Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    D
    I recently start have trouble saving my HAProxy configuration due to a error. It keeps adding clientca_ in front of the SSL offload certificate name. On file level this file does not exist! I tested with both HA Proxy plugins, the regular and dev version. I tried to regenerate the SSL (Lets Encrypt) but this keeps happening. [ALERT] (45623) : config : Couldn't open the ca-file '/var/etc/haproxy_test/clientca_shared-frontend.pem' (No such file or directory). [ALERT] (45623) : config : parsing [/var/etc/haproxy_test/haproxy.cfg:28] : 'bind 0.0.0.0:443' in section 'frontend' : 'ca-file' : unable to load /var/etc/haproxy_test/clientca_shared-frontend.pem Does anybody have the same behaviour? to be clear I have the 25.07-RC running. The relevant part of /var/etc/haproxy_test/haproxy.cfg frontend shared-frontend bind 0.0.0.0:443 name 0.0.0.0:443 ssl crt-list /var/etc/haproxy_test/shared-frontend.crt_list ca-file /var/etc/haproxy_test/**clientca_**shared-frontend.pem verify required crl-file /var/etc/haproxy_test/**clientcrl_**shared-frontend.pem
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    cyb3rtr0nianC
    @rlrobs Yes it’s still working fine here.
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    K
    @pulsartiger The database name is vnstat.db and its location is under /var/db/vnstat. With "Backup Files/Dir" we are able to do backup or also with a cron.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    M
    I resolved this by accepting the T+Cs via https://www.maxmind.com/en/accounts/1205389/geolite2/eula
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    493 Topics
    3k Posts
    GertjanG
    @EChondo What's your pfSense version ? The instructions are shown here : [image: 1753262126227-1acdc586-cb29-4148-9e36-81ade4e5e60c-image.png] A restart of a service will start by re creating their config files. If a certificate changed, it will get included. When the process starts, it will use the new certificate. @EChondo said in Issue with ACME Certificates Refresh & Restarting HAProxy: I haven't been able to confirm if the above works(mine just renewed, don't feel like doing it again just to test), so we'll see in 60 days I guess. No need to wait x days. You can re test / renew right away, as you are 'allowed' to renew a couple (5 max ?) of times per week.
  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    J
    @div444 i'm finding the same - did you find a solution or did reverting fix it? Hoping there is a patch fix or something to get it working! Rather not rollback if i can avoid it
  • Discussions about the Tailscale package

    90 Topics
    578 Posts
    T
    Re: How to update to the latest Tailscale version? I am on latest released Netgate 6100 pfSense PLUS v24 ( pfSense_plus-v24_11_amd64-pfSense_plus_v24_11 ) pkg config abi FreeBSD:15:amd64 pkg -vv | grep -A 3 "pfSense:" pfSense: { url : "pkg+https://pfsense-plus-pkg.netgate.com/pfSense_plus-v24_11_amd64-pfSense_plus_v24_11", enabled : yes, priority : 0, cat /usr/local/etc/pkg.conf ABI=FreeBSD:15:amd64 ALTABI=freebsd:15:x86:64 PKG_ENV { SSL_CA_CERT_FILE=/etc/ssl/netgate-ca.pem SSL_CLIENT_CERT_FILE=/usr/local/etc/pfSense/pkg/repos/pfSense-repo-0001-cert.pem SSL_CLIENT_KEY_FILE=/usr/local/etc/pfSense/pkg/repos/pfSense-repo-0001-key.pem } This firewall is obviously running on FreeBSD 15 no longer on 14. But can I use the freshports link for FreeBSD 14 amd64 quarterly which is at tailscale 1.86.2 or can I only go up to version tailscale 1.84.2_1, and need to wait until they have a version of tailscale 1.86.2 or higher for the FreeBSD 15? Would it be good enough to tell it to ignore the OSVERSION? export IGNORE_OSVERSION=yes Note: use of 14 and not 15 ? pkg add https://pkg.freebsd.org/FreeBSD:14:amd64/quarterly/All/tailscale-1.86.2.pkg service tailscaled restart tailscale up
  • Discussions about WireGuard

    690 Topics
    4k Posts
    J
    I've read through some other posts about this, but they either didn't say whether the proposed solution worked or they were very convoluted and difficult to understand. Here is our scenario: We have 6 locations--Las Cruces (LC), Sunland Park (SP), El Paso (EP), Abilene (ABI), Fort Worth (FW), and Plano (PL). LC and ABI have software that is accessed by the other 4 locations via VPN. There are WireGuard VPNs set up between LC and those 4 locations (SP, EP, FW, PL), and ABI and those 4 locations (SP, EP, FW, PL). There is also a WireGuard VPN connection between LC and ABI. LC and ABI have 2 internet connections. SP, EP, FW, and PL each have one internet connection. If the primary internet connection goes down at either LC or ABI and failover occurs to the secondary internet connection, is there a way to set up the WireGuard VPN connections so that they also failover without purchasing some 3rd party application? Thanks.
  • Snort - VPN - P2P-ruleset

