Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfBlockerNG v2.0 w/DNSBL

    Scheduled Pinned Locked Moved pfBlockerNG
    1.1k Posts 192 Posters 1.7m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • SoloamS
      Soloam
      last edited by

      Passing my comment from the other topic to this one

      Somtimes the reporting of the Alerts misses the list matching! I had this problem today.

      List 1 - Alias_Deny (De-Duplication enabled)
      List 2 - Alias_Native

      Interface 1
      Block List 1

      The IP1 is in both lists, because Alias_Native does not passes by the De-Duplication process.

      I had a hit on Interface 1 of IP1 and in the alert tab appeared the information that the hit is from List 2 (that does not even appears on the Interface)

      Thank You all

      1 Reply Last reply Reply Quote 0
      • SoloamS
        Soloam
        last edited by

        One extra that would be very useful is the ability to export (automatic) the lists to the webserver of PFSense, that way I could use the same list on other computers and only maintain it in pfsense. This is useful because when I'm not at home I like to use on my personal laptop the lists with PeerBlock!

        Nice Job

        1 Reply Last reply Reply Quote 0
        • P
          pfcode
          last edited by

          Hi, BBCan77

          I got first crash report since upgraded to v2:

          PHP Errors:
          [27-Nov-2015 12:14:53 America/Toronto] PHP Fatal error:  Maximum execution time of 900 seconds exceeded in /usr/local/pkg/pfblockerng/pfblockerng.inc on line 1662

          Release: pfSense 2.4.3(amd64)
          M/B: Supermicro A1SRi-2558F
          HDD: Intel X25-M 160G
          RAM: 2x8Gb Kingston ECC ValueRAM
          AP: Netgear R7000 (XWRT), Unifi AC Pro

          1 Reply Last reply Reply Quote 0
          • J
            Jamerson
            last edited by

            Thank you BBCAN,
            I've tested it and it works fine really clean internet.
            the only think I notice is the DHCP server stops sharing IPS,
            is this related to the DNSBL ?
            please advise.

            1 Reply Last reply Reply Quote 0
            • P
              pfcode
              last edited by

              Any1 has the issue about failed to download Snort rules from Snort website since Nov. 24?  It seemed this is an issue after upgrading to pfBlockerNG v2.0. but I'm not sure, don't know which dns feed block it, and I don't have any clue from the Alert tab either.

              EDIT:  Its the DNS: s3.amazonaws.com, was blocked by the DNSBL MPatrol feed. Adding it to the suppression list solves.

              Release: pfSense 2.4.3(amd64)
              M/B: Supermicro A1SRi-2558F
              HDD: Intel X25-M 160G
              RAM: 2x8Gb Kingston ECC ValueRAM
              AP: Netgear R7000 (XWRT), Unifi AC Pro

              1 Reply Last reply Reply Quote 0
              • J
                JohnPFsense
                last edited by

                I've sorted the issue with the snortBL by setting the state to FLEX. It had a curl ssl error code 200 . This could be seen in view log in the update tab. So setting to FLEX also resolves a curl 200 status code.

                -John-

                1 Reply Last reply Reply Quote 0
                • BBcan177B
                  BBcan177 Moderator
                  last edited by

                  @pfcode:

                  Any1 has the issue about failed to download Snort rules from Snort website since Nov. 24?  It seemed this is an issue after upgrading to pfBlockerNG v2.0. but I'm not sure, don't know which dns feed block it, and I don't have any clue from the Alert tab either.

                  I posted in the IDS forum… Try to avoid double posting...

                  @JohnPFsense:

                  I've sorted the issue with the snortBL by setting the state to FLEX.

                  The issue that pfcode is having, is with the Snort VRT rulesets for the IDS/IPS Snort… not the snort IP list. But yes the Snort IP list needs to use 'Flex'... Would be nice if Snort actually had a proper cert for their HTTPS site :)

                  "Experience is something you don't get until just after you need it."

