Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    H
    Hello all, please dont shoot me on sight, im one of those who kinda set up things by following tutorials and actually see things how they look like on screen. And English is not my native language either. I setted up HAProxy with pfSense package for Nextcloud which works as VM at ip 192.168.1.214. It has self signed cert. I created ACME with Porkbun as wildcard and all that works totally fine. BUT i have big issue which i dont know how to solve. When im acessing by nextcloud.mydomain.xx in LOCAL LAN it serves page fine, but it uses self signed cert. Will someone, please, by example show me how to create working rule which will force pfSense to serve 192.168.1.214 and all its translation or whatever exclusively outside? Bare in mind that 214 has to be able to lurk in 192.168.1.0/24 also, since data storage is served by NFS on TrueNas. 192.168.1.1 (pfSense IP), 192.168.1.214 (Nextcloud IP) All works fine from outside, but from local LAN it bypase HAProxy, and serve nextcloud internal cert with correct domain name nextcloud.mydomain.xx . Well it seems that only bypas cert part since domain works. Somehow it resolve. This is what dig command does from local lan: ;; ANSWER SECTION: nextcloud.domain.xx. 3600 IN A 192.168.1.1 nextcloud.domain.xx. 3600 IN A 192.168.1.214 ;; Query time: 0 msec ;; SERVER: 192.168.1.1#53(192.168.1.1) (UDP) ;; WHEN: Thu Oct 30 08:48:37 CET 2025 ;; MSG SIZE rcvd: 83 Main problem here is that Nextcloud app go stuck when we are on local network. It does not work since it gets different cert. It does not even ask do we want to accept it or not. Even if does it will be bit weird to do that every time we come home. Many thnx in advance!
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    B
    @Greyhat I think it's useful to work with what we've got and figure something out for the (i hope) edge cases later. So for the JSON I figured you can actually use an existing suricata integration by co-opting their pipelines.
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    573 Topics
    3k Posts
    dennypageD
    @kabeda If memory serves, that old version of ntopng did not run as user ntopng, but as user nobody. There are lots of problems in that old version. Anyway, check the ownership and permissions of /var/db/ntopng and make sure it matches the user that ntopng runs as. You may need to set ownership of the entire hierarchy. Example: /usr/sbin/chown -R nobody:nobody /var/db/ntopng However, the better choice would be to upgrade to a more recent version.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    tinfoilmattT
    Resurrecting this thread for two reasons: 1.) Because this is where I landed when newly confronted with the topic using pfBlockerNG-devel 3.2.10 on pfSense CE 2.8.1-RELEASE; and 2.) to confirm that the 'issue' and 'fix' here continue to be viable despite the TLD analysis function being considerably modified since the last post in September 2024. Current function @ L7255 of /usr/local/pkg/pfblockerng/pfblockerng.inc: // Determine max Domain count available for DNSBL TLD analysis (Avoid Unbound memory exhaustion) $pfs_memory = (round(get_single_sysctl('hw.physmem') / (1024*1024)) ?: 1000); $pfb['pfs_mem'] = [ '0' => '100000', '1500' => '150000', '2000' => '200000', '2500' => '250000', '3000' => '400000', '4000' => '600000', '5000' => '1000000', '6000' => '1500000', '7000' => '2000000', '8000' => '2500000', '12000' => '3000000', '16000' => '4000000', '32000' => '8000000' ]; if ($pfb['dnsbl_py_blacklist']) { array_walk($pfb['pfs_mem'], function (&$value) { $value = $value * 3; }); } foreach ($pfb['pfs_mem'] as $pfb_mem => $domain_max) { if ($pfs_memory >= $pfb_mem) { $pfb['domain_max_cnt'] = $domain_max; } } On a system with 32 GB of RAM attempting to 'analyze' over 24M but less than 27M domains, the line "'32000' => '8000000'" was changed to "'32000' => '9000000'" (i.e., permitting a maximum number of 27M domains to be 'analyzed') in order for the function to complete successfully. Analyzing (and then subsequently loading) precisely this number of domains... Original Matches Removed Final ---------------------------------------- 24270656 21017552 6463516 17807140 ----------------------------------------- ...results in Unbound's stable operational consumption of ~6 GB of RAM and any/all pfBlockerNG 'Reload' options consuming as much as ~6 GB of RAM, concurrently. Therefore one should only attempt this DNSBL hack if they're confident that their system has at least 13 GB of memory 'headroom' (taking into account normal system operation and any other resource-consuming, installed packages).
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    102 Topics
    3k Posts
    dennypageD
    @netboy said in Docker container for nut server?: I am NOT installing docker in pfsense - offcourse this is a big security risk - I agree !!! My apologies. I interpreted your earlier question I think i need to explain what i am asking for. I am fully aware if your netgate router is attached to an UPS you can configure netgate. Let us say you 5 UPS's in your home and you want nut server to read all the UPS's and show me a dasboard about the status of all the UPS's ? - Is there a ready made docker container for client server nut with dashboard functionality? as a request to have something running on pfSense, which is why I responded I believe most people would say that the type of thing you are asking for isn't something you want to run on your firewall. I recommend using a general purpose operating system behind the firewall instead. Mutual misunderstanding I guess. If you want to explore general NUT monitoring, and not something particular to pfSense, I would recommend the NUT Users list as a better place to seek information.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    503 Topics
    3k Posts
    M
    I am using the DNS-Update method I have to use a DNS-Sleep of 5 minutes to let the letsencrypt txt dns record update propagate. During this 5 minutes the acme-webgui times out. when the acme-webgui times out the Action list is NOT executed. How can I solve this ? Would it maybe be an idea to let the acme.sh script execute the actions in the action list as a post-hook instead of the web-gui? Or maybe add an option to add post-hooks in the webUI ?
  • Discussions about the FRR Dynamic Routing package on pfSense

