Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    JonathanLeeJ
    Squid can be configured externally, I would love a how to guide on how to do this correctly.
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    DARAD
    Hello team, I have a Netgate 8200 running 24.11-RELEASE (amd64) with Suricata 7.0.8_5 package installed. Suricata doesn't seem to start. It loops to red once I press the Play button on the interface. It leaves no logs in the System logs, it leaves no logs in suricata.log at /var/log/suricata/suricata_ovpns933787/suricata.log I tried launching it manually: # /usr/local/bin/suricata -V or # /usr/local/bin/suricata -c /usr/local/etc/suricata/suricata_33787_ovpns9/suricata.yaml -i suricata_ovpns933787 and I get this output ld-elf.so.1: /usr/local/bin/suricata: Undefined symbol "__strlcpy_chk@FBSD_1.8" Thanks in advance, Dara
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    573 Topics
    3k Posts
    dennypageD
    @kabeda If memory serves, that old version of ntopng did not run as user ntopng, but as user nobody. There are lots of problems in that old version. Anyway, check the ownership and permissions of /var/db/ntopng and make sure it matches the user that ntopng runs as. You may need to set ownership of the entire hierarchy. Example: /usr/sbin/chown -R nobody:nobody /var/db/ntopng However, the better choice would be to upgrade to a more recent version.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    D
    @BBcan177 Thank you for the kind reminder; I am so accustomed to ensuring Save Settings is checked that I didn't follow your instructions properly (thanks @tinfoilmatt for uploading and highlighting the screen shot). I've properly followed the instructions and the update did not report and db problems. Thank you again! drac
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    102 Topics
    3k Posts
    C
    @dennypage Nicely done sir!
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    503 Topics
    3k Posts
    GPz1100G
    @agitelzon I have no issue connecting to LE servers from pf shell. The issue is cloudflare security setting is configured as a whitelist for api zone record changes. The whitelist includes my ipv4 address only, as a /32. As I mentioned, I could add the ipv6 prefix as a /64. Given that pf is configured to prefer ipv4, I thought that would carry over to acme as well.
  • Discussions about the FRR Dynamic Routing package on pfSense

    296 Topics
    1k Posts
    C
    This one has been tricky still not sure what to try. Any ideas?
  • Discussions about the Tailscale package

    93 Topics
    663 Posts
    C
    For what it’s worth, we may have had the same issue but for different reasons. I checked, and my system has the duplicate two files. Therefore, I asked Grok.ai about “/usr/local/etc/rc.d/pfsense_tailscaled enable /usr/local/etc/rc.d/tailscaled disable” versus the solution it had provided me yesterday. See the answer below. (Grok.ai used sources that included this Netgate forum, Lawrence Systems Forums – Networking & Firewalls, and https://forum.tailscale.com/.) The Two Service Files: Quick Breakdown Before diving into the relation, let’s clarify what those files are (based on standard pfSense Tailscale package behavior on 25.07.x/FreeBSD 15-CURRENT): • /usr/local/etc/rc.d/tailscaled: This is the generic FreeBSD/Tailscale rc.d script. It originates from the underlying tailscale package (the one you manually installed via' pkg add' for version 1.90.6). It’s a basic daemon starter/stopper that just runs /usr/local/bin/tailscaled without any pfSense-specific smarts (e.g., no auto-auth, no route advertising, no GUI integration). • /usr/local/etc/rc.d/pfsense_tailscaled: This is the pfSense-specific wrapper script. It’s installed by the official pfSense-pkg-Tailscale package. It wraps the generic tailscaled binary but adds pfSense magic: it reads your GUI config (auth key, advertised routes, exit node flags), writes them to /usr/local/etc/rc.conf.d/pfsense_tailscaled (e.g., pfsense_tailscaled_authkey="yourkey"), and handles the full tailscale up with flags on boot. It’s what makes the service “pfSense-aware.” In a stock official package install (without your manual binary upgrade), only pfsense_tailscaled exists and runs everything. When you force-installed the newer tailscale pkg on top, it added the generic tailscaled script as a side effect—but your fixed script (the one we pasted into /usr/local/etc/rc.d/tailscaled) overrode it to behave correctly.
  • Discussions about WireGuard

    716 Topics
    4k Posts
    chpalmerC
    @tinfoilmatt Thanks! I have done that and it worked when forcing just her TV out the Centurylink.. My problem is my local box here. Im missing something because I can not get it to pass traffic from the WAN to the Wireguard tunnel. Ive got some time today so will chip away on my lab setup to see if I can finally accomplish it here first.
  • Squid integration - General Questions

    Locked
    5
    0 Votes
    5 Posts
    3k Views
    R
    Thanks for clearing my skies. I am cross referencing the squid log and CP log with script running on another linux box. User names are inserted to the un field on the squid log and they are parsed with lightsquid. Should be working until I complete the scripts.
  • FreeSwitch for pfsense dead?

