Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    A
    Adding load-server-state-from-file none to the Advanced Settings > Backend pass thru section of each backend overrides the behavior and makes backend changes apply immediately when reloading. I am also using the global GUI setting Force immediate stop of old process on reload. (closes existing connections). [image: 1754764767072-67de741e-7dbf-4766-8e17-1a550e6684b0-image.png]
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    bmeeksB
    @NRgia said in Suricata on Pfsense: @bmeeks Thank you for what you did for Snort or Suricata. I'm not sure what you want me to do on Redmine, due to is a bug tracker. My question is for Product Management, which I will ask it here to be public: What is the plan for these 2 packages, Suricata and Snort? Thank you Yes, Redmine is for both bug reports and feature requests. Asking for the Suricata binary to be updated to the latest 7.0.11 version from upstream is a legitimate Redmine request. I would suggest simply asking for the binary version update instead of asking about future Netgate strategy (such as the support plans for the packages). Strategy discussions typically don't get very far because they deal with proprietary information or plans that a company may not want to publicly discuss. Redmine is where the Netgate developer team tracks all the code changes they make for pfSense. They will see Redmine reports much quicker than a forum post.
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    K
    @pulsartiger The database name is vnstat.db and its location is under /var/db/vnstat. With "Backup Files/Dir" we are able to do backup or also with a cron.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    GertjanG
    @rasputinthegreatest said in pfBlockerNG not logging anything by default?: its made up of multiple sources so it does make sense that it resolves some of these weird private hosts An public NTP pool like pool.ntp.org would not list host names with weird random paddings that reference local devices. "domaincontroller-gPHvwjYS.local,192.168.1.86" is a reverse PTR, and is requested by one of your local devices. Why , I don't know. @rasputinthegreatest said in pfBlockerNG not logging anything by default?: I find them in pfblockerNG dns_reply log under Logs No URLs there, only host names. [image: 1754736735409-c09607c2-c95a-4971-bdb4-f63fe08bebe8-image.png]
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    493 Topics
    3k Posts
    GertjanG
    @EChondo What's your pfSense version ? The instructions are shown here : [image: 1753262126227-1acdc586-cb29-4148-9e36-81ade4e5e60c-image.png] A restart of a service will start by re creating their config files. If a certificate changed, it will get included. When the process starts, it will use the new certificate. @EChondo said in Issue with ACME Certificates Refresh & Restarting HAProxy: I haven't been able to confirm if the above works(mine just renewed, don't feel like doing it again just to test), so we'll see in 60 days I guess. No need to wait x days. You can re test / renew right away, as you are 'allowed' to renew a couple (5 max ?) of times per week.
  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    yon 0Y
    said in Please update frr on Pfsense+ to FRR 10.3: https://redmine.pfsense.org/issues/15785 now frr 10.4.1
  • Discussions about the Tailscale package

    90 Topics
    594 Posts
    E
    @totalimpact Tailscale 1.54.0 is 2+ years out of date. Tailscale has made quite a number of changes since Tailscale 1.54.0, likely rendering it incompatible with their servers. I would consider manually updating the Tailscale FreeBSD package. FreshPorts does not maintain an archive of all the releases, only the latest compiled by the volunteer maintainers. The key to manually upgrading is knowing which FreeBSD version your pfSense release is running, i.e. 14 or 15. You can following along here.
  • Discussions about WireGuard

    692 Topics
    4k Posts
    M
    This is still an issue as of 2.8.0 / 25.07, and it drives me crazy. Gateway failure works as expected, the wireguard tunnels will fail over to the backup gateway and continue on as normal, but will never recover once the failed gateway comes back online. While a reboot will (usually) fix it, I usually just go into my routing settings and mark the secondary gateway as down, forcing it to revert back to the primary... the users tend to dislike it when I reboot the firewall in the middle of the day
  • Snort Rules Update Problem: snort rules: md5 signature of rules mismatch.

    Locked
    6
    0 Votes
    6 Posts
    5k Views
    jimpJ
    I added a note about this to the Doc Wiki for future reference.
  • Havp package with trasparent squid proxy

    Locked
    8
    0 Votes
    8 Posts
    6k Views
    C
    Great..some of the things you might see in the logs sometimes is "can't send header or body to browser and also server number low spawning new..You can still increase the min/max servernumber in havp.inc…......I guess a still a WIP, but even with that it still works everytime.
  • Reverse proxy with squid???

    Locked
    10
    0 Votes
    10 Posts
    12k Views
    Cry HavokC
    You're asking about the configuration of a program that has it's own web site, documentation and mailing lists - have you considered looking there?  Heck, even Google finds a number of relevant pages ;) Once you know what settings need to be made, you should be able to look at the WebGUI and identify whether or not it's possible to do only via the GUI.
  • PFSENSE SQUID

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    M
    How long range are we talking?  Why not look into long range directional antenna or something?
  • PFSense / Snort Noo Guy - is this my problem

    Locked
    8
    0 Votes
    8 Posts
    4k Views
    jimpJ
    @jamesdean: Thanx for the heads up. Snort.org changed there md5 format to day to go along with there nice new website. From this > c2844479ed68cc0f13ab61f69e35bc7a To this > MD5 (snortrules-snapshot-2.8.tar.gz) = c2844479ed68cc0f13ab61f69e35bc7a Going have to code a fix. Man Snort Package is killing me this week. If they change it back after I code a fix, Im going on a vacation ASAP. james So code it to handle both ways  ;D If the line starts with MD5, split and grab the hash appropriately, otherwise, take the hash as-is.
  • Update ntop Verison to 3.3.9?

