Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfBlockerNG

    Scheduled Pinned Locked Moved pfBlockerNG
    1.2k Posts 210 Posters 1.8m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • BBcan177B
      BBcan177 Moderator
      last edited by

      Try the pfSense package ntopng…

      "Experience is something you don't get until just after you need it."

      Website: http://pfBlockerNG.com
      Twitter: @BBcan177  #pfBlockerNG
      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

      1 Reply Last reply Reply Quote 0
      • K
        kilthro
        last edited by

        Wow this package has really taken off. I have been away from all of this for a while. I had to reinstall my firewall and noticed that pfblocker (original wasnt a package anymore). I got this installed and I am amazed with what you can do.. I do have a quick question though.. How would i go about pulling all of the custom ips that I had set up in lists in the old pfblocker? I have the backed up config file for pfsense.. Am I able to pull them out of that somehow? I had some very extensive lists that I would like to duplicate on this pacakge without having to manually search and locate all of the ips again…

        Good Job on this package bbcan! Sorry i fell off on the beta testing.. just got super busy with work and never had the opportunity to play with it.

        1 Reply Last reply Reply Quote 0
        • BBcan177B
          BBcan177 Moderator
          last edited by

          @kilthro:

          How would i go about pulling all of the custom ips that I had set up in lists in the old pfblocker?

          If you goto Diagnostics:Command Prompt in the GUI -

          And in the PHP Execute Box type :

          print base64_decode("  coded String  ");

          So you will need to view the config.xml file (or the Backup file) and find the old pfBlocker Alias and look for the line "coded string" and copy the "coded string" part …

          It will output the decoded string to the Screen.

          Hope this helps!

          "Experience is something you don't get until just after you need it."

          Website: http://pfBlockerNG.com
          Twitter: @BBcan177  #pfBlockerNG
          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

          1 Reply Last reply Reply Quote 0
          • K
            kilthro
            last edited by

            @BBcan177:

            @kilthro:

            How would i go about pulling all of the custom ips that I had set up in lists in the old pfblocker?

            If you goto Diagnostics:Command Prompt in the GUI -

            And in the PHP Execute Box type :

            print base64_decode("  Decoded String  ");

            So you will need to view the config.xml file (or the Backup file) and find the old pfBlocker Alias and look for the line "decoded string" and copy the "decoded string" part …

            It will output the decoded string to the Screen.

            Hope this helps!

            Thanks alot!! I got most of them from that section that all of these are kept at. However when trying to get the custom ips I copied the code that is beteen the and I am getting.

            Parse error: syntax error, unexpected end of file in /usr/local/www/exec.php(250) : eval()'d code on line 2

            I copied exactly what was there. I used notepad to copy as well as adobe dreamworks since it formats it as it should… same result.. Am i doing it wrong?
            ===== edit=======

            Well i just did a round about way.. Since I restored off of the config file, the pfblocker folder is there in my hierarchy.. I went into it and there is a txt file that has the list there.. I just opened it and copied the info out of it.. So I am good now..
            Thanks for your help!!

            1 Reply Last reply Reply Quote 0
            • BBcan177B
              BBcan177 Moderator
              last edited by

              @kilthro:

              Parse error: syntax error, unexpected end of file in /usr/local/www/exec.php(250) : eval()'d code on line 2

              Make sure the Coded string that you copied is pasted inside the quotation marks and at the end of the command there is the semi-colon.

              "Experience is something you don't get until just after you need it."

              Website: http://pfBlockerNG.com
              Twitter: @BBcan177  #pfBlockerNG
              Reddit: https://www.reddit.com/r/pfBlockerNG/new/

              1 Reply Last reply Reply Quote 0
              • K
                kilthro
                last edited by

                @BBcan177:

                @kilthro:

                Parse error: syntax error, unexpected end of file in /usr/local/www/exec.php(250) : eval()'d code on line 2

                Make sure the Decoded string that you copied is pasted inside the quotation marks and at the end of the command there is the semi-colon.

                ah.. that was my mistake.. works like a charm now.. :-D

                1 Reply Last reply Reply Quote 0
                • BBcan177B
                  BBcan177 Moderator
                  last edited by

                  News - Emerging Threats acquired by Proofpoint? Wonder what this means for the Open Rulesets and lists?

                  https://proofpoint.com/us/proofpoint-signs-definitive-agreement-acquires-emerging-threats?utm_campaign=Project+Erie&utm_source=hs_email&utm_medium=email&utm_content=16303236&_hsenc=p2ANqtz-8E0j1nitfkn_rbVyujlv55UteYuZ9GuEWyH3Wlqv6AeMtvS1oRNnbvgA1qSFYfgAgV456PhtiJ7L2-_RZjlyTZ-EOTWA&_hsmi=16303236

                  "Experience is something you don't get until just after you need it."

