Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    JonathanLeeJ

    @aGeekhere They just release Squid 7 and it is stable if you want to check it out

    "The Squid HTTP Proxy team is very pleased to announce the availability
    of the Squid-7.1 release!

    This release is, we believe, stable enough for general production use.
    We encourage all users of any previous major version of Squid to upgrade to it,
    as well as users of beta version 7.0.X.

    It can be downloaded from GitHub, at
    https://github.com/squid-cache/squid/releases/tag/SQUID_7_1

    Since version 6, Squid offers:

    better support for overlapping IP ranges and wildcard domains in acl countless security, portability, and documentation fixes

    Since version 6, some previously deprecated features have been removed:

    Edge Side Includes (ESI) access to the cache manager using the cache_object:// scheme - use
    http instead the squdclient tool - use curl
    http://<squid-address>/squid-internal-mgr/menu instead the cachemgr.cgi tool the purge tool - use the http PURGE method instead Ident protocol support basic_smb_lm_auth and ntlm_smb_lm_auth helpers - use Samba's
    ntlm_auth instead

    Further details can be found in the release notes and in the changelog

    Please remember to run "squid -k parse" when testing the upgrade to a new
    version of Squid. It will audit your configuration files and report
    any identifiable issues the new release will have in your installation
    before you "press go".

    If you encounter any issues with this release please file a bug report at
    https://bugs.squid-cache.org/

    --
    Francesco Chemolli

    squid-users mailing list
    squid-users@lists.squid-cache.org
    https://lists.squid-cache.org/listinfo/squid-users"

    I am having issues with this right now

    "I got as far as this with the make clean install no matter what I do I can’t get this package installed. I have tried pkg install heimdal same error after install and pkg install krb5 and pkg install krb5-devel. I don’t know what I am doing wrong it does the make clean for a while and crashes for the bootstrap version the other one I could get going

    ERROR: checking whether S5L_CTX_sess_set_get_cb() callback accepts a const ID argument" ... yes checking "whether X509_get0_signature() accepts const parameters" ... yes checking whether the TXT_DB use OPENSSL_PSTRING data member... yes checking whether the squid workaround for buggy versions of sk_OPENSSL_PSTRING_V alue should used... no checking whether the workaround for OpenSSL IMPLEMENT_LHASH_ macros should used ... yes configure: OpenSSL library support: yes -lcrypto -lss1 configure "Library -Kit-kros" support: no (auto) /configure: LIBHEIMDAL_KRB5_PATH+=-L/usr/lib: not found /configure: LIBHEIMDAL_KRB5_CFLAGS+=-1/usr/include: not found checking for LIBHEIMDAL_KRB5... no configure: error: Required library 'heimdal-krb5' not found ニニニン Script "configure" failed unexpectedly. Please report the problem to timp87@gmail.com maintainerl and attach the '/usr/ports/uuu/squid/uork/squid-7.1/config.log" including the output of the failure of your make command. Also, it might be a good idea to provide an overview of all packages installed on your system te.g. a /usr/local/sbin/pkg-static into -g -tal. *** Error code 1 Stop. makel1]: stopped in /usr/ports/www/squid *** Error code 1 Stop. make: stopped in /usr/ports/www/squid root@free:/usr/ports/www/squid #"

    it gets so far along and fails with this error.

  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    P

    Hi. Is there any way to get Suricata working with the new PPPoE driver (available since version 2.8.0). Unfortunately, after enabling the new driver, Suricata doesn't report any alerts.

  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    K

    @pulsartiger
    The database name is vnstat.db and its location is under /var/db/vnstat.
    With "Backup Files/Dir" we are able to do backup or also with a cron.

  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    M

    @Laxarus This worked for me as well. Though I had to search the web how to edit the file (the easiest way).

    Therefore:

    Addition for anyone struggling to find where to edit files on your pfsense system.

    Go to Diagnostics --> Edit File --> insert the location of the file:

    /usr/local/pkg/pfblockerng/pfblockerng.sh

    Go to line number 1232 by filling it in the Go to line field.

