Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    E
    I even tried deleting and creating a new certificate. Any suggestions?
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    S
    @icoso also internal IPs aren’t blocked by default
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    572 Topics
    3k Posts
    keyserK
    @Antibiotic No it’s not possible with NtopNG as it is not a Netflow collector. You need nProbe for that which will “translate” recieved netflows into flows that NtopNG understands and can visualize (with very very little detail might I add as Netflows has no additonal information apart from sender/reciever and volume). The NtopNG package and the product in general is more geared towards visualising and recording traffic details from actual packet captures. This contains MUCH more metadata about the sessions than netflows (DNS names, protocol information and myriads of other things). But pffSense Plus has a builtin Netflow exporter if you have an external netflow collector on hand.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    tinfoilmattT
    @BiloxiGeek said in DNSBL and IPv6: Does it just follow the IPv4 address that is listed above that? In my case it would end up being ::10.0.0.86 Yes. In this specific context that's the notation being used. (Full IPv6 web server address, for reference then, would be: http://[0000:0000:0000:0000:0010:0000:0000:0086]) Nota bene: I use 0.0.0.0 which renders the DNSBL webserver useless and inaccessible, but otherwise returns 0.0.0.0 or ::/NOERROR answers to all blocked lookups.
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    501 Topics
    3k Posts
    A
    Hi, Please help to forward / report the bugs in ACME 1.0 package. Thanks.
  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    yon 0Y
    said in Please update frr on Pfsense+ to FRR 10.3: https://redmine.pfsense.org/issues/15785 now frr 10.4.1
  • Discussions about the Tailscale package

    90 Topics
    610 Posts
    E
    Updated CE 2.7.2 to 1.86.4_1 Changelog pkg add -f https://pkg.freebsd.org/FreeBSD:14:amd64/latest/All/tailscale-1.86.4_1.pkg Freshports
  • Discussions about WireGuard

    699 Topics
    4k Posts
    S
    @Bob.Dig what's the right place?
  • PfBlocker with Nested Aliases

    4
    0 Votes
    4 Posts
    2k Views
    J
    I'm very sorry I haven't responded, I didn't get alerted to the thread being updated. I am embarrassed to be reminded of this as I did realise I was being less than observant when I first looked in to it, pfBlocker itself can use multiple lists per alias. To achieve what I described I now do the following - please note I am describing this from memory and I have just started using pfblockerNG instead so please don't…. assume I am correct (!) In pfBlocker: Create a new item "Alias_Always_Block" Add the IP blocklists as required to this - I had missed the fact I could simply click "+" to add multiple lists. Set as an Alias rather than a permit/deny. –My "Always Block" contains only a Pe**phile list. Create a new item "Alias_Mostly_Block" Add the IP blocklists as required to this. Set as an Alias rather than a permit/deny. --My "Mostly Block" contains for example malware and ad lists. In the pfSense Aliases (Firewall > Aliases> URLs) create an Alias "URLs_pfBlocker_Override" and add the URLs you wish to whitelist. Now create your firewall rules using aliases in this order, relative to your other rules (I use floating rules). Block "Alias_Always_Block" Allow "URLs_pfBlocker_Override" Block "Alias_Mostly_Block" Whenever something breaks, add "www.example.com" to the "URLs_pfBlocker_Override" Alias - remember to refresh your rules and wait. You should now find you never see traffic to Pe**philes, and you may find certain websites get blocked because they are hosted by providers whose entire range has been added to a malware or ad list for some bad apples spoiling the bunch. Manually add them to your override URLs to allow for this. The above is overly simplified as my actual rules block everything, the URLs override rule only allows HTTP/HTTPS ports, and other allow rules I haven't described get the rest of my legitimate traffic working. I highly recommend reading this thread, I am only half way through it myself but it will explain in detail what I have glossed over here - https://forum.pfsense.org/index.php?topic=78062.0
  • New Package Child Boards

    1
    0 Votes
    1 Posts
    8k Views
    No one has replied
  • Asterisk as standalone package on pfsense

    2
    0 Votes
    2 Posts
    785 Views
    K
    http://www.asterisk.org/downloads/asterisknow
  • Sarg Reports Generation

    7
    0 Votes
    7 Posts
    1k Views
    B
    @marcelloc: Check the sample you copied. That is between two Yes thank you..attention to detail such an easy thing to miss. Thanks its working now.
  • Configure sarg or lightsquid

