Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    E
    I even tried deleting and creating a new certificate. Any suggestions?
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    N
    @btspce Thank you. Do you know if this will be the process to follow moving forward? Normal users are required to open tickets in order to get updates? Or is there a point of contact that we can nudge for this cases.
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    572 Topics
    3k Posts
    keyserK
    @Antibiotic No it’s not possible with NtopNG as it is not a Netflow collector. You need nProbe for that which will “translate” recieved netflows into flows that NtopNG understands and can visualize (with very very little detail might I add as Netflows has no additonal information apart from sender/reciever and volume). The NtopNG package and the product in general is more geared towards visualising and recording traffic details from actual packet captures. This contains MUCH more metadata about the sessions than netflows (DNS names, protocol information and myriads of other things). But pffSense Plus has a builtin Netflow exporter if you have an external netflow collector on hand.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    V
    @Gertjan Thanks for your reply – that’s also my impression. The point is: I don’t really see any lists right now that are actually “maintained” in the sense of being actively cleaned up, checked for dead domains, categorized, etc. That’s why my main interest is more about the demand: Would curated lists really be a game changer for admins? Would they be more helpful than what’s available today, or are most people already using other alternatives? If so, which ones? And from your perspective, what would be your expectation towards “community lists”? (e.g. reliability, update frequency, categories, fewer false positives?)
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    501 Topics
    3k Posts
    A
    Hi, Please help to forward / report the bugs in ACME 1.0 package. Thanks.
  • Discussions about the FRR Dynamic Routing package on pfSense

    295 Topics
    1k Posts
    J
    Anyone else happen to notice that when configuring BFD, if you create a peer and select a profile - after save, re-edit the peer and the Profile is not represented. It appears as "None". You have to check the raw config to determine if the profile was actually assigned to the peer. This is on 2.8.1 (all packages up to date as of the date/time of this post). UPDATE: if re-edit and save (without re-configuring the profile none to what you want) - the save will strip the profile from the peer.
  • Discussions about the Tailscale package

    91 Topics
    611 Posts
    T
    Hi All, I use HAProxy to redirect to a range of https internal resources, this works really well at the moment through the WAN where I have source limits set up, and I can connect to the internal resources from limited external IP Addresses. Given I have tailscale I would like to basically be able to put custom dns entries in to point these hostnames to my pfsense tailscale IP4 address (100.89.148.118) but I am not having any luck getting this working. At the moment, I am just trying to connect to HAProxy using https://100.89.148.118 but it is getting blocked by the firewall. Sep 11 11:55:58 tailscale0 Default deny rule IPv4 (1000000103) 100.89.148.10:53148 100.89.148.118:443 TCP:S I have tried with and without NAT redirecting internally to 127.0.0.1, and I also have rules set up to allow any traffic to and from my tailnets (defined in an alias) but I still keep getting these connections from my other tailscale machines being blocked on the pfsense machine. Can someone give me some pointers on what I am missing because I can see the requests are coming through to the pfsense machine, and in theory the rules should allow it through but I cant see why they don't. I do have tailscale ACL in place, but clearly that is not an issue as the requests are making it through to the firewall. 0/0 B IPv4+6 TCP/UDP TailNets * TailNets * * none Allow across Tailnets 0/0 B IPv4+6 TCP/UDP * * * 443 (HTTPS) * none Allow Tailscale IP4 I also tried adding a EasyRule but because the tailscale0 interface doesn't exist in pfsense it throws an error and won't let me add that rule. Appreciate any help or tips, Cheers.
  • Discussions about WireGuard

    700 Topics
    4k Posts
    Bob.DigB
    @HFADmin If it is no Site2Site-VPN then you don't need any gateways in the first place... If that is true but you want to monitor the connection then you could create dummy-gateways just to ping the remote ip-addresses.
  • PfBlocker in Alias Only Mode - Help

    7
    0 Votes
    7 Posts
    2k Views
    W
    Thanks Rick.
  • NUT + APC Back-UPS CS 350 not working

    3
    0 Votes
    3 Posts
    2k Views
    M
    Hi, thx for answer. I try all APC combinations settings, nothing work. my NUT settings (i want use only local usb ups): [image: Sn%C3%ADmka.JPG_thumb] [image: Sn%C3%ADmka.JPG]
  • Reverse-squid OWA,activesync attachement problem

