Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    E
    I even tried deleting and creating a new certificate. Any suggestions?
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    S
    @icoso said in Snort Alert list explanation: If I only run it on the LAN ports wouldn't that only prevent my users from going outbound to certain IP's? I think you're misunderstanding how it works. In legacy mode it will check for "bad" packets going past the router, and add the "bad" IP to a table/alias, and the firewall will block packets to/from that table. It is not directional in the sense of "it's on LAN so only watches outbound." Running it on LAN also identifies which internal device triggered the rule because otherwise on WAN it is after NAT, since it's outside the firewall. You can run it on WAN, sure. Some do if they have a lot of internal interfaces and don't want that many Snort/Suricata processes running. It's a tradeoff of "scanning packets that will never actually arrive" vs convenience/RAM usage. Here is the setting I mentioned in Suricata; the packages are similar to maybe Snort has it also: [image: 1757427238489-8223c7ca-ba6c-4503-8668-2b7c03e597ef-image.png] However, on the Snort interface settings click the View List button by "IP Pass List" and you'll see which IPs are ignored by default.
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    572 Topics
    3k Posts
    keyserK
    @Antibiotic No it’s not possible with NtopNG as it is not a Netflow collector. You need nProbe for that which will “translate” recieved netflows into flows that NtopNG understands and can visualize (with very very little detail might I add as Netflows has no additonal information apart from sender/reciever and volume). The NtopNG package and the product in general is more geared towards visualising and recording traffic details from actual packet captures. This contains MUCH more metadata about the sessions than netflows (DNS names, protocol information and myriads of other things). But pffSense Plus has a builtin Netflow exporter if you have an external netflow collector on hand.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    tinfoilmattT
    @BiloxiGeek said in DNSBL and IPv6: Does it just follow the IPv4 address that is listed above that? In my case it would end up being ::10.0.0.86 Yes. In this specific context that's the notation being used. (Full IPv6 web server address, for reference then, would be: http://[0000:0000:0000:0000:0010:0000:0000:0086]) Nota bene: I use 0.0.0.0 which renders the DNSBL webserver useless and inaccessible, but otherwise returns 0.0.0.0 or ::/NOERROR answers to all blocked lookups.
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    501 Topics
    3k Posts
    A
    Hi, Please help to forward / report the bugs in ACME 1.0 package. Thanks.
  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    yon 0Y
    said in Please update frr on Pfsense+ to FRR 10.3: https://redmine.pfsense.org/issues/15785 now frr 10.4.1
  • Discussions about the Tailscale package

    90 Topics
    610 Posts
    E
    Updated CE 2.7.2 to 1.86.4_1 Changelog pkg add -f https://pkg.freebsd.org/FreeBSD:14:amd64/latest/All/tailscale-1.86.4_1.pkg Freshports
  • Discussions about WireGuard

    700 Topics
    4k Posts
    Bob.DigB
    @HFADmin said in Wireguard Multi VPN Tunnels: Can I have the main pfsense monitor all the gateways That is the default.
  • Squid HTTPS filtering

    3
    0 Votes
    3 Posts
    2k Views
    A
    Lookup info on creating a wpad.dat file. It's not technically transparent, but it allows each computer to automatically be configured to use your proxy server. DansGuardian is quite nice, and very flexible as to capabilities, but is more complicated to setup and configure. SquidGuard has basic functionality, but it is far easier to get it going. If you need to enforce use of the proxy, you could try to block outgoing traffic on ports 80 and 443. If you do any of this, you will probably want to first switch the port used by pfSense's WebConfigurator to something non-standard so that you don't accidentally proxy traffic to the pfSense box. You can also use networkinggeek's answer. Neither solution is necessarily better or worse. It just depends on your network and your needs.
  • SNORT on 2.1.5 Really weird!!

    4
    0 Votes
    4 Posts
    1k Views
    S
    Very annoying :( Not running out of memory, CPU or disk. It just wont boot until I remove the 2nd interface.
  • Snort Disabled After Enabling "emerging-web_server.rules"

