From: Michael Tremer <michael.tremer@ipfire.org>
To: Adam Gibbons <adam.gibbons@ipfire.org>
Cc: development@lists.ipfire.org
Subject: Re: Let's launch our own blocklists...
Date: Sun, 25 Jan 2026 14:42:37 +0000 [thread overview]
Message-ID: <F364C265-FFEA-41EC-9F3B-7D6F09D0E851@ipfire.org> (raw)
In-Reply-To: <04b9ec03c6898d165e05f7bfc821c0b6@ipfire.org>
Hello Adam,
> On 23 Jan 2026, at 19:31, Adam Gibbons <adam.gibbons@ipfire.org> wrote:
>
> On 22/01/2026 11:33 am, Michael Tremer wrote:
>> Hello everyone,
>
> Hi Michael and Everyone,
>
>> Over the past few weeks I have made significant progress on this all, and I think we're getting close to something the community will be really happy with. I'd love to get feedback from the team before we finalise things.
>
> I've been keeping an eye on the development of IPFire DBL (RIP DNSBL) since the beginning and I agree the community should be very happy with it.
>
> Having our own trusted, properly maintained blocklists that fit nicely into IPFire (and the wider adblock/domain-blocking ecosystem) makes IPFire a more complete UTM solution while expanding the IPFire brand.
>
> I think we can make IPFire DBL a trusted alternative to the random lists hosted on the internet these days. Even the small things like DNSSEC by default, removing dead domains,and being able to track additions/removals over time will help build trust.
>
> With the help of the community we can further refine the lists and make IPFire DBL something that attracts attention to the project as a whole.
Well said.
>
>> I have added a couple more lists that I thought interesting and I have added a couple more sources that I considered a good start. Hopefully, we will soon gather some more feedback on how well this is all holding up. My main focus has however been on the technology that will power this project.
>
> I've been using several of the lists for a few weeks now and the number of false-positives has been minimal for my use-case. It has even passed the dreaded "wife test", so I think this is ready for wider testing.
The “wife test” is particularly important for this :)
>> One of the bigger challenges was to create Suricata rules from the lists. Initially I tried to create a ton of rules but since our lists are so large, this quickly became too complicated. I have now settled on using a feature that is only available in more recent versions of Suricata (I believe 7 and later), but since we are already on Suricata 8 in IPFire this won't be a problem for us. All domains for each list are basically compiled into one massively large dataset and one single rule is referring to that dataset. This way, we won't have the option to remove any false-positives, but at least Suricata and the GUI won't starve a really bad death when loading millions of rules.
>
> Yes, the IPFire DBL rules in IPS currently block all domains on the list without the ability to de-select false-positives. Luckily the reporting feature is very easy to use.
>
> As mentioned previously, domain blocking in Suricata isn't intended to be the optimal way to handle DNS blocking because connections are dropped rather than returning a DNS response such as NXDOMAIN, so it's best used as a policy backstop.
>
> For scenarios like schools using the "violence" list this will be perfect, though it might make some websites look/act unusual if the "advertising" list is used. But every scenario is different.
>
> We see similar effects when people enable the "emerging-dns.rule" ruleset where the ".cc" TLD is blocked by default. Quite often because of the way it's dropped, it's sometimes difficult to diagnose because of the unusual UX. It pops up on the forum occasionally.
You can still have Suricata block the other protocols and disable the DNS rule in each of the categories. That way, you won’t have this problem.
>> Looking ahead, I would like us to start thinking about the RPZ feature that has been on the wishlist. IPFire DBL has been a bigger piece of work, and I think it's worth having a conversation about sustainability. Resources for this need to be allocated and paid for. Open source is about freedom, not free beer — and to keep building features like this, we will need to explore some funding options. I would be interested to hear any ideas you might have that could work for IPFire.
>
> The community has been seeking a solution like this for some time now. It's great to see the start of what it will end up being. With community support, both funding and false-positive reporting, this can go a long way.
True. I am awaiting their test feedback on this so that we can move forward soon.
> Thank you for the work towards this, Michael.
Pleasure.
> Regards,
> Adam
>
next prev parent reply other threads:[~2026-01-25 14:42 UTC|newest]
Thread overview: 26+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-12-29 12:05 Michael Tremer
2025-12-30 14:05 ` Adolf Belka
2025-12-30 15:49 ` Re[2]: " Jon Murphy
2026-01-02 11:13 ` Michael Tremer
2026-01-02 11:09 ` Michael Tremer
2026-01-02 13:02 ` Adolf Belka
2026-01-05 11:11 ` Adolf Belka
2026-01-05 11:31 ` Adolf Belka
2026-01-05 11:48 ` Michael Tremer
2026-01-06 10:20 ` Michael Tremer
2026-01-22 11:33 ` Michael Tremer
2026-01-23 15:02 ` Matthias Fischer
2026-01-23 16:39 ` Michael Tremer
2026-01-23 18:05 ` Matthias Fischer
2026-01-24 23:41 ` Matthias Fischer
2026-01-25 14:40 ` Michael Tremer
2026-01-25 17:50 ` Matthias Fischer
2026-01-26 17:18 ` Michael Tremer
2026-01-28 16:25 ` Matthias Fischer
2026-01-28 16:33 ` Matthias Fischer
2026-01-28 16:59 ` Michael Tremer
2026-01-28 20:25 ` Matthias Fischer
2026-01-29 18:20 ` Michael Tremer
2026-01-23 19:31 ` Adam Gibbons
2026-01-25 14:42 ` Michael Tremer [this message]
2025-12-30 15:52 Re[2]: " Jon Murphy
2026-01-02 11:14 ` Michael Tremer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=F364C265-FFEA-41EC-9F3B-7D6F09D0E851@ipfire.org \
--to=michael.tremer@ipfire.org \
--cc=adam.gibbons@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox