Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    E
    I even tried deleting and creating a new certificate. Any suggestions?
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    I
    I am new to using Snort in a Netgate router with pfSense. In the Snort settings under alerts I am seeing notice like this: 2025-09-08 16:34:17 1 UDP Attempted User Privilege Gain 37.60.141.158 47167 195.252.###.### 9034 1:58853 SERVER-OTHER RealTek UDPServer command injection attempt Does this mean that someone from 37.60.141.158 tried to login to my router or is trying to log in to my router? Does SNORT block this attempt? or How do I block this attempt? There is nothing showing up in my BLOCKED list. Will snort ONLY block these IP's if I have "Block Offenders" checked? If yes, should I use legacy mode or inline mode? My understanding is that if I use legacy mode all rules will be enabled and any alerts will be automatically blocked right? If I use inline mode, then NO rules will be automatically blocked and I would have to enable the action for that rule for it to be blocked, right? If I use inline mode, how do I enable a rule? Right now I just have a yellow triangle under the action for this rule. How do I know which rules is snort using? Under WAN Categories, If I choose balance, NONE of the rulesets (Categories) shown at the bottom are checked? Here is another alert that I m wondering about: 2025-09-08 08:38:21 3 Generic Protocol Command Decode 97.78.###.### 24.172.###.### 123:8 (spp_frag3) Fragmentation overlap The source IP 97.78.###.### is my main office IP address and the Destination IP 24.172.###.### is my branch office. I'm not sure what this is and I definitely don't want this data being blocked by SNORT, so would this be a good reason to NOT use legacy mode in the Blocked Offenders section?
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    572 Topics
    3k Posts
    keyserK
    @Antibiotic No it’s not possible with NtopNG as it is not a Netflow collector. You need nProbe for that which will “translate” recieved netflows into flows that NtopNG understands and can visualize (with very very little detail might I add as Netflows has no additonal information apart from sender/reciever and volume). The NtopNG package and the product in general is more geared towards visualising and recording traffic details from actual packet captures. This contains MUCH more metadata about the sessions than netflows (DNS names, protocol information and myriads of other things). But pffSense Plus has a builtin Netflow exporter if you have an external netflow collector on hand.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    tinfoilmattT
    @BiloxiGeek said in DNSBL and IPv6: Does it just follow the IPv4 address that is listed above that? In my case it would end up being ::10.0.0.86 Yes. In this specific context that's the notation being used. (Full IPv6 web server address, for reference then, would be: http://[0000:0000:0000:0000:0010:0000:0000:0086]) Nota bene: I use 0.0.0.0 which renders the DNSBL webserver useless and inaccessible, but otherwise returns 0.0.0.0 or ::/NOERROR answers to all blocked lookups.
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    501 Topics
    3k Posts
    A
    Hi, Please help to forward / report the bugs in ACME 1.0 package. Thanks.
  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    yon 0Y
    said in Please update frr on Pfsense+ to FRR 10.3: https://redmine.pfsense.org/issues/15785 now frr 10.4.1
  • Discussions about the Tailscale package

    90 Topics
    610 Posts
    E
    Updated CE 2.7.2 to 1.86.4_1 Changelog pkg add -f https://pkg.freebsd.org/FreeBSD:14:amd64/latest/All/tailscale-1.86.4_1.pkg Freshports
  • Discussions about WireGuard

    699 Topics
    4k Posts
    S
    @Bob.Dig what's the right place?
  • Squid - ghostly settings

    3
    0 Votes
    3 Posts
    928 Views
    S
    Yes for the reverse proxy I don't think it's a domain issue Some settings are sticky. I remove them from the GUI but Squid RP still uses those settings.
  • Squidguard3 not working

    13
    0 Votes
    13 Posts
    3k Views
    V
    ok, I believe I found a work around. First install Squid3 Second, disable the Antivirus and hit save If you are using Transparent proxy make sure you select your proxy interface and save Once you do this Squid should fire. If you want to use Squidgaurd then you'll need to install, check your configuration and then hit download to download your block list. For some reason squidguard won't fire if you hit apply or save in the main menu. If it still doesn't fire go back to the main menu, hit apply then save then go back and tell it to download the block list again and it should fire once it finishes downloading and installing the block list. This is the only way I can get squidgaurd to work. If you follow the download with hitting apply or save again squidgaurd will stop.
  • SNORT vs Suricata Detection

    4
    0 Votes
    4 Posts
    6k Views
    bmeeksB
    Good advice above from jflsakfja and fsansfil. In my view it is sort of like preferring vanilla over chocolate when choosing an ice cream flavor.  It is a case of personal taste. If you have a paid Snort VRT subscription, then those rules are updated twice per week (on Tuesdays and Thursdays).  The Emerging Threats Open rules (ET-Open) are updated pretty much daily, but they cover a subset of the threats that are covered by the ET-Pro (paid) rules.  The ET-Pro rules are also updated daily.  Currently an ET-Pro subscription is $499/year.  The Snort VRT (for home use) is $29.99/year.  There are free Snort rules available that only require you to register, but they are 30-days old (meaning no protection for any threats newer than 30 days). So if you use the totally free rules from either Snort VRT or Emerging Threats, you have to accept the fact you are not protected from all of the current threats.  However, as jflsakfja said, you can compensate by writing your own custom rules for either package (Snort or Suricata) if you fully understand your network and have a good grasp of the signatures for current malware threats. In my view, neither package is necessarily "better". Bill
  • Upgrade to pfsense 2.2 broke postfix forwarder

    2
    0 Votes
    2 Posts
    2k Views
    S
    Well, crap.  I found out my issue is this: https://forum.pfsense.org/index.php?topic=40622.msg479547#msg479547 Apparently pfsense 2.2 security sysctrl option does not allow non root users to listen on low ports - and /var/spool/postfix is owned by the postfix user.
  • HAProxy stable in 2.2?