    4
    0 Votes
    4 Posts
    2k Views
    KOMK
    Are the commands for lightsquid or sarg? Sorry, I'm an idiot.  I grabbed the wrong section from my pfSense cheat sheet.  Try this for Lightsquid: ln -s /usr/pbi/lightsquid-amd64/local/www/lightsquid /usr/local/www/lightsquid ln -s /usr/pbi/lightsquid-amd64/local/etc/lightsquid /usr/local/etc/lightsquid pkg install perl5 pkg install p5-gd /usr/bin/perl /usr/pbi/lightsquid-amd64/www/lightsquid/lightparser.pl today This works for getting Lightsquid working with 2.1.5.  I haven't played much with 2.2 packages for a few weeks now so I have no idea if this works with the latest stuff.
  • Packages blocked after update

    2
    0 Votes
    2 Posts
    692 Views
    K
    I reinstalled the gui of the package and I have been able to uninstall it after that. So I presume my updated install is now clear.
  • Dansquardian doens'nt really block access

    1
    0 Votes
    1 Posts
    355 Views
    No one has replied
  • MOVED: asterisk sur pfsense

    Locked
    1
    0 Votes
    1 Posts
    499 Views
    No one has replied
  • Squidguard 1.4 reporting garbage on redirect page

    1
    0 Votes
    1 Posts
    652 Views
    No one has replied
  • Arpwatch pkg not starting….

    12
    0 Votes
    12 Posts
    5k Views
    F
    Same problem here, arpwatch service won't start. If I look inside <tt>/usr/local/etc/rc.d/arpwatch.sh</tt> I find /usr/local/sbin/arpwatch -d -f /var/log/arp.dat  -i bce2 > /var/log/arpwatch.reports 2>&1 & But executing this on the command line only gives "<tt>Ambiguous output redirect.</tt>" (although this may just be a shell problem). Anyway, arpwatch (2.1.a15_8 pkg v1.1.2) not working on pfSense 2.2-RELEASE (amd64) :(
  • Squidguad not blocking anny traffic

    2
    0 Votes
    2 Posts
    852 Views
    KOMK
    Are you using Transparent mode?  Are the sites not being blocked HTTPS?
  • Unable to configure haproxy. Need help please

    6
    0 Votes
    6 Posts
    3k Views
    A
    Thank you, My mistake was that i used clone option on first frontend, then you can't see shared option.  :'(
  • Squid and OpenVPN Road Warrior

    2
    0 Votes
    2 Posts
    1k Views
    S
    I have the exact same issue on pfSense 2.2-RELEASE (amd64) (built on Thu Jan 22 14:03:54 CST 2015 FreeBSD 10.1-RELEASE-p4) with squid 3.4.10_2 (pkg 0.2.6). The second number varies though, and it doesn't seem to always produce this error. I had it working for 2 weeks perfectly, but a few minutes ago my gateway went down and that led to this strange error again. For reference, my error was: Mar 1 20:14:29 php-fpm[42821]: /pkg_edit.php: The command '/usr/pbi/squid-amd64/sbin/squid -k reconfigure -f /usr/pbi/squid-amd64/local/etc/squid/squid.conf' returned exit code '1', the output was '2015/03/01 20:14:29| aclParseIpData: unknown netmask '0.20173389051966' in '0.40.0.0/0.20173389051966' FATAL: Bungled /usr/pbi/squid-amd64/local/etc/squid/squid.conf line 31: acl localnet src 10.0.0.0/8 172.16.0.0/24 172.16.1.0/24 172.16.2.0/24 0.40.0.0/0.20173389051966 0.40.0.0/0.20173389670071 Squid Cache (Version 3.4.10): Terminated abnormally. CPU Usage: 0.061 seconds = 0.031 user + 0.031 sys Maximum Resident Size: 45728 KB Page faults with physical i/o: 0' Mar 1 20:14:29 squid: Bungled /usr/pbi/squid-amd64/local/etc/squid/squid.conf line 31: acl localnet src 10.0.0.0/8 172.16.0.0/24 172.16.1.0/24 172.16.2.0/24 0.40.0.0/0.20173389051966 0.40.0.0/0.20173389670071
  • System log full of snort errors without configuration change

    3
    0 Votes
    3 Posts
    1k Views
    S
    Ok, thanks for the info!!
  • Squid3 + antivirus - freshclam not updating automatically

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • 0 Votes
    4 Posts
    1k Views
    JailerJ
    Mine had updated automatically last might at midnight as schedule but I did a manual update just to check it and see. Both seem to be functioning normally for me.
  • Squid swaps in 2.2-memory leaking freebsd 10

    3
    0 Votes
    3 Posts
    1k Views
    X
    updated the first post…
  • Clamav Update to 0.98.6?

