Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Bypassing DNSBL for specific IPs

    Scheduled Pinned Locked Moved pfBlockerNG
    114 Posts 28 Posters 85.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      ryno5514
      last edited by

      One topic I keep not seeing is what if you want to block X for all. But by pass Y for a few and still block X.

      1 Reply Last reply Reply Quote 0
      • perikoP
        periko
        last edited by

        Hi.

        Following this topic, we need to first create the ACL or u put the settings directly on the custom field?

        Regards.

        Necesitan Soporte de Pfsense en México?/Need Pfsense Support in Mexico?
        www.bajaopensolutions.com
        https://www.facebook.com/BajaOpenSolutions
        Quieres aprender PfSense, visita mi canal de youtube:
        https://www.youtube.com/c/PedroMorenoBOS

        K 1 Reply Last reply Reply Quote 0
        • K
          kevinmitky @periko
          last edited by

          @periko Put the settings directly into a custom field, this is the only place the ACLs are defined.

          Reference: https://jpmens.net/2016/12/20/unbound-supports-views-for-local-data/

          My implementation using the information in this post: https://mitky.com/pfblockerng-pfsense-filter-specific-clients-computers-network/

          1 Reply Last reply Reply Quote 2
          • perikoP
            periko
            last edited by

            I had tested and works, in my layout, I got 2 networks:

            -LAN
            -VLAN

            I setup my vlan not to use the dnsbl and works.

            Thanks guys!!!

            Necesitan Soporte de Pfsense en México?/Need Pfsense Support in Mexico?
            www.bajaopensolutions.com
            https://www.facebook.com/BajaOpenSolutions
            Quieres aprender PfSense, visita mi canal de youtube:
            https://www.youtube.com/c/PedroMorenoBOS

            1 Reply Last reply Reply Quote 0
            • Y
              yeleek
              last edited by

              Hi,

              I too have managed to get this working thanks to the above.

              One question though, if I use DNSBL Category (shallalist) instead of DNSBL Feeds I've noticed that the bypass no longer works.

              I'm guessing this is because the name 'dnsbl' isn't correct when using a category. Any ideas please on the correct syntax? or other cause?

              server:
                  access-control-view: 192.168.2.3/32 bypass
                  access-control-view: 192.168.2.0/24 dnsbl
                  access-control-view: 192.168.1.0/24 dnsbl
              view:
                  name: "bypass"
                  view-first: yes
              view:
                  name: "dnsbl"
                  view-first: yes
              server:include: /var/unbound/pfb_dnsbl.*conf
              

              Thanks

              K 1 Reply Last reply Reply Quote 0
              • K
                kevinmitky @yeleek
                last edited by

                @yeleek Try removing the second 'server' from your options here. Your custom options should look like:

                server:
                    access-control-view: 192.168.2.3/32 bypass
                    access-control-view: 192.168.2.0/24 dnsbl
                    access-control-view: 192.168.1.0/24 dnsbl
                view:
                    name: "bypass"
                    view-first: yes
                view:
                    name: "dnsbl"
                    view-first: yes
                    include: /var/unbound/pfb_dnsbl.*conf
                

                I've also noticed more problems with this when trying to set view 'bypass' for specific addresses inside of a subnet that is also a member of your 'dnsbl' view. I can't confirm whether this is actually an issue or just misconfiguration on my part, but I'd try the above and see if it works for you, even temporarily.

                Y 1 Reply Last reply Reply Quote 1
                • Y
                  yeleek @kevinmitky
                  last edited by

                  @kevinmitky That appears to be working for now. Thank you :)

                  1 Reply Last reply Reply Quote 0
                  • H
                    horse2370
                    last edited by

                    @yeleek Please note, if you do an update, disable and re-enable DNSBL that line will be modified again back to the standard entry. You will need to check each time and remove any leading "server:" to ensure your expected behavior works as expected.