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    S
    Any ETA of this version to pfSense?
  • Firewall / Squid and possible security related issue.

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    C
    Its in your squid.inc that modifies the pf rules. You can edit your squid.inc in /usr/local/pkg/squid.inc and comment: $rules .= "#pass in quick on $iface proto tcp from any to !($iface) port 80 flags S/SA keep state\n"; $rules .= "#pass in quick on $iface proto tcp from any to !($iface) port $port flags S/SA keep state\n"; to show your current pf rules pfctl -sr
  • Squid kern.ipc.nmbclusters=32768 - seemed to be large improvement here

    Locked
    4
    0 Votes
    4 Posts
    25k Views
    C
    freebsd default is 8192, but pfsense default is 0 if you comment that and reboot. sysctl kern.ipc.nmbclusters That will show your current value which is default unless its being specified in /etc/sysctl.conf performance also increase if set in /etc/sysctl.conf according to http://fasterdata.es.net/TCP-tuning/FreeBSD.html net.inet.tcp.inflight.enable=0 net.inet.tcp.hostcache.expire=1
  • LCDproc

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    Cry HavokC
    For what information LCDProc can display, try reading the LCDProc site. I'd also suggest you try that Search function.  It would have found you this thread and probably others.
  • Proxy filter and windows active directory users group

    Locked
    3
    0 Votes
    3 Posts
    5k Views
    N
    thanks for the tips is there a way to enable a windows users groups ? I'm the sistem administrator of a network with a lot hundred of users, and add every user in proxy acl is a very hard job to manage …. should I change the authentication method? nyno.
  • Iftop problem

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    D
    # uname -a FreeBSD my.home.net 7.0-RELEASE-p8 FreeBSD 7.0-RELEASE-p8 #0: Thu Jan  8 22:29:30 EST 2009     sullrich@freebsd7-releng_1_2_1.pfsense.org:/usr/obj.pfSense/usr/src/sys/pfSense_SMP.7  i386 #pkg_add -r ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-7-stable/net-mgmt/iftop-0.17.tbz I dont know why you used the Freebsd 8 ports  ..check which version you are using
  • PFS outgoing mail scanner (spam scanner)

    Locked
    6
    0 Votes
    6 Posts
    4k Views
    J
    yes, thanks, i will do that… but i can not cut it right now, i need time, and time is something that i dont have :( so i have to make temp solution. And after all it would be great to see SMTP proxy in PFS ;)
  • SquidGuard and blocking IPs as URLs

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    I
    dvserg, thanks, as expressions it works! br, ieleja
  • Bug: relative link should be absolute

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    C
    This was changed in the base system because it wouldn't work through reverse proxies with absolute paths, and there are people who manage multiple devices that way. I don't know there is a good solution aside from breaking that ability again.
  • HAVP whitelist not working

    Locked
    12
    0 Votes
    12 Posts
    7k Views
    L
    dvserg for president now!!!! :D Reinstalled now whitelist work perfectly! Thank you so much!
  • Log website visited per users

    Locked
    12
    0 Votes
    12 Posts
    44k Views
    M
    I think apaillard wants more than squid access.log. He wants go get a log file with Login name of the captive portal, hour of connexion, mac adress + Ip and all visited URLS… right now, this is not possible easily from Pfsense. You have to enable a classic syslog to log all systems events (DHCP, Captive portal, MACs etc...) to a remote system AND you have to store & rotate the Access.log from squid. The best way to rotate it is by using the GUI in pfsense, there is a checkbox to rotate, and a value to enter (365 for a year). Then, Pfsense will rotate your logs in the Pfsense's filesystem. What you have to do next, is transfering this file, access.log (in fact access.0.log, because access.log is always in use) to your remote server, either by using FTP or SCP ; script this in a file, then use CRON (it's available in Pfsense's package, as well as a GUI for CRON) to run your FTP/SCP script every day or every week, depending on how you rotate. By the way, you have to enable a special command in squid to get proper timestamp in your access.log, but by doing this, lightsquid wont work anymore. Then, on one serveur you have system logs on syslog + squid logs on a ftp folder ; you now just have to look for a match between your 2 files, for a precise day ; then you will see what IP has been given at what time, and by looking in the access.log file, you will see what sites this ip has visited.... I don't see how you can do better than that! (but if someone do, let's explain dude!)
  • Custom Squid acl

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Squidguard does not "Apply" the changes made on acl after restart.

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    N
    I'll try it. ACL supposed to be nonWorkHours it must be typo for me. Thanks dvserg!
  • Squid time problem?

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    R
    thanks for ur help, its works very well.
  • SquidGuard

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    D
    There is a lot of questions about the interaction of 'Default' and 'ACL'. Now 'Default' handles only those customers who do not conform to any 'ACL'. In doing so, 'Default' has its own settings, and each 'ACL' - their own. [client] -> [ SG > ( filter ACL or Default) ] -> [inet] There is an idea to extend the options' Default 'all' ACL ': [client]->[ SG > (the first filter ACL) > (the second filter Default) ] -> [inet] I think it would be more intuitive to use? What opinion?
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.