• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - Firewall
Tag:

Firewall

Tech

Open-source IPFire DNS Firewall blocks malware and phishing at the resolver

by Chief Editor April 28, 2026
written by Chief Editor

The Evolution of Network Defense: Moving Toward DNS-Layer Security

For years, network administrators have relied on a combination of heavy-duty proxies and external “sinkholes” to keep unwanted traffic at bay. Although, the landscape is shifting. The recent integration of DNS-layer domain blocking directly into the firewall—as seen in the latest IPFire Core Update 201—signals a broader trend: the move toward lightweight, invisible, and highly efficient security at the resolver level.

Unlike traditional URL filters that often require complex HTTPS inspection and certificate handling, DNS-layer blocking operates by intercepting the request before a connection is even attempted. When a client requests a domain flagged as malicious, the system returns an NXDOMAIN response. This effectively tells the client that the domain does not exist, ensuring that no connection is established and no sensitive data leaves the network.

Did you know? An NXDOMAIN (Non-Existent Domain) response is one of the most efficient ways to block threats because it stops the attack at the “phonebook” stage of the internet, preventing the device from ever reaching out to the malicious server.

The Decline of Heavy Proxy Dependencies

The industry is moving away from the “middleman” approach to filtering. Traditional URL filters often depend on proxy setups that can introduce latency and break encrypted traffic. By handling blocklist enforcement directly inside the firewall’s DNS proxy, the need for client-side configuration and HTTPS inspection is eliminated.

The Decline of Heavy Proxy Dependencies
Firewall Solving the Bandwidth Bottleneck Threat Intelligence One

This transition simplifies the architecture for the end-user. Instead of managing a separate device—such as an external Pi-hole deployment—operators can now consolidate their security stack. This reduction in complexity not only improves performance but as well reduces the number of potential failure points in a home or business network.

Solving the Bandwidth Bottleneck in Threat Intelligence

One of the biggest hurdles in maintaining real-time security is the size of the blocklists. As the number of phishing and malware domains grows, the data required to keep a firewall updated can turn into massive. For users on limited cellular connections or in regions with expensive data, downloading gigabytes of updates is simply not sustainable.

View this post on Instagram about Solving the Bandwidth Bottleneck, Threat Intelligence One
From Instagram — related to Solving the Bandwidth Bottleneck, Threat Intelligence One

The solution lies in Incremental Zone Transfers (IXFR), defined in RFC 1995. Rather than downloading a full list every time a change occurs, IXFR allows the firewall to download only the specific changes between versions. According to Michael Tremer, IPFire’s lead developer, this is crucial because full downloads of malware and phishing lists can reach roughly 100 MiB per update.

This shift toward incremental updates is a critical trend for the “edge” of the internet. As more devices move to the network perimeter, the ability to push updates every five minutes without saturating the connection is what allows security teams to combat the short lifespan of phishing sites, which may only remain active for a few hours.

Pro Tip: If you are migrating from a separate Pi-hole or an older URL Filter, remember that custom block and allow lists do not transfer automatically. Use the web UI to copy and paste your domains directly into the new DNS Firewall interface to maintain your custom security posture.

Hardening the Attack Surface: The “Less is More” Philosophy

Modern security is not just about adding new features; We see about removing unnecessary ones. A growing trend in open-source distributions is the aggressive pruning of unused packages to reduce the “attack surface”—the total number of points where an attacker could potentially find a vulnerability.

Infoblox DNS Firewall: Understanding APT Malware

We are seeing this in practice with the removal of non-essential components. For example, the removal of Rust packages no longer required by the distribution and the dropping of the 7zip add-on (due to a lack of upstream maintenance) are strategic moves. By cutting build overhead and removing unmaintained code, developers can ensure a leaner, more secure environment.

This philosophy extends to the toolchain itself. Updating to the latest versions of core components—such as glibc 2.43, OpenSSL 3.6.1, and OpenVPN 2.6.19—ensures that the firewall is leveraging the most recent security patches and performance optimizations.

The Future of Automated Reporting and IDS

As network environments grow more complex, the way we handle security alerts must also evolve. The move toward customizable recipient configurations for Intrusion Prevention System (IPS) reports—splitting daily, weekly, and monthly cadences—reflects a need for better organizational routing.

In the future, we can expect these reports to become even more granular, potentially integrating with AI-driven analysis to separate “noise” from actual threats, ensuring that the people responsible for review intervals are not overwhelmed by false positives.

Frequently Asked Questions

What is DNS-layer domain blocking?
It is a security method that checks DNS queries against a blocklist before a connection is made. If a domain is listed as malicious, the firewall returns an NXDOMAIN response, preventing the device from connecting to the site.

Do I still need a Pi-hole if my firewall has a DNS Firewall?
While Pi-hole is a powerful tool, integrated DNS firewalls provide similar functionality (blocking malware, phishing, and ads) without the need for additional hardware or complex configuration.

What is IXFR and why does it matter?
IXFR stands for Incremental Zone Transfer. It allows a system to download only the changes to a blocklist rather than the entire file, which significantly saves bandwidth and allows for more frequent updates.

