• Suricata Blocks Page

    18
    0 Votes
    18 Posts
    694 Views
    P
    @SteveITS - perfect. Thank you.
  • SURICATA Ethertype unknown

    46
    0 Votes
    46 Posts
    2k Views
    SteveITSS
    @stephenw10 I think they’re responding to me re the new HTTP header alerts. I wasn’t intending to hijack the thread, just say to watch out for them, too. My overall point was to “yes and” the topic because normally one does not need to watch for excessive blocking with a Suricata upgrade. I would guess something in detection changed and/or new rules are triggering often. To answer your question it’s a lot of connections to (and also from as I recall) the web servers. Like 10x normal blocking, without actually counting.
  • Acme Certs are Not Renewing - Again in 26.03.r.20260317.0210_RC

    7
    0 Votes
    7 Posts
    400 Views
    P
    @marcosm I may indeed have reverted the patch and therefore introduced the bug. That would explain why others have not come across this as an issue. I know that I "cleaned up" a few things recently and one of them was to delete the patch. I bet I hit Revert prior to also hitting Delete. Odd that uninstalling acme and then reinstalling it didn't seem to fix it but reinstalling the patch did the trick. Much appreciate your help.
  • Network interface outgoing mess

    6
    1
    0 Votes
    6 Posts
    368 Views
    stephenw10S
    What are you doing that triggers that error? Selecting an interface in the gui traceroute only selects the source address. Normally on a WAN that will force traffic via that WANs gateway. But if there's no gateway set it will be routed using the system routing table like any other traffic.
  • PPPoE IPv6, MultiWAN and 26.03

    23
    0 Votes
    23 Posts
    1k Views
    w0wW
    [image: 1774023250262-3812c97f-0c8a-4078-b7e6-d1b800fe1a1a-image.png] This happens randomly on every boot or CARP failover. Right now it affects the IPv4 WAN, but it could be any of the interfaces listed. Sometimes only one comes up. Sometimes all of them come up... I honestly don't know. I even installed OpenWrt, and it just works, so this is clearly not an ISP or upstream router issue. pfSense is clearly misbehaving here.
  • 2100 issues pci0

    3
    0 Votes
    3 Posts
    160 Views
    JonathanLeeJ
    @stephenw10 thanks for the reply if that gets fixed I can upgrade I am stuck without it as the pcie doesn’t work
  • SafeXcel EIP-97 Full OCF Registration Needed for 26.x - SG-2100

    3
    0 Votes
    3 Posts
    148 Views
    M
    It sounds like some of these things could have already been resolved upstream. Testing on something recent, preferably 26.03, would help reduce scope and help towards resolution.
  • 0 Votes
    136 Posts
    26k Views
    yon 0Y
    @netblues said in pfSense VM on Proxmox: PPPoE only works when parent NIC is PCI passthrough — virtual NIC breaks LAN→WAN traffic: @yon-0 Your issue is different. Icmp always worked 26.03 fixes the original issue. Have you tried with minimum configuration, after factory? LAN to WAN icmp can't work.
  • PHP errors during upgrade to 26.03 RC

    8
    0 Votes
    8 Posts
    545 Views
    SteveITSS
    @marcosm said in PHP errors during upgrade to 26.03 RC: Is that device using zfs? Yes.
  • The 26.03 system will crash.

    5
    3
    0 Votes
    5 Posts
    524 Views
    stephenw10S
    Hmm, not FRR there though. What is miniupnpd doing there? What is it logging during that extreme CPU usage? Is it open to abuse from anywhere?
  • PPPoE WAN gateway stuck in “Pending” status after successful connection

    10
    0 Votes
    10 Posts
    1k Views
    M
    Presumably when it's showing packet loss while the gateway is responsive, that means the traffic is either being blocked or not going out the right interface. The output of pfctl - vvss and pfctl - vsr should help narrow that down along with some pcaps.
  • 26.03-BETA snapshot

    2
    3 Votes
    2 Posts
    227 Views
    luckman212L
    26.03.b.20260219.2016 running nicely since last night for me as well. - 6100
  • openvpn MTU bug

    11
    0 Votes
    11 Posts
    1k Views
    yon 0Y
    @marcosm said in openvpn MTU bug: Clients need the additional option to ignore the MTU pulled from the server. I'll add this so it's done automatically. For now you can add this to the custom options: pull-filter ignore "tun-mtu" Also note that MSS is calculated automatically on that page. So if you want the correct MSS based on a 1440 MTU then set the MSS value on that page to 1440 as well. As for why fe80 addresses are the same it's because that's not a conflict. Those are link-local addresses and would require the scope in addition to the address (e.g. fe80::1%vtnet1). pull-filter ignore "tun-mtu" this is work. When I returned to edit, it showed a misalignment. [image: 1771065856084-7116c286-7d1c-40ce-999a-befbe690aae5-image.png]
  • openvpn client dco connectivity issues @ 20250518113006_20250726122025

    Moved
    17
    0 Votes
    17 Posts
    3k Views
    yon 0Y
    @netblues no.
  • ACME cant work

    1
    2
    0 Votes
    1 Posts
    143 Views
    No one has replied
  • Is 26.03.a.20260106.2058 still the latest snapshot?

    4
    1 Votes
    4 Posts
    356 Views
    stephenw10S
    26.03.a.20260128.2142 is now public
  • /tmp/sess_* files (0 bytes) piling up

    19
    1
    0 Votes
    19 Posts
    1k Views
    luckman212L
    Can't find anything about it in changelogs, but FWIW I can no longer reproduce this as of 26.03.a.20260128.2142
  • [26.03-DEVELOPMENT - 20260106] Nexus (wow! + some issues)

    3
    1 Votes
    3 Posts
    492 Views
    luckman212L
    Socked in good here in the northeast US. Perfect time to dig in to a fresh 26.03 build if there's one coming :)
  • Maybe some one else sees it ....

    Moved
    9
    3
    0 Votes
    9 Posts
    1k Views
    T
    This is what fixed it for me in Pfsense Plus v25.11: System->Advanced->Networking In the section: [Network Interfaces] Check the following boxes: Hardware TCP Segmentation Offloading and Hardware Large Receive Offloading (Save and reboot Pfsense)
  • 1 Votes
    5 Posts
    431 Views
    luckman212L
    @stephenw10 Yes, the ifconfig gif0 down was just temporary, ran from ssh during the upgrade so it could complete. After reboot the v6 tunnel came up normally and is working fine. This includes pkg ... commands, menu option 13, System > Update etc.
Copyright 2026 Rubicon Communications LLC (Netgate). All rights reserved.