[2.8.1-RELEASE][root@host.domain.tld]/root: pfSense-repoc -ND OS: FreeBSD OS Version: 15.0-CURRENT Platform: amd64 Product: pfSense Version: 2.8.1-RELEASE FS type: zfs Language: en_US Model: unknown hardware NDI: someID Package prefix: pfSense-pkg- Serial: (null) Repo path: /usr/local/etc/pfSense Request query: {"platform":"unknown hardware","os":"FreeBSD","osver":"15.0-CURRENT","prod":"pfSense","ver":"2.8.1-RELEASE","ed":"Community","fstype":"zfs","pkgs":"[{\"name\":\"nut\",\"ver\":\"2.8.2_5\"},{\"name\":\"Cron\",\"ver\":\"0.3.8_6\"},{\"name\":\"acme\",\"ver\":\"1.0\"},{\"name\":\"bind\",\"ver\":\"9.20_1\"},{\"name\":\"nmap\",\"ver\":\"1.4.4_8\"},{\"name\":\"sudo\",\"ver\":\"0.3_10\"},{\"name\":\"tinc\",\"ver\":\"1.0.35_7\"},{\"name\":\"zeek\",\"ver\":\"3.0.6_6\"},{\"name\":\"Avahi\",\"ver\":\"2.2_7\"},{\"name\":\"Filer\",\"ver\":\"0.60.6_9\"},{\"name\":\"LADVD\",\"ver\":\"1.2.2_5\"},{\"name\":\"Notes\",\"ver\":\"0.2.9_5\"},{\"name\":\"iperf\",\"ver\":\"3.0.5\"},{\"name\":\"lldpd\",\"ver\":\"0.9.11_3\"},{\"name\":\"snort\",\"ver\":\"4.1.6_26\"},{\"name\":\"squid\",\"ver\":\"0.5.3\"},{\"name\":\"tftpd\",\"ver\":\"0.1.3_6\"},{\"name\":\"Backup\",\"ver\":\"0.6.3\"},{\"name\":\"arping\",\"ver\":\"1.2.2_6\"},{\"name\":\"ntopng\",\"ver\":\"6.2.0\"},{\"name\":\"snmptt\",\"ver\":\"1.0.0_2\"},{\"name\":\"haproxy\",\"ver\":\"0.63_11\"},{\"name\":\"siproxd\",\"ver\":\"1.1.4_2\"},{\"name\":\"stunnel\",\"ver\":\"5.50_13\"},{\"name\":\"Shellcmd\",\"ver\":\"1.0.5_4\"},{\"name\":\"Telegraf\",\"ver\":\"0.9_8\"},{\"name\":\"arpwatch\",\"ver\":\"0.2.3\"},{\"name\":\"cellular\",\"ver\":\"1.2.4\"},{\"name\":\"darkstat\",\"ver\":\"3.1.4\"},{\"name\":\"net-snmp\",\"ver\":\"0.1.5_13\"},{\"name\":\"Tailscale\",\"ver\":\"0.1.8\"},{\"name\":\"WireGuard\",\"ver\":\"0.2.9_5\"},{\"name\":\"mtr-nox11\",\"ver\":\"0.85.6_5\"},{\"name\":\"softflowd\",\"ver\":\"1.2.6_2\"},{\"name\":\"Lightsquid\",\"ver\":\"3.0.7_5\"},{\"name\":\"bandwidthd\",\"ver\":\"0.7.7\"},{\"name\":\"mailreport\",\"ver\":\"3.6.4_5\"},{\"name\":\"squidGuard\",\"ver\":\"1.16.23\"},{\"name\":\"RRD_Summary\",\"ver\":\"2.2\"},{\"name\":\"freeradius3\",\"ver\":\"0.15.14\"},{\"name\":\"mDNS-Bridge\",\"ver\":\"1.0\"},{\"name\":\"pfBlockerNG\",\"ver\":\"3.2.8\"},{\"name\":\"System_Patches\",\"ver\":\"2.2.23\"},{\"name\":\"FTP_Client_Proxy\",\"ver\":\"0.3_9\"},{\"name\":\"Service_Watchdog\",\"ver\":\"1.8.7_4\"},{\"name\":\"udpbroadcastrelay\",\"ver\":\"1.2.4\"},{\"name\":\"Status_Traffic_Totals\",\"ver\":\"2.3.3\"},{\"name\":\"openvpn-client-export\",\"ver\":\"1.9.5\"}]"} POST data: uid=5d2361411dea4fa02470&language=en_US&serial=&version=%7B%22platform%22%3A%22unknown+hardware%22%2C%22os%22%3A%22FreeBSD%22%2C%22osver%22%3A%2215.0-CURRENT%22%2C%22prod%22%3A%22pfSense%22%2C%22ver%22%3A%222.8.1-RELEASE%22%2C%22ed%22%3A%22Community%22%2C%22fstype%22%3A%22zfs%22%2C%22pkgs%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22nut%5C%22%2C%5C%22ver%5C%22%3A%5C%222.8.2_5%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22Cron%5C%22%2C%5C%22ver%5C%22%3A%5C%220.3.8_6%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22acme%5C%22%2C%5C%22ver%5C%22%3A%5C%221.0%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22bind%5C%22%2C%5C%22ver%5C%22%3A%5C%229.20_1%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22nmap%5C%22%2C%5C%22ver%5C%22%3A%5C%221.4.4_8%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22sudo%5C%22%2C%5C%22ver%5C%22%3A%5C%220.3_10%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22tinc%5C%22%2C%5C%22ver%5C%22%3A%5C%221.0.35_7%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22zeek%5C%22%2C%5C%22ver%5C%22%3A%5C%223.0.6_6%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22Avahi%5C%22%2C%5C%22ver%5C%22%3A%5C%222.2_7%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22Filer%5C%22%2C%5C%22ver%5C%22%3A%5C%220.60.6_9%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22LADVD%5C%22%2C%5C%22ver%5C%22%3A%5C%221.2.2_5%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22Notes%5C%22%2C%5C%22ver%5C%22%3A%5C%220.2.9_5%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22iperf%5C%22%2C%5C%22ver%5C%22%3A%5C%223.0.5%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22lldpd%5C%22%2C%5C%22ver%5C%22%3A%5C%220.9.11_3%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22snort%5C%22%2C%5C%22ver%5C%22%3A%5C%224.1.6_26%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22squid%5C%22%2C%5C%22ver%5C%22%3A%5C%220.5.3%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22tftpd%5C%22%2C%5C%22ver%5C%22%3A%5C%220.1.3_6%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22Backup%5C%22%2C%5C%22ver%5C%22%3A%5C%220.6.3%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22arping%5C%22%2C%5C%22ver%5C%22%3A%5C%221.2.2_6%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22ntopng%5C%22%2C%5C%22ver%5C%22%3A%5C%226.2.0%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22snmptt%5C%22%2C%5C%22ver%5C%22%3A%5C%221.0.0_2%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22haproxy%5C%22%2C%5C%22ver%5C%22%3A%5C%220.63_11%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22siproxd%5C%22%2C%5C%22ver%5C%22%3A%5C%221.1.4_2%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22stunnel%5C%22%2C%5C%22ver%5C%22%3A%5C%225.50_13%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22Shellcmd%5C%22%2C%5C%22ver%5C%22%3A%5C%221.0.5_4%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22Telegraf%5C%22%2C%5C%22ver%5C%22%3A%5C%220.9_8%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22arpwatch%5C%22%2C%5C%22ver%5C%22%3A%5C%220.2.3%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22cellular%5C%22%2C%5C%22ver%5C%22%3A%5C%221.2.4%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22darkstat%5C%22%2C%5C%22ver%5C%22%3A%5C%223.1.4%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22net-snmp%5C%22%2C%5C%22ver%5C%22%3A%5C%220.1.5_13%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22Tailscale%5C%22%2C%5C%22ver%5C%22%3A%5C%220.1.8%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22WireGuard%5C%22%2C%5C%22ver%5C%22%3A%5C%220.2.9_5%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22mtr-nox11%5C%22%2C%5C%22ver%5C%22%3A%5C%220.85.6_5%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22softflowd%5C%22%2C%5C%22ver%5C%22%3A%5C%221.2.6_2%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22Lightsquid%5C%22%2C%5C%22ver%5C%22%3A%5C%223.0.7_5%