Does the DNS Firewall require HTTPS inspection?
No. Because it operates at the DNS level, it does not need to inspect encrypted HTTPS traffic or handle certificates, making it more privacy-friendly and easier to deploy.


Are you upgrading your home or business firewall this year? We wish to hear about your setup. Do you prefer a consolidated firewall approach, or do you still rely on separate hardware for DNS sinkholing? Let us know in the comments below or subscribe to our newsletter for more deep dives into open-source security.

April 28, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Uncover the Limits: macOS 15.3 and the New Firewall Restrictions on Complete Network Traffic Blockage

by Chief Editor February 10, 2025
written by Chief Editor

Apple’s macOS 15.3 Updates: Implications for Network Security Tools

Apple’s continuous updates to its macOS 15 Sequoia have introduced significant changes to the network stack, notably affecting third-party network tools’ functionality. After the rollout of version 15.3, tools have encountered challenges in monitoring ICMP traffic—an essential component for network diagnostics. Apple’s updates have inadvertently made it impossible for these tools to capture and block ICMP packets, raising alarms within the security community.

Impact on Diverse Firewalls

This issue transcends Little Snitch, impacting all firewall solutions leveraging Apple’s Network-Content-Filter interface. Developer feedback suggests that Apple is already aware of these challenges and hopes to address them as a software bug rather than an intentional change. If not promptly corrected, this could hinder the efficacy of firewalls designed to protect against a variety of network threats.

The Evolution of Apple’s Network-Extension Interface

In recent history, similar inconsistencies emerged with the introduction of Apple’s Network-Extension-Schnittstelle in macOS 11, which led to Third-party firewalls losing ability to oversee certain traffic. Such updates demonstrate Apple’s shift towards system extensions in Userspace, affecting the control and monitoring depth previously available to third-party developers. A further recent bug in macOS 15.3 has made it challenging to delete certain tools like Little Snitch without utilizing developer-provided workarounds, pointing to ongoing adjustments in Apple’s ecosystem.

Such changes not only require ongoing company responses but also alert network security professionals to remain adaptive and prepared for similar unpredictability in the future.

Understanding the Broader Context

While Apple often cites increased security and system control as primary motives for suas updates, these adjustments sometimes introduce new challenges for third-party security solutions. The evolution of Apple’s APIs continues to present both opportunities and roadblocks. This ongoing development cycle necessitates a proactive approach from security vendors to keep up with the latest changes and maintain their tools’ effectiveness.

Real-Life Challenges and Solutions

The ramifications of these macOS updates are not abstract; they reflect in how companies manage network security protocols. Businesses relying heavily on Apple’s infrastructure within their IT environments must stay vigilant and adaptable to newly introduced bugs, ensuring proper network traffic monitoring is maintained.

For instance, organizations using third-party firewalls may need to conduct fresh assessments following a major OS update. Regular testing can help identify potential vulnerabilities arising from updated network stacks, allowing for swift application of vendor-provided solutions or workarounds until more permanent fixes are released by Apple.

FAQ

What does ICMP traffic monitoring entail? ICMP (Internet Control Message Protocol) is crucial for diagnostic functions such as ping and traceroute commands which assess network connectivity and path tracing.

How can third-party developers adapt to Apple’s evolving interfaces? Developers should establish a close line of communication with Apple, proactively engage in public beta programs, and maintain a flexible approach in designing adaptable APIs.

Pro Tips for Navigating Apple’s Network-Extension Updates

Did you know? Apple frequently updates its guidelines for third-party developers on their official platforms, which can provide forward-thinking strategies to anticipate and adapt to changes.

Looking Forward: Trends in Network Security for Apple’s Ecosystem

Network security professionals must anticipate and adapt to Apple’s ongoing system updates. Predicting trends such as more enhanced Userspace extensions and streamlined API access can guide future-ready security strategies. Ultimately, understanding these evolutionary steps can ensure robust continuity of network monitoring and defensive capabilities within corporate IT infrastructures.

Conclusion and Call-to-Action

As Apple’s macOS continues its evolution, staying informed and responsive is crucial for those overseeing network security within its ecosystem. Readers interested in keeping pace with these changes may benefit from subscribing to updates on security protocols or engaging in forums discussing Apple’s software development trends. We invite our readers to share their experiences and strategies in adapting to these updates in the comments below.

February 10, 2025 0 comments
0 FacebookTwitterPinterestEmail

Recent Posts

  • David Guelle Retires from Pro Volleyball as Royan Eyes Ligue A Promotion

    May 2, 2026
  • Xbox Free Play Days: 4 Free Games Including Dragon Ball FighterZ

    May 2, 2026
  • Court blocks mailing prescriptions of abortion pill mifepristone

    May 2, 2026
  • Charlie McAvoy Ejected After Slash in Bruins’ Elimination Loss

    May 2, 2026
  • Weight loss drugs significantly cut heart risk, major study finds

    May 2, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World