Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    JonathanLeeJ
    @firefox I don’t think so, to be honest with you I am on an older version also. Just make sure you do the patch package and install all the system patches.
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    M
    Hi, I had a problem with my home network today, so I checked pfsense and discovered that suricata had blocked the wan ip. After some tests and triggering some suricata alerts, the wan ip was blocked. I restarted pfsense and ran some more tests, but the problem no longer occurred. I then checked the wan interface settings and indeed the ip list does not include the wan ip, both now that it's working and before, when it was blocked. I'm using pfsense 2.8.0 and suricata 7.0.8_2. I use PPPoE to access the Internet.
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    dennypageD
    @Leon-Straathof Data retention settings are handled inside of ntopng. Documentation here. Pay attention to the RRD note. Also, if you've turned on some of the slice and dice time series information (is off by default), I'd suggest turning them back off. These balloon the storage requirements and are of little actual use.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    keyserK
    @jrey said in pfBlockerNG syslog logentries to remote SIEM: @keyser I so want to answer this, but then at the same time (no I don't) ... pfblocker using syslog messaging in real time. no tailing of files, no other packages, just code. Huuuh? That seems very very interesting I noticed your name in other posts around the forum where you seemed to be QUITE proficient at coding/developing. Are you by any chance considering involvement in developing and refining the pfBlockerNG package? It would be SO great if you are looking into adding native syslog to the pfBlockerNG package - or an easy workaround that does not require additional packages and “temporary” edits in files that does not survive service restarts or pfSense updates. Here’s that you will fill me/us in on the solution you are using to your Greylog - please, pretty please with sugar on top
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    496 Topics
    3k Posts
    R
    @provels said in updating to acme 1.0 breaks system beyond repair: need to restore from backup: This same mess happened to me, even w/o Acme, going from 25.07 to *.1. Blew, reinstalled w/ Crowdsec, blew again, reinstalled, clipped all the Crowdsec info from config.xml, restored config, back to normal. Crowdsec is a great concept, but I think I'm out. I never had this issue with Crowdec before the ACME update, even with updating from 2.7 to 2.8 there was no issues. In fact after restoring from a backup after the ACME update, Crowdsec reinstalled just fine, and this was before the recent release a couple days ago that contained a fix.
  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    yon 0Y
    said in Please update frr on Pfsense+ to FRR 10.3: https://redmine.pfsense.org/issues/15785 now frr 10.4.1
  • Discussions about the Tailscale package

    90 Topics
    606 Posts
    M
    @yobyot I've SSHed into pfsense and for the sake of testing I've simply run the command: tailscale up --auth-key=tskey-client-kQ_THE_REST_IS_A_SECRET\?preauthorized=true\&ephemeral=false --accept-dns=false --accept-routes --advertise-exit-node --advertise-routes=X.X.X.X/24 --advertise-tags=tag:pfsense Note the preauthorized=true and ephemeral=false I gave this key all permissions (temporarly as I just wanted to verify it's working) of course I had to register the tag used also in the ACL tags pane: https://login.tailscale.com/admin/acls/visual/tags so far so good
  • Discussions about WireGuard

    697 Topics
    4k Posts
    lvrmscL
    Same here. It started after I installed 25.07. Then it settled down by itself after a few days. It started again after upgrading to 25.07.1. WireGuard works fine (it merely connects to the remote site from this one). However, I am refraining from upgrading the remote, because if the 'service' does not start, I fear it will not listen to incoming connections, which would leave me in a difficult situation. The other topic I had opened before finding this: https://forum.netgate.com/topic/198449/25.07-release-amd64-wireguard-service-reported-stopped-yet-tunnel-trafic-clearly-is-ok
  • Squid web proxy + Virtual IP

    3
    0 Votes
    3 Posts
    2k Views
    E
    On page Serivce –> Proxy server. Add custom option include /usr/local/etc/squid/my.conf On my.conf write http_port virtual_ip:port restart squid squid -k reconfigure check open port netstat -an
  • Squid3 transparant SSL

    1
    0 Votes
    1 Posts
    852 Views
    No one has replied
  • Snort 2.9.6.2 pkg v3.1.3 Update – Release Notes

