PfBlockerNG
-
Only log that will show is the pfblocker log, all other logs show failure to read.
I'm on 2.3 release and the hardware is a Dell Optiplex 960
https://www.dell.com/downloads/global/products/optix/en/desktop-optiplex-960-technical-guidebook-en.pdf.
-
Are there any more lines in the pfblockerng.log file? Can you scroll down to see the end of the log? Those entries are ~24hrs ago. Did you select the Interfaces in the General Tab?
-
Thats all there is in the log. Entries are recent, at least in my timezone :) Interfaces are configured per the screenshot below.
-
You clicked "Floating Rules". So any firewall rules will not show in the wan/lan tabs. Goto the floating tab to see the rules. If Cron is running. You will not be able to Force Update till cron completes. You should be able to hit "view" in the update Tab while Cron is running.
-
Here is what I have on the floating rules. Should there be additional rules for ipv4 lists?
-
Here is what I have on the floating rules. Should there be additional rules for ipv4 lists?
Hi samoth, I sent you a PM…
-
Hi,
I think I found the reason why DNSBL wasn't working for me when using together with squid and .PAC file.
DNSBL creates to NAT rules to redirect ports 80 and 443 to the internal server on IP 127.0.0.1. But when using squid I am using ports 3128 and 3129.
So I created a second NAT rule - made a copy of the existing DNSBL rules - but with the squid ports.
Further I let pfsense create an "associated firewall rule" to make sure that access is allowed and further I wanted to use it to enable logging on this rule.So after these additional configuration options it is working for me. I can see the 1x1 pixel gif when accessing http or https and I get the access logged in the pfBlockerng Alerts tab.
So in a short summary I would say these additional steps have to be done when you want to use DNSBL togther with squid (and PAC file).
-
Define in the proxy PAC file to NOT use (go DIRECT and no through the proxy) the proxy for the DNSBL VIP. Probably best is to NOT use proxy for any private subnets like 192.168./16, 172.16./12, 10./8
-
Add an additional NAT rule for your proxy ports 3128 and 3129 - or whatever ports you used in your squid config
-
Create an "associated firewall rule" based on the NAT rule(s) you created and make sure it is placed in the correct order in your firewall rules and is not hidden by any other rule.
@BBcan177
Any idea to put an option into your package which allows the user to enable "Squid Proxy Support". Then the user should put in their squid ports and then DNSBL will automatically create an additional NAT rule for these ports and will create an additional Floating/Firewall rule. Then perhaps giving a little hint that when using PAC file the user needs to configure it PAC file to bypass proxy and go direct.
Don't know if you need this when using tranparent proxy.This option should be disabled by default so it will not cause any problems for the majority of users who do not use squid proxy and DNSBL together.
–--- EDIT -----
It looks like the additional NAT rules are NOT needed.
BUT the additional Firewall Rule IS needed.
-
-
Hi everyone!
I'm looking for some help to solve a strange issue with pfBlockerNG and OpenVPN.
On pfSense I've both OpenVPN client and server. Everything worked fine until I installed pfBlockerNG. Then, every 2 times I restart pfSense, the service status shows that OpenVPN server is not working.The thing is: OpenVPN server actually works if I test it! I can connect as normal, it's just pfSense that thinks it's not working.
If I reboot pfSense, then everything turns back to normal, and the problem reappears if I reboot once again, and so on.On boot, OpenVPN log reports this error:
May 5 17:43:13 openvpn 30398 TCP/UDP: Socket bind failed on local address [AF_INET]192.168.1.100:1194: Address already in use
192.168.1.100 is the WAN address. If I try to restart the service, i get a TUN/TAP device busy error, since it's actually being used.
It doesn't help to disable pfBlockingNG, but if I uninstall it then the problem disappears.
Another thing that "solves" the problem is to remove all the firewall's rules on OpenVPN, but then I have to manually add them again after reboot and remove them before the next reboot.What am I doing wrong? What did I miss?
pfSense v2.3
pfBlockingNG v2.0.12 -
Hi everyone!
I'm looking for some help to solve a strange issue with pfBlockerNG and OpenVPN.
On boot, OpenVPN log reports this error:
May 5 17:43:13 openvpn 30398 TCP/UDP: Socket bind failed on local address [AF_INET]192.168.1.100:1194: Address already in use
The only way I can see pfBlockerNG interfering with OpenVPN, is if you configured the DNSBL Port to use 1194?
Can you describe your Interfaces? and are you using DNSBL?
-
I tried DNSBL, but now it's disabled. I haven't changed the DNSBL's port, btw.
This is the list of my interfaces:
WAN - eth0
LAN - eth1
WIFI - wlan0
CLIENTS - vlan1
SERVERS - vlan2
BRIDGE - between WIFI and CLIENTS
VPN - used by VPN client -
I tried DNSBL, but now it's disabled. I haven't changed the DNSBL's port, btw.