    11
    0 Votes
    11 Posts
    2k Views
    S
    I've been away for a couple of days– sorry for the intermission. I haven't been able to reproduce the memory error that BBcan177 is experiencing. I am running a (mostly) default install of pfSense and Snort on bare metal with the exception of the fact that I increased the memory of many parameters to offer headroom... to prevent out of memory errors. Just in case. Per bill Meek's request, I added the following lines to my snort.inc file: // Snort GUI needs some extra PHP memory space to manipulate large rules arrays ini_set("memory_limit", "256M"); Since I was NOT experiencing this specific issue, I didn't expect any behavior to change. Additionally, I have not had the time to whittle down the specific rule(s) responsible for my issue. There are, after all, over 5000  emerging-web_specific_apps.rules to work with. I do have a few updates to add to the log: Rather surprisingly (and somewhat disconcertingly), after several months of slowly working with this error on my own involving the two rule sets (emerging-web_specific_apps.rules and emerging-web_server.rules) which causes Snort to enter a 'Disabled' state within minutes to hours of enabling either or both of those two rule sets, I can no longer reproduce the error at all. In fact, turning ON those two rule sets will no longer cause Snort to become disabled as it once did. This new behavior was observed within approximately 24 hours of these posts to the pfSense forum. And I've made no changes to the system. None. Perhaps Bill or someone on the Snort/pfSense team read this post and fixed the issue in a rules update? I can't determine any other cause for the change in behavior. This is an exceptional coincidence in my many years of tinkering with PCs. In fact, instead of considering the issue closed and moving ahead, I am even more curious now to determine what is happening "under the hood". Another bit of info to consider: once I had determined that one or both of the rule sets in question would disable Snort, I of course verified this hypothesis by working with all permutations of those rule sets to verify that the problem was reproducible before posting to this forum. BBcan177: short of re-installing pfSense or reverting to a default configuration, have you tried to run a hardware test to ensure that your memory and other components are in working order? I have found bad memory in a number of computers over the years; bad memory can cause very strange behavior and sometimes the problem is consistent and reproducible, and other times it is not. Thank you all for your assistance and input.
  • FreeRADIUS 2 not starting: gdbm fatal: Unexpected end of file

    3
    0 Votes
    3 Posts
    2k Views
    M
    Dear Als, Thank you very much! Based on your freedback, I took a slightly more radical approach, since I found freeradius would not start with one of the accounting databases missing. I deleted /var/log/radacct and reinstalled the package. Then, things started to work, at least for the time being. This is much better then reinstalling the entire system without knowing when the same thing might happen again. As this is a backup system in a CARP setting, I could imagine that things go sour when the backup system switches back to is usual backup function after having been the master for a short time. Regards, Michael
  • How to add a separate box for a Snort Firewall to a network?

    3
    0 Votes
    3 Posts
    1k Views
    ?
    @Thrae: I'm having trouble figuring out how to implement the particular scheme I want: Main pfSense router without Snort installed. (Almost) all traffic goes through Snort transparent proxy firewall unless it takes too long to respond, in which case the pfSense box stops using the proxy until it responds in a timely fashion again. This would be a really long timeout, meaning the proxy box is probably down or at least extremely overloaded. The reason I want a separate box is because I've found Snort especially tends to be rather problematic on pfSense boxes, possibly taking them down, even if they are well over-spec'd. I'm guessing one way to do this would be to have the boxes hooked up via a crossover cable such that all requests still go to the pfSense box, but then the pfSense box itself forwards requests first through the Snort Firewall, which then goes back to the pfSense box on the same port if not blocked. Since pfSense supports Snort, I could have the other box also run pfSense and use something like CARP and pfSense's own built-in redundancy. What you found out was not snort, nor pfsense, or anything related to them. Snort has no problem running on pfsense. If the box is well over-spec'd and taken down that means you have a lot of bigger fish to fry than snort not running. I've run snort on old hardware that should have been sent for recycling a long long time ago, analyzing traffic most users in here will never see (datacenter volume traffic), and never had an issue with snort taking down the box. I would not recommend adding another unnecessary box to the network. Credentials: Author of the snort and suricata blueprints.
  • BandwidthD Not showing correct version.

    3
    0 Votes
    3 Posts
    1k Views
    C
    pfSense 2.2 is a rather big change from 2.1, due to the change from FreeBSD 8.3 to 10.1.  This brings benefits of better hardware support.  2.2 has been fairly stable for me, but I don't use many packages or advanced features of pfSense.  If 2.1.5 is running and you're happy, stick with it.  If you have hardware not supported in 2.1.x, or you like to test and report issues as you find them, try out 2.2. Keep a copy of your 2.1.5 configuration as a backup in case you need to downgrade; you can update 2.1.x -> 2.2, but AFAIK you can't use a 2.2 config to go back to 2.1.x
  • Any tutorial about how to authenticate squid3-dev by freeradius

    1
    0 Votes
    1 Posts
    509 Views
    No one has replied
  • Snort stopped working for unknown reasons

    7
    0 Votes
    7 Posts
    2k Views
    bmeeksB
    @lpallard: Hey bmeeks, I PM'ed you! I replied with a request and my e-mail address. Bill
  • Snort alarm - confirm false positive?

