OPNsense Forum

English Forums => Q-Feeds (Threat intelligence) => Topic started by: vpx23 on January 31, 2026, 04:07:52 PM

Title: Q-Feeds blocks the Tor Browser
Post by: vpx23 on January 31, 2026, 04:07:52 PM
Obviously the Q-Feeds IP blacklist blocks IPs that belong to the Tor network, therefore a connection is not possible.

Only if you enable the obfs4/Snowflake/meek bridge you can connect again with the Tor Browser. Which is much slower than a normal connection.

Maybe an option "Don't block TOR IPs" would be possible in the options, although it's probably hard to differentiate those IPs from other ones.
Title: Re: Q-Feeds blocks the Tor Browser
Post by: Q-Feeds on January 31, 2026, 07:47:19 PM
Thank you very much for bringing this to our attention. We will investigate the options.

Kind Regards,

Stefan
Title: Re: Q-Feeds blocks the Tor Browser
Post by: Patrick M. Hausen on January 31, 2026, 09:45:22 PM
@vpx23 have you considered using firewall based block lists only for inbound connections? It's what I do.
Title: Re: Q-Feeds blocks the Tor Browser
Post by: Q-Feeds on January 31, 2026, 11:12:34 PM
Another solution could be to add a whitelist rule with an alias with all the TOR nodes.
Title: Re: Q-Feeds blocks the Tor Browser
Post by: vpx23 on February 02, 2026, 07:36:05 PM
@Patrick M. Hausen I would feel less safe, if I get compromised e.g. by a RAT the outbound list could potentially block the connection to its C&C server.

@Q-Feeds thanks for the tip, I now added the full list from here https://www.dan.me.uk/tornodes as a firewall rule using an "URL Table (IPs)" alias as a whitelist.