    That line should read:

    s1="$(grep -cv ^${ip_placeholder2}$ ${masterfile})"

    replace only (leave the rest intact):

    masterfile

    to

    mastercat

    Then follow the above instructions from @Laxarus https://forum.netgate.com/post/1219635

  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    99 Topics
    2k Posts
    K

    @elvisimprsntr thanks for your suggestion. I will give it a try.

  • Discussions about the ACME / Let’s Encrypt package for pfSense

    493 Topics
    3k Posts
    johnpozJ

    @MacUsers

    https://help.zerossl.com/hc/en-us/articles/360060119933-Certificate-Revocation

    edit: oh you prob out of luck

    You can revoke any certificate issued via the ZeroSSL portal. Currently, certificates issued via ACME can not be revoked from inside the portal - please follow the instructions of your ACME client for revoking those certificates.

    the gui in pfsense does not have the ability to revoke - you prob have to move the certs to something you have certbot installed to and revoke that way.

  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    R

    I had a similar issue with Routed VTI over IPsec recently. FRR lost its neighbors after rebooting or when a tunnel went down. It never re-discovered it automatically. Only restarting FRR (either in GUI or via CLI) brought the neighbors back.

    When I manually added those under the OSPF neighbors tab in the GUI it seems to solve the problem as well.

  • Discussions about the Tailscale package

    88 Topics
    572 Posts
    A

    We have a very basic configuration between three locations. All are running Netgate firewalls (1x 4100, 1x 6100 & 1x 4200). All are on the latest firmware (03.00.00.01-2Ct-uc-15) and system versions (24.11-RELEASE).

    The local subnets are as follows:
    4100 - 192.168.5.0/24
    4200 - 192.168.4.0/24
    6100 - 192.168.1.0/24

    The VPN traffic between the 4100 and 4200 is functioning 100% as expected

    The traffic between 6100 and the 4100 works going from the 4100 subnet (192.168.5.0/24) to the 6100 subnet (192.168.1.0/24)

    Traffic from the firewall (i.e. the 6100 device) to the 4100 subnet works (i.e. I can ping any device on the 192.168.5.0/24 subnet from the 6100 firewall) but I cannot ping any device on the 4100 (192.168.5.0/24) subnet from any device on the 6100 subnet (192.168.1.0/24) - other than from the firewall itself.

    All routes are correct, but it seems that traffic from the 192.168.1.0/24 subnet hits the firewall and then gets lost - traceroute shows that it goes off into the internet.

    Note too that the 6100 has IPsec VPN configured on it as well

    Suggestions would be appreciated

    Attached is a zipped pdf file with the relevant screenshots
    Relevant screen shots.zip

  • Discussions about WireGuard

    689 Topics
    4k Posts
    P

    @patient0 Yes, have followed that guide and infact have set up quite a few Wireguard tunnels before with no issue. The difference this time is the CGNAT. I am pretty sure its some quirk of the CGNAT that is causing this but still unsure how to diagnose.

    My firewall settings on the tunnel interfaces are correct I think and are the same as I normally use, there is no blockage there.

  • Squid - diskd bug (ipcs and ipcrm not available)

    8
    0 Votes
    8 Posts
    4k Views
    T

    For Squid3 (3.4.10_2 0.2.5), on pfsense 2.2 you need ipcs and ipcrm from a 10.1 base.
    The diskd text should reflect that, now it still refers to 8.3.

    diskd uses a separate process to avoid blocking the main Squid process on disk-I/O. To use ipcs and ipcrm on squid, Download livefs.iso from ftp://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/ mount it and copy /usr/bin/ipcs and /usr/bin/ipcrm to your system and set them as executables. diskd uses a separate process to avoid blocking the main Squid process on disk-I/O. To use ipcs and ipcrm on squid, Download livefs.iso from ftp://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/ mount it and copy /usr/bin/ipcs and /usr/bin/ipcrm to your system and set them as executables.
  • FreeRADIUS “daily” issue

    6
    0 Votes
    6 Posts
    2k Views
    G

    Simply deleting /var/log/radacct/timecounter/db.daily and starting the service fixed the issue.