    3
    0 Votes
    3 Posts
    956 Views
    N
    All right. Thank you. Nicolas
  • Haproxy-devel external address option (pfsense 2.2)

    3
    0 Votes
    3 Posts
    1k Views
    N
    Hi, thank you for your answer. Nicolas
  • Bypass ssl-bump on squid3-dev

    37
    0 Votes
    37 Posts
    19k Views
    marcellocM
    @webstor: He has to generate a certificate for the required domain when bumping server-side first, it is a wildcard generated for the correct domain and not the ip. I know it is for the site. the question is, in transparent mode, how could squid know without intercepting that connection from 192.168.1.1 to 64.54.10.10 is a request to microsoft windows update? Squid will only know the domain after interception, so acl will take no effect. Also there are some notes about fast and slow acls that not work on this or that squid option.
  • Need the best squid caching policy for a slow connection

    4
    0 Votes
    4 Posts
    1k Views
    T
    I had a similar network in size, and the cache hit ratio was around 15-20%. YMMV. That would likely increase if SSL interception was enabled but that bring it's own set of problems. Try it, it isn't too difficult to setup, especially if you use the pfsense package.
  • Suricata 2.0.6 pkg v2.1.4 Release Notes (pfSense 2.2 only)

    8
    0 Votes
    8 Posts
    1k Views
    C
    Your welcome Bill! Good call on how you programmed this.
  • Smokeping on pfSense

    22
    1 Votes
    22 Posts
    7k Views
    D
    So you mean - killbyname in case something happened to pid file? I wouldn't do it like that, but I am not developing pfSense. If developers need to killbyname, they should be using link with different name themselves :) I am not here to judge this. If that's how it is done currently, we'll use workaround, I just don't like that many workarounds around pfSense :(
  • Squid + SquidGuard + AD

    12
    0 Votes
    12 Posts
    12k Views
    A
    @Luiz Gustavo , there is now other repositories working ???????
  • Mailreport Problems

    4
    0 Votes
    4 Posts
    2k Views
    P
    This is in Mail Report 2.3, available now. Along with fixes here also: https://forum.pfsense.org/index.php?topic=83668.msg488777#msg488777
  • Bacula Client Package doesn't work on 2.2-rc

    6
    0 Votes
    6 Posts
    2k Views
    jimpJ
    Bacula should be OK now on 2.2, as of package version 1.0.6.
  • Sarg + dansguardian

    2
    0 Votes
    2 Posts
    902 Views
    R
    @markusxyz: Is there any conflict with sarg+dansguardian? Should I use squidguard instead? There is no incompatibility between Sarg and dansguardian. However, you will have to set the log format for dans to output in the squid format for Sarg to parse it. BTW, there are much better options for dansguardian reporting… you could install webmin and the DG reporting package - or see this thread https://forum.pfsense.org/index.php?topic=69003.msg377440#msg377440 The question on squidguard has nothing to do with Sarg… squidguard and dansguardian are not the same thing. Squidguard does blacklist based filtering. Dans does both blacklist and content based filtering.
  • Simple set-up Squid3 and Clam with Failover

    3
    0 Votes
    3 Posts
    934 Views
    O
    Well, I got Failover working. Ticking the "default gateway switching" box did the trick. I did not need to add a floating rule like many trying to do this in 2.1.5.
  • Snort Rule Fatal Error

    3
    0 Votes
    3 Posts
    993 Views
    K
    Thanks BBcan177, I'll disable the rule.
  • Ntopng won't load

    3
    0 Votes
    3 Posts
    1k Views
    E
    Thanks for the response.  Looking at the PFsense dashboard, it's sitting at 20% memory usage of the 2GB of memory being used.  I've got other fish to fry with my network, so ntopng is more of a luxury.  Alas, it was wonderful when it worked.
  • 2.2 and bind package: libz.so.5

    8
    0 Votes
    8 Posts
    2k Views
    D
    @knebb: Just wondering as there is now no symlink libz.so.5 nor libz.so anywhere… Well yes, that is the point! It does NOT need libz.so.5. It gets moaning about that one since the linker symlink under /usr/lib points to the non-existent deprecated library version. (If you look into /usr/pbi, the PBI thing somehow creates its own directory structure for each package under /usr/pbi/<packagename-$arch>/local, and redirects the calls and produces its own symlinks copies there. So, just removing/fixing the broken symlink under /usr/lib is not enough. You need to nuke and reinstall the package as well. At least that's my understanding of these stupid issues, I hate the PBI thing with passion and pretty sure at least some of the few remaining package maintainers are of the same opinion.</packagename-$arch>
  • 0 Votes
    2 Posts
    3k Views
    marcellocM
    While intercepting port 443, on http protocol will work. Skype uses port 443 but it's protocol is not http. That's why it's not working
  • Freeradius authentication over IPSEC

    5
    0 Votes
    5 Posts
    2k Views
    D
    This won't work out of the box with IPSec for reasons documented here: Why can't I query SNMP, use syslog, NTP, or other services initiated by the firewall itself over IPsec VPN
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.