Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    LaxarusL

    I am trying to use a rule to whitelist ips for a specific backend in my frontend.

    Basically use the X backend, if the host matches xxx.com and ip is whitelisted in a pfsense defined ip alias list.

    The problem is I am using the Cloudflare proxy and need to inspect the CF-Connecting-IP.

    And to do that I am using Custom ACL like this

    req.hdr(CF-Connecting-IP) -f /var/etc/haproxy/ipalias_Allowed_IPs.lst

    The Alias is defined in the firewall named Allowed_IPs.

    But this list does not get created unless I use something standard like "Source IP matches IP or IP Alias". Is there another way to refer to the created Aliases so that they are created properly?

    The workaround for this is to create a dummy acl with "Source IP matches IP or IP Alias" that does nothing but it is not a good solution.

    Edit: One more thing, I noticed is, when the alias list is updated, this does not get reflected to the HAProxy lists in /var/etc/haproxy/ until HAProxy is restarted.

  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    S

    oh ok. Thanks again

  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    K

    @pulsartiger
    The database name is vnstat.db and its location is under /var/db/vnstat.
    With "Backup Files/Dir" we are able to do backup or also with a cron.

  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    M

    Hello,
    I found this in the error log. Wondering how serious that is:

    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/1/25 20:00:24 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/2/25 20:00:24 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/3/25 20:00:24 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/4/25 20:00:24 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/5/25 20:00:03 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/6/25 20:00:10 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/7/25 20:00:04 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/8/25 20:00:04 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/9/25 20:00:05 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/10/25 20:00:04 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/12/25 08:00:05 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/13/25 08:00:05 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/14/25 08:00:05 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/15/25 08:00:04 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/16/25 08:00:04 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/17/25 08:00:08 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/18/25 08:00:04 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/19/25 08:00:04 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/20/25 08:00:05 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/21/25 08:00:05 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/22/25 08:00:04 ]
    [PFB_FILTER - 17] Failed or invalid Mime Type: [application/octet-stream|0] [ 06/23/25 08:00:05 ]

    UPDATE:
    as per suggestion from a previous post with a different but similar error, I added
    'application/octet-stream',
    to the file /usr/local/pkg/pfblockerng/pfblockerng.inc

    Hope this helps.

  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    98 Topics
    2k Posts
    J

    So far everything is stable without me changing anything else. Who knows why....

  • Discussions about the ACME / Let’s Encrypt package for pfSense

    492 Topics
    3k Posts
    I

    @Gertjan Thank you for the directions. I will have a look this evening and post some logs. I tried it using my current PAT Token for my domain. The cert is for a website, not for a VPN-Server. :-)

  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    B

    Hi,

    We are running 25.03-BETA and running into the issue of FRR and BGP processes disconnecting at the control level. It mitigates itself in BGP being stuck in the active state from the GUI and FRR point of view (even vtysh thinks so), while the BGP process is actively keeping the connection in the background. No routes are being populated into the routing table, but these are being announced as confirmed by our peer:

    Nothing in routing, BGP neighbor is active, so no routes should be in.

    10.206.238.225 4 65228 0 2309 0 0 0 never Active 0 Odido BGP via

    So far it looks good, but the session is already established:

    >>> tcpdump -i ipsec2 07:23:11.642870 IP 10.206.238.225.bgp > 10.206.238.226.49408: Flags [P.], seq 2440502671:2440502690, ack 2016892785, win 11, options [nop,nop,md5 shared secret not supplied with -M, can't check - 2ed14f304978416f8007afca427f988d], length 19: BGP 07:23:11.642939 IP 10.206.238.226.49408 > 10.206.238.225.bgp: Flags [.], ack 19, win 131, options [nop,nop,md5 shared secret not supplied with -M, can't check - 078b7005ba698e2b636e70eb2c37e234], length 0 >>> USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS ... frr bgpd 76872 22 tcp4 10.206.238.226:49408 10.206.238.225:179 The FRR restart doesn't help: /usr/local/etc/rc.d/frr restart Stopping watchfrr. Waiting for PIDS: 2357. Starting watchfrr. [58970|mgmtd] sending configuration Waiting for children to finish applying config... [59017|zebra] sending configuration [59963|bgpd] sending configuration [61500|staticd] sending configuration [61157|watchfrr] sending configuration [59017|zebra] done [58970|mgmtd] done [61157|watchfrr] done [61500|staticd] done [59963|bgpd] done

    The BGP process ID 59963 is different from 76872!!!