                    Just an FYI as it caught me out and is now part of my standard checks following any modifications to the configuration of my pfSense

                    @ kevinmitky I am doing exactly what you described. I have my dnsbl view as the subnets and am specifying specific hosts on those subnets to bypass. These are Roku's devices that had news feeds that used block sites and I made a choice to allow it access for the convenience. Ensuring the host specific acl was before the subnet based ones was something I just do based on my background, but if you don't have it in that order, maybe that's an area to check. That and having to clear any host DNS caches made this a little more time consuming to test if I screwed up the config on pfSense :-)

                    1 Reply Last reply Reply Quote 2
                    • T
                      TupleButter
                      last edited by TupleButter

                      Current syntax under Services > DNS Resolver > Custom Options with Pfblockerng enabled is:

                      private-domain: "plex.direct"
                      server:include: /var/unbound/pfb_dnsbl.conf**

                      I have a multiple devices I want to bypass dnsbl (192.168.1.50, 192.168.1.51, 192.168.1.52) but everything else on 192.168.1.0/24 I want running through dnsbl so as I understand it I should just copy and paste the following into the custom options field of the DNS resolver for this:

                      *server:
                      private-domain: "plex.direct"
                      access-control-view: 192.168.1.50/32 bypass
                      access-control-view: 192.168.1.51/32 bypass
                      access-control-view: 192.168.1.52/32 bypass
                      access-control-view: 192.168.1.0/24 dnsbl
                      view:
                      name: "bypass"
                      view-first: yes
                      view:
                      name: "dnsbl"
                      view-first: yes
                      include: /var/unbound/pfb_dnsbl.*conf
                      
                      1 Reply Last reply Reply Quote 0
                      • H
                        horse2370
                        last edited by horse2370

                        @TupleButter Basically yes. although in your samples you have some "*" in places I don't expect. i.e. *server:

                        In my active config the last line is: -
                        [Edited] My original was incorrect as it was changed following an update. You will need to keep checking this line if there are any changes, as it gets auto added with server: prefixing it.

                        include: /var/unbound/pfb_dnsbl.*conf
                        

                        TBH its been a while since I set this up, so not sure if you need to repeat the server: tag again.

                        As a note, if you ever enable blocking of banned or emerging hosts you will need to include that config file in each view

                        My custom options currently are: -

                        server:
                        so-reuseport: no
                        private-domain: "plex.direct"
                        # bypass view for Roku IP addresses
                        access-control-view: 192.168.1.51/32 bypass
                        access-control-view: 192.168.1.61/32 bypass
                        access-control-view: 192.168.1.83/32 bypass
                        access-control-view: 2601:xxxx:xxxx:xxxx::/64 dnsbl
                        access-control-view: 2601:xxxx:xxxx:xxxx::/64 dnsbl
                        access-control-view: 2601:xxxx:xxxx:xxxx::/64 dnsbl
                        access-control-view: 192.168.1.0/24 dnsbl
                        access-control-view: 192.168.2.0/24 dnsbl
                        access-control-view: 192.168.3.0/24 dnsbl
                        view:
                        name: "bypass"
                        view-first: yes
                        include: /var/unbound/host_entries.conf
                        view:
                        name: "dnsbl"
                        view-first: yes
                        include: /var/unbound/host_entries.conf
                        # local-zone: "youtube.com" inform_deny
                        # local-zone: "facebook.com" inform_deny
                        include: /var/unbound/pfb_dnsbl.*conf
                        

                        This ensures plex works, unbound is multithreaded, includes my IPv6 subnets (obscured in example) provide bypass for selected hosts (in this case only Roku and they are IPv4 only), denies access to banned or emerging hosts.
                        The two commented out local-zone's are my sledge hammer approach to blocking social media for some of the younger members in the house when they get grounded! They are not currently grounded :-)

                        1 Reply Last reply Reply Quote 2
                        • R
                          ryk48
                          last edited by

                          I have followed the above and put this in my unbound custom options and it doesnt block the ads
                          server:
                          private-domain: "plex.direct"
                          access-control-view: 10.10.0.0/24 bypass
                          access-control-view: 10.0.0.0/24 dnsbl
                          access-control-view: 10.0.8.0/24 dnsbl
                          view:
                          name: "bypass"
                          view-first: yes
                          view:
                          name: "dnsbl"
                          view-first: yes
                          include: /var/unbound/pfb_dnsbl.*conf

                          if i get rid of everything and put it back to what it was before which was the below then i get adblocking but of course it happens on every network. I just want adblocking on my guest network and openvpn network for now
                          server:
                          private-domain: "plex.direct"
                          server:include: /var/unbound/pfb_dnsbl.*conf

                          May someone help please?

