Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    F
    Hello, I use Squid as an explicit proxy, but I can't bypass the private destination IP addresses. Do you have any ideas?
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    M
    Hi, I had a problem with my home network today, so I checked pfsense and discovered that suricata had blocked the wan ip. After some tests and triggering some suricata alerts, the wan ip was blocked. I restarted pfsense and ran some more tests, but the problem no longer occurred. I then checked the wan interface settings and indeed the ip list does not include the wan ip, both now that it's working and before, when it was blocked. I'm using pfsense 2.8.0 and suricata 7.0.8_2. I use PPPoE to access the Internet.
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    572 Topics
    3k Posts
    keyserK
    @Antibiotic No it’s not possible with NtopNG as it is not a Netflow collector. You need nProbe for that which will “translate” recieved netflows into flows that NtopNG understands and can visualize (with very very little detail might I add as Netflows has no additonal information apart from sender/reciever and volume). The NtopNG package and the product in general is more geared towards visualising and recording traffic details from actual packet captures. This contains MUCH more metadata about the sessions than netflows (DNS names, protocol information and myriads of other things). But pffSense Plus has a builtin Netflow exporter if you have an external netflow collector on hand.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    G
    FYI, this bug is still present on pfSense v2.8.1-RC and pfBlockerNG-devel v3.2.8
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    500 Topics
    3k Posts
    GertjanG
    @gorkrul said in Let's Encrypt Cert via ACME ask for oathtool (PFSende 2.8): so, what could be the solution then? or what other best practice recommended? acme.sh uses a 'scripted' or 'automated' login against 'INWX'. If an 2FA is needed to passs through, then, afaik, you can't use that access - acme.sh won't be able to grab your phone and copy over the challenge code. I'm not a 'INWX' (dono what/who that is to be honest) but I advise you to go to their support (foruim, FAQ, etc) and xheck how other, using 'INWX', set their acme.sh. Their support page said : https://www.inwx.com/en/offer/api where acme.sh is mentioned as 'possible'. here is a list with open issues with INXW : https://github.com/acmesh-official/acme.sh/issues?q=is%3Aissue%20state%3Aopen%20INWX - maybe yours is there also ? My pretty broken advise would be : stop 2FA ....
  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    yon 0Y
    said in Please update frr on Pfsense+ to FRR 10.3: https://redmine.pfsense.org/issues/15785 now frr 10.4.1
  • Discussions about the Tailscale package

    90 Topics
    608 Posts
    Y
    Well, I spent some time tonight playing around with this and I think I have it. Some suggestions for others: Generate the OAuth client in the Tailscale admin before anything else. Make sure to create the tag you'll need. One per pfSense instance (and clearly, one OAuth client per pfSense instance). Give the OAuth client the permissions you think appropriate. Very Important: make sure that you can generate an API key with the OAuth creds. The OAuth creds are, apparently, used by the CLI to generate an API key. The latter is what does the trick in tailscale up. Do this from the pfSense console: curl -d "client_id=kY5Mv4h8kQ11CNTRL" -d "client_secret=tskey-client-kY5[invalidchars]CNTRL-ZXo2FfBbb[moreinvalidchars]GVT" "https://api.tailscale.com/api/v2/oauth/token" If you don't get back something like this, you'll never be able to get it to work: {"access_token":"tskey-api-kM[lotsofinvalidchars]NTRL-[stillmoreinvalidchars]9YevL","token_type":"Bearer","expires_in":3600,"scope":"all"} Here's what worked for me if the above returned an API token: /usr/local/bin/tailscale up --auth-key=tskey-client-[greekedout]GVT\?ephemeral=false\&preauthorized=true --accept-dns=false --accept-routes --advertise-exit-node --advertise-routes=192.168.211.0/24 --advertise-tags=tag:[yourtaghere] Make sure you have the cron package installed. Then add a @reboot entry using the full path (see above). I also added a cron entry every six hours as if Tailscale is up, this command does not interrupt or reset any sessions. I've left some bytes of the creds in these examples to make it clearer where your full creds should go. The curl command requires the escape symbol (\) in the parameters that will be passed to the control plane. FWIW, I lost an hour or more because I had (God only knows why) set Tailscale on one pfSense instance to accept DNS. Do this and the router cannot resolve the control plane API endpoint. Dumb. And I own it. I don't know if this "fixes" everything. But it's a lot of work and it shouldn't be necessary. Somehow, this package to be useful needs to survive reboot without the need to go to these lengths.
  • Discussions about WireGuard

    699 Topics
    4k Posts
    S
    @Bob.Dig what's the right place?
  • PFsense 2.2 squid 3.4.10_2 pkg 0.2.6

    3
    0 Votes
    3 Posts
    899 Views
    F
    It take long time ,,, Thank Man its working now
  • Migrating postfix database logs to pfsense 2.2

    4
    0 Votes
    4 Posts
    1k Views
    S
    Looks like I'm downgrading to 2.1 then. Thanks, Sam
  • SNMP NUT not working (Fixed in 2.2-Release)

    10
    0 Votes
    10 Posts
    2k Views
    V
    This is fixed and working and 2.2 Release
  • New To Snort, Lots of False Positives

    2
    0 Votes
    2 Posts
    2k Views
    BBcan177B
    Take a look at these threads: https://forum.pfsense.org/index.php?topic=64674.0 https://forum.pfsense.org/index.php?topic=78062.0‎
  • Squid slows certain webpages

    10
    0 Votes
    10 Posts
    2k Views
    marcellocM
    @Escorpiom: A standard hd install is with or without softupdates? Without…
  • Re: 2.2-RELEASE now available!