    >>>> ps -ax | grep 76872 76872 - Ss 0:02.09 /usr/local/sbin/bgpd -A 127.0.0.1 -F traditional -d 62041 0 S+ 0:00.00 grep 76872 >>>> sockstat -4 USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS ... frr bgpd 76872 22 tcp4 10.206.238.226:49408 10.206.238.225:179

    After killing the process, restarting the FRR, and checkign for the traffic and routes:

    >>> kill -KILL 76872 >>> ps -ax | grep 76872 21650 0 S+ 0:00.00 grep 76872 >>> /usr/local/etc/rc.d/frr restart Stopping watchfrr. Waiting for PIDS: 88383. Starting watchfrr. [27380|mgmtd] sending configuration [27540|zebra] sending configuration [28677|bgpd] sending configuration Waiting for children to finish applying config... [27380|mgmtd] done [30560|staticd] sending configuration [30405|watchfrr] sending configuration [27540|zebra] done [28677|bgpd] done [30560|staticd] done [30405|watchfrr] done >>> ps -ax | grep bgp 11708 - Ss 0:05.87 /usr/local/sbin/bgpd -A 127.0.0.1 -F traditional -d 31648 0 S+ 0:00.00 grep bgp >>> tcpdump -i ipsec2 07:31:08.709787 IP 10.206.238.225.bgp > 10.206.238.226.26294: Flags [P.], seq 1180140056:1180140117, ack 3799507337, win 11, options [nop,nop,md5 shared secret not supplied with -M, can't check - d6b2c0bac2ebb8cf1058d365224d4c5c], length 61: BGP 07:31:08.709850 IP 10.206.238.226.26294 > 10.206.238.225.bgp: Flags [.], ack 61, win 131, options [nop,nop,md5 shared secret not supplied with -M, can't check - 9dec3ac243f71d5f90e285627b2cd9e5], length 0 >>> show bgp summary Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd PfxSnt Desc 10.206.238.225 4 65228 3 494 5 0 0 00:00:48 4 5 Odido BGP via >>> show bgp ipv4 unicast Network Next Hop Metric LocPrf Weight Path *> 10.204.50.4/32 10.206.238.225 0 65228 ? *> 10.204.50.12/32 10.206.238.225 0 65228 ? *> 10.204.52.4/32 10.206.238.225 0 65228 ? *> 10.206.238.192/27 0.0.0.0 0 32768 ? *> 172.27.0.0/16 10.206.238.225 0 65228 ? >>> netstat -rn ... B>* 10.204.50.4/32 [20/0] via 10.206.238.225, ipsec2, weight 1, 03:42:44 B>* 10.204.50.12/32 [20/0] via 10.206.238.225, ipsec2, weight 1, 03:42:44 B>* 10.204.52.4/32 [20/0] via 10.206.238.225, ipsec2, weight 1, 03:42:44 B>* 172.27.0.0/16 [20/0] via 10.206.238.225, ipsec2, weight 1, 03:42:44

    Did anyone see anything like it? We could've lived with the BGP down and no routes, but it is announcing, and the traffic is being expected on the wrong interface in the destination FW.

    Regards

  • Discussions about the Tailscale package

    86 Topics
    558 Posts
    chudakC

    @yobyot said in "Tailscale is not online" problem:

    I'm late to the party but unless I misunderstand this thread it's not about Tailscale not starting up but instead about the auth key expiring.

    Auth keys are good for a maximum of 90 days. If you reboot pfSense on day 91, Tailscale will not come up and the "API" error will be generated (it's actually an auth key expired error).

    Thus, unless you never reboot pfSense, starting with the 91st day, you must re-generate an auth key and input it to Tailscale even if you have key expiry disabled.

    What makes this worse, IMHO, is that the longer you go between reboots, the more obscure the problem. So, Tailscale is not a reliable service because it cannot survive a reboot after 90 days.

    This occurs on both CE 2.7.2 in a Protectli Vault Proxmox VM and on a real SG-1100 running Plus 24.11 (packages as distributed with those releases).

    I wish TS would introduce a new feature "a la Acme update" so that this would be done automatically.

  • Discussions about WireGuard

    684 Topics
    4k Posts
    M

    Hi,

    I have the following setup:

    device c --> 5G (CGNAT) --> internet <--> pppoe fiber <--> device F

    device F: using pppoe fiber internet, changes public IP's once every week, has a dynamic dns name registered device C: using a 5G connection, behind CGNAT, has no DNS name registered

    These are 2 pfsense installs with a site-to-site link in between.
    Peer config representing device C in device F is configured as dynamic (IP not known / behind CGNAT).
    To handle public IP address changes of device F, I am running a watchdog script on device C that restarts the wireguard service in pfsense on device C when the IP of device F changes (using periodic DNS lookups to detect a change in IP).

