Describe your package hereDescribe your package requirements hereCurrently there are no FAQ items provided.pfblockerngdnsblsettings1.0pfBlockerNG: DNSBL: Settings/usr/local/pkg/pfblockerng/pfblockerng.incpfBlockerNG: Save DNSBL general settingsGeneral/pkg_edit.php?xml=pfblockerng.xmlUpdate/pfblockerng/pfblockerng_update.phpAlerts/pfblockerng/pfblockerng_alerts.phpReputation/pkg_edit.php?xml=/pfblockerng/pfblockerng_reputation.xmlIPv4/pkg.php?xml=/pfblockerng/pfblockerng_v4lists.xmlIPv6/pkg.php?xml=/pfblockerng/pfblockerng_v6lists.xmlDNSBL/pkg_edit.php?xml=/pfblockerng/pfblockerng_dnsbl.xmlCountry/pkg_edit.php?xml=/pfblockerng/pfblockerng_top20.xmlLogs/pfblockerng/pfblockerng_log.phpSync/pkg_edit.php?xml=/pfblockerng/pfblockerng_sync.xmlDNSBL/pkg_edit.php?xml=/pfblockerng/pfblockerng_dnsbl.xml2DNSBL Feeds/pkg.php?xml=/pfblockerng/pfblockerng_dnsbl_lists.xml2DNSBL EasyList/pkg_edit.php?xml=/pfblockerng/pfblockerng_dnsbl_easylist.xml2listtopicLINKSFirewall Alias
Firewall RulesFirewall Logs]]>
infoinfoNote: DNSBL requires the DNS Resolver (Unbound) to be used as the DNS service.
When a DNS request is made for a domain that is listed in DNSBL, the request is redirected to the Virtual IP address
where an instance of Lighttpd Web Server will collect the packet statistics and push a '1x1' GIF image to the Browser.
If browsing is slow, check for Firewall LAN Rules/Limiters that might be blocking access to the DNSBL VIP.
Note: DNSBL will block and partially log Alerts for HTTPS requests.
To debug issues with 'False Positives', the following tools below can be used:
1. Browser Dev mode (F12) and goto 'Console' to review any error messages.
2. Execute the following command from pfSense Shell (Changing the interface 're1' to the pfSense Lan Interface):
tcpdump -nnvli re1 port 53 | grep -B1 'A 10.10.10.1'
3. Packet capture software such as Wireshark.
]]>
Enable DNSBLpfb_dnsblcheckbox
To Utilize, Unbound DNS Resolver must be enabled.]]>
DNSBL Virtual IPpfb_dnsvipinput13
Enter a single IPv4 VIP address that is RFC1918 Compliant.
This address should be in an Isolated Range than what is used in your Network.
Rejected DNS Requests will be forwarded to this VIP (Virtual IP)
RFC1918 Compliant - (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16)]]>
10.10.10.1DNSBL Listening Portpfb_dnsportinput3
Enter a single PORT that is in the range of 1 - 65535
This Port must not be in use by any other process.]]>
8081DNSBL SSL Listening Portpfb_dnsport_sslinput3
Enter a single PORT that is in the range of 1 - 65535
This Port must not be in use by any other process.]]>
8443DNSBL Listening Interfacednsbl_interface
Default: LAN - Selected Interface should be a Local Interface only.]]>
interfaces_selectionwan|loopbacklanDNSBL Firewall Rulepfb_dnsbl_rulecheckboxbegindnsbl_allow_int
to access the DNSBL VIP on the LAN interface. This is only required for multiple LAN Segments.]]>
interfaces_selectionwanendDNSBL IP Firewall Rule SettingslisttopicConfigure settings for Firewall Rules when any DNSBL Feed contain IP AddressesinfoList ActionDisabled
Select the Action for Firewall Rules when any DNSBL Feed contain IP addresses.
'Disabled' Rule: Disables selection and does nothing to selected Alias.