    296 Topics
    1k Posts
    C
    This one has been tricky still not sure what to try. Any ideas?
  • Discussions about the Tailscale package

    92 Topics
    638 Posts
    L
    @Vad-B Interesting indeed! I just tried to fill the Pre-authentication Key with file:/dev/null. I get an crash in pfsense after some time, but when I login again is saved. For me this for after service restarts at least this solves it, including the issue with the routes not being advertised even set in the WebUI. Havent done an full restart of pfsense (yet)
  • Discussions about WireGuard

    710 Topics
    4k Posts
    T
    @chpalmer Me too! 25.11-BETA (amd64) built on Tue Oct 28 12:38:00 CST 2025 FreeBSD 16.0-CURRENT Ted
  • [SOLVED] squidclient

    5
    0 Votes
    5 Posts
    8k Views
    belleraB
    Sticky thread about Monitor Squid Status, https://forum.pfsense.org/index.php?topic=28835.0
  • Web cache server is not working for me

    2
    0 Votes
    2 Posts
    702 Views
    belleraB
    pfSense version? Package version do you want to install? There are different squid package versions. LAN/WAN scenario? (One LAN or more, one WAN or more?).
  • Firewall Rule, Squid and Squidguard

    6
    0 Votes
    6 Posts
    3k Views
    belleraB
    Yes, whitelists go before blacklists. That's all. If you need to do something like !block_bad_words filter_some_domains !block_with_big_black_lists you can see a trick at https://forum.pfsense.org/index.php?topic=73759.msg404261#msg404261
  • Snort IPrep

    15
    0 Votes
    15 Posts
    4k Views
    bmeeksB
    @BBcan17: @bmeeks: @BBcan17: I noticed this in the Blocked log? Not sure how that got added? I check the blocklist and its not there. 224 255.255.255.255 (spp_reputation) packets blacklisted - 04/15/14-13:10:56                               (portscan) UDP Filtered Portsweep - 04/15/14-10:19:22 Obviously it was a broadcast.  Could be a bug in the IP REP preprocessor code within Snort itself.  Done improperly, a test of a broadcast address could seem to match any IP address.  All the GUI package code does is set a handful of snort.conf parameters for the preprocessor. I guess add that to the Whitelst? Nah…I wouldn't bother.  You generally don't care if a broadcast is blocked because that is all subnet localized anyway.
  • Prevent snort from blocking particular websites

