Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    E
    I even tried deleting and creating a new certificate. Any suggestions?
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    bmeeksB
    @NRgia said in Suricata on Pfsense: Your suggestion is preferred, but from I understood from you, nobody is interested or have the knowledge. Again thank you, for updating this package over the years. I'm sure there is someone here on the forum using the package that has the knowledge to maintain it. Another option if IDS/IPS is critical is to use the Linux package on a separate virtual machine or hardware appliance. Inline IPS performance would actually be very good using a Linux box (or even a FreeBSD box) with two separate NICs and configure true netmap hardware-to-hardware mode. That is many times more performant than the hardware-to-host mode that is required when using netmap within pfSense. Of course using a separate box would mean no GUI, but that's how the vast majority of the world uses Suricata already (without a GUI).
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    572 Topics
    3k Posts
    keyserK
    @Antibiotic No it’s not possible with NtopNG as it is not a Netflow collector. You need nProbe for that which will “translate” recieved netflows into flows that NtopNG understands and can visualize (with very very little detail might I add as Netflows has no additonal information apart from sender/reciever and volume). The NtopNG package and the product in general is more geared towards visualising and recording traffic details from actual packet captures. This contains MUCH more metadata about the sessions than netflows (DNS names, protocol information and myriads of other things). But pffSense Plus has a builtin Netflow exporter if you have an external netflow collector on hand.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    High_VoltageH
    @wesley33taylor okay, now I have to ask, just due to being especially dense today, what and how did you do that? what do others need to change, so that there is written history for anyone else that might end up finding this thread and wanting to do the same, the usefulness of archival purposes and the desire to confirm I've done the same drive me to ask this. please advise.
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    501 Topics
    3k Posts
    A
    Hi, Please help to forward / report the bugs in ACME 1.0 package. Thanks.
  • Discussions about the FRR Dynamic Routing package on pfSense

    295 Topics
    1k Posts
    J
    Anyone else happen to notice that when configuring BFD, if you create a peer and select a profile - after save, re-edit the peer and the Profile is not represented. It appears as "None". You have to check the raw config to determine if the profile was actually assigned to the peer. This is on 2.8.1 (all packages up to date as of the date/time of this post). UPDATE: if re-edit and save (without re-configuring the profile none to what you want) - the save will strip the profile from the peer.
  • Discussions about the Tailscale package

    91 Topics
    611 Posts
    T
    Hi All, I use HAProxy to redirect to a range of https internal resources, this works really well at the moment through the WAN where I have source limits set up, and I can connect to the internal resources from limited external IP Addresses. Given I have tailscale I would like to basically be able to put custom dns entries in to point these hostnames to my pfsense tailscale IP4 address (100.89.148.118) but I am not having any luck getting this working. At the moment, I am just trying to connect to HAProxy using https://100.89.148.118 but it is getting blocked by the firewall. Sep 11 11:55:58 tailscale0 Default deny rule IPv4 (1000000103) 100.89.148.10:53148 100.89.148.118:443 TCP:S I have tried with and without NAT redirecting internally to 127.0.0.1, and I also have rules set up to allow any traffic to and from my tailnets (defined in an alias) but I still keep getting these connections from my other tailscale machines being blocked on the pfsense machine. Can someone give me some pointers on what I am missing because I can see the requests are coming through to the pfsense machine, and in theory the rules should allow it through but I cant see why they don't. I do have tailscale ACL in place, but clearly that is not an issue as the requests are making it through to the firewall. 0/0 B IPv4+6 TCP/UDP TailNets * TailNets * * none Allow across Tailnets 0/0 B IPv4+6 TCP/UDP * * * 443 (HTTPS) * none Allow Tailscale IP4 I also tried adding a EasyRule but because the tailscale0 interface doesn't exist in pfsense it throws an error and won't let me add that rule. Appreciate any help or tips, Cheers.
  • Discussions about WireGuard

    701 Topics
    4k Posts
    QuantumParadoxQ
    resolved! Issue was the following I corrected a few things on your config: Your Outbound NAT configuration was malformed. I corrected it to utilize Hybrid mode and configured a single Outbound NAT for your Wireguard connection, which should be much cleaner. I updated your routing table to be Automatic and switched to Policy-based routing within the firewall rules under Firewall --> Rules --> LAN I updated the name of the interface for the Wireguard tunnel to be called TORGUARD and set the MSS clamping to 1350. This can probably be bumped back up to 1400, but I wanted to make sure the clamping was small enough to avoid fragmentation. I cleaned up some redundant firewall rules and a few other "odds and ends".
  • [Suricata IDS] Extracting encrypted and unencrypted data files