                  Website: http://pfBlockerNG.com
                  Twitter: @BBcan177  #pfBlockerNG
                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                  1 Reply Last reply Reply Quote 0
                  • BBcan177B
                    BBcan177 Moderator
                    last edited by

                    @Jamerson:

                    Thank you BBCAN,
                    I've tested it and it works fine really clean internet.
                    the only think I notice is the DHCP server stops sharing IPS,
                    is this related to the DNSBL ?
                    please advise.

                    Not related to DNSBL… Only thing that I suggest, is not to use the two "DHCP Registration" checkboxes in the Resolver, as that seems to have issues on Reload.

                    "Experience is something you don't get until just after you need it."

                    Website: http://pfBlockerNG.com
                    Twitter: @BBcan177  #pfBlockerNG
                    Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                    1 Reply Last reply Reply Quote 0
                    • BBcan177B
                      BBcan177 Moderator
                      last edited by

                      @soloam:

                      One extra that would be very useful is the ability to export (automatic) the lists to the webserver of PFSense, that way I could use the same list on other computers and only maintain it in pfsense. This is useful because when I'm not at home I like to use on my personal laptop the lists with PeerBlock!

                      Nice Job

                      Peerblock would probably need the files to be formatted in a certain way? There is a file in:    /var/db/pfblockerng/mastercat  which is a complete list of IPs (Deny).

                      "Experience is something you don't get until just after you need it."

                      Website: http://pfBlockerNG.com
                      Twitter: @BBcan177  #pfBlockerNG
                      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                      1 Reply Last reply Reply Quote 0
                      • BBcan177B
                        BBcan177 Moderator
                        last edited by

                        @soloam:

                        Passing my comment from the other topic to this one

                        Somtimes the reporting of the Alerts misses the list matching! I had this problem today.

                        List 1 - Alias_Deny (De-Duplication enabled)
                        List 2 - Alias_Native

                        Interface 1
                        Block List 1

                        The IP1 is in both lists, because Alias_Native does not passes by the De-Duplication process.

                        I had a hit on Interface 1 of IP1 and in the alert tab appeared the information that the hit is from List 2 (that does not even appears on the Interface)

                        Thank You all

                        This is a hard one to solve when "Alias Native" lists are used since multiple lists can have the same IP.. Alerts tab is not superhuman :)

                        "Experience is something you don't get until just after you need it."

                        Website: http://pfBlockerNG.com
                        Twitter: @BBcan177  #pfBlockerNG
                        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                        1 Reply Last reply Reply Quote 0
                        • J
                          JohnPFsense
                          last edited by

                          Trouble with whitelist

                          Since the update to pfBlockerNG v2.0 w/DNSBL I'm having a problem whitelisting some IPs. I'm not sure exactly if the problem started before I tried using the DNS blocklist option, or purely from updating pfBlockerNG.
                          I turned off the dns forwarder and turned on the dns resolver and the DNSBL worked nicely, some alerts appeared in the alert tab. Besides updating PfBlockerNG and trying the DNSBL option I did not change anything to my IP blocklists or whitelist.
                          I noticed that my whitelist wasn't working anymore. No more green icons in the firewall log dashboard gadget and nothing in the permit section of the pfBlockerNG: Alerts tab. I disabled the DNSBL and went back to the dns forwarder. This didn't help. I tried rebooting, flusing the firewall state table and reinstalling pfBlockerNG (keeping the settings tab checked). This didn't help either.

                          When I look at the iplist update log, my whitelist shows up in the Permit List with the correct number of IPs.
                          The blocked IPs that I want to whitelist  are blocked by the country list.

                          Does anyone have the same problem? Searching the forum I get the impression this is not a universal problem.

                          Suggestions would be greatly appreciated.

                          • John -
                          1 Reply Last reply Reply Quote 0
                          • BBcan177B
                            BBcan177 Moderator
                            last edited by

                            JohnPFsense,

                            For this whitelist, did you select "permit_outbound" in the alias? Does it create a firewall permit rule in the outbound firewall tab? Also ensure that the 'Rule order' is set to order the Permit rules above the block/reject rules.

