Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    RBAC to Role Mapping - Black List services

    Scheduled Pinned Locked Moved General pfSense Questions
    7 Posts 2 Posters 824 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • penguinpagesP
      penguinpages
      last edited by

      First time with pfsense.. But I use to use m0n0wall .. well.. 10 years ago.

      Back to dealing with script kiddy attacks on home lab and need a more beefy solution.

      Current issue:

      1. RBAC binding: link to Active directory works. I can login as user and it logs in but says "No page assigned to this user! Click here to logout." which implies my AD goup "pf1_admins" which matches group named for role mapping in router, is not right.. or (to baseline) I set single role mapping "WebCft - All pages" (though I did a baseline of added all roles to that group to baseline). Yes I reboot between each group binding change (but my guess is this warning is more if it has to do refresh after upgrades .. not new accounts/groups). Any ideas on what step I missed in role to AD group (remote) mapping? Or link to RTFM.

      2. Black list domain filtering. I use to have a web service I linked to that was "dump all" if on this black list. And I put all servers not in my country + few others. Keep down on rif raff poking. Reason is that I am getting slow / low grade password trolling and DDOS on my router which folds once a day now.

      I just need something to setup things to filter down the noise.

      1 Reply Last reply Reply Quote 0
      • stephenw10S stephenw10 moved this topic from Problems Installing or Upgrading pfSense Software on
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Check Diag > Auth to see what groups it returns.

        See: https://docs.netgate.com/pfsense/en/latest/troubleshooting/authentication.html

        Checkout the pfBlocker-ng package for blacklist and geo blocking:

        https://docs.netgate.com/pfsense/en/latest/packages/pfblocker.html

        Steve

        penguinpagesP 1 Reply Last reply Reply Quote 0
        • penguinpagesP
          penguinpages @stephenw10
          last edited by

          @stephenw10

          Thanks for response. Test passes.

          c7805473-6320-4a7f-8567-267ef9009b69-image.png

          It is some kind of binding to role issue.

          5bd60f94-e73a-47b6-ade3-5cbc0f8f1953-image.png

          I tried to KISS and just do Webcfg- All Pages..
          74e63408-cd74-4165-8d9f-abbab4300f1e-image.png

          Login from new private tab
          e3832c81-bd38-4be4-8141-bb5ecb326c96-image.png

          No page assigned.
          6ef2c28c-5d64-415c-95f8-6d42c569d3ee-image.png

          This looks like the logic to bind that user within group "pf1_admins" in AD is not authorized for privilges noted

          ef5ad631-6d19-4cee-b9e0-8aebd0e78cad-image.png

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by stephenw10

            Yeah, it's not returning any groups from AD so it doesn't inherit any privileges in pfSense.

            penguinpagesP 1 Reply Last reply Reply Quote 0
            • penguinpagesP
              penguinpages @stephenw10
              last edited by

              @stephenw10

              I saw same symptom in this recording https://www.youtube.com/watch?v=_xmz1TE0N34 so I did not consider it a baseline / issue.

              All three fields on ADSI Editor show short/ group name: (membership shows users with full DN)
              c5af861c-33b8-4854-8e01-3a2cc05c5b9c-image.png
              --> Also noted that I did not match AD case changes "sAMAccountName" , neither changes made difference

              The domain context is very flat.. so no OU or sub search to run
              dc15956a-6dd2-4da9-b341-bfd62e64de34-image.png

              Keep getting in the test auth no returned groups.

              Can someone post if this is expected?
              Any guidance as to which changes necessitate a reboot (save on time/ baseline)?
              For context account of someone to make changes via ansible/TF.. "pf1_admins" is the role I am trying to setup to do that with. Does someone have "Assigned Privileges" list that would match that use case ?

              PS: Whomever added the Authentication test box into the system <hats off> finally a system to help debut RBAC basics outside beating head and wireshark.

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                @penguinpages said in RBAC to Role Mapping - Black List services:

                https://www.youtube.com/watch?v=_xmz1TE0N34

                In that video they never actually show the auth test after they have added group membership to the users. But it definitely should return the groups as shown in our own hangout we did on this here: https://youtu.be/n2Z3rr4W2xw?t=2220

                It looks like your query is not correct for the group membership perhaps.
                I suggest watching that video in it's entirety or at least the LDAP parts.

                penguinpagesP 1 Reply Last reply Reply Quote 0
                • penguinpagesP
                  penguinpages @stephenw10
                  last edited by

                  @stephenw10

                  Just wanted to respond with close on this issue.

                  1. DNS and setup of pfBlockerNG-devel plugin helped solve and the youtube videos on it also were help in learning more tuning.

                  2. AD Auth. Issue was first that I did not have groups named and decriptions matching in AD... which created a bit of rabbit hole.. Then when I just took time to recreate Auth type with AD recommended template, it worked. Thing to know is if you don't get groups respond on query, and can add/ change user group membership and see auth test track those changes.. STOP.. fix AD.. then move on to other things.

                  Good Return Example: AD group membership matches
                  9eeadbd7-30c2-4337-9634-47dc01004e60-image.png

                  Thanks for help and responses to this posting. As I learn more , hopefully I can help others

                  1 Reply Last reply Reply Quote 1
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.