    I have noticed though that in some cases, after the wireguard service restart on device C the endpoint address shown for device F is its not the new IP, but its previous IP address.
    In this case, I even tried doing wg set tun_wg0 peer <key> endpoint <newip>:port, which is briefly reflected in the output of wg show but then the peer's IP switches back to the previous (now not valid) IP in the wg show output.
    Obvisouly, in this state, the link is not operable. As expected, neither end shows any recent handshakes.
    Curiously though, on device C, both the sent and received (!!!) size keeps increasing.

    Looks almost like if the wireguard client on device C continued to receive valid wireguard traffic from the old IP address and updated the peer endpoint address automagically.

    No matter if I restart the wireguard service on either end, does not help. The only remedy seems to be restarting the 5G modem itself - possibly triggering some CGNAT state resets.

    Anyone experienced similar behavior? Seems like a broken CGNAT implementation? T-Mobile HU is the carrier.

  • 0 Votes
    1 Posts
    425 Views
    No one has replied
  • sshguard update question

    1
    0 Votes
    1 Posts
    140 Views
    No one has replied
  • FreeRadius multiple clients problem

    2
    0 Votes
    2 Posts
    173 Views
    L

    Got it, shared secret contained a closing bracket and the client config file misunderstood that.

  • Upgrade pfSense using a repository proxy (Nexus OSS) problem

    1
    0 Votes
    1 Posts
    123 Views
    No one has replied
  • FreeRADIUS handing out IPs even when MAC auth fails

    6
    0 Votes
    6 Posts
    371 Views
    aaronsshA

    @keyser Thank you, I was wondering if that is was the case! I will follow up with the switch vendor.

  • Cloudflare DDNS update request no longer valid

    3
    0 Votes
    3 Posts
    298 Views
    R

    @Gertjan My bad, I am sorry.

    I did search but I didn't notice the default is to search by titles only.

    Thanks for the nudge.

  • many problems after upgrading service watchdog

    9
    0 Votes
    9 Posts
    430 Views
    F

    @SteveITS All back to normal. And the fix is really simple. I did a restore of my config and everything was back working again... Thanks again.

  • 0 Votes
    2 Posts
    731 Views
    S

    Hi @Finger79

    have you found any information about it?
    For me it looks like PFsense itself does also not support RadSec as it is defined in RFC from 2012. Nevertheless only a view vendors support it at all.

    Maybe this changes after the Radius-blast issue.

    br
    Thomas

  • 0 Votes
    3 Posts
    213 Views
    B

    @kprovost Good to know, thank you.

  • CVE-2024-7589

    6
    0 Votes
    6 Posts
    526 Views
    sokeadaS

    @Gertjan your instruction is make sense to me. I already applied that too except turn on/off ssh via GUI when needed. That's another tip. Thanks you so much.

  • 0 Votes
    4 Posts
    305 Views
    bmeeksB

    Suricata by default places the physical interface in promiscuous mode, so all traffic traversing the physical interface is seen by all Suricata instances running on the physical interface. That means there is no benefit to creating separate Suricata instances for each VLAN, because a single instance will see the traffic from all VLANs.

    You can, to a limited extent, tailor how a given Suricata instance responds to traffic by using customized HOME_NET and/or EXTERNAL_NET variables and making sure all the rules you are enabling use the $HOME_NET and $EXTERNAL_NET conditionals in the rule text.

  • Official Wazuh agent support?

    2
    2 Votes
    2 Posts
    368 Views
    B

    @buggz I second this. It would make things much easier than enabling the FreeBSD repos, if that still even works. I might end up giving it a whirl with one of my internal fws. I've also considered the syslog route but the agent seems like it may provide more info/customization etc.

  • Pfsense new install no software packages available

    38
    0 Votes
    38 Posts
    25k Views
    B

    Thanks for all the replies.

    I ran the upgrade in the command line

    pfSense-upgrade -y

    and am on 2.7.2 now.

    All packages seems to be populating again.

  • LCDproc

    5
    0 Votes
    5 Posts
    276 Views
    fireodoF

    Hi,

    there is another problem with LCDpros 0.12_1 (beside the increase processor activity since the update 12-13.05.24) when there is a Gateway latency problem or the WAN gets unexpectedly down,

    Aug 6 04:28:48 rc.gateway_alarm 23648 >>> Gateway alarm: WAN_PPPOE (Addr:217.xxx.xxx.xxx Alarm:0 RTT:9.355ms RTTsd:.223ms Loss:5%)
    LCDProc is flooding the log with this:

    Aug 6 04:30:03 php 25120 lcdproc: Connection to LCDd process lost ()
    Aug 6 04:28:55 php 25120 lcdproc: Connection to LCDd process lost ()
    Aug 6 04:28:54 php 25120 lcdproc: Connection to LCDd process lost ()
    Have a nice day,
    fireodo

  • LCDproc totally broken in 0.12_1?