    9
    0 Votes
    9 Posts
    4k Views
    bmeeksB
    @pfNeo: I did another test and I did find some files in the directory, but not the actual dll file. I found file.1 and file.1.meta. file.1 contained the following (stripped) text {"status":"success","url":"http:\/\/www.SOMEWEBSITE.com\/PHPFILE.php?=somecodeinphp"} file.1.meta contains the following TIME:              [stripped content] SRC IP:            [stripped content] DST IP:            [stripped content] PROTO:              [stripped content] SRC PORT:          [stripped content] DST PORT:          [stripped content] HTTP URI:          [stripped content] HTTP HOST:        [stripped content] HTTP REFERER:      [stripped content] HTTP USER AGENT:  [stripped content] FILENAME:          /URLPATH/file.dll MAGIC:            <unknown>STATE:            CLOSED SIZE:              126</unknown> Thanks for the feedback.  Just got back in the country from a vacation and still catching up.' Sorry about giving you the wrong rules file name.  It is custom.rules.  The snort.rules are all the pre-packaged rules. As I mentioned, testing of the file capture ability in Suricata is not something I had a chance to test.  One possible issue is I may have the "magic file" setting messed up.  If you have some knowledge and want to experiment, you can edit that feature in the suricata.yaml file.  There is a "template" for that file in /usr/local/pkg/suricata called suricata_yaml_template.inc. Please post back what you discover.  I want to get this working properly.  I have been multitasking with the Snort package and working on Suricata blocking.  This has limited my time to experiment more with this feature. Bill
  • NEW - Suricata 1.4.6 IDS pkg. v0.2-BETA Released

    39
    0 Votes
    39 Posts
    18k Views
    bmeeksB
    @Supermule: Thanks a billion Bill!! Youre SO much the man of this project right now! Thank you.  One caveat for Suricata blocking.  Initially it will have to operate the same way as Snort does using libpcap.  Thus it won't be true inline-mode IPS.  Ermal has to make some changes in the ipfw code within pfSense in order to accommodate true inline IPS mode.  However, due to the problem of context switching between kernel mode and user-land, IPS mode when it comes won't be nearly as fast as the pseudo-IPS mode Snort uses (and that Suricata will use initially).  So true inline IPS is probably not going to be very useful for heavily loaded firewalls.  That's just the nature of the beast unless you go to highly customized code, and if you do that then you can't easily follow the upstream updates. The kernel changes to support true IPS may or may not make it into 2.2.  That is not up to me.  It is up to the pfSense team.  However, I can include the pseudo-IPS mode without those kernel changes.  That means pseudo-IPS can work with 2.1.x releases.  The pseudo-IPS mode is what I am working on now. Bill
  • Snort blocked ips in reverse order

    5
    0 Votes
    5 Posts
    1k Views
    bmeeksB
    @BBcan17: In my installations I see the Alerts tab showing the entries newest first. When you look at the Blocked Page, I think it displays the first alert only for the spp_rep Alert. If you sort by the "#" column it actually isn't in order (By date/time) which I assume should be. Ah…OK.  I will look into that.  The BLOCKED tab does some grouping by taking a blocked IP and then finding all the matching entries for that particular IP anywhere in the Alerts log file.  So if IP address 1.2.3.4 has been blocked say 10 times in the last 3 days, when it gets blocked again, the BLOCKED tab will show all the previous 10 entries along with the current one.  This assumes two things:  (1) you have the blocks being automatically cleared on some interval, and (2) the alerts log has not been itself cleared out. UPDATE:  there is no sorting of the grouped IP data.  That is, the code does not specifically sort by alert time when grouping IPs for display on the BLOCKED tab. Bill
  • Snort does not run in WAN interface in pfSense 2.1

    26
    0 Votes
    26 Posts
    11k Views
    Z
    FYI The following being enabled kept the WAN interface from turning on. It will show enabled, but it will have that red X next to it and it refused to start. After troubleshooting, I narrowed it down to this very specific rule (which you need to add to your exception list) 2011695 ET WEB_CLIENT Possible Microsoft Internet Explorer Dynamic Object Tag/URLMON Sniffing Cross Domain Information Disclosure Attempt Disclosure Attempt If I disable that, then the WAN interface is able to show the green play button (running) without issue.
  • PfBlocker Widget XHTML Errors

    2
    0 Votes
    2 Posts
    840 Views
    D
    Honestly? pfBlocker needs a severe diet, getting rid of useless stuff such as the GeoIP-based lists years and years old and completely useless the legacy HTML tables layout needs to get eradicated everywhere across the pfSense code these "validator" fixes caused a bunch of severe regressions (such as completely breaking the schedules) lately so IMNSHO this just should be left as it is as long it works
  • PfBlocker Errors

    2
    0 Votes
    2 Posts
    816 Views
    BBcan177B
    Goto  Advanced:Firewall/NAT  and increase the "Firewall Maximum Table Entries".
  • Ookla Speedtest Mini

    2
    0 Votes
    2 Posts
    2k Views
    pttP
    For what it's worth…..  ;) https://forum.pfsense.org/index.php?topic=59501.msg320248#msg320248
  • PHPsysinfo error.