    2
    0 Votes
    2 Posts
    1k Views
    X
    Yep, happened to me. Well the vpn wasn't blocked because I have the remote host added to the $home_net, but it was triggering an alert. 1:2003310 ET P2P Edonkey Publicize File
  • Squid caching alternative

    2
    0 Votes
    2 Posts
    1k Views
    K
    If you install the "Proctor Caching" software you will see that it is just Squid for Windows repackaged with a web framework that provides a user interface for the online testing. Once you install the Proctor Caching software you could edit the conf file: C:\ProctorCache\squid\etc\squid.conf And point it to your pfsense box IP address and port. Stop and Start via the .BAT files and you should be good. This way you can still use their software and your pfsense box together. You will be caching on two levels though. Hope this helps.
  • Squid3 reverse proxy config (HTTPS not redirecting)

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Reset Package Configuration (DansGuardian)

    3
    0 Votes
    3 Posts
    1k Views
    marcellocM
    Remove the package and then remove dansguardian config from config.xml. You can do it by editing a backup file or directly with viconfig cmd on console/ssh. On both cases, be careful.
  • HAProxy forwardfor trouble

    4
    0 Votes
    4 Posts
    4k Views
    P
    Hey Aviz, When using "mode tcp" haproxy cannot modify headers send through the encrypted SSL connection. You only option when needing to modify https traffic would be to switch to the haproxy-devel package and configure a certificate to perform ssl-offloading/decryption on haproxy, and then modify headers before sending to the backends. You can choose whether or not you want that backend connection to be encrypted again. Which might be required for the application to work properly, though plain http to the backend would take less CPU power. (You might also accomplish this with putting 'stunnel' in front of haproxy 1.4.. But i would not recommend that..) Another option when using haproxy-devel would be to use its transparent client-ip option. So the backend sees the connection coming in from the actual client-ip.. Please note that backend then 'must' use pfSense as a default-gateway for reply traffic to be properly processed by HAProxy. And that connections directly to the backend will fail with the current 'fwd' rules used in ipfw.. Greets PiBa-NL
  • Dansguardian 2.12.0.3_2 does not work

    25
    0 Votes
    25 Posts
    5k Views
    R
    @marcelloc: @rjcrowder: something definitely got broken in the 2.12.0.3_2 version of the package. That's the official version from ports compiled by core team, the code doesn't have some patches @rjcrowder: At any rate… the workaround seems to be installing the 2.12.0.3 version from your repository... I'm trying to port e2guardian to freebsd and then pfsense. As I said, dansguardian is no longer being updated by maintainers on sourceforge. Many commits are pending. AFAIK, e2guardian will not have use restrictions as dasnguardian has. The gui will be almost the same, just the package name will change. If core team aproves, it will be applied to pfsense 2.1 Very nice… I'll look forward to that... Thanks again Marcello
  • Bandwidthd breaks pfS RRD Graphs (Traffic, Packets)

    3
    0 Votes
    3 Posts
    1k Views
    C
    Haven't seen that. Any RRD-related errors in the system log?
  • Ipguard with pf 2.1.2

    3
    0 Votes
    3 Posts
    834 Views
    N
    @marcelloc: @N3w4dm1n: For now its not compatible to the last version of pf. Will it be supported next time? What errors are you getting? i click start service. nothing happens, i gues i have to check package logs. ill do monday at work!
  • 2.1.2-RELEASE Defaulted sip.conf and extensions.conf ASTERISK

    1
    0 Votes
    1 Posts
    676 Views
    No one has replied
  • Squid3-dev stops at midnight

    1
    0 Votes
    1 Posts
    527 Views
    No one has replied
  • Open-VM-Tools 8.7.0.3046 (build-425873) cannot install on pfSense 2.1.2

    3
    0 Votes
    3 Posts
    913 Views
    S
    Thanks, but how about the Open-VM-Tools? Aren't they supposed to work with pfSense 2.1.2?
  • Squid and Windows 7/8 browser authentication (negotiate)

    5
    0 Votes
    5 Posts
    1k Views
    J
    Thanks Marcello, I'll have a look at that. :)
  • Newbie Question Regarding SNORT and Interfaces