    16
    0 Votes
    16 Posts
    3k Views
    BBcan177B
    That IP is currently listed on a Threat Source called "Alienvault" http://kb.bothunter.net/ipInfo/nowait.php?IP=93.184.220.20 –-------------------------------------------------------       IP Address        = 93.184.220.20       Threat Level      = Unverified       Threat Category    = Malware Propagator       Threat Description = Malware drive-by exploit site       Hostname          =       Service Provider  = EDGECAST NETWORKS INC       Domain Name        = EDGECASTCDN.NET       ASN Number        =       ASN Name          =       Network Speed      = DSL       Country CC        = US       Country            = UNITED STATES       Region            = CALIFORNIA       City              = LOS ANGELES       Longitude          = -118.283996582031       Latitude          = 34.0452003479004       Zipcode            = 90001       TimeZone          = -08:00       BestAnswer        = 1 --------------- thank you for asking -------------------- Would be wise to use pfBlocker with that Threat source and block that from your network completely. https://reputation.alienvault.com/reputation.snort
  • Continuous packet capture?

    3
    0 Votes
    3 Posts
    2k Views
    BBcan177B
    @zinzara: I have some experience analyzing traffic and was wondering if there's a way (package or otherwise) to continuously capture and save packets. Reason is, I also have some experience writing snort signatures and would like to look through my traffic from time to time and if I find anything I don't like and it wasn't caught by snort, I could write a signature on it. So, is there a way to do this? I would prefer to save onto the pfsense box but if I have to setup an external server that would be ok too. I realize this would add up quickly in storage requirements but this is on my home network which I don't do a whole lot on and I have a big hard drive. Thanks. There is a Solution Called "Security Onion" that will do Full Packet Capture and more… http://blog.securityonion.net/p/securityonion.html https://code.google.com/p/security-onion/wiki/IntroductionToSecurityOnion
  • PfBlocker does not block like CountryBlocker

    5
    0 Votes
    5 Posts
    1k Views
    BBcan177B
    The country Codes in pfBlocker has not been updated for two years. They are out of date.
  • Pfblocker IP Address

    2
    0 Votes
    2 Posts
    653 Views
    BBcan177B
    @jay4linux: I am trying to unblock an IP address in one of the pfblocker country lists.  Is this possible. Hi Jay, You can't remove one of those IPs from the Lists as each update it could come back into the list. So what you should do is create a "Safe Pass List" and add all IPs that should not be Blocked by a List. This rule should be above the Blocked Rules to allow it thru.
  • Squid is eating all my memory FIXED

    8
    0 Votes
    8 Posts
    12k Views
    S
    See HERE for how to get Cache Manager stats. Select General Runtime Information from the menu to get the stats above. Steve
  • Apu1c4 and snort

    10
    0 Votes
    10 Posts
    3k Views
    J
    @Bulldogg: is your apu1c4 still running stable with HAVP antivirus, snort and squid3? what kind of speed do you get? Yes, still running stable since months now. Speedtest reaches my provider limited bandwith maximum of 20 Mbps download and 2 Mbps upload.
  • Bind fails to start after upgrade

    10
    0 Votes
    10 Posts
    7k Views
    rbgargaR
    Try latest version 9.9.5P1_5 pkg v 0.3.5 and let me know if you find any issues.
  • Freeeradius package bug report - Mobile OTP Configuration

    1
    0 Votes
    1 Posts
    965 Views
    No one has replied
  • OPIE for the 2.1.5

    1
    0 Votes
    1 Posts
    630 Views
    No one has replied
  • Squid Access list

    9
    0 Votes
    9 Posts
    2k Views
    F
    thats was so easy you just  put the file(which contain the list of ip's) inside  "/var/squid/acl" why is that [2.1.5-RELEASE][admin@******.localdomain]/root(69): ls -l /var/squid/acl/ total 4 -rw-r–r--  1 proxy  proxy  84 Sep 16 07:53 throttle_exts.acl -rwxr-xr-x  1 proxy  proxy  992 Sep 15 12:47 youtube.acl to make it read from the file the proxy user should have permissions
  • SquidGuard stopped blocking sites

    2
    0 Votes
    2 Posts
    2k Views
    A
    *Solved, I think I was looking in the Log/Filter Config and found a syntax error src Test { 192.168.2.7192.168.2.24 } Edited the Group ACL "Test" client list by adding a space between IP Addresses.  Saved and applied the change, which modified the Log/Filter Config… src Test { ip    192.168.2.7 ip    192.168.2.24 } Ads are blocked again Both the Common ACL and Test ACL are behaving as expected Thinking back, this started around the time I created a new VM 192.168.2.24. When I added the VM to the Test group, I probably hit Enter in the Client IP address text box. The Client UI either doesn't or can't check for Returns in the text box, so it read the entry as 192.168.2.7192.168.2.24 instead of 192.168.2.7 192.168.2.24
  • IPTraf

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.