Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    F
    @JonathanLee no way to fix this ?? to do some kind of purge to squid and squidguard and install them again The last option I'm trying to avoid is to reinstall the entire system.
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    M
    Hi, I had a problem with my home network today, so I checked pfsense and discovered that suricata had blocked the wan ip. After some tests and triggering some suricata alerts, the wan ip was blocked. I restarted pfsense and ran some more tests, but the problem no longer occurred. I then checked the wan interface settings and indeed the ip list does not include the wan ip, both now that it's working and before, when it was blocked. I'm using pfsense 2.8.0 and suricata 7.0.8_2. I use PPPoE to access the Internet.
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    dennypageD
    @Leon-Straathof Data retention settings are handled inside of ntopng. Documentation here. Pay attention to the RRD note. Also, if you've turned on some of the slice and dice time series information (is off by default), I'd suggest turning them back off. These balloon the storage requirements and are of little actual use.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    keyserK
    I am considering a “novel” solution to this lack of syslog support in pfBlockerNG. The obvious way would still be to use syslog-ng but I’m instead considering using the builtin syslogd in pfsense as that is already shipping pfsense logentries to my siem. It seems it would be quite simple to use the SHELLCMD package to run a small daemon script at startup that monitors the needed pfBlocker logfiles with “tail -F” and then converts the contents into a more syslog friendly format before piping that into “logger” with the local0 facility as destination. That destination is already syslogged of to my SIEM by the builtin syslogd setup in pfSense. This would probably still see everything being shipped in duplicates because of how pfBlockerNG rotates its logs (if that has not been fixed), but this way I could adapt the script to skip entries in the 1 minute timeframe when the pfBlocker reload happens. That it still a rather shitty and complicated solution requiring a package, but it seems builtin syslog support is not in the pfBlockerNG development priority list, so a manual workaround is required.
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    496 Topics
    3k Posts
    R
    @provels said in updating to acme 1.0 breaks system beyond repair: need to restore from backup: This same mess happened to me, even w/o Acme, going from 25.07 to *.1. Blew, reinstalled w/ Crowdsec, blew again, reinstalled, clipped all the Crowdsec info from config.xml, restored config, back to normal. Crowdsec is a great concept, but I think I'm out. I never had this issue with Crowdec before the ACME update, even with updating from 2.7 to 2.8 there was no issues. In fact after restoring from a backup after the ACME update, Crowdsec reinstalled just fine, and this was before the recent release a couple days ago that contained a fix.
  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    yon 0Y
    said in Please update frr on Pfsense+ to FRR 10.3: https://redmine.pfsense.org/issues/15785 now frr 10.4.1
  • Discussions about the Tailscale package

    90 Topics
    606 Posts
    M
    @yobyot I've SSHed into pfsense and for the sake of testing I've simply run the command: tailscale up --auth-key=tskey-client-kQ_THE_REST_IS_A_SECRET\?preauthorized=true\&ephemeral=false --accept-dns=false --accept-routes --advertise-exit-node --advertise-routes=X.X.X.X/24 --advertise-tags=tag:pfsense Note the preauthorized=true and ephemeral=false I gave this key all permissions (temporarly as I just wanted to verify it's working) of course I had to register the tag used also in the ACL tags pane: https://login.tailscale.com/admin/acls/visual/tags so far so good
  • Discussions about WireGuard

    697 Topics
    4k Posts
    H
    I figured out the issue. I missed adding the 3rd locations Lan to the static routing. Now all is working perfect.
  • Error : The requested URL could not be retrived - pfsense - squid3

    6
    0 Votes
    6 Posts
    4k Views
    KOMK
    is there anyway to get the antivirus to work? No idea, but then I don't use that stuff.  I played with the Clam package but it was slowing down our link too much, and we already subscribe to a large vendor AV solution on all clients and servers here so the Clam stuff was redundant and less effective.  I know the new 2.2 using HAVP, but I still won't use it.
  • Snort 2.9.7.0 v 3.2.2 shows N/A

    8
    0 Votes
    8 Posts
    2k Views
    bmeeksB
    @PfChris: Hi bmeeks, i had "auto management" on and the Alerts File set to 500KB. Changed it to 50MB and will now check if the "problem" occurs again. Besides the "N/A" - does it work like it should? If the N/A is only a "cosmetic" thing then i don't mind at all - as long as snort is working properly Thank you for your help Most assuredly it works.  The "N/A" is purely cosmetic.  The blocked IP is in the blocking alias table (the <snort2c>table) or else it would not show up on the BLOCKED tab.  As I described above, the "N/A" simply means the alert log got rotated and so the GUI can't find the old alert description to display.  It does not mean the block is invalid or anything.  It just means the GUI code can't find the old rule description to show you (since it got rotated with the older alert log file). Bill</snort2c>
  • Monit "package" for pfSense part 3

    2
    0 Votes
    2 Posts
    808 Views
    C
    i've been using monit I think since 1.2 days… Great little tool! If I ever start to learn to code, this would be probably be my first pfSense package.
  • LCDproc

    5
    0 Votes
    5 Posts
    1k Views
    M
    :) Thank you
  • Platform 2.2 & Packages that dose not work

    7
    0 Votes
    7 Posts
    1k Views
    K
    Yeah - I know.  Thats what I told my friend and theat what he told the customers and yet…. They keep whining for it.
  • FreeRadius 2 not working: error code when running test command

    3
    0 Votes
    3 Posts
    1k Views
    U
    It was on an amd64 box. But my friend did some tinkering with it and got it working.
  • Growl in 2.2 rc

    2
    0 Votes
    2 Posts
    719 Views
    T
    Test button works but not seen any alerts from pfsense yet.
  • {SOLVED} Unable to communicate with packages.pfsense.org?

