Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    N

    Can I use pgblockerng aliases in Haproxy?

    80758505-9bad-4dad-a80b-c159be1045a2-image.png

    If it was a firewall rule, typing pfb would produce a dropdown to select.

    Here it has to be written, but will it work? Is it supported?

  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    bmeeksB

    I saw where the Netgate kernel developer updated the Suricata package in the pfSense 25.07 development branch to work with the new kernel PPPoE driver. But so far as I know that updated package has not been migrated to 2.8 CE.

    Here is the commit into the DEVEL branch: https://github.com/pfsense/FreeBSD-ports/commit/68a06b3a33c690042b61fb4ccfe96f3138e83b72.

  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    K

    @pulsartiger
    The database name is vnstat.db and its location is under /var/db/vnstat.
    With "Backup Files/Dir" we are able to do backup or also with a cron.

  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    A

    @wbmstr2000 : Thanks! I will investigate it, greetings

  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    99 Topics
    2k Posts
    K

    @elvisimprsntr thanks for your suggestion. I will give it a try.

  • Discussions about the ACME / Let’s Encrypt package for pfSense

    493 Topics
    3k Posts
    johnpozJ

    @MacUsers

    https://help.zerossl.com/hc/en-us/articles/360060119933-Certificate-Revocation

    edit: oh you prob out of luck

    You can revoke any certificate issued via the ZeroSSL portal. Currently, certificates issued via ACME can not be revoked from inside the portal - please follow the instructions of your ACME client for revoking those certificates.

    the gui in pfsense does not have the ability to revoke - you prob have to move the certs to something you have certbot installed to and revoke that way.

  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    R

    I had a similar issue with Routed VTI over IPsec recently. FRR lost its neighbors after rebooting or when a tunnel went down. It never re-discovered it automatically. Only restarting FRR (either in GUI or via CLI) brought the neighbors back.

    When I manually added those under the OSPF neighbors tab in the GUI it seems to solve the problem as well.

  • Discussions about the Tailscale package

    88 Topics
    573 Posts
    luckman212L

    For 25.07 RC, this worked for me (run sh first)

    [25.07-RC][root@r1.lan]/root: sh # export IGNORE_OSVERSION=yes # pkg add https://pkg.freebsd.org/FreeBSD:15:amd64/latest/All/tailscale-1.84.2.pkg # service tailscaled restart # tailscale up # tailscale version 1.84.2 go version: go1.24.4 # tailscaled -version 1.84.2 go version: go1.24.4
  • Discussions about WireGuard

    689 Topics
    4k Posts
    P

    @patient0 Thanks for further suggestions. The tunnel is definitely up and so I don't think this is a CGNAT issue after all. WAN firewall rule is in place for UDP on port 51823 (otherwise the tunnel wouldn't work, right?). I can ping from client 1 -> client 2 and visa versa and also ping all points in between like you suggest. I just can't open an HTTPS connection from pfSenseB from Client 1 using a browser. But I can do this the other way round i.e. from Client 2 to pfSenseA

    I will try and do some packet capture to see if that reveals anything.

  • A question about snort?

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    C

    Thanks for reply…

  • NUT USV shutdown / service start

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    H

    http://forum.pfsense.org/index.php/topic,4019.msg24916.html#msg24916

  • Application proxies - Advanced features

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    H

    Good luck :)

  • Imspector

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    S

    Newest version of AIM is not supported yet.  Downgrade to a previous version.

    This was covered by Ryan in a different thread.

  • Sshd_config gets overwritten on reboot

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    H

    You can't shut that behaviour down. Nearly all config files are generated dynamicall on reboot or at config changes when needed. I think we have some code to allow what you are trying to do already in our head code tree so you can configure it from the gui but that probably won't appear before the 2.0 release.

    Try using one of the techniques described here to fetch that file: http://forum.pfsense.org/index.php/topic,3256.msg19680.html#msg19680
    http://forum.pfsense.org/index.php/topic,3256.msg19744.html#msg19744

  • Snort blocking for more than an hour

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    S

    Not on future versions, you need to modify the config.xml file.

  • Snort.conf gets overwritten

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    C

    ok I will start there thanks for the quick response

  • IMSpector-MSN Logon issue

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    ?

    No, just one external connection

  • Squid Cache & Disk Usage in system status

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    M

    I suspect the default value of 'largest item to cache' of 4kb has a lot to do with it.  Thanks for the tip…I'll wait a few days longer for the cache to fill.