This is the list of my interfaces:
WAN - eth0
LAN - eth1
WIFI - wlan0
CLIENTS - vlan1
SERVERS - vlan2
BRIDGE - between WIFI and CLIENTS
VPN - used by VPN clientSo if DNSBL is disabled, there is nothing else in pfBlockerNG that touches the ports. Could it be that a firewall rule is blocking something?
-
I thought of it too, but I can't find any difference on the firewall rules from when I don't have pfBlockerNG installed and when I do.
Plus the fact that it happens once every two reboots leaves me very confused… -
I thought of it too, but I can't find any difference on the firewall rules from when I don't have pfBlockerNG installed and when I do.
Plus the fact that it happens once every two reboots leaves me very confused…I don't think its an issue with the pfBlockerNG package… Try to post in the OpenVPN forum thread.
May 5 17:43:13 openvpn 30398 TCP/UDP: Socket bind failed on local address [AF_INET]192.168.1.100:1194: Address already in use
-
I've got pfSense at home and I wanted to put the lvl1 bluetack list in pfBlockerNG but when I get to that entry, it takes a long time for it to load and can make new DNS queries time out (I'm guessing since it's making changes to Unbound?)
Everything else is working fine. Running on a AMD Athlon II X2 240 Processor with 3GB of RAM.
Do I just need to throw more RAM in there or is there something I can tweak to fix this behavior?
Thanks,
-Nick-
-
I've got pfSense at home and I wanted to put the lvl1 bluetack list in pfBlockerNG but when I get to that entry, it takes a long time for it to load and can make new DNS queries time out (I'm guessing since it's making changes to Unbound?)
Everything else is working fine. Running on a AMD Athlon II X2 240 Processor with 3GB of RAM.
Do I just need to throw more RAM in there or is there something I can tweak to fix this behavior
I guess that Level 1 Bluetack is a subscription list… Not sure how many IPs are in that list? But I assume that its an IP list and not a DNSBL list, so it should be added to the IPv4 Tab. It shouldn't timeout Unbound tho...
-
Hi all,
I’ve just tried to install pfBlockerNG on pfSense 2.3.1_1 and I got error message:pkg: https://pkg.pfsense.org/pfSense_v2_3_1_amd64-pfSense_v2_3_1/All/pfSense-pkg-pfBlockerNG-2.0.17.txz: Not Found Failed
After quick check I found that repository contains 2.0.14 but not 2.0.17.
-
Hi all,
I’ve just tried to install pfBlockerNG on pfSense 2.3.1_1 and I got error message:pkg: https://pkg.pfsense.org/pfSense_v2_3_1_amd64-pfSense_v2_3_1/All/pfSense-pkg-pfBlockerNG-2.0.17.txz: Not Found Failed
After quick check I found that repository contains 2.0.14 but not 2.0.17.
Should be fixed now… One of the Devs looked into it...
-
Hope someone can help I have outbound deny selected on the IPV4 list below
Alias Name Alias Description Action Frequency Logging
IBlock pfBlockerNG IBlock Deny_Outbound 04hours enabledPRI1 pfBlockerNG PRI1 Deny_Outbound 01hour enabled
PRI2 pfBlockerNG PRI2 Deny_Outbound 04hours enabled
PRI3 pfBlockerNG PRI3 Deny_Outbound 04hours enabled
SEC1 pfBlockerNG SEC1 Deny_Outbound 04hours enabled
TOR pfBlockerNG TOR Deny_Outbound 04hours enabled
MAIL pfBlockerNG MAIL Deny_Outbound 08hours enabled
Now I want to keep all the listed enabled but i keep getting some good sites blocked like dropbox.com.
Can someone advice how i can exclude these destination domains please. I have tried the advance rule outbound invert but when i do it locks me out of the firewall interface.
-
Can someone advice how i can exclude these destination domains please. I have tried the advance rule outbound invert but when i do it locks me out of the firewall interface.
If an IP is getting blocked, then you can either: 1) Suppress the IP from the Alerts Tab 2) Create a new pfBlockerNG alias (Whitelist), and add the IP to the customlist and set the format to "Permit Outbound". Ensure that the "Rule Order" places the Permit Rules, above the Block/Reject Rules.
If a domain is getting blocked by DNSBL, then you need to suppress it from the Alerts Tab.
-
Can someone advice how i can exclude these destination domains please. I have tried the advance rule outbound invert but when i do it locks me out of the firewall interface.
If an IP is getting blocked, then you can either: 1) Suppress the IP from the Alerts Tab 2) Create a new pfBlockerNG alias (Whitelist), and add the IP to the customlist and set the format to "Permit Outbound". Ensure that the "Rule Order" places the Permit Rules, above the Block/Reject Rules.
If a domain is getting blocked by DNSBL, then you need to suppress it from the Alerts Tab.
Thanks I will try that. :)