PfBlocker
-
Bman2121,
When you pass a range, pfBlocker will find a CIDR that matches it.
I saw in your list a realy large range( > /16).
Change this list to a CIDR format and see what happens. -
hankjrfan00,
It's related to ip-blocklist package.
If you had removed it, maybe you need to delete this remaining script.'/usr/local/pkg/pf/IP-Blocklist.sh start'
Also look for ipblocklist scripts in /usr/local/etc/rc.d
-
hankjrfan00,
It's related to ip-blocklist package.
If you had removed it, maybe you need to delete this remaining script.'/usr/local/pkg/pf/IP-Blocklist.sh start'
Also look for ipblocklist scripts in /usr/local/etc/rc.d
Thanks! Removing '/usr/local/pkg/pf/IP-Blocklist.sh' seems to have fixed the problem!
-
Ran into problems today, rules were not applied correctly … anyhow.
I removed pfblocker for my test, but the tables were still there.
The widget was also complaining
I removed /var/db/aliastables/pfBblocker* but I can still see them in Diagnositic: Table !How to remove them?
So I reinstalled pfBlocker, create a table with the same name, with no list, nothing happenned.
I added a list, the table was recreated ... fine ;o)
I I renamed it to the second table, table is renamed ok.
Now I delete the table ... nothing happens, table still present
I disabled pfBlocker, all the tables were gone :D
I enabled pfBlocker, the old tables were finaly gone.So I created another table, I deleted it but the table remain available until your click Save in Firewall: pfBlocker: General
Do we need a Save or Apply changes button under Firewall: pfBlocker: Lists? -
How/where could I apply a pfBlocker list to filter inbound traffic on a NAT-PMP port created by miniupnpd?
-
How/where could I apply a pfBlocker list to filter inbound traffic on a NAT-PMP port created by miniupnpd?
Try first on floating rules and go testing access with tcpdump on console.
-
Found a few good pfBlocker compatible blocklists:
I am specifically worried about Malware.
formats: txt
Known AD server IPs:
http://pgl.yoyo.org/adservers/iplist.php?ipformat=peerblock&showintro=0&mimetype=plaintext
Main page: http://pgl.yoyo.org/adservers/Malcode (anti-malware):
http://malc0de.com/bl/IP_Blacklist.txtAMaDa C&C IP Blocklist:
http://amada.abuse.ch/blocklist.php?download=ipblocklistabuse.ch ZeuS IP blocklist:
http://www.abuse.ch/zeustracker/blocklist.php?download=ipblocklistSucuri Security Malware Scanning IPs:
http://tools.sucuri.net/blacklist/MS-iplist.txt
CI Army Malicious IP List:
http://www.ciarmy.com/list/ci-badguys.txtRussian Business Network:
http://doc.emergingthreats.net/pub/Main/RussianBusinessNetwork/RussianBusinessNetworkIPs.txt -
Thanks for your contribution.
Do you know how often its Updated?
-
I don't know how often the advertising blacklist is updated, it doesn't seem to be very effective. I'm the "cup half full" type of person so I block those IP's anyways.
As to the known malware IP's, I believe from looking at the commented-out time stamp within the files they look to be updated daily.
-
Can somebody please tell me why PFblocker widget isn't showing all my block lists as being blocked?
Specifically the Russian Business Network Malverisers IP list is working however their CI Army list is not…. but the IP lists are of the same structure.
Working: http://rules.emergingthreats.net/blockrules/rbn-malvertisers-ips.txt
Not working or showing on Pfblocker widget: http://www.ciarmy.com/list/ci-badguys.txt
Please help!
-
Check first in diagnostics tables if this list was filled up.
Then check rule description for this alias rule.
-
Check first in diagnostics tables if this list was filled up.
Then check rule description for this alias rule.
Can you please explain this in further detail? I don't see alias rules for these lists, shouldn't they have been automatically made?
-
The pfBlocker is great! It's easy to use and very effective! Thank you!
I have 2 dumb questions.
- I have Russia blocked but need to allow for the access to my network from the IP 213.238.8.10. I looked up the CiDR for it. How do I enter the IP to allow it past the Russia block list?