  • Bypass the transparent proxy

    Locked
    1
    0 Votes
    1 Posts
    3k Views
    No one has replied
  • Snort won't restart

    Locked
    8
    0 Votes
    8 Posts
    4k Views
    V

    It's back :'(.
    Running 1.0.1-SNAPSHOT-03-18-2007 built on Thu Mar 8 22:14:44 EST 2007.

    Got this from syslog:

    | Mar 13 02:16:32 snort2c[87594]: attack detected non-whitelisted ip: 60.27.190.214 blocked !                                                                                                                    |
    | Mar 13 02:17:57 dhclient[81270]: DHCPREQUEST on xl1 to 255.255.255.255 port 67                                                                                                                                |
    | Mar 13 02:17:57 dhclient[81270]: DHCPACK from 81.236.128.1                                                                                                                                                    |
    | Mar 13 02:17:57 dhclient[81270]: bound to 81.236.134.3 – renewal in 600 seconds.                                                                                                                            |
    | Mar 13 02:27:57 dhclient[81270]: DHCPREQUEST on xl1 to 81.228.3.186 port 67                                                                                                                                    |
    | Mar 13 02:28:28 last message repeated 3 times                                                                                                                                                                  |
    | Mar 13 02:29:58 last message repeated 2 times                                                                                                                                                                  |
    | Mar 13 02:35:03 last message repeated 2 times                                                                                                                                                                  |
    | Mar 13 02:37:58 dhclient[81270]: DHCPDISCOVER on xl1 to 255.255.255.255 port 67 interval 8                                                                                                                    |
    | Mar 13 02:37:58 dhclient[81270]: DHCPOFFER from 81.236.128.1                                                                                                                                                  |
    | Mar 13 02:38:00 dhclient[81270]: DHCPREQUEST on xl1 to 255.255.255.255 port 67                                                                                                                                |
    | Mar 13 02:38:00 dhclient[81270]: DHCPACK from 81.236.128.1                                                                                                                                                    |
    | Mar 13 02:38:00 dhclient[81270]: bound to 81.236.134.3 – renewal in 600 seconds.                                                                                                                            |
    | Mar 13 02:38:01 login: login on ttyv0 as root                                                                                                                                                                  |
    | Mar 13 02:38:10 snort2c[87594]: SIGTERM received - exiting                                                                                                                                                    |
    | Mar 13 02:38:28 SnortStartup[74604]: Ram free BEFORE starting Snort: 40M – Ram free AFTER starting Snort: 39M -- Mode ac-sparsebands -- Snort memory usage:                                                  |
    | Mar 13 02:38:28 snort[87591]: *** Caught Term-Signal                                                                                                                                                          |