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Snort adding multiple cron entries which expire blocked IPs too early

    8
    0 Votes
    8 Posts
    1k Views
    B
    Thx, for the fix!  :) Now, let´s wait for the pfSense Team. :-P
  • Snort wont start

    15
    0 Votes
    15 Posts
    2k Views
    bmeeksB
    I posted a Pull Request today that adds some additional validation checks on IP addresses and subnets when creating the HOME_NET and PASS LIST values for Snort.  Hopefully this corrects the issue with only a single forward slash ( "/" ) getting into HOME_NET and/or PASS LISTS. Here is a link to the Pull Request:  https://github.com/pfsense/pfsense-packages/pull/805 Bill
  • Guide to configure squid, squidguard, https?

    38
    0 Votes
    38 Posts
    9k Views
    M
    Some help please :)
  • 0 Votes
    21 Posts
    3k Views
    C
    pfBlocker has been removed, and replaced by pfBlockerNG for 2.2. It's in the package system if you want to install it
  • SNORT not blocking/reporting to Snort widget if

    2
    0 Votes
    2 Posts
    655 Views
    bmeeksB
    @Supermule: Snort is not blocking/reporting to widget if WAN IP REP is enabled. It is started and returning nothing Any idea to why?? Do you have IP REP files downloaded and then assigned on the WAN interface?  The files should show up under the IP LISTS tab (on the top row of tabs).  Then on the WAN tabs (lower tab row) you assign particular files to the interface on the IP REP tab.  Once you make the assignments, Snort will need restarting on that interface. I have the ET-Open rules "emerging-compromised-ips.txt" list assigned to my WAN, and I am getting blocks.  Just had a few in the last couple of hours.  The alert text will this:  (spp_reputation) packets blacklisted and the GID:SID is 136:1. Bill
  • Suricata 2.0.6 update coming soon – but only for pfSense 2.2

    3
    0 Votes
    3 Posts
    1k Views
    bmeeksB
    This update was merged this morning and should appear for pfSense 2.2 users only as mentioned in the release notice above.  Go to System > Packages > Installed Packages and the update should be showing as available. NOTE:  this update and future Suricata updates will only be available for pfSense 2.2 and above due to changes in the Suricata source code that break compiling a package on pfSense 2.1.x. Bill
  • Great pFsense 2.2 and squid3

    1
    0 Votes
    1 Posts
    816 Views
    No one has replied
  • Can't start Clamd antivirus - Squid3

    4
    0 Votes
    4 Posts
    2k Views
    N
    @firefox: i did not see this packages in the packages manger ? clamd c-icap where this from ? it is automaticly installed with squid3
  • Ntopng - regular errors

    6
    0 Votes
    6 Posts
    2k Views
    C
    Thanks!
  • Bandwidth monitor

    1
    0 Votes
    1 Posts
    922 Views
    No one has replied
  • Squid HTTPS/SSL killing Cisco VPN client connection

    11
    0 Votes
    11 Posts
    3k Views
    C
    A couple links on how its works and such… They are different but same concept https://mitmproxy.org/doc/index.html http://docs.diladele.com/faq/squid/index.html
  • Snort in promiscuous mode does not block automatically

    10
    0 Votes
    10 Posts
    3k Views
    bmeeksB
    @peridian: Doh!  Figured it out. @bmeeks: In this case, the bad IP (the source IP in this alert) was blocked so no further communication can happen there. You would think, however looking at the logs I realised that squid was operating on that interface in transparent mode.  snort was generating the block for the external IP, but squid was returning a cached copy of the content, which made it look to the client like the connection had still worked. @bmeeks: If so, you will need to define a custom PASS LIST, uncheck the option to include local networks, then manually assign the list to the VLAN interface (or the LAN interface) and restart Snort. Excellent, thank you for that, it achieved exactly the result I was looking for.  I don't know how I ever got snort to produce blocks originally if I didn't know to do this, but it is now behaving as expected, and with squid still enabled on the interface. Thank you for all your help, it's very much appreciated. Regards, Rob. Glad you got it figured out.  Unless you are worried about your internal VLAN hosts being a source of and spreading some malware, I don't understand why you want their IP addresses blocked at the firewall as well.  Simply blocking the other end of the offending traffic stream is protection enough for the victim host.  I'm assuming you are running this in a home setup.  As an example, assume your PC browses to a web site and some rogue ad content on the site causes Snort to fire an alert and insert a block.  If you let it block both the bad web site AND your own PC's address, then you can find yourself locked out of the firewall (at least from your PC).  Isn't it sufficient that just the far-end rogue source or destination be blocked? Bill
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.