Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfBlockerNG v2.0 w/DNSBL

    Scheduled Pinned Locked Moved pfBlockerNG
    1.1k Posts 192 Posters 1.7m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • BBcan177B
      BBcan177 Moderator
      last edited by

      @heliop100:

      Is a WHOIS based on AS number.

      So you select "whois" and enter an AS for example:    AS13414    in the source field? Is this an IPv4 or v6 alias? Maybe post a screenshot…

      What does this command report when you run it from the shell? You can change the ASN to the number that you configured above:

      mwhois -h whois.radb.net \!gAS13414
      

      UPDATE:
      You can see if its listed in DNSBL and if the host cmd responds with the DNSBL VIP, then it need to be whitelist in DNSBL.

      host -t A whois.radb.net
      

      "Experience is something you don't get until just after you need it."

      Website: http://pfBlockerNG.com
      Twitter: @BBcan177  #pfBlockerNG
      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

      1 Reply Last reply Reply Quote 0
      • H
        heliop100
        last edited by

        @BBcan177:

        @heliop100:

        Is a WHOIS based on AS number.

        So you select "whois" and enter an AS for example:    AS13414    in the source field? Is this an IPv4 or v6 alias? Maybe post a screenshot…

        What does this command report when you run it from the shell? You can change the ASN to the number that you configured above:

        mwhois -h whois.radb.net \!gAS13414
        

        UPDATE:
        You can see if its listed in DNSBL and if the host cmd responds with the DNSBL VIP, then it need to be whitelist in DNSBL.

        host -t A whois.radb.net
        

        Hi, is an IPV4 alias.

        mwhois -h whois.radb.net \!gAS13414
        ```returs:
        
        mwhois -h whois.radb.net \!gAS14061
        
        A3848
        5.101.96.0/21 5.101.104.0/22 5.101.108.0/24 5.101.109.0/24 5.101.110.0/24 5.101.111.0/24 37.139.0.0/19 45.55.32.0/19 45.55.64.0/19 45.55.96.0/22 45.55.100.0/22 45.55.104.0/22 45.55.116.0/22 45.55.120.0/22 45.55.124.0/22 45.55.128.0/17 45.55.128.0/18 45.55.192.0/18 46.101.0.0/18 46.101.64.0/22 46.101.68.0/22 46.101.72.0/21 ….. a lot more
        
        And
        
        

        host -t A whois.radb.net

        
        whois.radb.net has address 198.108.0.18
        
        DNSBL are disable.
        Thanks.
        
        ![pfbloquerNG.jpg](/public/_imported_attachments_/1/pfbloquerNG.jpg)
        ![pfbloquerNG.jpg_thumb](/public/_imported_attachments_/1/pfbloquerNG.jpg_thumb)
        1 Reply Last reply Reply Quote 0
        • BBcan177B
          BBcan177 Moderator
          last edited by

          You're on an older version of pfSense and pfBlockerNG… I'd suggest updating to the latest versions...

          "Experience is something you don't get until just after you need it."

          Website: http://pfBlockerNG.com
          Twitter: @BBcan177  #pfBlockerNG
          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

          1 Reply Last reply Reply Quote 0
          • T
            TyphooN
            last edited by

            BBcan, I've read and been using most of the feeds mentioned in the first few pages of this thread.  Is there an exhaustive list of feeds or any "must have" feeds that I might have missed?  Thank you!  8)

            1 Reply Last reply Reply Quote 0
            • BBcan177B
              BBcan177 Moderator
              last edited by

              @TyphooN:

              BBcan, I've read and been using most of the feeds mentioned in the first few pages of this thread.  Is there an exhaustive list of feeds or any "must have" feeds that I might have missed?  Thank you!  8)

              I am working on the next version of pfBlockerNG v3.0 which will have a Feeds Management Tab for IPv4/v6/DNSBL feeds … plus many other features ...

              Currently listing:

              • IPv4:  105 Feeds

              • IPv6:      9 Feeds

              • DNSBL: 71 Feeds

              Just working on the last bits … Hope to have it out soon....
              I will post some screenshots when I can...

              "Experience is something you don't get until just after you need it."

              Website: http://pfBlockerNG.com
              Twitter: @BBcan177  #pfBlockerNG
              Reddit: https://www.reddit.com/r/pfBlockerNG/new/

              1 Reply Last reply Reply Quote 0
              • T
                TyphooN
                last edited by

                @BBcan177:

                @TyphooN:

                BBcan, I've read and been using most of the feeds mentioned in the first few pages of this thread.  Is there an exhaustive list of feeds or any "must have" feeds that I might have missed?  Thank you!  8)

                I am working on the next version of pfBlockerNG v3.0 which will have a Feeds Management Tab for IPv4/v6/DNSBL feeds … plus many other features ...

