https://www.cloudflare.com/learning/dns/dns-records/dns-ptr-record/
"In IPv4:
While DNS A records are stored under the given domain name, DNS PTR records are stored under the IP address — reversed, and with ".in-addr.arpa" added. For example, the PTR record for the IP address 192.0.2.255 would be stored under "255.2.0.192.in-addr.arpa".
"in-addr.arpa" has to be added because PTR records are stored within the .arpa top-level domain in the DNS. .arpa is a domain used mostly for managing network infrastructure, and it was the first top-level domain name defined for the Internet. (The name "arpa" dates back to the earliest days of the Internet: it takes its name from the Advanced Research Projects Agency (ARPA), which created ARPANET, an important precursor to the Internet.) in-addr.arpa is the namespace within .arpa for reverse DNS lookups in IPv4."
Therefore that IP address, if we try to do a WHOIS, comes from Cyprus and not Philippines..
In pfBNG, you can create an IPv4 Whitelist that contains Cloudflare DNS IPs and place it above your IPv4 Blocklists. Alternatively, there's Quad9. Or run Gibson Research's DNS Benchmark to find the fastest Public DNS servers for you.
Go to DNSBL tab and scroll down to DNSBL configuration to find the option. Null blocking is how pihole does it by default too.
I'm not entirely sure of how it all works but here's one explanation: https://github.com/StevenBlack/hosts#we-recommend-using-0000-instead-of-127001
The block lists can contain sites that host more than one service. "Simplisafe" probably uses some server farm(s) and the IP ranges may be on some block list.
NordVPN also doesn't reach all its available locations from behind my home pfBlockerNG; the logs show the IP's are blocked in a block list I've enabled.
This wasn't the video but this post I saw it almost exactly like what I did:
;utm_medium=android_app&utm_name=androidcss&utm_term=1&utm_content=share_button
However I'm getting some DNS leaks for some reason... In pftop in see my public ISP IP talking to my upstream DNS servers...
Glad it works for you, I am a premium member, if you decide to pay please use my link https://nextdns.io/?from=nwmzs7gc it is $20usd a year.
You get 300k queries a month after that it just becomes a regular resolver.
Did you do DNS over TLS to NextDNS through unbound or use the NextDNS app?
The ADGuard feed isn't regex, it's ADblock syntax.
See here:
https://adblockplus.org/en/filter-cheatsheet
The pfBlockerNG domain parser will only collect the lines that start with "||" and end with "^". So those are just domains to be blocked. As-is, it isn't a regex or a wildcard block. That is where the TLD wildcard feature decides on how to automatically wildcard block domains.
I use these as native URL Aliases but did previously have them being fetched from pfBlocker.
I would suggest trying the feed as a native alias via pfblocker as it gives more control when creating rules.
Cloudflare_v4 https://www.cloudflare.com/ips-v4
Cloudflare_v6 https://www.cloudflare.com/ips-v6
I reinstalled the pfBlockerNG package and the service is running now!
The ads are blocked on Chrome but not on Firefox. So I'm wondering if the ad blocking I'm seeing on Chrome is due to Ublock Origin rather than pfBlockerNG. I use the sites that pi-hole has for testing.
Those are two different lists. First list is "Steven Black's ad-hoc list" which is defined as "Additional sketch domains as I come across them". Second list is made up of adware + malware and is pulled together from many different sources. The list in the pfBlockerNG feed tab is under the Malicious section, so assume it's pointing to the correct location.
I also use NordVPN. You must be talking about Player TVN. For policy routing to Player, I ended up creating an IPv4 list based on "DE" GeoIP entry, since I noticed that Player streams were coming out of German AWS servers, and I got tired of adding individual IPs to make it work. I also have entries for Atman and Atende ASNs.
Can you create another alias in PfBlockerNG for use with firewall rules for Netflix, without the Amazon-02 ASN?
> 1. I can ping pfSense
I would still try doing a dns query to confirm. I have used an app like network analyzer to test. I would test a local domain and/or a domain you know is blocked to see what you get. On this app you can also see the system DNS, to confirm it is your pfsense is set, and there are no others.
I just assumed initially, but are you using DNSBL to block adds? And/or IP block lists?
I would also like to figure this out. The pfsense mullvad instructions are here: I would like to get pfblockerng to co-exist. I've tried different settings, all to no avail. I think it has something to do with the DHCP Server settings having Mullvad's specific DNS, whilst ignoring the pfblockerng dns of 10.10.10.1. I also want to maintain no DNS leaks.
Any help would be appreciated.
Maybe it is your dns settings. I don't think pfblocker can see the dns traffic if you are using the built in dns servers through the vpn tunnel. Try it with a separate dns server. I use dns over TLS (9.9.9.9) with pfblocker and then send non dns traffic through the Mullvad gateway and it all works.