    2
    0 Votes
    2 Posts
    1k Views
    bmeeksB
    @SMuD: I'd like to install SNORT on my pfSense firewall to monitor packets that get through our WAN interface. I am not interested in the traffic that reaches our WAN but is not allowed in - I want to monitor what makes it inside, after the firewall has parsed the packet. Does this mean that I should enable snort on the LAN and OPT interfaces rather than the WAN? Since we want to monitor the traffic that is allowed into our network should I enable SNORT on the WAN at all? Thanks! Snort puts interfaces it monitors in promiscuous mode, so you are right that it would see and alert on ALL traffic hitting your WAN interface whether the firewall passed the traffic or not.  So putting it on an internal interface is better in my opinion.  This way Snort only inspects what the firewall allowed to pass.  This filters out a bunch of noise.  Another added benefit of having it on the LAN (or other internal interface) is it sees traffic pre-NAT and post-NAT, so you can see the actual internal hosts that may be malware-infected and are attempting to communicate outbound.  Running it only on the WAN means the only local IP you ever see in the logs is the WAN interface IP.  If you don't use NAT, then that is not an issue; but most folks do use NAT and seeing only the WAN IP for all local hosts behind the firewall is not very helpful. If you run Snort on multiple interfaces, then in the name of memory efficiency and CPU workload, I suggest tailoring the rules for the environment behind Snort.  By that I mean if you don't have mail and web servers on your LAN, then don't run those rule sets on the LAN.  Same idea if you don't have DB servers back there.  You choose the rule sets appropriate for the hosts.  But if you have a monster firewall with a ton of RAM and a beefy CPU, you can certainly load it up with all of the rules on all of the interfaces. Bill
  • Freeradius, mOTP and bash

    3
    0 Votes
    3 Posts
    2k Views
    N
    Hi, the freeradius motp features is based on a script - modified for pfsense - from http://motp.sourceforge.net/ The script is written for /bin/bash but this is not the default shell for pfsense so you need an additional package "bash". So there are two possibilities: 1.) Modify the function "function freeradius_motp_resync()" in freeradius.inc starting on line 3897 2.) Rewrite the motp script from /bin/bash to work on the pfsense default shell (recommended) There is a check on this part - if someone enabled mOTP feature on GUI the the package checks if bash is installed but it only checks on a specific version. If it ist not installed it installs bash. If it is installed and mOTP is still enabled it skips the installation. If you disabled mOTP bash will be uninstalled. So bash does not come with the freeradius2 package but it installs later if mOTP is enabled. This is for sure not an elegant solution. PS: if you download bash manually then you can try to just comment out the lines on feeradius.inc which do the check and installation of bash package.
  • Netgate FW-7541 - some packages outdated

    5
    0 Votes
    5 Posts
    1k Views
    P
    I see you edited my link from https://www.pfsense.org to https://packages.pfsense.org It doesn't work with https://packages.pfsense.org, it only works with https://www.pfsense.org. I just tried it again….
  • Inconsistent behavior with Siproxd

    1
    0 Votes
    1 Posts
    666 Views
    No one has replied
  • Bacula-fd looks in the wrong path for config file

    1
    0 Votes
    1 Posts
    753 Views
    No one has replied
  • Reverse Proxy RPCoverHttp Exchange 2013

    8
    0 Votes
    8 Posts
    4k Views
    E
    Thanks to keyser, we have try it in our environmet. And HAproxy works for us to.
  • SquidGuard XMLRPC page edit

    3
    0 Votes
    3 Posts
    1k Views
    I
    Editing this page is impirtant for me. firstly i need to edit this file.
  • Snort 2.9.6.0 - Alerts not being logged

    20
    0 Votes
    20 Posts
    4k Views
    bmeeksB
    @priller: @priller: I then went back and tried to reproduce the original problem by removing the IP Blacklist while still having IP REP enable.  Not only could I not reproduce it, but I kept getting 'packets blacklisted' blocks and alerts without having the blacklist selected Ops, never mind, I was clicking around too fast.  Adding the blacklist to the interface 'sticks' without hitting Save, meaning you can leave the interface configuration and when you come back it is still there. You can be 'tricked' into thinking it is doing something. Only when you hit Save does it trigger the interface config reload. Same for when you remove a list. This behavior could have unintended consequences for the user.  You continue to see a given blacklist applied (or removed), but it is not doing anything. (Got'a protect dummy users from themselves!  :o ) You're right.  Did not think about that.  I will update it so changing a blacklist or whitelist does the restart. Bill
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.