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22bandwidthd%5C%22%2C%5C%22ver%5C%22%3A%5C%220.7.7%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22mailreport%5C%22%2C%5C%22ver%5C%22%3A%5C%223.6.4_5%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22squidGuard%5C%22%2C%5C%22ver%5C%22%3A%5C%221.16.23%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22RRD_Summary%5C%22%2C%5C%22ver%5C%22%3A%5C%222.2%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22freeradius3%5C%22%2C%5C%22ver%5C%22%3A%5C%220.15.14%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22mDNS-Bridge%5C%22%2C%5C%22ver%5C%22%3A%5C%221.0%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22pfBlockerNG%5C%22%2C%5C%22ver%5C%22%3A%5C%223.2.8%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22System_Patches%5C%22%2C%5C%22ver%5C%22%3A%5C%222.2.23%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22FTP_Client_Proxy%5C%22%2C%5C%22ver%5C%22%3A%5C%220.3_9%5&arch=amd64 pfSense-repoc: failed to fetch the repo data failed to read the repo data. [2.8.1-RELEASE][root@host.domain.tld]/root: pkg -d update DBG(1)[60498]> pkg initialized Updating pfSense-core repository catalogue... DBG(1)[60498]> PkgRepo: verifying update for pfSense-core DBG(1)[60498]> Pkgrepo, begin update of '/var/db/pkg/repos/pfSense-core/db' DBG(1)[60498]> Request to fetch pkg+https://pkg.pfsense.org/pfSense_v2_8_1_amd64-core/meta.conf DBG(1)[60498]> curl_open DBG(1)[60498]> Fetch: fetcher used: pkg+https DBG(1)[60498]> curl> fetching https://pkg.pfsense.org/pfSense_v2_8_1_amd64-core/meta.conf DBG(1)[60498]> CURL> attempting to fetch from , left retry 3 * Couldn't find host pkg00-atx.netgate.com in the .netrc file; using defaults * Host pkg00-atx.netgate.com:443 was resolved. * IPv6: 2610:160:11:18::207 * IPv4: 208.123.73.207 * Trying 208.123.73.207:443... * Connected to pkg00-atx.netgate.com (208.123.73.207) port 443 * ALPN: curl offers http/1.1 * CAfile: none * CApath: /etc/ssl/certs/ * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 / X25519 / RSASSA-PSS * ALPN: server accepted http/1.1 * Server certificate: * subject: CN=*.netgate.com * start date: Apr 10 00:00:00 2025 GMT * expire date: May 11 23:59:59 2026 GMT * subjectAltName: host "pkg00-atx.netgate.com" matched cert's "*.netgate.com" * issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA * SSL certificate verify ok. * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha384WithRSAEncryption * Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha384WithRSAEncryption * using HTTP/1.x > GET /pfSense_v2_8_1_amd64-core/meta.conf HTTP/1.1 Host: pkg00-atx.netgate.com User-Agent: pkg/1.21.3 Accept: */* If-Modified-Since: Thu, 28 Aug 2025 16:50:33 GMT * Request completely sent off < HTTP/1.1 200 OK Fetching meta.conf: 0%< Server: nginx < Date: Sat, 20 Sep 2025 13:06:33 GMT < Content-Type: application/octet-stream < Content-Length: 179 < Last-Modified: Thu, 28 Aug 2025 16:50:33 GMT < Connection: keep-alive < ETag: "68b088d9-b3" < Strict-Transport-Security: max-age=31536000; preload < X-Content-Type-Options: nosniff < X-XSS-Protection: 1; mode=block < X-Robots-Tag: all < X-Download-Options: noopen < X-Permitted-Cross-Domain-Policies: none < Accept-Ranges: bytes < * The requested document is not new enough * Simulate an HTTP 304 response * Closing connection DBG(1)[60498]> Request to fetch pkg+https://pkg.pfsense.org/pfSense_v2_8_1_amd64-core/data.pkg DBG(1)[60498]> curl_open DBG(1)[60498]> Fetch: fetcher used: pkg+https DBG(1)[60498]> curl> fetching https://pkg.pfsense.org/pfSense_v2_8_1_amd64-core/data.pkg DBG(1)[60498]> CURL> attempting to fetch from , left retry 3 * Couldn't find host pkg00-atx.netgate.com in the .netrc file; using defaults * Hostname pkg00-atx.netgate.com was found in DNS cache * Trying 208.123.73.207:443... * Connected to pkg00-atx.netgate.com (208.123.73.207) port 443 * ALPN: curl offers http/1.1 * CAfile: none * CApath: /etc/ssl/certs/ * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 / X25519 / RSASSA-PSS * ALPN: server accepted http/1.1 * Server certificate: * subject: CN=*.netgate.com * start date: Apr 10 00:00:00 2025 GMT * expire date: May 11 23:59:59 2026 GMT * subjectAltName: host "pkg00-atx.netgate.com" matched cert's "*.netgate.com" * issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA * SSL certificate verify ok. * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha384WithRSAEncryption * Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha384WithRSAEncryption * using HTTP/1.x > GET /pfSense_v2_8_1_amd64-core/data.pkg HTTP/1.1 Host: pkg00-atx.netgate.com User-Agent: pkg/1.21.3 Accept: */* If-Modified-Since: Thu, 28 Aug 2025 16:50:33 GMT * Request completely sent off < HTTP/1.1 200 OK Fetching data.pkg: 0%< Server: nginx < Date: Sat, 20 Sep 2025 13:06:33 GMT < Content-Type: application/octet-stream < Content-Length: 1632 < Last-Modified: Thu, 28 Aug 2025 16:50:33 GMT < Connection: keep-alive < ETag: "68b088d9-660" < Strict-Transport-Security: max-age=31536000; preload < X-Content-Type-Options: nosniff < X-XSS-Protection: 1; mode=block < X-Robots-Tag: all < X-Download-Options: noopen < X-Permitted-Cross-Domain-Policies: none < Accept-Ranges: bytes < * The requested document is not new enough * Simulate an HTTP 304 response * Closing connection pfSense-core repository is up to date. Updating pfSense repository catalogue... DBG(1)[60498]> PkgRepo: verifying update for pfSense DBG(1)[60498]> Pkgrepo, begin update of '/var/db/pkg/repos/pfSense/db' DBG(1)[60498]> Request to fetch pkg+https://pkg.pfsense.org/pfSense_v2_8_1_amd64-pfSense_v2_8_1/meta.conf DBG(1)[60498]> curl_open DBG(1)[60498]> Fetch: fetcher used: pkg+https DBG(1)[60498]> curl> fetching https://pkg.pfsense.org/pfSense_v2_8_1_amd64-pfSense_v2_8_1/meta.conf DBG(1)[60498]> CURL> attempting to fetch from , left retry 3 * Couldn't find host pkg01-atx.netgate.com in the .netrc file; using defaults * Host pkg01-atx.netgate.com:443 was resolved. * IPv6: 2610:160:11:18::209 * IPv4: 208.123.73.209 * Trying 208.123.73.209:443... * Connected to pkg01-atx.netgate.com (208.123.73.209) port 443 * ALPN: curl offers http/1.1 * CAfile: none * CApath: /etc/ssl/certs/ * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 / X25519 / RSASSA-PSS * ALPN: server accepted http/1.1 * Server certificate: * subject: CN=*.netgate.com * start date: Apr 10 00:00:00 2025 GMT * expire date: May 11 23:59:59 2026 