          • S
                            shon @Gertjan
                            last edited by shon

                            @gertjan I added my local IP4 addresses under the group policy as host IP's with no subnet mask range e.g. /32 /24 etc.. I restarted pfsense, unbound, ran , update force, reload and still no dice. I love the way it works but I need to whitelist IP's to get around pfblocker/dnsbl/geoip restrictions I've set already. thanks!

                            1 Reply Last reply Reply Quote 0
                            • O
                              Overlord @Gertjan
                              last edited by Overlord

                              @gertjan
                              As I can see there are no rules under "Deny". I have read there, that this issue could be from the installed version (2.1.4_26). Is this 2x version still in development? Is there a release date for the 3.x devel version? (Devel becomes non devel)

                              1 Reply Last reply Reply Quote 0
                              • M
                                michmoor @SmokinMoJoe
                                last edited by

                                @smokinmojoe I was literally saying this out loud to myself. This package has been available for quite some time and the fact that this request which is very reasonable and very obvious that is needed is not implemented really hurts my soul.

                                Yes, DNS sinkholing is great. You would think along the way someone would've thought to themselves "Gee, what if there's a user that shouldn't be restricted". Pretty much the follow-up to that thought was "ehh that would never happen. what an unlikely thing to think".

                                Firewall: NetGate 6100/7100U, Palo Alto
                                Routing: Juniper MX204 , Arista 7050X3
                                Switching: Juniper EX/QFX. Arista 7050SX
                                Wireless: Unifi, Aruba IAP

                                GertjanG 1 Reply Last reply Reply Quote 0
                                • GertjanG
                                  Gertjan @michmoor
                                  last edited by

                                  @michmoor

                                  Not implemented ?

                                  I just spend looking some time why my DNSBL didn't seem to work. Then I found out out wasn't working for the PC is was using, but it was working, for the PC right next to me.
                                  I recalled : I've added the IPv4 and IPv6 of the PC I'm using on the "Python Group Policy" list.

                                  Btw : Python Group Policy was added to the "pfBlockerNG-devel 3.1.0_1"", not the ancient 'pfBlockerNG 2.1.4_26'.

                                  No "help me" PM's please. Use the forum, thanks.

                                  1 Reply Last reply Reply Quote 0
                                  • P
                                    pftdm007
                                    last edited by pftdm007

                                    Unless there's something wrong in my config, I think I found a bug with bypassing DNSBL with the python feature...

                                    For example, that if I add a client to the exclusion list (Python group policy) to bypass DNSBL, almost immediately after, DNSBL starts behaving very weirdly by allowing traffic from the unblocked client as it should, but randomly also from other clients. Sometimes it returns the 1x1 gif thingy, sometimes the webpage with "This website BLABLABLA has been blocked by the Network Administrator!"

                                    (Edited this post after more troubleshooting)

                                    GertjanG M 2 Replies Last reply Reply Quote 0
                                    • GertjanG
                                      Gertjan @pftdm007
                                      last edited by

                                      @pftdm007

                                      Your are using the correct IP addresses ? Like :

                                      23e1f1cc-1092-4c31-8157-dd4a7ea450a8-image.png

                                      When you change DNSBL settings :
                                      Do a force realod all for pfBlocker.
                                      Reset for every LAN device the local DNS cache.
                                      Windows will need a

                                      ipconfig /flushdns
                                      

                                      @pftdm007 said in Bypassing DNSBL for specific IPs:

                                      Sometimes it returns the 1x1 gif thingy, sometimes the webpage with "This website BLABLABLA has been blocked by the Network Administrator!"

                                      That what's left over from the DNSBL web server that wants to tell you a page has been blocked.
                                      To make a long story short : don't use the DNSBL web server, because (repeat after me) "it is impossible to redirect a https request".

                                      Select :

                                      8537ec77-60ad-4f88-884a-8f200fe09a7d-image.png

                                      No "help me" PM's please. Use the forum, thanks.

                                      P 1 Reply Last reply Reply Quote 0
                                      • M
                                        michmoor @pftdm007
                                        last edited by michmoor

                                        @pftdm007 python mode is very iffy. I have found that using unbound custom dns options works way better to exclude hosts or networks from DNSBL where as python mode only allows /32 exclusions which isn’t very scalable at all. I would highly recommend that over python mode.

                                        Firewall: NetGate 6100/7100U, Palo Alto
                                        Routing: Juniper MX204 , Arista 7050X3
                                        Switching: Juniper EX/QFX. Arista 7050SX
                                        Wireless: Unifi, Aruba IAP

                                        1 Reply Last reply Reply Quote 0
                                        • P
                                          pftdm007 @Gertjan
                                          last edited by

                                          @gertjan said in Bypassing DNSBL for specific IPs:

                                          Your are using the correct IP addresses ?

                                          Yes. Client assigned IP's from pfsense's DHCP server.

                                          @gertjan said in Bypassing DNSBL for specific IPs:

                                          When you change DNSBL settings :
                                          Do a force realod all for pfBlocker.
                                          Reset for every LAN device the local DNS cache.

                                          I do a force reload on ALL (pfb and DNSBL). I usually close all browsers on all machines and retry, I haven't reset the local DNS cache per-se but will try. I only use linux boxes.

                                          @gertjan said in Bypassing DNSBL for specific IPs:

                                          don't use the DNSBL web server, because (repeat after me) "it is impossible to redirect a https request".

                                          Okay I had No Global mode set and changed it to Null Block (logging). lets see if DNSBL is more stable and predictable.

                                          1 Reply Last reply Reply Quote 0
                                          • S
                                            shon @Gertjan
                                            last edited by

                                            @gertjan

                                            Just following up on this -- (Thanks for your help!)

                                            The Python Group Policy action works for whitelisting any clients, per host address e.g. 192.168.1.100 that we do not want DNSBL to filter.

                                            However I have another problem, sort of in the same neighborhood.

                                            I am using GeoIP as well using a domain name white list alias (domain a/s lookup enabled) that I created called "domain_whitelist_v4"

                                            This is the alias URL in the fw:

                                            https://127.0.0.1:443/pfblockerng/pfblockerng.php?pfb=pfB_domain_whitelist_v4

                                            I'm trying to use the same GeoIP alias file " domain_whitelist_v4" in a DNSBL Group Feed source definition to not take action/block on.

                                            The URL I set of the DNSBL group feed source definition is https://127.0.0.1:443/pfblockerng/pfblockerng.php?pfb=pfB_domain_whitelist_v4.txt

                                            I have the action set to "Disabled" instead of Unbound.

                                            I figure that If I update the GeoIP alias "domain_whitelist_v4" section, that I do not have to then also update the DNSBL Whitelist section too since their (DNSBL & GeoIP) are both referencing the same domain name list (domain_whitelist_v4). Instead I have to update in 2 places for domain reachability sometimes depending if its also being blocked via GeoIP

                                            Ideally, I don't want to remove all filtering for some clients, but instead I'd like to update one alias file that covers both DNSBL (permit) and GeoIP (permit)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post