    3
    0 Votes
    3 Posts
    1k Views
    J
    Thanks, downloaded new version and it works about 90%. Will play with .ini file and see if i can detect the hardware elements.
  • DansGuardian Reporting 'Access Denied' settings not working

    13
    0 Votes
    13 Posts
    4k Views
    S
    Bryan: Thank you for your help on this. I finally got around to following your advice to uninstall DansGuardian from the gui, then from a terminal session I deleted all of the dansguardian files from your steps #2-3. I upgraded pfsense to 2.1.2. I then reinstalled DansGuardian from the gui, and everything seems to be working correctly. The correct symlinks are there, and I can edit the configurations using the gui. Almost all of my previous settings are still there– I'm glad about that but I am curious where those configuration settings are stored. ** Tip: After reinstalling DansGuardian, I had trouble getting DansGuardian to start until I deleted .dguardianipc and .dgaurdianurlipc in /tmp. Rebooted and it works again.  (see this message for this tip: https://forum.pfsense.org/index.php?topic=75068.msg409652#msg409652)
  • Auto backup restore hash not matching though it should

    8
    0 Votes
    8 Posts
    2k Views
    C
    A phantom new line has showed up for some reason out of nowhere, unrelated to anything that's changed recently. We're still looking for the source of it, but in the mean time, a new package v1.23 is out there that fixes the issue. If it's something we can fix only server-side, we will, for now if you upgrade the package it'll work.
  • Pfsense GUI & Dansguardian woes …

    18
    0 Votes
    18 Posts
    7k Views
    A
    Worked perfectly, I can edit the template, save, and the changes take effect immediately! Many thanks for your help. The DG/Squid combo appears to be working nicely now, I don't notice any browsing difference going through the proxy compared to a direct connection except of course the filtering - but I am only 1 user. Monday I'll point a group of students at it - that's when the problems began last few times with timeouts, slowness, etc.. Hopefully it won't this time. Again, thanks for your help.
  • Package Install on 2.1.1 after Upgrade

    2
    0 Votes
    2 Posts
    1k Views
    D
    I can confirm I ran into this same issue, I however didn't need to have the proxy set, just used it to allow caching.  Since https isn't cached on my Squid setup I just removed it, and problem was resolved. The autoupdate firmware check was still able to find updates, and the problem persisted after the 2.1.2 update which was done on my system which had this problem, prior to fixing the issue. However its definitely a repeatable scenario that should be resolve in the case where the proxy is required.
  • Can't install OpenVPN Client Export Utility

    7
    0 Votes
    7 Posts
    2k Views
    I
    @priller: There is a new option you can select to bypass the check. System: Advanced: Miscellaneous: Packages settings Just what I needed! Many thanks.
  • Squid authentication with logged on user possible?

    2
    0 Votes
    2 Posts
    993 Views
    jimpJ
    It's been covered on here before a few times in other threads. Try searching for squid and NTLM and similar topics.
  • PfBlocker no longer updating aliases since upgrading to pfSense 2.1.1

    5
    0 Votes
    5 Posts
    1k Views
    D
    Well, is should not keep disabling itself on every damn reinstall, dunno what's the bug there. Reported many times but this thing is pretty much in need of major rewrite, dropping all those not anymore useful features, like years old geoIP lists.
  • 0 Votes
    3 Posts
    1k Views
    P
    It is thank you! Although there now appears to be a problem with the Emerging Threats Open rule set, specifically one of the rules in "emerging-web_client.rules" that is causing a fatal error and preventing Snort from starting. I have disabled those rules for now.
  • Siproxd URLMAP is full

    2
    0 Votes
    2 Posts
    1k Views
    W
    Guys can anyone help me to recompile Siproxd package?
  • Sarg system log error how to fix?

    1
    0 Votes
    1 Posts
    645 Views
    No one has replied
  • Hyperlink PFblocker Dashboard Widget Label

    6
    0 Votes
    6 Posts
    2k Views
    F
    Edit - try this Create a backup of /usr/local/www/widgets Save http://www.filedropper.com/pfblockerlink Transfer pfBlockerLink.tar to /tmp/ tar xf pfBlockerLink.tar cd pfBlockerLink ./patch.sh
  • PfBlocker not blocking addresses

    15
    0 Votes
    15 Posts
    4k Views
    F
    Is the status for the dashboard widget a green up arrow or a red down arrow? Can you check your Firewall \ Rules \ WAN - to see if there is a pfblocker auto rule that has been created for each of your pfblocker lists ? This page https://forum.pfsense.org/index.php?topic=42543.705 talks about a bug that might be causing your problem.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.