CIDR results for 213.238.8.10
213.238.8.10/32 = 213.238.8.10 through 213.238.8.10 [1 IP - Single IP]
213.238.8.10/31 = 213.238.8.10 through 213.238.8.11 [2 IPs]
213.238.8.8/30 = 213.238.8.8 through 213.238.8.11 [4 IPs]
213.238.8.8/29 = 213.238.8.8 through 213.238.8.15 [8 IPs]
213.238.8.0/28 = 213.238.8.0 through 213.238.8.15 [16 IPs]
213.238.8.0/27 = 213.238.8.0 through 213.238.8.31 [32 IPs]
213.238.8.0/26 = 213.238.8.0 through 213.238.8.63 [64 IPs]
213.238.8.0/25 = 213.238.8.0 through 213.238.8.127 [128 IPs]
213.238.8.0/24 = 213.238.8.0 through 213.238.8.255 [256 IPs - Class C]
213.238.8.0/23 = 213.238.8.0 through 213.238.9.255 [512 IPs]
213.238.8.0/22 = 213.238.8.0 through 213.238.11.255 [1024 IPs]
213.238.8.0/21 = 213.238.8.0 through 213.238.15.255 [2048 IPs]
213.238.0.0/20 = 213.238.0.0 through 213.238.15.255 [4096 IPs]
213.238.0.0/19 = 213.238.0.0 through 213.238.31.255 [8192 IPs]
213.238.0.0/18 = 213.238.0.0 through 213.238.63.255 [16384 IPs]
213.238.0.0/17 = 213.238.0.0 through 213.238.127.255 [32768 IPs]
213.238.0.0/16 = 213.238.0.0 through 213.238.255.255 [65536 IPs - Class B]
213.238.0.0/15 = 213.238.0.0 through 213.239.255.255 [131072 IPs]
213.236.0.0/14 = 213.236.0.0 through 213.239.255.255 [262144 IPs]
213.232.0.0/13 = 213.232.0.0 through 213.239.255.255 [524288 IPs]
213.224.0.0/12 = 213.224.0.0 through 213.239.255.255 [1048576 IPs]
213.224.0.0/11 = 213.224.0.0 through 213.255.255.255 [2097152 IPs]
213.192.0.0/10 = 213.192.0.0 through 213.255.255.255 [4194304 IPs]
213.128.0.0/9 = 213.128.0.0 through 213.255.255.255 [8388608 IPs]
213.0.0.0/8 = 213.0.0.0 through 213.255.255.255 [16777216 IPs - Class A]
212.0.0.0/7 = 212.0.0.0 through 213.255.255.255 [33554432 IPs]
212.0.0.0/6 = 212.0.0.0 through 215.255.255.255 [67108864 IPs]
208.0.0.0/5 = 208.0.0.0 through 215.255.255.255 [134217728 IPs]
208.0.0.0/4 = 208.0.0.0 through 223.255.255.255 [268435456 IPs]
192.0.0.0/3 = 192.0.0.0 through 223.255.255.255 [536870912 IPs]
192.0.0.0/2 = 192.0.0.0 through 255.255.255.255 [1073741824 IPs]
128.0.0.0/1 = 128.0.0.0 through 255.255.255.255 [2147483648 IPs]- I would like to go view the stats of what is blocked by pfBlocker. I saw your screen capture at the beginning of the pfBlocker forum. Where or how do I access this?
Again, great work!
-
I am getting this in the System Log. Any ideas?
php: : The command '/usr/local/pkg/pf/IP-Blocklist.sh start' returned exit code '2', the output was 'not running root: IP-Blocklist was found not running 0 table deleted. 0 table deleted. rm: /tmp/rules.debug.tmp: No such file or directory /usr/local/pkg/pf/IP-Blocklist.sh: cannot create /usr/local/www/packages/ipblocklist /errorOUT.txt: No such file or directory rm: /tmp/rules.debug.tmp: No such file or directory 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 cat: /usr/local/www/packages/ipblocklist/interfaces.txt: No such file or directory 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 rm: /usr/local/www/pac
I might make the suggestion that pfblocker uninstall runs a script to clean it out of the packages directory (and any directories it leaves behind there). While one could go to do this manually (especially if you had country block before), it makes more sense to remove the scripts and files it creates there so a reinstall will keep this type of thing from happening.
If not a BIG FAT STICKY that tells people what they need to do would probably keep these types of messages from having to be posted.
Essentially, manually remove:
/usr/local/www/packages/pfblock* and the other two related directories, especially the one with the startup script. It doesn't unintall cleanly or reinstall cleanly.
-
Grazman,
It's related to ip-blocklist package.
If you had removed it, maybe you need to delete this remaining script.'/usr/local/pkg/pf/IP-Blocklist.sh'
Also look for ipblocklist scripts in /usr/local/etc/rc.d
-
The pfBlocker is great! It's easy to use and very effective! Thank you!
I have 2 dumb questions.
- I have Russia blocked but need to allow for the access to my network from the IP 213.238.8.10. I looked up the CiDR for it. How do I enter the IP to allow it past the Russia block list?
Create a new list, choose action allow inbound and paste your networks in custom list.
-
So you're saying my new list will over ride the other lists by default?
Also, what format to I put the IPs in? Is it listed as below?
213.238.8.10/32
Sorry to be so stupid on this.
Thanks!
-
whitelist(allow) rules are applied before blacklists(deny).
the custom list is in CIDR format, so if its only one ip address 213.238.8.10/32 is fine.
-
Thank you!
-
FYI http://www.countryipblocks.net/information/country-ip-blocks-endorses-pfsense/