    3
    0 Votes
    3 Posts
    174 Views
    fireodoF

    Hi,

    there is another problem with LCDpros 0.12_1 (beside the increase processor activity since the update 12-13.05.24) when there is a Gateway latency problem or the WAN gets unexpectedly down,

    Aug 6 04:28:48 rc.gateway_alarm 23648 >>> Gateway alarm: WAN_PPPOE (Addr:217.xxx.xxx.xxx Alarm:0 RTT:9.355ms RTTsd:.223ms Loss:5%)

    LCDProc is flooding the log with this:

    Aug 6 04:30:03 php 25120 lcdproc: Connection to LCDd process lost () Aug 6 04:28:55 php 25120 lcdproc: Connection to LCDd process lost () Aug 6 04:28:54 php 25120 lcdproc: Connection to LCDd process lost ()

    Have a nice day,
    fireodo

  • Troubleshooting telegraf - influxdb

    3
    0 Votes
    3 Posts
    3k Views
    F

    Might help someone, I had similar issues, but it turns out my pfsense didn't trust the self signed CA that signed the influxDB cert. Found out by stopping the service:

    ps aux | grep tele kill -9 <PID>

    And then running telegraf manually:

    /usr/local/bin/telegraf -config=/usr/local/etc/telegraf.conf

    Note that the service restart/stop buttons in the web gui did not work for me, only the start button (which shows up after I killed the process)

  • isc-bind package upgrade

    4
    0 Votes
    4 Posts
    397 Views
    K

    @allxi said in isc-bind package upgrade:

    https://github.com/pfsense/FreeBSD-ports/commit/279801056eb46b74ce3828a77a7b679225817a2d#diff-a69ffe76fc45ab53d7931b2ee22b96681a82a9ef3245d8ea08eb0a217db0bb60

    Thanks (sorry for the delayed response)

    However its great we have this but this doesnt show when it will hit CE at all, as this commit was 2 years ago, but 9.16 is still in CE

  • 0 Votes
    3 Posts
    995 Views
    P

    While looking for something else I found that I also have similar messages in my syslog. Looking further I found this recommendation for the vnStat package:

    "Every NIC is added on install. So if a NIC is added (or removed) on the firewall, remove the package and install again. If the firewall has data for a NIC vnStat will report the data even if the NIC has been removed.
    A reinstall of the package will not change this as the firewall has data pertaining to the non existent data and thus other packages such as vnstat2 will report the data it has or has found."

    Link: https://docs.netgate.com/pfsense/en/latest/packages/traffic-totals.html

    Indeed I changed my hardware and restored the configuration from the old one. Some NICs changed from 1Gb to 10Gb.

    However, after removing and installing the package I see this in the log:

    Monitoring (10): tun_wg0 (1000 Mbit) pppoe1 (1000 Mbit) pfsync0 (1000 Mbit) pflog0 (1000 Mbit) ix1 (10000 Mbit) ix0 (10000 Mbit) igb1 (10 Mbit) igb0 (10 Mbit) enc0 (1000 Mbit) em0 (1000 Mbit)

    And it's incorrect. My pppoe1 sits on ix0 and my fiber speed is 3/3Gbps, so higher than 1000Mbit vnStat thinks. Also igb0 and igb1 are 1000Mbit, not 10Mbit (they are not assigned yet, though).

    I suppose the log messages we see are no more than a minor nuisance but is there a way to assign correct interface speeds for vnStat or disable these messages?

  • Performance with widget Speedtest by ookla

    3
    0 Votes
    3 Posts
    241 Views
    P

    @Gertjan

    Thank you! I Understand activities use resources, but if we have 50%+ cpu idle, probably not causing a problem? Or is that misleading?

    I have the exact same hardware pfsense firmware/software all with the same speedtest gui in 3 different ISP/locations.

    One location I have ATT Dedicated Fiber (new Install) that basically has zero network load but speed tests are all over the map (and large majority of tests are below the 90% minimums)

    The other 2 locations have a lot of network traffic, have shared fiber and they are much more stable than the ATT dedicated fiber.

    Since I have those three comparisons, I feel that proves the issue is with the ATT Dedicated fiber service. Yes or No / Agree disagree? Thanks!

  • pfSense Repository down?

    6
    0 Votes
    6 Posts
    1k Views
    GertjanG

    @SteveITS said in pfSense Repository down?:

    https://docs.netgate.com/pfsense/en/latest/troubleshooting/upgrades.html#packages-netgate-com-has-no-a-aaaa-record

    Correct, no A or AAAA record.
    This time SRV records ("server records ?") are looked for.

    This is probably is, I'm just thinking out loud : everything is fine, but DNS isn't. pfSense can't call out for self. Seen that before, and I never understood how people to so. Default 'Netgate' DNS settings work, as I've shown above.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.