OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • English Forums »
  • Intrusion Detection and Prevention »
  • FireHOL Block List ( Botnets, Attacks, Malware....)
« previous next »
  • Print
Pages: [1] 2 3 4

Author Topic: FireHOL Block List ( Botnets, Attacks, Malware....)  (Read 27030 times)

yeraycito

  • Full Member
  • ***
  • Posts: 207
  • Karma: 12
    • View Profile
FireHOL Block List ( Botnets, Attacks, Malware....)
« on: June 08, 2020, 06:46:36 pm »
A firewall blacklist composed from IP lists, providing maximum protection with minimum false positives. Suitable for basic protection on all internet facing servers, routers and firewalls.

Info:     https://iplists.firehol.org/

Example of characteristics:  Source File Date: Mon Jun  8 07:21:55 UTC 2020:      2575 subnets, 619564767 unique IPs

Installation in Opnsense:

1 - Firewall-Aliases-New:

2 - Name: FireHOL
     Type: URL Table (IPs)
     Expiration Days: 1
     Content:    https://raw.githubusercontent.com/ktsaou/blocklist-ipsets/master/firehol_level1.netset
     Description: FireHOL

3 - Save

4 - System-Settings-Cron-New:
     Create a job with the command Update and reload firewall aliases

5 - Create firewall rules in Wan and Lan
Logged

mimugmail

  • Hero Member
  • *****
  • Posts: 6336
  • Karma: 435
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #1 on: June 08, 2020, 07:55:59 pm »
I always advise level3 since level1 also includes private networks which would break setups if you have DMZ or similar.
Logged
Twitter: mimu_muc
WWW: www.routerperformance.net
Support plans: https://www.max-it.de/en/it-services/opnsense/
Commercial Plugins (German): https://opnsense.max-it.de/

hushcoden

  • Sr. Member
  • ****
  • Posts: 395
  • Karma: 17
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #2 on: June 08, 2020, 09:28:55 pm »
Quote from: yeraycito on June 08, 2020, 06:46:36 pm
5 - Create firewall rules in Wan and Lan

Do you mind to provide a dumb-proof guide on this?
Logged

hushcoden

  • Sr. Member
  • ****
  • Posts: 395
  • Karma: 17
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #3 on: June 08, 2020, 11:14:22 pm »
Expiration Days: 1  --> with this you shouldn't need a cron job, is that right ?
Logged

mimugmail

  • Hero Member
  • *****
  • Posts: 6336
  • Karma: 435
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #4 on: June 09, 2020, 07:25:00 am »
Quote from: hushcoden on June 08, 2020, 11:14:22 pm
Expiration Days: 1  --> with this you shouldn't need a cron job, is that right ?

No, Alias module will take care of it.
Logged
Twitter: mimu_muc
WWW: www.routerperformance.net
Support plans: https://www.max-it.de/en/it-services/opnsense/
Commercial Plugins (German): https://opnsense.max-it.de/

mimugmail

  • Hero Member
  • *****
  • Posts: 6336
  • Karma: 435
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #5 on: June 09, 2020, 07:26:25 am »
Quote from: hushcoden on June 08, 2020, 11:14:22 pm
Expiration Days: 1  --> with this you shouldn't need a cron job, is that right ?

On LAN you create a rule with protocol any, source LAN, destination you FireHOL alias and condition drop. On WAN the same rule but source is your Alias and destination ANY (to match port forward and connections to firewall itself)
Logged
Twitter: mimu_muc
WWW: www.routerperformance.net
Support plans: https://www.max-it.de/en/it-services/opnsense/
Commercial Plugins (German): https://opnsense.max-it.de/

hushcoden

  • Sr. Member
  • ****
  • Posts: 395
  • Karma: 17
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #6 on: June 09, 2020, 10:34:56 am »
Quote from: mimugmail on June 09, 2020, 07:25:00 am
Quote from: hushcoden on June 08, 2020, 11:14:22 pm
Expiration Days: 1  --> with this you shouldn't need a cron job, is that right ?

No, Alias module will take care of it.
Right, so it's yes: I said you don't need a cron job as Alias will do the update...
Logged

hushcoden

  • Sr. Member
  • ****
  • Posts: 395
  • Karma: 17
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #7 on: June 09, 2020, 10:39:45 am »
Quote from: mimugmail on June 09, 2020, 07:26:25 am
Quote from: hushcoden on June 08, 2020, 11:14:22 pm
Expiration Days: 1  --> with this you shouldn't need a cron job, is that right ?

On LAN you create a rule with protocol any, source LAN, destination you FireHOL alias and condition drop. On WAN the same rule but source is your Alias and destination ANY (to match port forward and connections to firewall itself)
That's great thanks: there is no 'drop' in the drop-down menu, I can chose between 'block' or 'reject', which one is the best approach?