GMT * subjectAltName: host "pkg01-atx.netgate.com" matched cert's "*.netgate.com" * issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA * SSL certificate verify ok. * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha384WithRSAEncryption * Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha384WithRSAEncryption * using HTTP/1.x > GET /pfSense_v2_8_1_amd64-pfSense_v2_8_1/meta.conf HTTP/1.1 Host: pkg01-atx.netgate.com User-Agent: pkg/1.21.3 Accept: */* If-Modified-Since: Mon, 15 Sep 2025 15:21:37 GMT * Request completely sent off < HTTP/1.1 200 OK Fetching meta.conf: 0%< Server: nginx < Date: Sat, 20 Sep 2025 13:06:33 GMT < Content-Type: application/octet-stream < Content-Length: 179 < Last-Modified: Mon, 15 Sep 2025 15:21:37 GMT < Connection: keep-alive < ETag: "68c82f01-b3" < Strict-Transport-Security: max-age=31536000; preload < X-Content-Type-Options: nosniff < X-XSS-Protection: 1; mode=block < X-Robots-Tag: all < X-Download-Options: noopen < X-Permitted-Cross-Domain-Policies: none < Accept-Ranges: bytes < * The requested document is not new enough * Simulate an HTTP 304 response * Closing connection DBG(1)[60498]> Request to fetch pkg+https://pkg.pfsense.org/pfSense_v2_8_1_amd64-pfSense_v2_8_1/data.pkg DBG(1)[60498]> curl_open DBG(1)[60498]> Fetch: fetcher used: pkg+https DBG(1)[60498]> curl> fetching https://pkg.pfsense.org/pfSense_v2_8_1_amd64-pfSense_v2_8_1/data.pkg DBG(1)[60498]> CURL> attempting to fetch from , left retry 3 * Couldn't find host pkg01-atx.netgate.com in the .netrc file; using defaults * Hostname pkg01-atx.netgate.com was found in DNS cache * Trying 208.123.73.209:443... * Connected to pkg01-atx.netgate.com (208.123.73.209) port 443 * ALPN: curl offers http/1.1 * CAfile: none * CApath: /etc/ssl/certs/ * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 / X25519 / RSASSA-PSS * ALPN: server accepted http/1.1 * Server certificate: * subject: CN=*.netgate.com * start date: Apr 10 00:00:00 2025 GMT * expire date: May 11 23:59:59 2026 GMT * subjectAltName: host "pkg01-atx.netgate.com" matched cert's "*.netgate.com" * issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA * SSL certificate verify ok. * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha384WithRSAEncryption * Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha384WithRSAEncryption * using HTTP/1.x > GET /pfSense_v2_8_1_amd64-pfSense_v2_8_1/data.pkg HTTP/1.1 Host: pkg01-atx.netgate.com User-Agent: pkg/1.21.3 Accept: */* If-Modified-Since: Mon, 15 Sep 2025 15:21:37 GMT * Request completely sent off < HTTP/1.1 200 OK Fetching data.pkg: 0%< Server: nginx < Date: Sat, 20 Sep 2025 13:06:33 GMT < Content-Type: application/octet-stream < Content-Length: 189698 < Last-Modified: Mon, 15 Sep 2025 15:21:37 GMT < Connection: keep-alive < ETag: "68c82f01-2e502" < Strict-Transport-Security: max-age=31536000; preload < X-Content-Type-Options: nosniff < X-XSS-Protection: 1; mode=block < X-Robots-Tag: all < X-Download-Options: noopen < X-Permitted-Cross-Domain-Policies: none < Accept-Ranges: bytes < * The requested document is not new enough * Simulate an HTTP 304 response * Closing connection pfSense repository is up to date. All repositories are up to date.