                Currently listing:

                • IPv4:  105 Feeds

                • IPv6:      9 Feeds

                • DNSBL: 71 Feeds

                Just working on the last bits … Hope to have it out soon....
                I will post some screenshots when I can...

                Awesome!  Can't wait for it's release!  Thank you for your continued contribution, pfBlockerNG is already great but this is the icing on the cake!

                1 Reply Last reply Reply Quote 0
                • R
                  Ramosel
                  last edited by

                  @BBcan177:

                  I am working on the next version of pfBlockerNG v3.0 which will have a Feeds Management Tab for IPv4/v6/DNSBL feeds … plus many other features ...
                  I will post some screenshots when I can...

                  As one of BBcan's testers, I can tell you he has done an amazing job on this feature.  It alone will be worth the update.

                  1 Reply Last reply Reply Quote 0
                  • P
                    pfBasic Banned
                    last edited by

                    Any guesstimates for ETA?

                    1 Reply Last reply Reply Quote 0
                    • S
                      spyshagg
                      last edited by

                      I'd like to report a serious bug.

                      After the first setup and first reboot, PFblockerNG proceeds to alter the order of the pre-existing Floating Rules.
                      Before PFblockerNG:

                      1º Custom quick Allow rules to many things

                      2º Custom quick Deny all rule to all traffic on my subnets.

                      After PFblockerNG

                      1º  PFblocker own rules

                      2º Custom quick Deny all rule to all traffic on my subnets.

                      3º Custom quick Allow rules to many things.

                      It changed the order of my Deny Rule to be above my Allow rules, thus blocking all traffic.

                      I fixed the rules ordering, but I have yet to reboot the machine to see if they are preserved.

                      Edit: I see there is an option on how to order pfblockerng floating rules, and the default one  says:

                      pfb_block / Reject | all other rules

                      It either considered my custom Deny rule to be one of its own, or it simply parses all existing rules looking for "deny/reject" and jumps them ahead.

                      1 Reply Last reply Reply Quote 0
                      • T
                        TyphooN
                        last edited by

                        @Ramosel:

                        @BBcan177:

                        I am working on the next version of pfBlockerNG v3.0 which will have a Feeds Management Tab for IPv4/v6/DNSBL feeds … plus many other features ...
                        I will post some screenshots when I can...

                        As one of BBcan's testers, I can tell you he has done an amazing job on this feature.  It alone will be worth the update.

                        How do you become a tester?  I would like to sign up if any more are needed!  I always love to try bleeding edge/potentially buggy software and assist in the debugging/feedback process.  Kind of why I religiously update my pfSense box daily whenever updates are available :)

                        1 Reply Last reply Reply Quote 0
                        • BBcan177B
                          BBcan177 Moderator
                          last edited by

                          @TyphooN:

                          How do you become a tester?  I would like to sign up if any more are needed!  I always love to try bleeding edge/potentially buggy software and assist in the debugging/feedback process.  Kind of why I religiously update my pfSense box daily whenever updates are available :)

                          I sent a PM :)

                          "Experience is something you don't get until just after you need it."

                          Website: http://pfBlockerNG.com
                          Twitter: @BBcan177  #pfBlockerNG
                          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                          1 Reply Last reply Reply Quote 0
                          • Y
                            yodaphone
                            last edited by

                            @BBcan177:

                            @TyphooN:

                            How do you become a tester?  I would like to sign up if any more are needed!  I always love to try bleeding edge/potentially buggy software and assist in the debugging/feedback process.  Kind of why I religiously update my pfSense box daily whenever updates are available :)

                            I sent a PM :)

                            I'd love  to test too.. :) let me know if can include me..

                            1 Reply Last reply Reply Quote 0
                            • M
                              mifronte
                              last edited by

                              Just got caught up on this thread.  The only thing I am unclear on is what is the ramifications of having these two options enabled?

                              1. Register DHCP leases in the DNS Resolver
                              2. Register Static DHCP static mappings in the DNS Resolver

                              Thanks.

                              SuperMicro Atom C2758 A1SRI-2758F 16GB
                              2.7.2 (amd64)

                              1 Reply Last reply Reply Quote 0
                              • RonpfSR
                                RonpfS
                                last edited by

                                At every registration, Unbound reloads, so if it takes 1-3 minutes to restart (depending on you domain block list size), you have no DNS service available.

                                Static mappings are not dynamic, so Unbound will reload only when you save the mappings.

                                2.4.5-RELEASE-p1 (amd64)
                                Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
                                Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

                                1 Reply Last reply Reply Quote 0
                                • M
                                  mifronte
                                  last edited by

                                  Yes, unbound reloading delay makes sense.  Look like I will have to limit my DNSBL feeds since I need both features enabled.