                          1 Reply Last reply Reply Quote 0
                          • M
                            mcury
                            last edited by

                            @ryk48 said in Bypassing DNSBL for specific IPs:

                            rivate-domain: "plex.direct"
                            server:include: /var/unbound/pfb_dnsbl.*co

                            Remove the server: from this line.
                            server:include: /var/unbound/pfb_dnsbl.*conf

                            It should be like this: include: /var/unbound/pfb_dnsbl.*conf

                            Note that every time you perform a change in pfblocker, you will have to remove the "server:" from unbound custom options.

                            dead on arrival, nowhere to be found.

                            R 1 Reply Last reply Reply Quote 0
                            • R
                              ryk48 @mcury
                              last edited by

                              @mcury
                              Right.. Its what i did above and what my current config is. What i mentioned is what i had before i made the changes which was the config below without all access control stuff.

                              I think my problem might be because im running an active directory domain and all my computers are set to use a windows dns server which forwards to pfsense to do dns over tls so im thinking no matter what network i put in the access control view it will be blocked if i do dnsbl on that network since pretty much everything has its dns set to my windows dns server, except the guest lan.
                              For example:
                              My windows dns server is on 10.10.0.0/24 network
                              my windows pcs are on 10.0.0.0/24
                              opendns computers are on 10.0.8.0/24
                              guest is on 192.168.10.0/24

                              my windows pcs have their dns server set to the dns server on the 10.10 network so i think if i dnsbl on the 10.0.0.0/24 network its not working because windows computers dns are pointed to the dns server on the 10.10.0.0/24 network which wouldnt be dnsbl. Also i think id have the same problem on my opendns network as well since its dns servers also point to my windows dns server so i can rdp into network pcs. If i am wrong in how this works please chime in. Sounds like i might need dns servers for each network?

                              Ideally i just want to do dnsbl on my guest and opendns networks because i want guests to have adblock. I also want to connect to my openvpn server from my phone and browse the net on my phone with no ads and in addition have the ability to rdp into my pcs and servers but how can i achieve that when the opendns network dns points to the windows server network?

                              K 1 Reply Last reply Reply Quote 1
                              • K
                                kezzla @ryk48
                                last edited by

                                @ryk48 I have been looking for a pfsense solution to this for awhile. It seems the Unbound views might accomplish what I need as well, but what a pain in the ass to setup and manage. I have been investigating the Sensei plugin for Opnsense. It looks sooooo amazing and does exactly what you are asking about with ease. Policy based filtering! I just really like pfsense and didn’t want to have to reinstall my home router for one feature, but I am not seeing another option. Was hoping Sensei would be migrated to pfsense :P!

                                We’re you able to get this setup using unbound in pfsense?

                                1 Reply Last reply Reply Quote 1
                                • R
                                  ryk48
                                  last edited by

                                  @kezzla I was not. I figured since im having all of my devices on my network point to my AD DNS Server this wouldnt work. Guest lan would probably work but since i want to rdp from my phone and also block ads on my phone while connected to vpn to home this wouldnt work without affecting all pcs that use my ad dns servers.

                                  1 Reply Last reply Reply Quote 1
                                  • P
                                    pftdm007
                                    last edited by

                                    Just found this thread and I think it might save my a$$ while stuck at home because of the covid19 pandemic... If I'm hijacking an existing thread, I'll move to a new one.

                                    Basically I want all traffic on a specific VLAN (named DMZ with 192.168.2.0/24) totally bypass pfblocker & DNSBL in both directions (incoming and outgoing)... Based on OP's post, I added the following in unbound's custom options:

                                    server:
                                        access-control-view: 192.168.2.0/24 bypass
                                        access-control-view: 192.168.1.0/24 dnsbl
                                        access-control-view: 192.168.3.0/24 dnsbl
                                    view:
                                        name: "bypass"
                                        view-first: yes
                                    view:
                                        name: "dnsbl"
                                        view-first: yes
                                    include: /var/unbound/pfb_dnsbl.*conf
                                    

                                    For some reasons, even after restarting unbound, DNSBL and even rebooting pfsense, I still see tons of alerts in the Reports tab of pfblocker. Using a machine on VLAN, pages are still being blocked. Clearly this is not working for me. What am I doing wrong?