    | Mar 13 02:38:28 snort[87591]: Final Flow Statistics                                                                                                                                                            |
    | Mar 13 02:38:28 snort[87591]: ,–--[ FLOWCACHE STATS ]–--------                                                                                                                                              |
    | Mar 13 02:38:28 snort[87591]: Memcap: 10485760 Overhead Bytes 16400 used(%79.610596)/blocks (8347776/46545) Overhead blocks: 1 Could Hold: (58579)                                                            |
    | Mar 13 02:38:28 snort[87591]: IPV4 count: 46544 frees: 0 low_time: 1173728308, high_time: 1173747400, diff: 5h:18:12s                                                                                          |
    | Mar 13 02:38:28 snort[87591]:    finds: 130156627 reversed: 68755550(%0.000000)      find_success: 130110083 find_fail: 46544 percent_success: (%0.000000) new_flows: 46544                                  |
    | Mar 13 02:38:28 snort[87591]:  Protocol: 1 (%0.000000)    finds: 4265    reversed: 1352(%0.000000)    find_success: 3427    find_fail: 838    percent_success: (%0.000000)    new_flows: 838                  |
    | Mar 13 02:38:28 snort[87591]:  Protocol: 6 (%0.000000)    finds: 130118608    reversed: 68746792(%0.000000)    find_success: 130092296    find_fail: 26312    percent_success: (%0.000000)    new_flows: 26312 |
    | Mar 13 02:38:28 snort[87591]:  Protocol: 17 (%0.000000)    finds: 33754    reversed: 7406(%0.000000)    find_success: 14360    find_fail: 19394    percent_success: (%0.000000)    new_flows: 19394            |
    | Mar 13 02:38:28 snort[87591]: Snort received 163787886 packets                                                                                                                                                |
    | Mar 13 02:38:28 snort[87591]:    Analyzed: 107665066(65.734%)                                                                                                                                                |
    | Mar 13 02:38:28 snort[87591]:    Dropped: 56122706(34.265%)                                                                                                                                                  |
    | Mar 13 02:38:28 snort[87591]:    Outstanding: 114(0.000%)                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]: ===============================================================================                                                                                                  |
    | Mar 13 02:38:28 snort[87591]: Breakdown by protocol:                                                                                                                                                          |
    | Mar 13 02:38:28 snort[87591]:    TCP: 107045797  (99.425%)                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]:    UDP: 33754      (0.031%)                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]:    ICMP: 4420      (0.004%)                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]:    ARP: 580490    (0.539%)                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]:  EAPOL: 0          (0.000%)                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]:    IPv6: 0          (0.000%)                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]: ETHLOOP: 0          (0.000%)                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]:    IPX: 0          (0.000%)                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]:    FRAG: 0          (0.000%)                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]:  OTHER: 605        (0.001%)                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]: DISCARD: 0          (0.000%)                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]: ===============================================================================                                                                                                  |
    | Mar 13 02:38:28 snort[87591]: Action Stats:                                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]: ALERTS: 39                                                                                                                                                                      |
    | Mar 13 02:38:28 snort[87591]: LOGGED: 123                                                                                                                                                                      |
    | Mar 13 02:38:28 snort[87591]: PASSED: 0                                                                                                                                                                        |
    | Mar 13 02:38:28 snort[87591]: ===============================================================================                                                                                                  |
    | Mar 13 02:38:28 snort[87591]: TCP Stream Reassembly Stats:                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]:    TCP Packets Used: 107045780  (99.425%)                                                                                                                                      |
    | Mar 13 02:38:28 snort[87591]:    Stream Trackers: 35912                                                                                                                                                      |
    | Mar 13 02:38:28 snort[87591]:    Stream flushes: 23072828                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]:    Segments used: 55005722                                                                                                                                                      |
    | Mar 13 02:38:28 snort[87591]:    Segments Queued: 56073646                                                                                                                                                    |
    | Mar 13 02:38:28 snort[87591]:    Stream4 Memory Faults: 2159                                                                                                                                                  |
    | Mar 13 02:38:28 snort[87591]: ===============================================================================                                                                                                  |
    | Mar 13 02:38:28 snort[87591]: Snort exiting                                                                                                                                                                    |
    | Mar 13 02:38:47 SnortStartup[74706]: Ram free BEFORE starting Snort: 64M – Ram free AFTER starting Snort: 64M -- Mode ac-sparsebands -- Snort memory usage:                                                  |
    | Mar 13 02:39:26 dnsmasq[572]: reading /etc/resolv.conf                                                                                                                                                        |
    | Mar 13 02:39:26 dnsmasq[572]: using nameserver 195.67.199.41#53                                                                                                                                                |
    | Mar 13 02:39:26 dnsmasq[572]: using nameserver 195.67.199.40#53                                                                                                                                                |
    | Mar 13 02:39:26 dnsmasq[572]: using nameserver 195.67.199.39#53                                                                                                                                                |
    | Mar 13 02:40:21 sshd[75185]: Accepted keyboard-interactive/pam for root from 192.168.11.1 port 3358 ssh2                                                                                                      |
    | Mar 13 02:48:00 dhclient[81270]: DHCPREQUEST on xl1 to 81.228.3.186 port 67                                                                                                                                    |
    | Mar 13 02:48:40 last message repeated 4 times                                                                                                                                                                  |
    | Mar 13 02:50:27 last message repeated 4 times                                                                                                                                                                  |

  • UPS shutdown

    Locked
    67
    0 Votes
    67 Posts
    35k Views
    P

    @rsw686:

    @patord:

    @rsw686:

    Hmm I just hooked up a ups to my ip330 on com2, and I couldn't get it to work. I have an embedded install on there so that might be part of the issue. When I try and start the driver control I get the error

    Can't uu_lock ttyd1: creat error: No such file or directory

    I installed the NUT package on a fresh hard drive based SNAPSHOT-02-14-2007 and get a similar error (for ttyd0) on a box that worked fine under win32 (com1) for an APC BackUPS Pro with the 95B cable in full signal mode.  I tried all the various permutations from the webgui with no go. Went to the shell and hand ran the various nut binaries to see what I could figure out.  At first I thought it had to do with settings in /etc/ttys for the various ttydX, especially ttyd0 due to the console definitions.  But after eliminating that and a few other things, I'm still at a loss.