                  Website: http://pfBlockerNG.com
                  Twitter: @BBcan177  #pfBlockerNG
                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                  1 Reply Last reply Reply Quote 0
                  • A
                    AndrewZ
                    last edited by

                    Something is strange with the Alias Header.
                    This is the Alias and Alert tabs.

                    For some reasons on the Alert tab the IP-address is properly indicated as GB, but the list name is wrong.

                    0.jpg
                    0.jpg_thumb
                    1.jpg
                    1.jpg_thumb

                    1 Reply Last reply Reply Quote 0
                    • F
                      fsansfil
                      last edited by

                      News - Emerging Threats acquired by Proofpoint? Wonder what this means for the Open Rulesets and lists?

                      Paid 40M in cash and stock. Considering the low price paid, lets say its 20-40 PE, this tells me ET were barely making any dime…

                      Proofpoint will focus on B2B, business cloud solution and try to make more money. Also, they should cut all ET staffs except the 20 plp working on rules writing and threat analysis...

                      My two cents.

                      F.

                      1 Reply Last reply Reply Quote 0
                      • R
                        reggie14
                        last edited by

                        @BBcan177:

                        News - Emerging Threats acquired by Proofpoint? Wonder what this means for the Open Rulesets and lists?

                        Emerging Threats posted this letter committing to continue to support the Open ruleset. Obviously things could change over time, but it's a fairly strong statement.

                        1 Reply Last reply Reply Quote 0
                        • Q
                          qasimchadhar
                          last edited by

                          My itch is getting worse….. lol how does one become beta tester for pfsense?

                          1 Reply Last reply Reply Quote 0
                          • F
                            fragged
                            last edited by

                            @qasimchadhar:

                            My itch is getting worse….. lol how does one become beta tester for pfsense?

                            pfBlockerNG is available in the packet repo, no need to be a beta tester or anything. All you need is pfSense 2.2.X.

                            1 Reply Last reply Reply Quote 0
                            • Q
                              qasimchadhar
                              last edited by

                              lol another case of half-asleep pfsense tinkering. My bad.

                              1 Reply Last reply Reply Quote 0
                              • P
                                postduif
                                last edited by

                                How often do you update the enabled lists? I'm using pfSense for my home router/firewall with the following lists :

                                1 Reply Last reply Reply Quote 0
                                • BBcan177B
                                  BBcan177 Moderator
                                  last edited by

                                  @postduif:

                                  How often do you update the enabled lists?

                                  Hi postduif,

                                  In the pfblockerng.log (This can be viewed in the Log Browser), after the downloads are completed, you will see a section called :

                                  "==[ [b]Last Updated List Summary ]=="

                                  This will show you the last updated timestamp of the Threat Sources. You can change the lists to update once per hour and follow the log file for a few days to see the Update Frequency of each list and adjust accordingly.

                                  I would recommend atleast a once a day for most, some are updated more frequently (1-4hrs).

                                  Also the first step in any Cron event is to check the timestamp of the remote server and see if its the same as the previous download, then the download is skipped for that particular list. Also note the blocklist.de has several other lists available (you show only the ssh list).

                                  I have also indicated in several posts in this thread to be more concerned about the "Outbound" traffic.

                                  Typically for "Home" use, you most likely do not have any open ports. As pfSense is a Stateful Firewall by design, it is blocking all unsolicited traffic on the inbound WAN. But if a device on the LAN makes a request to any of these Malicious IPs, it will go thru and not protect your devices as you have not configured any "OUTBOUND" rules. If you do have open WAN ports, then you can add specific Alias Type Rules to protect those individual ports on the "Inbound" WAN.

                                  Hope this helps!

                                  "Experience is something you don't get until just after you need it."