    2
    0 Votes
    2 Posts
    585 Views
    jimpJ
    Not that I'm aware of
  • Urgent Issue : BANDWIDTHD failed to boot up pfSense

    8
    0 Votes
    8 Posts
    3k Views
    W
    Same here, new install, bandwidthd error. Installed the 2.2 upgrade on another machine and it got hosed, won't reboot…. ugh.
  • Snort fails on 2.2

    5
    0 Votes
    5 Posts
    2k Views
    W
    Yup, I just rebooted and reinstalled and it installed fine.  It also started snort fine too. Thanks!
  • Upgraded to Squid3-dev, now traffic is being blocked

    2
    0 Votes
    2 Posts
    814 Views
    marcellocM
    What you get on access.log and cache.log? Setup looks fine… ... acl safeports port 21 70 80 210 280 443 488 563 591 631 777 901 2083 3128 3127 1025-65535 21-65535 acl allowed_subnets src 192.168.1.0/24 http_access allow allowed_subnets http_access allow localnet
  • 0 Votes
    9 Posts
    5k Views
    B
    I am going to have to give up and accept that I have to get a more powerful system to do this.  I tried reducing the size of the shallalist.tar.gz to only what I want.  But for some reason, while it appears that the databases are being updated, they apparently are not as the blacklist.files file does not exist as it should per this log entry. klist_update.sh: The command '/bin/cp -f -p /tmp/squidGuard/arcdb/blacklist.files /usr/pbi/squidguard-i386/etc/squidGuard' returned exit code '1', the output was 'cp: /u6/etc/squidGuard/blacklist.files: Read-only file system' I also do not appear to be able to hack the config files to make it work.  You guys did too good of a job at securing this thing down. Thank you for your help.  At least now I know.
  • Updating to snort 3.9.7/3.2.2 breaks snort

    6
    0 Votes
    6 Posts
    1k Views
    bmeeksB
    @lshiry: … I found a workaround for this by killing the process "/bin/sh /usr/local/etc/rc.d/snort.sh start", which returns to the install script so it can complete the rest of its tasks.  After that, snort was in the services menu.  It was not started, but at least I can manage it now.  Thanks for the help, got me looking in the right direction.  Perhaps a fix for this would be to implement some sort of keepalive in the install php page, or background the service start step so it can complete. Thanks for the information on how you solved it.  Something got hung up in that sub-process on your box.  You are not the only one to experience the issue, but the number who have is quite low (maybe 3 or 4 that I can recall).  The install process calls a system function to execute that shell script.  I will look into it some more. Thanks, Bill
  • Sarg Stops After 10 Minutes

    7
    0 Votes
    7 Posts
    1k Views
    marcellocM
    what squid version are you using?
  • Snort: log: VLAN message on LAN?

    5
    0 Votes
    5 Posts
    1k Views
    M
    @bmeeks: No, the Promiscuous Mode feature has been in Snort since the beginning.  It is something the underlying binary controls and not the GUI package.  Since you say you have done a complete fresh install from the ground up, are you absolutely positive that all the pfSense settings are exactly the same as before?  Was perhaps your VLAN formerly associated with a different interface? Bill Thank you Bill  ;D No, it is completely 100% the same. I meticulously created screenshots of all settings, and setup everything again, fresh, by hand according to these screenshots :-[
  • SquidGuard 1.9.10 problem

    9
    0 Votes
    9 Posts
    2k Views
    D
    @KOM: Just curious, but why do you need to stop it?  Just disable it. +1 SquidGuard may be only disabled. Otherwise Squid will crash.
  • Bandwidthd problem

    48
    0 Votes
    48 Posts
    50k Views
    T
    Edit: found info on 2.2 problems here: https://forum.pfsense.org/index.php?topic=84642.0
  • [Resolved] pfBlocker logs?

    2
    0 Votes
    2 Posts
    2k Views
    B
    Nevermind, I think I found what I'm looking for. Under status->system logs->firewall I can see all blocked connections. I'm not 100% sure I'm seeing pfBlocker kills here, but I think I am because I'm seeing some blocks on outbound connection attempts to Netherlands (a country I blocked) (no, I don't have kazy, it's a damn Kaspersky IP).
  • Package for daily and montly traffic

    8
    0 Votes
    8 Posts
    1k Views
    KOMK
    Is it better to put the tracking to the VLAN or the WAN Interface? That depend on what it is you're trying to measure.  Total bandwidth in/out would require WAN if you have multiple vLANs.  If you have just the one vLAN and no others then I suspect it doesn't make any difference.  It's just adding up all bytes going in/out of the specified interface.
  • Ha proxy-devel client certificates optional

    2
    0 Votes
    2 Posts
    710 Views
    P
    When creating this i choose to do it like this and allow for using acl's like 'SSL client certificate valid.' to be used for selecting the normal backend, or redirecting to a custom 'error' backend. Ill have to re-check if it actually works like i intended (i don't actually use it myself).. It does seem that i forgot to implement the 'none' option which can be selected for a , which i intended to allow for switching between 'optional' and 'required'. Thanks for your sharing your opinion and experience with haproxy-devel, it will take me a while before i get to this though. Put your item on my list of items to check/improve. Thanks.
  • Squid 3 Reverse Proxy Help

    4
    0 Votes
    4 Posts
    1k Views
    J
    I've had issues with reverse proxy (which typically publishes internal servers over HTTP and HTTPS ports 80 and 443) when the web configurator itself is also listening on one of those ports. Nowadays, I change the port the pfSense web configurator listens to as a rule of thumb - anything really as long as it's not 80 or 443. You could try that and see if it helps? Refer to "TCP port" under System | Advanced menu on where to change it. Remember that you would then need to specify that port number in the URL in your browser to access the pfSense web configurator. Also, have a look at the "DNS Rebind Check" option (also under the System | Advanced menu).
  • TFTP Server

    1
    0 Votes
    1 Posts
    740 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.