    3
    0 Votes
    3 Posts
    829 Views
    S
    Hi, yes thats true. I forgot to write that. But the question still remain, why pfs or freebsd still on old version.
  • Runing snort inline-test mode

    11
    0 Votes
    11 Posts
    4k Views
    bmeeksB
    @SenselessCow: First case WAN to get some experience but later preferably a setup as explained here: https://forum.pfsense.org/index.php/topic,62928.msg341417.html#msg341417 To run Snort in a "test mode" of sorts, simply uncheck the Block Offenders box on the INTERFACE SETTINGS tab for each Snort interface.  The checkbox is within the Alert Settings section of the tab.  With that box unchecked, Snort will alert and log the incident, but it will not insert any blocks into the firewall's packet filter engine for the IP addresses in the alert. In the configuration described in the above paragraph, Snort is running as an IDS (Intrusion Detection System).  It detects a problem, but only alerts you to its presence.  When you check the Block Offenders checkbox and then restart Snort on the interface, it will insert blocks for the offending IP addresses (depending on the setting of the Which IP to Block drop-down) into the firewall's packet filter engine.  When the Block Offenders box is checked Snort behaves closer to an IPS (Intrusion Prevention System) within the limits described earlier in the thread relative to using libpcap and working from copies of packets, etc. For the majority of home networks, running Snort on the LAN only is probably the best solution.  I run some rules on the WAN solely for the purpose of seeing some alerts from Snort as part of my testing.  My firewall rules block pretty much all unsolicited inbound traffic anyway, so Snort on the WAN for me is not adding to security.  It is just there to gather some log data really. Bill
  • Squid3 Crashing frequently

    7
    0 Votes
    7 Posts
    3k Views
    H
    @marcelloc: Better see cache.log and squid -k parse Squid3 on pfsense 2.2 32 bits still need a package compilation to work in transparent mode. I'll ping Renato again… how about 64bit version? non-transparent mode, cpu utilization going to 100% randomly and cache.log contains this: 2015/02/20 09:43:53 kid1| Starting new negotiateauthenticator helpers… 2015/02/20 09:43:53 kid1| Starting new negotiateauthenticator helpers... 2015/02/20 09:57:20 kid1| Starting new negotiateauthenticator helpers... 2015/02/20 09:57:20 kid1| Starting new negotiateauthenticator helpers... 2015/02/20 09:57:20 kid1| Starting new negotiateauthenticator helpers... 2015/02/20 10:03:25 kid1| helperDispatch: Helper memberof #Hlpr0 has crashed 2015/02/20 10:03:28 kid1| helperDispatch: Helper memberof #Hlpr0 has crashed 2015/02/20 10:03:47 kid1| helperDispatch: Helper memberof #Hlpr0 has crashed 2015/02/20 10:04:17 kid1| Starting new memberof helpers... 2015/02/20 10:04:46 kid1| helperDispatch: Helper memberof #Hlpr0 has crashed 2015/02/20 10:04:46 kid1| WARNING: memberof #Hlpr0 exited 2015/02/20 10:04:46 kid1| ERROR: The memberof helpers are crashing too rapidly, need help! 2015/02/20 10:04:47 kid1| WARNING: memberof #Hlpr0 exited 2015/02/20 10:04:47 kid1| ERROR: The memberof helpers are crashing too rapidly, need help! 2015/02/20 10:04:52 kid1| helperDispatch: Helper memberof #Hlpr0 has crashed 2015/02/20 10:04:52 kid1| helperDispatch: Helper memberof #Hlpr0 has crashed 2015/02/20 10:05:07 kid1| WARNING: memberof #Hlpr0 exited 2015/02/20 10:05:07 kid1| ERROR: The memberof helpers are crashing too rapidly, need help! 2015/02/20 10:06:12 kid1| WARNING: memberof #Hlpr0 exited 2015/02/20 10:06:15 kid1| WARNING: memberof #Hlpr0 exited FATAL: The memberof helpers are crashing too rapidly, need help! Squid Cache (Version 3.4.10): Terminated abnormally. CPU Usage: 38855.042 seconds = 38840.176 user + 14.866 sys Maximum Resident Size: 774000 KB Page faults with physical i/o: 11 2015/02/20 10:06:18 kid1| Starting Squid Cache version 3.4.10 for amd64-portbld-freebsd10.1... "memberof" from squid.conf: external_acl_type memberof ttl=300 ipv4 %LOGIN /usr/local/libexec/squid/ext_ldap_group_acl -P -K -R -b "dc=,dc=local" -D "squid_k@.local" -W "/usr/local/etc/squid/squid_k.pass" -f "(&(objectclass=person)(sAMAccountName=%v)(memberOf:1.2.840.113556.1.4.1941:=cn=%g,OU=Internet,DC=***,DC=local))" -h 192.168.0.231 192.168.0.239 can i use "ext_ldap_group_acl" helper from squid version 3.3.10 for example, coz it's just an external (to squid) program if i understand correctly, and it working fine on pfsense 2.1.5?
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.