                                    Some of my settings (if it helps):

                                    • WAN is WAN... LAN1, LAN2 and DMZ are VLAN's based on LAN physical interface
                                    • WAN is the only interface selected in pfblockerNG's Inbound Firewall Rules
                                    • LAN1 & LAN2 are the only interfaces selected in pfblockerNG's Outbound Firewall Rules
                                    • LAN1 & LAN2 are the only interfaces selected in DNSBL's "Permit Firewall Rules"
                                    1 Reply Last reply Reply Quote 0
                                    • H
                                      horse2370
                                      last edited by

                                      I did a quick check on my pfSense version 2.4.5-RELEASE and pfBlockerNG 2.1.4_22 and checked I can bypass a single hosts (/32) and also changed my LAN subnet to bypass (/24) and all worked as expected.

                                      On my setup however I do have to make sure my test PC has IPv6 disabled for DNS so it correctly matched the unbound views.

                                      Clutching at straws, my config is not nicely indented like yours, as you will see from my original reply earlier in this thread, that did seem to cause me problems, but did not spend much time verifying it as I just removed all leading spaces and it mainly worked as expected after that.

                                      1 Reply Last reply Reply Quote 0
                                      • P
                                        pftdm007
                                        last edited by

                                        This is really strange....

                                        1. If I remove the leading spaces, I cannot save the config
                                        The following input errors were detected:
                                        
                                            The generated config file cannot be parsed by unbound. Please correct the following errors:
                                            [1586258288] unbound-checkconf[11766:0] error: local-data in redirect zone must reside at top of zone, not at zz.zeroredirect1.com 60 IN A 10.10.10.1
                                            [1586258288] unbound-checkconf[11766:0] fatal error: Could not set up views
                                        
                                        1. I had removed the leading "server:" in front of the last line to look like this:
                                        include: /var/unbound/pfb_dnsbl.*conf
                                        

                                        But every time I login to pfsense and try to modify the unbound settings, it is back to this:

                                        server:include: /var/unbound/pfb_dnsbl.*conf
                                        

                                        Is the package pfblockerNG doing this???

                                        GertjanG 1 Reply Last reply Reply Quote 0
                                        • GertjanG
                                          Gertjan @pftdm007
                                          last edited by

                                          @pftdm007 said in Bypassing DNSBL for specific IPs:

                                          Is the package pfblockerNG doing this???

                                          Yep.
                                          You know now how pfBlockerNG-devel communicates the list with IPs to be blocked to unbound ^^

                                          Before you install, the custom options box (unbound) is empty :

                                          39b28cd9-0dcd-4f6c-8b7c-06ead4a43747-image.png

                                          When you dissable pfBlockerNG-debel, and re activate it :

                                          9e0330ee-bd57-4cf9-b5b7-961c7c5973cf-image.png

                                          it will add this line to the custom options (unbound) :
                                          0dcaf0e2-0ff8-4467-a1ba-82dc39552db6-image.png

                                          The first time you installed pfBockerng-devel, there was even a first comment line :

                                          93ea5b1c-31b5-473b-a232-6f2eeab9f4a6-image.png

                                          No "help me" PM's please. Use the forum, the community will thank you.
                                          Edit : and where are the logs ??

                                          P 1 Reply Last reply Reply Quote 0
                                          • P
                                            pftdm007 @Gertjan
                                            last edited by

                                            @Gertjan

                                            Okayyyy... but...? That doesnt explain why the custom options with views dont work (and dont work if I remove the leading spaces), and how to prevent pfblockerNG from adding the redundant "server:" statement in front of the line....

                                            Others in this thread have successfully used views while using pfblockerNG so there's something I am doing wrong...

                                            GertjanG 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.