Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    E
    I even tried deleting and creating a new certificate. Any suggestions?
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    S
    @Smeg.Head Have you tried saving the log settings page as is? Years ago IIRC there was a bug there also where it needed saving. If pfSense is set to compress logs (should not on ZFS or slow CPUs) I wonder if it might be trying and timing out.
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    572 Topics
    3k Posts
    keyserK
    @Antibiotic No it’s not possible with NtopNG as it is not a Netflow collector. You need nProbe for that which will “translate” recieved netflows into flows that NtopNG understands and can visualize (with very very little detail might I add as Netflows has no additonal information apart from sender/reciever and volume). The NtopNG package and the product in general is more geared towards visualising and recording traffic details from actual packet captures. This contains MUCH more metadata about the sessions than netflows (DNS names, protocol information and myriads of other things). But pffSense Plus has a builtin Netflow exporter if you have an external netflow collector on hand.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    J
    @nanda said in pfb_filter and pfb_dnsbl services are not running Pfsense 25.07.1: When I checked the status of the service, the firewall returned, "does not exist". as in on the Status -> Services page? or where specifically ? and yet it shows on the dashboard services widget.. And you said this was a fresh install so ... are there any errors in pfblockerNG 's error.log, dnsbl_parsed_error or py_error (Firewall -> pfBlockerNG -> Logs on the pfblockerNG -> General. make sure the Keep Settings option is enabled then head over to packages and try to reinstall the package (you may remove and install or just reinstall) see if you spot any install errors during the install then when complete you will need to change the masterfile / mastercat line again and then check the update page at Firewall -> pfBlockerNG -> Update should have a status showing the next scheduled cron event (if that is within a few minutes just wait for it to run). if it is more than say 20 minutes away or says not scheduled (or similar) then on the same update screen force Cron hit run. when that is complete check the status then reboot check the status
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    500 Topics
    3k Posts
    G
    @Gertjan well..... finally i created a new user for inwx and just gave him dns_management role only AND without 2FA. So now all is fine, my PFSense has the LE Cert as it should be. Thanks and kr Mike
  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    yon 0Y
    said in Please update frr on Pfsense+ to FRR 10.3: https://redmine.pfsense.org/issues/15785 now frr 10.4.1
  • Discussions about the Tailscale package

    90 Topics
    609 Posts
    luckman212L
    The bugaboo that was affecting the FreeBSD 15 pkg repos has cleared, and the new builds seem to be finished. So, 1.86.4 is now landed in FreeBSD:15:amd64/latest ABI: pkg add -f https://pkg.freebsd.org/FreeBSD:15:amd64/latest/All/tailscale-1.86.4.pkg
  • Discussions about WireGuard

    699 Topics
    4k Posts
    S
    @Bob.Dig what's the right place?
  • Snort in promiscuous mode does not block automatically

    10
    0 Votes
    10 Posts
    3k Views
    bmeeksB
    @peridian: Doh!  Figured it out. @bmeeks: In this case, the bad IP (the source IP in this alert) was blocked so no further communication can happen there. You would think, however looking at the logs I realised that squid was operating on that interface in transparent mode.  snort was generating the block for the external IP, but squid was returning a cached copy of the content, which made it look to the client like the connection had still worked. @bmeeks: If so, you will need to define a custom PASS LIST, uncheck the option to include local networks, then manually assign the list to the VLAN interface (or the LAN interface) and restart Snort. Excellent, thank you for that, it achieved exactly the result I was looking for.  I don't know how I ever got snort to produce blocks originally if I didn't know to do this, but it is now behaving as expected, and with squid still enabled on the interface. Thank you for all your help, it's very much appreciated. Regards, Rob. Glad you got it figured out.  Unless you are worried about your internal VLAN hosts being a source of and spreading some malware, I don't understand why you want their IP addresses blocked at the firewall as well.  Simply blocking the other end of the offending traffic stream is protection enough for the victim host.  I'm assuming you are running this in a home setup.  As an example, assume your PC browses to a web site and some rogue ad content on the site causes Snort to fire an alert and insert a block.  If you let it block both the bad web site AND your own PC's address, then you can find yourself locked out of the firewall (at least from your PC).  Isn't it sufficient that just the far-end rogue source or destination be blocked? Bill
  • Squid 3.3.x how to install ?

    7
    0 Votes
    7 Posts
    1k Views
    W
    One more question.  How do I add CA certs that I manage to squid itself?
  • Clear out all old config from package

    9
    0 Votes
    9 Posts
    3k Views
    T
    @marcelloc: @Trel: If I edit a backup xml file, and remove the appropriate settings, and then restore it, does anything I removed get wiped off of pfsense or would the package gui config persist still? Will be removed. Keep in mid that full config restore forces a reboot and package reinstall. Ok, this looks like the best option anyway.  I should be good then.
  • Is pfBlocker safe to use with 2.2?