    1
    0 Votes
    1 Posts
    878 Views
    No one has replied
  • Tincd and nat

    4
    0 Votes
    4 Posts
    2k Views
    P
    well this worked.  thanks.  I forgot about the interface assign page…
  • Brain-dead postfix postscreen function

    6
    0 Votes
    6 Posts
    2k Views
    B
    If anyone is running postfix and doesn't find this too fugly ;) I found this about how to whitelist Google servers: Comparing the list of subnets to one seen in another thread (now lost) it seems they haven't changed in over a year.  Not too surprising, since they are pretty big subnets. Paste the following into Services > Postfix Forwarder > Access Lists > Client Access Lists > CIDR: # Google IPv4 addresses 64.18.0.0/20 permit 64.233.160.0/19 permit 66.102.0.0/20 permit 66.249.80.0/20 permit 72.14.192.0/18 permit 74.125.0.0/16 permit 173.194.0.0/16 permit 207.126.144.0/20 permit 209.85.128.0/17 permit 216.239.32.0/19 permit # Google IPv6 addresses 2001:4860:4000::/36 permit 2404:6800:4000::/36 permit 2607:f8b0:4000::/36 permit 2800:3f0:4000::/36 permit 2a00:1450:4000::/36 permit 2c0f:fb50:4000::/36 permit Haven't been able to find anything similar for HotMail but no one I know uses it anyway  :)
  • Lightsquid reports via email

    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    I've seen it done with mailreports before. You can use "/usr/bin/fetch -o - https://[…]" to include the contents of the page in the report, though I seem to remember that having a formatting issue of some sort.
  • How to install g729 on pfsense & asterisk

    2
    0 Votes
    2 Posts
    1k Views
    A
    friend succeeded in installing the codec? Thank!
  • Squid will not work at all

    2
    0 Votes
    2 Posts
    948 Views
    C
    Do you have a backup you can try to restore from? System -> Firmware -> Restore Full Backup or Diagnostics -> Backup/Restore
  • Install the full FreeBSD-GENERIC on pfSense 2.2

    3
    0 Votes
    3 Posts
    2k Views
    D
    Hello again  :) I've just improved to the procedure for installing Finch on pfSense. Now more resilient to upgrading of the pfSense host system. Before these changes, the Finch boot scripts could be wiped away after pfSense upgrade. Now, the only manual thing a user needs to do after upgrading pfSense, is restore their "fstab" file from a Backup. But it's very easy and full instructions are given. All new installation procedure is documented on Finch's website: http://dreamcat4.github.io/finch/install/ Other improvements: Better handling of admin user accounts. The presence of a temporary file "$finch_realpath/var/db/finch/installing…" now allows a simple way to query Finch's installation progress (i.e. "not installed, installing, installed"). (Useful for pfSense pkg makers).
  • Squid service stops on backup box when primary goes down

    1
    0 Votes
    1 Posts
    667 Views
    No one has replied
  • How to add snortsam on pfsense

    3
    0 Votes
    3 Posts
    1k Views
    bmeeksB
    @bmeeks: @magedtab: I tried to add snortsam to pfsense . snortsam 2.7 failed in installation i need the steps to install snortsam on pfsense thank you friends I'm pretty sure snortsam is not supported on pfSense, and the package has not been updated for quite a long time now.  So far as I know, the original creator/maintainer no longer visits the forums here. Bill
  • What is the difference between Suricata and snort ?