                                  Website: http://pfBlockerNG.com
                                  Twitter: @BBcan177  #pfBlockerNG
                                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    sparks305
                                    last edited by

                                    So i just finished reading this entire 36 page thread prior to posting any questions when installing/setting up, as I definitely do not consider myself an "engineer." I wanted to thank everyone involved (not just limited to testing) and most notably BBcan177 for his time and effort contributed.

                                    1 Reply Last reply Reply Quote 0
                                    • P
                                      postduif
                                      last edited by

                                      @BBcan177:

                                      @postduif:

                                      How often do you update the enabled lists?

                                      Hi postduif,

                                      In the pfblockerng.log (This can be viewed in the Log Browser), after the downloads are completed, you will see a section called :

                                      "==[ [b]Last Updated List Summary ]=="

                                      This will show you the last updated timestamp of the Threat Sources. You can change the lists to update once per hour and follow the log file for a few days to see the Update Frequency of each list and adjust accordingly.

                                      I would recommend atleast a once a day for most, some are updated more frequently (1-4hrs).

                                      Also the first step in any Cron event is to check the timestamp of the remote server and see if its the same as the previous download, then the download is skipped for that particular list. Also note the blocklist.de has several other lists available (you show only the ssh list).

                                      I have also indicated in several posts in this thread to be more concerned about the "Outbound" traffic.

                                      Typically for "Home" use, you most likely do not have any open ports. As pfSense is a Stateful Firewall by design, it is blocking all unsolicited traffic on the inbound WAN. But if a device on the LAN makes a request to any of these Malicious IPs, it will go thru and not protect your devices as you have not configured any "OUTBOUND" rules. If you do have open WAN ports, then you can add specific Alias Type Rules to protect those individual ports on the "Inbound" WAN.

                                      Hope this helps!

                                      Really helps for understanding pfblockerng, thanks.
                                      The only inbound services i'm using are ssh (on port 6622 which forwards to an internal server on port 22, but is only allowed from a specific source IP) and Openvpn on port 1194.
                                      What's your advice, only use deny_outbound on my lists? Or deny_both?

                                      1 Reply Last reply Reply Quote 0
                                      • BBcan177B
                                        BBcan177 Moderator
                                        last edited by

                                        If you are restricting those two ports for SSH and OpenVPN to a select few IPs, then it doesn't protect you to have pfBNG "Inbound" rules as the "Implicit Deny" on the WAN is already dropping all unsolicited traffic.

                                        If you want to see the activity "noise" that is being implicitly blocked on the WAN, you can use "Deny Both" but it will slightly impact performance. FreeBSD "pf" is quite capable to process the IPs and lookup the Alias Tables, however its not offering any protection to your network as stated above.

                                        You will see less activity in the Widget/Alert Logs without the "Deny Inbound" rules but that is a good thing. You should really be looking at what is being blocked. So if a LAN device is showing blocked activity to a Malicious IP, you should be investigating why?

                                        By un-neccessarily using the "Deny Both" rules, you are cluttering your alerts log and you can miss the real malicious activity that you should be looking out for.

                                        You don't just want to turn it on, and forget about it.

                                        If for example you have a single port (or a few ports) open on the WAN, you are better off in creating an "Alias Deny" rule(s), and creating a manual Firewall rule just for the Inbound port(s). This way it reduces un-necessary processing of the Inbound packets.

                                        "Experience is something you don't get until just after you need it."

                                        Website: http://pfBlockerNG.com
                                        Twitter: @BBcan177  #pfBlockerNG
                                        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                        1 Reply Last reply Reply Quote 0
                                        • ghostshellG
                                          ghostshell
                                          last edited by

                                          @Supermule:

                                          Via the private repository but it will be available soon as a pfsense package.

                                          Be patient :)

                                          How can I get access to this private repo?

                                          1 Reply Last reply Reply Quote 0
                                          • BBcan177B
                                            BBcan177 Moderator
                                            last edited by

                                            @ghostshell:

                                            @Supermule:

                                            Via the private repository but it will be available soon as a pfsense package.

                                            Be patient :)

                                            How can I get access to this private repo?

                                            The Package has already been released… Its in the pfSense Package Repo.

                                            "Experience is something you don't get until just after you need it."

                                            Website: http://pfBlockerNG.com
                                            Twitter: @BBcan177  #pfBlockerNG
                                            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.