'Deny' Rules:
'Deny' rules create high priority 'block' or 'reject' rules on the stated interfaces. They don't change the 'pass' rules on other
interfaces. Typical uses of 'Deny' rules are:
Deny Both - blocks all traffic in both directions, if the source or destination IP is in the block list
Deny Inbound/Deny Outbound - blocks all traffic in one direction unless it is part of a session started by
traffic sent in the other direction. Does not affect traffic in the other direction.
One way 'Deny' rules can be used to selectively block unsolicited incoming (new session) packets in one direction, while
still allowing deliberate outgoing sessions to be created in the other direction.
'Alias' Rule: 'Alias' rules create an alias for the list (and do nothing else).
This enables a pfBlockerNG list to be used by name, in any firewall rule or pfSense function, as desired.]]>
actionselectEnable LoggingaliaslogEnable
Select - Logging to Status: System Logs: FIREWALL ( Log )
This can be overriden by the 'Global Logging' Option in the General Tab.]]>
selectAdvanced Inbound Firewall Rule SettingslisttopicinfoNote: In general, Auto-Rules are created as follows:
Inbound - 'any' port, 'any' protocol and 'any' destination
Outbound - 'any' port, 'any' protocol and 'any' destination address in the lists
Configuring the Adv. Inbound Rule settings, will allow for more customization of the Inbound Auto-Rules. Select the pfSense 'Port' and/or 'Destination' Alias below:]]>
autoportsEnable Custom PortcheckboxaliasportsbeginDefine AliasaliasportsClick Here to add/edit Aliases
Do not manually enter port numbers. Do not use 'pfB_' in the Port Alias name.]]>
21aliasesportendautodestEnable Custom Destinationcheckboxaliasdest,autonotbeginaliasdestClick Here to add/edit Aliases
Do not manually enter Addresses(es). Do not use 'pfB_' in the 'IP Network Type' Alias name.]]>
21aliasesnetworkInvertautonotInvert - Option to invert the sense of the match.
ie - Not (!) Destination Address(es)]]>
checkboxendCustom ProtocolautoprotoDefault: any Select the Protocol used for Inbound Firewall Rule(s).
Do not use 'any' with Adv. Inbound Rules as it will bypass these settings!]]>select4listtopicEnable Alexaalexa_enableTop 1 million sites list.
(Global 1 month average traffic ranking)
Alexa can be used to whitelist the most popular domain names to avoid false positives.
To use this feature, select the number of 'Top Domains' to whitelist. You can also 'include' which TLDs to whitelist.
Recommendation:
Alexa also contains the 'Top' AD Servers, so its recommended to configure the first DNSBL Alias with AD Server
(ie. yoyo, Adaway...) based feeds. Alexa whitelisting can be disabled for this first defined Alias.
Generally, Alexa should be used for feeds that post full URLs like PhishTank, OpenPhish or MalwarePatrol.
To bypass an Alexa domain, add the Domain to the first defined Alias 'Custom Block list' with Alexa disabled in this alias.
The complete 'Top 1M list' can be downloaded from
Here (Database is free to use.)
When enabled, this list will be automatically updated once per month along with the MaxMind Database.]]>
checkboxTop Domains to Whitelisting]]>alexa_countDefault: Top 1k
Select the number of Alexa 'Top Domain global ranking' to whitelist.]]>select1000Alexa TLD Inclusionalexa_inclusionDefault: COM, NET, ORG, CA, CO, IO
Detailed listing : Root Zone top-level domains. ]]>
select10listtopicCustom Listsuppression
Enter one Domain Name per line
You may use "#" after any Domain name to add comments. example (google.com # Suppress Google.com)
This List is stored as 'Base64' format in the config.xml file.
Note: These entries are only suppressed when Feeds are downloaded or on a
'Force Reload'.
Use the Alerts Tab '+' Suppression icon to immediately remove a domain from Unbound DNSBL.]]>
textarea5025base64Click to SAVE Settings and/or Rule Edits. Changes are Applied via CRON or
'Force Update']]>listtopic