    5
    0 Votes
    5 Posts
    3k Views
    bmeeksB
    @Hollander: 1. The thread you posted is clear. Except for the part about 'changeSID'. I have no clue what I am seeing, as in: it doesn't fit in my limited brain; either you have enabled SID's, or you have disabled them. Why the third list? The modifysid option is for actually changing the text of the rule body.  For example, you could change the "alert" keyword to "drop".  This will have more meaning once a true IPS mode is implemented.  Then, "alert" rules will simply print messages in the logs and on the ALERTS tab; but "drop" rules will be the ones that actually drop (or block) the offending traffic.  Today on pfSense any "alert" causes a block, but on a true IPS that is not the case.  Alerts are like notices and "drop" rules are the only ones that should block traffic.  You might for example only want alerts for rules that identify older versions of Java or something, but you would want drops for rules that identify known malware phoning home. As the Snort and Suricata packages exist today, the modifysid function is not really necessary yet. @Hollander: 2. Do you have thoughts on keeping separate SID-lists for Snort and Suricata? Or 'one list fits all'? (Does it? I don't know). This is an admin decision.  Just remember that there are many, many Snort rules that contain keywords or rule options that Suricata does not recognize.  No sense even trying to load those rules on Suricata. @Hollander: 3. Do you have thoughts on the lists having exclusive SID's (-> if a SID is on list 1 it shouldn't be on list two, and vice versa), or are there good reasons to do things differently? If you are using only literal SIDs in the files, then it does not make sense to put the same SID in both files.  However, when you use the more advanced PCRE options; it is conceivable to match the same SID.  In those situations, the setting of the SID STATE ORDER control becomes important. @Hollander: 4. How can one manage the part of new SID's appearing after an update? Is there a 'new SID's added during update' list somewhere? Because these need to be processed into the github-list one way or the other I guess(?) Each time the rules are updated the vendors post an updated Change Log on their web sites. Bill
  • Zebedee is removed?

    2
    0 Votes
    2 Posts
    753 Views
    BBcan177B
    The Devs have removed the package. See the following link: https://github.com/pfsense/pfsense-packages/commit/87019e8afcb46a9be8edc461168287f6a9b92cc4
  • Help me get NTP fixed up properly!

    8
    0 Votes
    8 Posts
    11k Views
    johnpozJ
    Thanks for fixing that up for the next guy..  But I only have ntp listening on my lan..  But yeah that looks like a better setup for someone might have opened it up to the public internet sort of thing.
  • NUT not starting (error included)

    4
    0 Votes
    4 Posts
    4k Views
    D
    @kdemaria: This did not work for me.  However, setting it to Tripplite AVR USB with Auto USB solved the problem completely, and seemed to also solve the stale data issue as well. NUT is now reporting correct Model, Status, Load, Charge, Voltages and Runtime. +metoo for a CyberPower 1000 model CP1000AVRLCD pfSense 2.1.5-RELEASE (amd64) and nut 2.6.5_1 pkg 2.0.2 This is an annoying bug. According to http://www.networkupstools.org/stable-hcl.html This model CyberPower should be using "powerpanel". But I'm not sure if that's correct for USB rather than serial connected models. The CyberPower CP1000AVDLCD has both USB and serial ports but ships with a USB cable.
  • Squid - Sarg and IP-Adress in Hostname

    1
    0 Votes
    1 Posts
    862 Views
    No one has replied
  • Installed packages missing version numbers

    4
    0 Votes
    4 Posts
    1k Views
    P
    I made it smarter - see this pull request for 2.2: https://github.com/pfsense/pfsense/pull/1359 We will see if the project managers think this is a reasonable idea… Edit: Pull request has been committed, so in 2.2 when the package server cannot be reached the version column will display something like: Latest: N/A Installed: 4.5.6 and put it all in red so it is obvious that something is not quite right.
  • Pfblocker Tables

    7
    0 Votes
    7 Posts
    1k Views
    SoloamS
    This is a weird problem. I looked at "diag_tables.php" and the problem is on the code block" <a onclick="del_entry(&quot;<?=htmlspecialchars($entry)?>&quot;);">![](/themes/<?=$g['theme'];?>/images/icons/icon_x.gif)</a> If I remove it it works ok. But I cant seem to understand way. Because in other alias it works ok.
  • SQUID3 Setup On Multiple Interfaces

    1
    0 Votes
    1 Posts
    652 Views
    No one has replied
  • Snort false positives?

    8
    0 Votes
    8 Posts
    3k Views
    BBcan177B
    With SO, it all depends on how many Rules you enable and how much Traffic the sensors will see. But you are starting with some decent hardware. Download the ISO and try it out… Here are the Hardware Requirements -     https://code.google.com/p/security-onion/wiki/Hardware Google Group Forum -     https://groups.google.com/forum/#!forum/security-onion
  • Snort Local IP Triggering Wan Rule

    3
    0 Votes
    3 Posts
    943 Views
    SoloamS
    Done :) it solved my problem. Thank You Best Regards
  • NUT change action for low battery

    1
    0 Votes
    1 Posts
    514 Views
    No one has replied
  • Snort: Apply to LAN also applies to VLANs??