                                  Another question for DNSBL is do you normally Deny Both or just Deny Outbound and allow pfSense implicit block to handle the inbound.  I am trying to imagine a case for Deny Both in DNSBL.  For anything incoming, the session has to be initiated from inside the firewall.  So for unwanted ads to come in, they have to be embedded in the response of the original request in the form of actual content and not a URL.  In which case, DNSBL would not be able to block it anyway.

                                  SuperMicro Atom C2758 A1SRI-2758F 16GB
                                  2.7.2 (amd64)

                                  1 Reply Last reply Reply Quote 0
                                  • M
                                    Mr. Jingles
                                    last edited by

                                    @RonpfS:

                                    At every registration, Unbound reloads, so if it takes 1-3 minutes to restart (depending on you domain block list size), you have no DNS service available.

                                    Static mappings are not dynamic, so Unbound will reload only when you save the mappings.

                                    Thanks Ron. This might be added as an explanation in the screen, next to these two options.

                                    6 and a half billion people know that they are stupid, agressive, lower life forms.

                                    1 Reply Last reply Reply Quote 0
                                    • BBcan177B
                                      BBcan177 Moderator
                                      last edited by

                                      @mifronte:

                                      Another question for DNSBL is do you normally Deny Both or just Deny Outbound and allow pfSense implicit block to handle the inbound.  I am trying to imagine a case for Deny Both in DNSBL.  For anything incoming, the session has to be initiated from inside the firewall.  So for unwanted ads to come in, they have to be embedded in the response of the original request in the form of actual content and not a URL.  In which case, DNSBL would not be able to block it anyway.

                                      If you have open WAN ports, then you only need to protect those ports… If so, you can use the "Adv. Inbound" rule settings to add the DST IP(s) and Port(s) so the rules are effective for those events only... The default pfSense block rule on the WAN will handle all other blocking required...

                                      IP Blocking uses the Firewall rules to block/permit/match while DNSBL is blocking based on DNS request by the LAN clients... Don't get the two mixed up :)

                                      "Experience is something you don't get until just after you need it."

                                      Website: http://pfBlockerNG.com
                                      Twitter: @BBcan177  #pfBlockerNG
                                      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        mifronte
                                        last edited by

                                        @BBcan177:

                                        …

                                        IP Blocking uses the Firewall rules to block/permit/match while DNSBL is blocking based on DNS request by the LAN clients... Don't get the two mixed up :)

                                        Sorry if I sound like a newbie, but I just found out about pfBLockNG a few days ago and have been reading the forums to fully understand the package.

                                        This is where I am confused about is if DNSBL is blocking based on DNS request by the LAN clients, why are there options in DNSBL to block incoming?  I am trying to understand a scenario where I would have DNS request coming in through the WAN that I would need blocking.  Or is the incoming blocking options in DNSBL is just a way to implement IP Blocking using DNSBL feeds?

                                        I am feeling like I am missing a connection to fully understand the difference between IP blocking and DNSBL "incoming" blocking.  By incoming, I am referring to requests originating from the WAN/internet.

                                        SuperMicro Atom C2758 A1SRI-2758F 16GB
                                        2.7.2 (amd64)

                                        1 Reply Last reply Reply Quote 0
                                        • BBcan177B
                                          BBcan177 Moderator
                                          last edited by

                                          @mifronte:

                                          -I am missing a connection to fully understand the difference between IP blocking and DNSBL "incoming" blocking.  My incoming, I am referring to requests originating from the WAN/internet.

                                          Some of the DNSBL Feeds contain IP addresses.. So when IPs are found in DNSBL, they can be added to a "DNSBL_IP" aliastable to be blocked. So the IP settings in DNSBL are just for that part. Typically IP based feeds are entered in the IPv4/6 Tabs and GeoIP.

                                          There is also a "Permit Rule" in DNSBL which is used to allow other Vlans to be able to access the DNSBL VIP address.

                                          Hope that makes it clearer.

                                          "Experience is something you don't get until just after you need it."

                                          Website: http://pfBlockerNG.com
                                          Twitter: @BBcan177  #pfBlockerNG
                                          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                          1 Reply Last reply Reply Quote 0
                                          • M
                                            mgc6288
                                            last edited by

                                            I have the latest version to date and wondering if there is a way, or if in the future, possible to whitelist IPs from companies like Teamviewer sending email from Germany when all countries are blocked?

                                            I understand it sounds counter productive as pfSense blocks all by default but we want pfBlockerNG blocking all international traffic as we open ports for services and don't need the N. Koreans attempting any crazy stuff.  pfBlockerNG has done a marvelous in blocking unwanted international email spam which is an A+++!

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.