    13
    0 Votes
    13 Posts
    3k Views
    marcellocM
    @j@svg: Got it. So, basically wait for NG…. :( There is a manual install steps on pfblockerng thread but I'll send pull request to remove pfblocker and enable pfblockerng on 2.2
  • Lcdproc is not working anymore after the las Upgrade to 2.2

    2
    0 Votes
    2 Posts
    640 Views
    J
    The system logs indicate: php: lcdproc: Failed to connect to LCDd process Operation timed out (60) Any clues?
  • NTOP question

    2
    0 Votes
    2 Posts
    662 Views
    jimpJ
    Use ntopng rather than ntop. Its main screen focuses on immediate/current traffic usage.
  • Bacula version compatibility issue

    4
    0 Votes
    4 Posts
    3k Views
    jimpJ
    That should be possible in theory. The FreeBSD ports tree has both available still, sysutils/bacula-client is 7.0.5, sysutils/bacula5-client is 5.2.12
  • Squid Proxy with HTTPS Inspection downgrades SSL/TLS Ciphers

    3
    0 Votes
    3 Posts
    2k Views
    L
    @marcelloc: You mean client to squid cipher or squid to web server? I meant both connections. AFAIK sslproxy_cipher is for Squid <-> web server, and https_port is for Squid <-> web client. It doesn't hurt to keep both connections with strong SSL/TLS modes.
  • Ldap group Search filter for users in other OU's

    1
    0 Votes
    1 Posts
    676 Views
    No one has replied
  • 0 Votes
    33 Posts
    19k Views
    E
    Have you restart the firewall.
  • Snort keeps blocking my WAN

    6
    0 Votes
    6 Posts
    1k Views
    bmeeksB
    It should not be blocking your WAN IP unless Snort is not getting restarted when your WAN IP changes.  Remember that Snort only reads the Pass List contents once at startup.  It stores the contents in a memory array and refers to that array when getting ready to block an IP.  If the IP is in the memory list, it is not blocked.  If it's not in the memory list, it is blocked.  But this memory list is only created at startup and is not updated again until Snort restarts. The BOTH selection should be fine.  You can change it if you wish, but depending on the direction of traffic, it may not help with your blocking problem.  I think that issue is caused by Snort not recognizing your WAN IP updated. If you WAN IP changes and Snort does not restart, you can get a block.  You should see some system log entries when your WAN IP changes.  Look for a line near the IP change message that says "…restarting packages...".  If you don't see that line, and your IP changed, that's going to be the problem.  You would next need to determine why the packages did not restart.  Have you applied any manual patches to pfSense itself? Bill
  • How to backup configuration in readable text?

    5
    0 Votes
    5 Posts
    1k Views
    jimpJ
    ^ These things. If you have a good editor, it may already have base64 en/decoing built in. I use UltraEdit. All I have to do is select some text and use Edit > Decode base64. Notepad++ Has Plugins > MIME Tools > Base64 Decode There are scripts for Kate, and probably many other editors out there.
  • [Solved] Issue installing squid and squid guard

    12
    0 Votes
    12 Posts
    3k Views
    KOMK
    I've seen this behaviour before as well.  It's almost as if there are some operations in the package being done out of order, such as copying a library file to a dir that doesn't exist and then later creating that dir.  Fails on first install because the dir wasn't there, but succeeds on second try because the dir got created at the end of the first failed install.
  • Custom SquidGuard Error Pages Redux

    5
    0 Votes
    5 Posts
    2k Views
    KOMK
    I haven't tried that.  The problem with editing the local file is that any changes will be blown away during an upgrade.  The posts I linked to suggested just including the function in an external file so that you only had to add the include statement to the updated sgerror.php.  I know I should move the KOMerr.php out of /usr/local/www but I wanted to get it working at a basic level first.
  • Snort GUI misleading v- 2.2

    3
    0 Votes
    3 Posts
    975 Views
    C
    Thanks that worked perfectly. cjb
  • Testing snort alerts

    2
    0 Votes
    2 Posts
    944 Views
    bmeeksB
    @tsolrm: What sort of things would cause snort to throw an alert? I am trying to test its functionality so I need a few test cases that would prove that it works. Thank you Enable the Emerging Threats scan rules category, then scan the firewall (on the interface where Snort is running) from a host running nmap.  That should generate some alerts for MySQL probes, VNC probes and a handful of others. Bill
  • 0 Votes
    3 Posts
    781 Views
    P
    @marcelloc: As you're forwarding it via firewall nat/rules, just create a no nat rule before with your client ips. Thank you, Marcello! So, if I understand correctly, I create a rule that instead of forwarding the client's IP outgoing traffic from port 80 to port 8080 on the LAN interface (like I have with DansGuardian), I create a rule to forward port 80 outgoing traffic on the LAN interface to port 3128? so even if the proxy is set to bypass traffic from that IP in transparent mode, it will still force HTTp to be proxied, and HTTPS to be bypassed?
  • Snort suppress list not working ?

    5
    0 Votes
    5 Posts
    2k Views
    bmeeksB
    @godtor: Solved, i was missing the "Choose a suppression or filtering file if desired" option.. my bad sry :) And after choosing that file and saving the change, remember to restart Snort on that interface. Bill
  • Strange snort's portscan detection

    2
    0 Votes
    2 Posts
    1k Views
    BBcan177B
    Snort puts the interface in promiscuous mode so it's seeing any traffic on the selected interface.
  • 2.2 update(amd64) UnboundDNS package missing from package list

    2
    0 Votes
    2 Posts
    490 Views
    BBcan177B
    In 2.2, Unbound is part of the base pfSense software. Look in the GUI menu for "DNS Resolver".
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.