    2
    0 Votes
    2 Posts
    682 Views
    F
    Snort puts the interface into promiscuous mode and thus will see all traffic hitting that physical interface including VLAN's, PPPoE etc.
  • 0 Votes
    3 Posts
    2k Views
    L
    @wcrowder: Squid3-dev is at Squid ver. 3.3.13, Squid is at ver. 3.4.9 about to go to 3.5? Thanks for your reply. Are you sure about that for Squid3-dev? Where are you finding these version numbers for Squid3-dev? Remember, I'm using pfsense 2.1.5, and that is still running on FreeBSD 8. When I look at the package info, pfSense seems to indicate that I'm on the most recent version (production version, not beta) and package. There is no option to upgrade when I look at the available packages via pfSense. Do you know the location of an official squid3-dev repository? I haven't been able to find one, so I've got to go with whatever I see in pfSense packages. Separate box or VM? Port forward? wpad? Dedicated box. No port forwarding. I don't know what a 'wpad' is. Diladele looks cool, and looks like it's actively developed, going to look at it. Thanks. (Edited to add the last line.) No problemo. It seemed like the best option as it allows SSL filtering and some decent ad removal features. I believe there is a 60-day  free trial period. After that you have to pay, but for personal use it's cheap ($1 / month).
  • PfSense + LDAP: Start TLS

    2
    0 Votes
    2 Posts
    1k Views
    ?
    Solved. Yes you can, the config option "start_tls" is used, independent of the protocol type. No you do not, however there is some "faf" you have to go through to get FreeRadius to operate with only the CA cert, see here: https://forum.pfsense.org/index.php?topic=84564.0 No rules appear to be required, the router services have access onto the VLAN without explicit rules. Regards, Rob.
  • Snort POLICY PE EXE or DLL Windows file download alert

    2
    0 Votes
    2 Posts
    15k Views
    F
    In the alerts page, find the policy and click the suppress icon to add a suppress rule to the interface. You can find the surpress rule in the Services, Snort, Suppress tab, where you will see one or more entries like so wansuppress_5437e6139435f lansuppress_544229bb9e947 In side the suppress rule you will see something like #ET POLICY PE EXE or DLL Windows file download suppress gen_id 1, sig_id 2000419 This is your basic suppress rule which will not block any Windows PE file. PE is just the name given to the format of the windows exe and dll's.  http://en.wikipedia.org/wiki/Portable_Executable You can also tweak the rules a bit to suit your needs better. These threads might be useful. https://forum.pfsense.org/index.php?topic=61018.msg339645#msg339645 https://forum.pfsense.org/index.php/topic,62928.msg341417.html#msg341417
  • Enforcing filter rules in Smartphones and Tablets

    5
    0 Votes
    5 Posts
    1k Views
    N
    YouTube is tunneling the traffic in mobile mode. I just found a TEMPORARY SOLUTION, in mobile YouTube is redirected to "m.youtube.com". I f you block "m.youtube.com" and change the browser setting website preference in the smartphones/tablets to desktop mode then YouTube is redirected to "www.youtube.com/education" and it works fine. If you type "m.youtube.com" then the page is blocked. But this is just a temporary solution.
  • Proxy HTTPS filtering

    4
    0 Votes
    4 Posts
    934 Views
    H
    @Derelict: The only way to get "in the middle" of an HTTPS conversation is to coerce your users to install a trusted root CA and generate certificates on-the-fly using that CA for every site they visit.  Or throw a certificate error for every site because you're generating certificates on-the-fly and your users don't have a trusted root for you installed.  That's the nature of HTTPS.  No magic pill. I'm fine with throwing cert errors, as long as I can achieve the blocking. I have an idea.  Put that guest network on a separate interface. Create a limiter to limit the damage the "guests"can do to your bandwidth. If they just can't behave themselves, kill their access every time they do things you have told them not to. Is there a way to use the limiter to completely block traffic instead of just limiting it?
  • FreeRADIUS authentication

    2
    0 Votes
    2 Posts
    737 Views
    D
    to clarify, I am a student in Information Assurance and have never actually worked with RADIUS or pfSense before this semester. I eventually want to use a mySQL database for credential verification, but would like to ensure authentication can occur properly before taking that next step.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.