    The newly created db.daily is 64 KB, not 16 KB. So it looks like it got corrupted somehow.

    How do we prevent this from happening in the future?

    Thank you

  • About haproxy-devel

    2
    0 Votes
    2 Posts
    822 Views
    P

    First add a backend, in there you can add multiple destination servers.
    To actually use it, you also need a frontend that uses the backend and listens on a port.

  • Squidguard/Web Filtering Questions

    3
    0 Votes
    3 Posts
    951 Views
    J

    Thanks for your reply.  I definitely have some reading/digging to do but that link appears to contain helpful information for the active directory piece.

  • Snort error: Could not create configuration reload thread

    11
    0 Votes
    11 Posts
    3k Views
    bmeeksB

    @johanstrand:

    Hi!

    I had it set to AC. I changed to AC-BNFA and it Went from 1.3GB to 380MB. Maybe this was the reason for the original problem. I am still suspicious of the rules because now (after resinstall) I can activate all rules using AC as the pattern matcher and snort starts without any problem and it takes about 1.4GB of RAM.

    I can not reproduce the reconfig thread problem.

    /Johan

    The AC pattern matcher will slowly gobble up RAM as it operates.  I have seen posts on other sites where users have had it gobble up 16 GB of RAM and more with a lot of traffic and rules.

    There is no appreciable difference in the performance of any of the pattern matchers on today's hardware.  AC-BNFA or AC-BNFA-NQ is the suggested setting, and I would advise to never change it.

    Bill

  • Squid as parent for havp

    11
    0 Votes
    11 Posts
    3k Views
    marcellocM

    @webstor:

    Tried, couldn't fix it.
    Still the icap error. Maybe related only to amd64 ?

    Check your logs
    the icap is working on 0.2.4 version.

    There is a typo on clamav config check that i'll send a fix today.

  • Revamp of an old closed question regarding uPnP proxy.

    1
    0 Votes
    1 Posts
    612 Views
    No one has replied
  • Can snort be configured for a single interface or VLAN?

    5
    0 Votes
    5 Posts
    2k Views
    T

    Well I'm trying to eliminate any security measures from a certain lan due to bitching about the rules blocking stuff… so adding snort to the wan will probably cause more issues and they are not willing to troubleshoot.

  • Apply different blocking level to different VLans

    7
    0 Votes
    7 Posts
    2k Views
    jahonixJ

    Surely I know and have used Squid as cache. But never more than that.
    Thanks for pointing me to it.

  • Squid Reverse Proxy stops working when using Squid3 load balancing ACL

    2
    0 Votes
    2 Posts
    2k Views
    J

    I figured out how to fix the issue.

    First I had to learn some Squid bits and figure out how the Squid.conf is interpreted (ie. top-to-bottom for first-matched ACLs) and what some of the various "tags" mean. I found the following link quite useful to get some basics under the belt: http://www.deckle.co.uk/squid-users-guide/squid-configuration-basics.html

    After grokking the Squid.conf that was generated by pfSense, I figured out what the existing reverse-proxy configuration ACLs were (as it was needed to for the cache_peer_access tags).
    For those interested, you can use the "Edit File" function under the "Diagnostic" in the webconfigurator to browse to the generated Squid.conf file.

    In my case it was under: /usr/pbi/squid-i386/etc/squid/squid.conf
    Note: Yours may in in a different location if you use a different version or have the AMD64 version of pfSense.

    After figuring out how these are interpreted by Squid (i.e. the order, precedence, overrides, etc.) with the help of the above link, I understood what was needed.

    I looked up all the reverse-proxy ACLs generated by pfSense and create an tcp_outgoing_address tag for each using the LAN side IP (or DMZ side if that's where you are reverse-proxying to).