                            "Experience is something you don't get until just after you need it."

                            Website: http://pfBlockerNG.com
                            Twitter: @BBcan177  #pfBlockerNG
                            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                            1 Reply Last reply Reply Quote 0
                            • J
                              JohnPFsense
                              last edited by

                              @BBcan177:

                              JohnPFsense,

                              For this whitelist, did you select "permit_outbound" in the alias? Does it create a firewall permit rule in the outbound firewall tab? Also ensure that the 'Rule order' is set to order the Permit rules above the block/reject rules.

                              I did select permit_outbound, I also tried permit_both just to check. That did not help. I can see a permit rule in the Firewall: Rules tab.  After some fiddling around I figured it out thanks to your suggestion. It was te "Rule order" The original setting apparently doesn't work as it used to. I left it at default after my pfBlockerNG update.
                              I also figured out that using the pfSense Pass/Match first order totally negates any block rule if "default pass LAN to any rule" is present. This could not be seen in the firewall dashboard widget. The last blocked packet was shown from before the settings change. Some vague memories about ipchains are coming to the surface, but I am not a networking expert.

                              Thanks a lot for your quick response, knowing what to do and teaching me something on top of it.

                              • John -
                              1 Reply Last reply Reply Quote 0
                              • A
                                azmo
                                last edited by

                                I get an error when updating the BBC_DGA list as follows:

                                [ DNSBL FAIL ] [ Skipping : BBC_DGA  ]

                                /var/unbound/check.conf:6: error: cannot open include file '/var/db/pfblockerng/dnsbl/BBC_DGA': No such file or directory
                                /var/unbound/check.conf:6: error: unknown keyword '.bk'
                                read /var/unbound/check.conf failed: 2 errors in configuration file

                                Anyone got a clue ?

                                1 Reply Last reply Reply Quote 0
                                • BBcan177B
                                  BBcan177 Moderator
                                  last edited by

                                  @azmo:

                                  I get an error when updating the BBC_DGA list as follows:

                                  [ DNSBL FAIL ] [ Skipping : BBC_DGA  ]

                                  /var/unbound/check.conf:6: error: cannot open include file '/var/db/pfblockerng/dnsbl/BBC_DGA': No such file or directory
                                  /var/unbound/check.conf:6: error: unknown keyword '.bk'
                                  read /var/unbound/check.conf failed: 2 errors in configuration file

                                  Anyone got a clue ?

                                  BBC DGA is a large GZ download (16M Extracted - I don't readily have the gz file size). Maybe its timing out on you? Do you have a slow connection?

                                  "Experience is something you don't get until just after you need it."

                                  Website: http://pfBlockerNG.com
                                  Twitter: @BBcan177  #pfBlockerNG
                                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                  1 Reply Last reply Reply Quote 0
                                  • H
                                    Harvy66
                                    last edited by

                                    @reggie14:

                                    @mbarnes:

                                    What about setting your virtual address to 0.0.0.0? As that whole /8 is non-routable, you wouldn't get the cert error. It would just silently fail to load ads.

                                    While that might hide the cert error, there would be downsides.  First, some some pages will hang as they wait for the ad server to respond.  Second, blackholing the traffic completely by setting the VIP to something other than the DNSBL webserver will disable alerts.  That would create problems, because the regular ad-blocking lists WILL break some sites and mobile apps.  The alerts are, by far, the easiest way to track down problems.

                                    There are better plausible workarounds, but we need to see some examples to understand under what circumstances people run into cert errors.

                                    I manually set ad domains to 127.0.0.1, which results in a "Non-existent domain" response from Unbound. No waiting for timeouts. A website or app that breaks if ads can't be reached is a site or app I don't care about. Others may not be able to say that.