    2
    0 Votes
    2 Posts
    2k Views
    bmeeksB
    @firefox: I understand that they both IDS/IPS Daemon What is the difference between them ? Nothing really except two different vendors.  Snort is an open-source version of the IDS engine used by Sourcefire.  Suricata is a totally open-source effort partially funded by the U.S. Government and some private companies.  Well, technically Suricata is funded by the Open Information Security Foundation, but they get funding from the U.S. Department of Homeland Security and others.  Here is a link describing Suricata:  https://www.openinfosecfoundation.org/index.php/download-suricata.  Suricata is multi-threaded and should theoretically scale better in very high throughput networks.  However, extensive testing by the Snort guys and some independents shows there really is not much difference in the packet throughput in real-world networks between Snort and Suricata. In the end it comes down to personal preference.  Currently Suricata captures and logs a little bit more "context" around alerts, but Snort is catching up in this area. Bill
  • Squid3 disable caching and masking

    1
    0 Votes
    1 Posts
    634 Views
    No one has replied
  • Squid error page time difference

    1
    0 Votes
    1 Posts
    513 Views
    No one has replied
  • Snort/Barnyard2 interface via Stunnel

    2
    0 Votes
    2 Posts
    830 Views
    bmeeksB
    @wq6n: pfSense 2.1.3 Snort 2.9.6 Barnyard2 ? Stunnel 4.43.0 Unified2 feed from Snort remains constant on all sensors First off, thank you for such a great software security suite of tools. Pointing several Snort IDS sensors to a remote MYSQL server using a common port (lets call it TCP 3333). Created the Stunnel cert at the remote server using: openssl req -new -x509 -days 365 -nodes -config stunnel.cnf -out stunnel.pem -keyout stunnel.pem I did not create the Diffie-Hellman 'openssl gendh 512 >> stunnel.pem' as I did not see anything in the pfSense Barnyard2 configuration that suggested integration. However the other native Stunnel relationships do support the DH key. All Stunnel connections are in place and operational to the remote MYSQL server. I did have to go into the working pfSense Barnyard2.conf and append [port = 3333] to the MYSQL line. The remote Stunnel takes the incoming port TCP 3333 feeds and port forwards the data streams to the local TCP 3306 MYSQL listener. Restarting the Snort interface everything comes up and the remote end does see the incoming connection from the pfSense Snort application. My challenge is that Barnyard2 stops working and the connection is closed after a while. The Native feeds from the other remote Snort senors remain functional. Any ideas on keeping the Barnyard2 application running? Do you see any Barnyard2 related messages in the system log on the pfSense side?  The latest Barnyard2 binary seems to have a problem with multiple instances concurrently accessing the same SQL DB.  This usually manifests itself with a "duplicate key" error written to the pfSense system log. The fix, if you have this error, is to choose only one Barnyard2 instance to update the References table.  There is a checkbox to handle this on the BARNYARD tab in Snort. Bill
  • Blocking specific items on a web page?

    1
    0 Votes
    1 Posts
    527 Views
    No one has replied
  • Unable to determine IP address from host name for ….

    5
    0 Votes
    5 Posts
    7k Views
    E
    thank you rjcrowder for your time. I find the solution, the sites i got the massage was host in my vpn network and i should check the option "Disable DNS Rebinding Checks" at menu System->Advanced->Admin Access
  • Squid RealTime Log

    2
    0 Votes
    2 Posts
    730 Views
    C
    not really an answer but different developers built the packages. That is why Squid 2 doesn't have the real-time logging feature
  • Squid Authentication - Almost there…but not yet

    3
    0 Votes
    3 Posts
    2k Views
    G
    Final Update & Closing: My settings: LDAP base domain: cn=Users,dc=ads,dc=example,dc=local LDAP username DN attribute: samAccountName LDAP search filter: (&(memberOf=CN=InternetUsers,CN=Users,DC=ads,DC=example,DC=local)(sAMAccountName=%s)) AD structure: Container: Users > squid, test, administrator Other Containers (OU): OU Main             –- OU1 --- User1             --- OU2 --- User2 All these users have been added to security group (global) named InternetUsers and this group resides in the "Users" container. I am able to verify three users - test, squid, and administrator which are in Users container; but I am not able to authenticate User1 and User2 which are placed elsewhere in AD even though they are members of InternetUsers group. I conclude that the search is limited to one level only. So either I have to find a way to provide multiple Base Domain values, or find a way to make the search query recursive. Both would perhaps require me to directly edit the .inc file. I am not planning to do it and will leave it at that. I would rather create local users in Squid and now focus on learning SquidGuard. Thanks
  • Squidguard LOG and ERROR message

    4
    0 Votes
    4 Posts
    1k Views
    L
    this is solved. please close. thanks to all
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.