    I'll try hand editing the ups.conf and try setting it to simple signaling like you did to see what happens.

    Does the /var/spool/lock directory exist? If you create that directory and run chown uucp:dialer /var/spool/lock does it work? If so I will put a check to make sure that directory exists and if not create it. All the full installs I've seen have already had it, but something might have changed.

    From your post you have the console running on ttyd0. The only thing I can think of is that there is some conflict when the console is being directed to a serial port and using other serial ports.

    Sorry for the late reply.  I saw you committed some changes to the package to address this and a few other items.  On fresh installs from the snapshots back then, the /var/spool/lock was created and did exist at the time with the proper permissions.  So the safety checks you put in would be just that.

    The ttyd0 was something else I was looking into, more of the serial port on the box I was testing not properly mapping.

    I'm getting ready to roll out a new test box on to this UPS (APC Pro) using snapshot-03-08-2007 and I'll see what happens with the latest nut package.

  • Snort in dual-wan configuration

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    Y

    Snort is currently limited to running on only 1 WAN interface, iirc.

  • Squid "replicating" itself inside Status–>Services

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    V

    Thanks for the tip, it did the truck :D.
    I will keep my fingers crossed and hope to never see it again.

    I was not far away from a nervous breakdown ;D.

  • Squid don't log

    Locked
    6
    0 Votes
    6 Posts
    3k Views
    J

    honestly with the latest version this is not an issue that I know up, go to installed packages and update it

  • List of visited pages in squid

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    J

    Yes, vist /var/squid/log/access.log in the shell,  you have to have the box checked to log access in the gui.  This file can be grepped and searched.  Just make sure you rotate this log frequently, I've seen them as large as 8 or 9 gigs in the past.

  • Tried 3 different packages, non want to install

    Locked
    8
    0 Votes
    8 Posts
    3k Views
    V

    Thanks for the info :D.
    Will do an update asap.

  • Updatexlrator

    Locked
    9
    0 Votes
    9 Posts
    9k Views
    H

    hi,

    not my update, it is client's update, i have aprox. 500 clients on 4 diffrent pfboxes. any way if it should work, it will work then.

    many thanks

  • Snort not working anymore

    Locked
    10
    0 Votes
    10 Posts
    5k Views
    P

    Yeah, Issue #1 is the main problem I've been having, next would be Issue #1 whitelisted machines getting blocked.

    Issue #1

    Each change or update to the config modifies snort.conf and ,/32 is added to the HOME_NET variable, then snort fails to start, manual modifcation to change it to reflect the hosts IP is required (i.e. 10.0.1.2/32) then restart of snort

    Issue #2

    Snort is blacklisting whitelisted IPs, (namely my DNS servers and an additional server in my DMZ.

    This may be something I have to work out on my own, but as stated my setup is

    WiFi Router (external IP #1
    Cable Modem–-----Hub----<
                                            pfSense/Snotr(external IP #2

    Snort picks up traffic between the WiFi router (ext IP #1) and things like my DNS servers. this is where I get the error

    (snort_decoder) WARNING: ICMP Original IP Fragmented and Offset Not 0! [ ** ] 
    03/06-21:50:51.235361 [[b]External IP #1] -> [[b]DNS server]
    ICMP TTL:64 TOS:0x0 ID:19164 IpLen:20 DgmLen:56 DF
    Type:3 Code:3 DESTINATION UNREACHABLE: PORT UNREACHABLE
    ** ORIGINAL DATAGRAM DUMP:

    Should I just add an additional NIC to pfSense, and rather then go inet,hub,split.. go Inet-> pfSense… thus bridging WAN to OPT1 and OPT2 on pfSense, and plug in my WiFi router into OPT2, giving it full * accesss... ( I don't wanna block anything for WiFi, I want full open access.) Only think is, snort will still function on that network as I'm listening on WAN...

    Could I listen on OPT1 instead? or would snort still function?

    [snort] OPT1 - Internal network
    I.e.  inet -> pfsense WAN <
                                          OPT2 - DMZ WiFi

    or would that work?

    Rather then
                              OPT1 - Internal network
    inet WAN [snort] <
                              OPT2 - WiFi DMZ

  • ASSP Still Not Fixed? :(

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    J

    Its true, this is open source, its all about contributing

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.