    For example, the following is what I ended up with. This must be placed above the bits for the random ACL to load-balance the forward-proxy. 192.168.0.254 is the IP of my LAN side interface:

    tcp_outgoing_address 192.168.0.254 OWA_URI_pfs tcp_outgoing_address 192.168.0.254 rvm_Extranet tcp_outgoing_address 192.168.0.254 rvm_Prototype tcp_outgoing_address 192.168.0.254 rvm_WebService tcp_outgoing_address 192.168.0.254 rvm_License # Put load balancing tags after setting the tcp_outgoing_address for reverse proxy tags acl fiftyPercent random 0.5 tcp_outgoing_address <<wan1-ip-here>> fiftyPercent tcp_outgoing_address <<wan2-ip-here>></wan2-ip-here></wan1-ip-here>

    The result is that for the reverse-proxy traffic goes to the specified LAN side IP , and then the remainder of all other traffic is load-balanced via the random ACL on the WAN IPs.

    Hope that helps anyone else who might run into a similar issue.

  • Shellcmd suggestion

    3
    0 Votes
    3 Posts
    933 Views
    M

    +1.

  • Are there any conflicts with running Squid + Squidguard + snort?

    4
    0 Votes
    4 Posts
    2k Views
    J

    Running one firewall with pfSense 2.1.5 (AMD64) + Squid (2.7.9) + SquidGuard (1.5_1.1 beta) + Snort + pfBlocker and have no issues. Proxy is NOT transparent.

    Running another firewall with pfSense 2.1.5 (i386) + Squid3-dev (3.3.10 pkg 2.2.8) + SquidGuard (1.4_4 pkg v.1.9.5) + Snort + pfBlocker and have no issues. Proxy is NOT transparent. ClamAV is not enabled as I get ICAP timeouts.

    Both are stable and responsive.

    Hth.

  • UPS Support - pfSense and a FreeNAS Server?

    7
    0 Votes
    7 Posts
    5k Views
    V

    Cool! Glad to hear! Those instuctions were directly from my own setup, so if you need any further assistance I'll help where I can.

  • Set up Squid proxy for different network

    4
    0 Votes
    4 Posts
    949 Views
    M

    Use the setting upstream proxy.

  • Freeradius not starting at boot when use mysql as database

    2
    0 Votes
    2 Posts
    1k Views
    N

    Can any one help me?

  • Snort OpenAppID on the GUI

    7
    0 Votes
    7 Posts
    4k Views
    bmeeksB

    By the way, if you come up with a collection of working rules for OpenAppID that you think others would find useful, please share them here on the Forum.  This is a new technology, and group collaboration would be a good thing as folks learn and try it out.

    Bill

  • Squid3 : Low downloads speeds and CPU overload

    1
    0 Votes
    1 Posts
    744 Views
    No one has replied
  • FreeRadius users

    6
    0 Votes
    6 Posts
    1k Views
    J

    I found solution! On the user check attribute add Calling-Station-Id += 'mac adress', | Calling-Station-Id += 'mac adress', | and more if need… before I try syntax := and this not working..

  • Suricata

    3
    0 Votes
    3 Posts
    1k Views
    bmeeksB

    Currently Emerging Threats offers no lower cost versions that I am aware of (excepting the free Open Source version you mentioned).

    You can use the Snort VRT rules with Suricata, but there are around 700 of those rules (if I remember the count correctly) that will not load because they contain keywords Suricata does not recognize.  They won't break Suricata, but any protection afforded by the non-loading rules will of course be sacrificed.

    Snort VRT does offer a home-use annual subscription for their latest rules.  It is $29.99 USD per year.  That's certainly cheaper than $500 USD per year.

    Many folks use a combination of the ET-Open free rules and a paid Snort VRT subscription.  Of course if you are a commercial enterprise, $500 per year is generally not considered an excessive expense for cyber security protection.

    Bill

  • Re: New Package: ntopng

    5
    0 Votes
    5 Posts
    2k Views
    H

    Mine did not install at first.
    Just hit back in the browser and installed again.
    Second time it worked.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.