                                    Every website that has annoying ads, I've been blackholing DNS for over a year without issues. Results may vary.

                                    1 Reply Last reply Reply Quote 0
                                    • J
                                      Jamerson
                                      last edited by

                                      @BBcan177:

                                      @Jamerson:

                                      Thank you BBCAN,
                                      I've tested it and it works fine really clean internet.
                                      the only think I notice is the DHCP server stops sharing IPS,
                                      is this related to the DNSBL ?
                                      please advise.

                                      Not related to DNSBL… Only thing that I suggest, is not to use the two "DHCP Registration" checkboxes in the Resolver, as that seems to have issues on Reload.

                                      i've noticed the LAN had the same IP as the DNSBL.
                                      change it to 10.10.30.1 now let test.
                                      i'll report back
                                      one notice MAC book users keep getting error certificate when they visit youtube.
                                      certificate can't be identified  " Safari can't identify the website certificate "
                                      anyway of avoiding this ? is kinda frustrating.
                                      thank you
                                      thank you

                                      1 Reply Last reply Reply Quote 0
                                      • RonpfSR
                                        RonpfS
                                        last edited by

                                        When I select Match Both, with Floating Rules enabled, 1 rule is generated Source on the Wan interface. Same as Match Inbound. If I select Match Outbound, no rule is created ?

                                        With Deny Both 2 rules are created:  Source on WAN  and Destination on LAN.
                                        I was expecting that Match Both would also create 2 rules.

                                        The other odd thing is that the match rules are shown as Block with the Red X, maybe because there is no Match icon in the System Logs/Firewall GUI. This is confusing as it is not blocked at that stage.

                                        pfBlockerNG 2.0.1
                                        2.2.5-RELEASE (i386)

                                        2.4.5-RELEASE-p1 (amd64)
                                        Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
                                        Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

                                        1 Reply Last reply Reply Quote 0
                                        • R
                                          reggie14
                                          last edited by

                                          @Harvy66:

                                          I manually set ad domains to 127.0.0.1, which results in a "Non-existent domain" response from Unbound. No waiting for timeouts. A website or app that breaks if ads can't be reached is a site or app I don't care about. Others may not be able to say that.

                                          Every website that has annoying ads, I've been blackholing DNS for over a year without issues. Results may vary.

                                          Truth be told, I suspect blackholing undesirable traffic along those lines should work for most things.  I haven't tried it myself to see what could go wrong.  But, that kind of blackholing would kill the logging system pfBlockerNG uses for the Alerts page.  For non-HTTPS traffic, pfBlockerNG logs blocked traffic when an endpoint pulls down the php page that its redirected to.  This logging method has the advantage of logging blocked traffic even when DNS entries are cached by an endpoint, and also captures other useful diagnostic information, such as the referrer URL, which tells you what page you were looking at that had the blocked traffic.

                                          Redirection doesn't work for HTTPS traffic, as the browser won't complete a TLS handshake with the DNSBL webserver due to the certificate issue.  So, BBcan177 came up with a workaround that basically logs the failed HTTPS connection.  But, while alerts are still logged, this method doesn't provide the same amount of information.

                                          Getting the Alerts working reliably is very important.  The common DNS blocklists include things that definitely will break stuff.  Many include various AWS domains, which breaks all kinds of things.  Separate from that, I found that the Amazon and HBO Go apps did not work properly until I unblocked a few domains.  I'm sure those aren't the only examples.

                                          1 Reply Last reply Reply Quote 0
                                          • SoloamS
                                            Soloam
                                            last edited by

                                            What lists are you guys using with pfblockerNG DNSBL?

                                            iblocklist.com hosts premium
                                            http://hphosts.gt500.org/hosts.txt
                                            http://winhelp2002.mvps.org/hosts.txt
                                            http://malwaredomains.lehigh.edu/files/justdomains
                                            http://www.malwaredomainlist.com/hostslist/hosts.txt
                                            http://www.hostsfile.org/Downloads/hosts.txt

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.