Also, as for the LAN rule, do I have to chose 'LAN' in the interface section only or for both interface and source ?
Tia.
« Last Edit: June 09, 2020, 10:48:14 am by hushcoden »
Logged

yeraycito

  • Full Member
  • ***
  • Posts: 207
  • Karma: 12
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #8 on: June 09, 2020, 03:30:24 pm »
Quote from: mimugmail on June 09, 2020, 07:25:00 am
Quote from: hushcoden on June 08, 2020, 11:14:22 pm
Expiration Days: 1  --> with this you shouldn't need a cron job, is that right ?

No, Alias module will take care of it.

I'm confused about this. Is that really how it works? For example: https://forum.opnsense.org/index.php?topic=15483.0
In this post they do say that you have to create a job. And if you don't have to create it to exist in System - Settings - Cron a call section Update and reload aliases?
Logged

yeraycito

  • Full Member
  • ***
  • Posts: 207
  • Karma: 12
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #9 on: June 09, 2020, 04:39:59 pm »
FireHol Level2 List ( other than the one mentioned above: Level1 ):

An ipset made from blocklists that track attacks, during about the last 48 hours. (includes: blocklist_de dshield_1d greensnow)

Info: https://iplists.firehol.org/?ipset=firehol_level2

Installation in Opnsense:

1 - Firewall-Aliases-New:

2 - Name: FireHOL2
     Type: URL Table (IPs)
     Expiration Days: 1
     Content:    https://raw.githubusercontent.com/ktsaou/blocklist-ipsets/master/firehol_level2.netset
     Description: FireHOL2

3 - Save

4 - System-Settings-Cron-New:
     Create a job with the command Update and reload firewall aliases

5 - Create firewall rules in Wan and Lan
« Last Edit: June 09, 2020, 05:05:13 pm by yeraycito »
Logged

mimugmail

  • Hero Member
  • *****
  • Posts: 6336
  • Karma: 435
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #10 on: June 09, 2020, 04:54:15 pm »
Quote from: yeraycito on June 09, 2020, 03:30:24 pm
Quote from: mimugmail on June 09, 2020, 07:25:00 am
Quote from: hushcoden on June 08, 2020, 11:14:22 pm
Expiration Days: 1  --> with this you shouldn't need a cron job, is that right ?

No, Alias module will take care of it.

I'm confused about this. Is that really how it works? For example: https://forum.opnsense.org/index.php?topic=15483.0
In this post they do say that you have to create a job. And if you don't have to create it to exist in System - Settings - Cron a call section Update and reload aliases?

For me it sounds the guy wants to refresh the alias for other reason, if you want to use url table there's no cron required.
Logged
Twitter: mimu_muc
WWW: www.routerperformance.net
Support plans: https://www.max-it.de/en/it-services/opnsense/
Commercial Plugins (German): https://opnsense.max-it.de/

yeraycito

  • Full Member
  • ***
  • Posts: 207
  • Karma: 12
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #11 on: June 09, 2020, 05:04:33 pm »
FireHol Level3 List ( other than the one mentioned above: Level1, Level2 ):

An ipset made from blocklists that track attacks, spyware, viruses. It includes IPs than have been reported or detected in the last 30 days. (includes: bruteforceblocker ciarmy dshield_30d dshield_top_1000 malc0de maxmind_proxy_fraud myip shunlist snort_ipfilter sslbl_aggressive talosintel_ipfilter zeus vxvault)

Info: https://iplists.firehol.org/?ipset=firehol_level3

Installation in Opnsense:

1 - Firewall-Aliases-New:

2 - Name: FireHOL3
     Type: URL Table (IPs)
     Expiration Days: 1
     Content:    https://raw.githubusercontent.com/ktsaou/blocklist-ipsets/master/firehol_level3.netset
     Description: FireHOL3

3 - Save

4 - System-Settings-Cron-New:
     Create a job with the command Update and reload firewall aliases

5 - Create firewall rules in Wan and Lan
Logged

hushcoden

  • Sr. Member
  • ****
  • Posts: 395
  • Karma: 17
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #12 on: June 09, 2020, 05:33:29 pm »
thanks @yeraycito, that's very handy...

Are the IPs in the level2 and level3 lists already included in the Level1 list ?
Logged

yeraycito

  • Full Member
  • ***
  • Posts: 207
  • Karma: 12
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #13 on: June 09, 2020, 05:36:30 pm »
Quote from: hushcoden on June 09, 2020, 05:33:29 pm
thanks @yeraycito, that's very handy...

Are the IPs in the level2 and level3 lists already included in the Level1 list ?

They seem to include some common components but not all.
Logged

yeraycito

  • Full Member
  • ***
  • Posts: 207
  • Karma: 12
    • View Profile
Re: FireHOL Block List ( Botnets, Attacks, Malware....)
« Reply #14 on: June 09, 2020, 05:37:35 pm »
More information and many more lists ( use carefully ) here:

https://github.com/firehol/blocklist-ipsets
Logged

  • Print
Pages: [1] 2 3 4
« previous next »
  • OPNsense Forum »
  • English Forums »
  • Intrusion Detection and Prevention »
  • FireHOL Block List ( Botnets, Attacks, Malware....)
 

OPNsense is an OSS project © Deciso B.V. 2015 - 2023 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2