    Locked
    8
    0 Votes
    8 Posts
    6k Views
    F
    Ahh, ok, so it's sort of still alive. I noticed that Freeswitch was marked with a ? on the 2.0 compatibility list, and I guess fusionpbx is another? I'm still considering switchin to 2.0, but I think I want to get an ALIX appliance with a HD first, so I can make a seperate install with that, before completely erasing the old 1.2.3 Thanks for the input!
  • Help with SquidGuard

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    D
    Enter from console touch /usr/local/etc/squidGuard/blacklist.files
  • Snort exception for VPN traffic?

    Locked
    3
    0 Votes
    3 Posts
    5k Views
    M
    Thanks for your input, Rob. Whitelisting is not really relevant when the remote user is logging in from a range of locations. Actually, it's not really meaningful even when they are coming in from a single location in many cases - our chief developer uses an internet connection with dynamic IP from one of the biggest ISPs in this country - I've had to whitelist their entire IP range and, in the process, told SNORT to ignore probably thirty percent or more of the UK internet users! I also spent a lot of time turning off rules - but there's a lot of them that trigger from time to time. I described them as "false positives" which may not be strictly true - I guess the point is that a lot of remote users coming into the network over VPNs are doing so from public ISPs and quite a lot of the attacks I'm seeing are probably genuine. We are a commercial organisation hosting public facing web sites behind this firewall and it's harmful to business to block incoming traffic unnecessarily. How does pfSense block traffic from IP addresses identified by SNORT? Does it generate hidden firewall rules to block the offending IP addresses? If that is the case, could we set it up so that the generated block rules were inserted at an identifiable point in the rule list? That way, I could simply insert exception rules above that point which would always override the internally generated blocks and, thus, permit specific protocols or destinations irrespective of the SNORT decisions. This would actually be better than putting in some sort of VPN exception - it would also allow me, for example, to add further exceptions to allow access to my web sites even while stopping port scans and attempts to bust into the RDP ports on my servers! Martin
  • Squid in Transparent and Port mode. ssh into lan, proxy local connections

    Locked
    1
    0 Votes
    1 Posts
    3k Views
    No one has replied
  • Transparent Proxy partially functional

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    R
    Completed the upgrade to 1.2.3 and reinstalled the packages. LightSquid appears to be showing all of the traffic again. Thanks for the help.
  • Encryped LDAP communication with Squid?

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Siproxd and Telia

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Snort - Unblock blacklisted hosts from the command line

    Locked
    4
    0 Votes
    4 Posts
    6k Views
    jimpJ
    I'm not sure of the details, it's changed a few times over the years, not sure what the package author has it doing these days.
  • Lightsquid report

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • MagicJack on pfSense PC?

    Locked
    5
    0 Votes
    5 Posts
    4k Views
    N
    @Cry: My understanding is that MagicJack is an entire service, you can't just go switching the software you run. I'd suggest that going down the FreeSwitch route should only be done after you read up on FreeSwitch. MJ is actually uses the standard SIP protocol.  As long as you can get at your credentials, you can use any SIP application in place of the MJ dongle.  Some have used an ATA instead. http://www.magicjacksupport.com/any-new-way-to-get-sip-info-t8145.html
  • I need to update php4 to php5

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    jimpJ
    That will not work, you will break many things. You should not use your firewall for things like that, but if you must, 2.0 uses PHP5. And if you're going to be altering the firewall and running insecure services on it, you may as well be using the 2.0 RC version because it will in no way be considered stable at that point.
  • Suppresing Priority 3 alert in snort 2.8.6.1

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Vnstat time not correct

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Correctly monitor bandwidth?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    A
    On my system Bandwidthd shows more traffic than the rrd graph and I have a filter to keep it from counting lan traffic.  "ip and not ((src net 192.168.0.0/16) and (dst net 192.168.0.0/16))"  I think this will cover all the 192.168 subnets as I have a static route to another lan on the opt1 interface with servers on both lans.
  • Snort acting very weird!

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Does anyone use the BlockHosts script from ACZoom.com?

    Locked
    8
    0 Votes
    8 Posts
    3k Views
    T
    @ToxIcon: Tommyboy180 did you ever create a package for blockhosts My work is saved on my desktop right now. I am currently moving right now. When I get settled in then I can resume development.
  • Pfsense 1.2.3-Release + Squid + OPEN-LDAP

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    S
    Hello, This is really late, but I just began using pfSense and ran into this same problem. In my searching for the answer I have found your post with no answer I too was struggling with exactly what you are/were experiencing. Here is a solution I figured out after much messing around for the filter search string type in "uid=%s" the rest of what you have should be OK
  • Snort Suppression can't get to work in release 2.0 RC1

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    T
    Sorry I missed the option to enable it on "If Setting" under the Snort Interface using Suppresion and filtering option. It is working now. Thanks.
  • Snort

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    N
    @stuen93: Do you have any IP ranges white listed? You also set how long the IP stays blocked for so if the alert was generated longer ago then the block time the IP will be removed from the block list. No i do not have anything white listed .
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.