    2
    0 Votes
    2 Posts
    2k Views
    bmeeksB
    @thelongdivider: The title says it all.  Whenever snort is enable even the most popular websites like amazon and newegg are blocked by snort, as well as a couple of less common websites that are important to me.  Is there any way to unblock these sites on a website to website basis? Welcome to the world of false positives.  It happens with all IDS systems.  You need to examine the alerts, and if you trust the web site and are sure it is a false positive, you have two options: (1) suppress the alert or (2) add the host to a Pass List.  Here are some links to the Documentation Wiki with some details on each method. https://doc.pfsense.org/index.php/Snort_suppress_list https://doc.pfsense.org/index.php/Snort_passlist There is also a long thread here in the Packages forum containing known false positives and the corresponding Suppress List entries for them.  Here is a link to that thread: https://forum.pfsense.org/index.php?topic=64674.0 Bill
  • Snort: Alerts in the suppress list still visible in logg

    15
    1 Votes
    15 Posts
    4k Views
    P
    @BBcan17: @Priller, Did you try to re-install Snort? Or a De-install and re-install (Make sure the Checkbox is click to keep settings after deinstall) My bad for hijacking the original Snort problem reported.  Snort is working fine for me, it's Suricata that is exhibiting the identical problem that the OP reported with Snort. So, for Suricata, yes I did try a de-install and re-install.  I performed that both keeping the config … and also a total removed and rebuilt the config by hand.
  • Upgraded pfSense 2.1 with Quagga OSPF, exiting on signal 6

    6
    0 Votes
    6 Posts
    2k Views
    N
    Looks like the dead timer is doing it (40s default), although it gets the hello messages quite regularly: 08:37:50.196698 IP x.x.x.244 > 224.0.0.5: OSPFv2, Hello, length 68 08:37:59.869506 IP x.x.x.244 > 224.0.0.5: OSPFv2, Hello, length 68 08:38:09.148189 IP x.x.x.244 > 224.0.0.5: OSPFv2, Hello, length 68 08:38:18.830889 IP x.x.x.244 > 224.0.0.5: OSPFv2, Hello, length 68
  • Cannot Install OpenVPN Client Export Utililty

    6
    0 Votes
    6 Posts
    2k Views
    S
    Thanks jimp!  That worked!
  • Squidguard + SSL error page

    5
    0 Votes
    5 Posts
    2k Views
    belleraB
    @mendilli: if you want error page to bee seen for https sites, you should use squid3-dev with https transparent option As @mendilli said, you need squid3-dev + squidGuard+squid3 for SSL Bump (SSL interception). Steps (in Spanish), use translate.google.com https://forum.pfsense.org/index.php?topic=73007.msg402349#msg402349 https://forum.pfsense.org/index.php?topic=73740.0
  • Squid3-dev 3.3.10 pkg 2.2.2 failed to start after upgrading

    2
    0 Votes
    2 Posts
    1k Views
    belleraB
    I saw strange numbers in this case: https://forum.pfsense.org/index.php?topic=74567.0 Look for interfaces activated at your squid3-dev And look for this reported bug, https://forum.pfsense.org/index.php?topic=62256.msg407762#msg407762
  • Free Radius + Captive Portal No valid RADIUS responses received

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Zebedee

    1
    0 Votes
    1 Posts
    651 Views
    No one has replied
  • DansGuardian AD Groups

    2
    0 Votes
    2 Posts
    1k Views
    O
    Anyone?
  • Upgrade causes snort to enable barnyard (Snort 2.9.5.6 pkg v3.0.6)

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    @adam65535: Upgrade of the primary… Now the primary has barnyard enabled for both LAN and WAN too.  Not sure what is causing this.  Not a big deal though.  I just disabled it on the primary for both instances and the backup server got the synced snort config and is disabled there now too. There was a little logic error I introduced into the Barnyard2 migration code that migrates old settings into the new format to support the enhanced output plugins.  I was keying off only one of two parameter that must BOTH be true for Barnyard to have been enabled under the old config.  As a consequence of only looking at one and not both, the migration script was turning on Barnyard2 if it had ever been enabled in the past on an interface. I am fixing that for future upgrades, but for this one the damage is sort of done.  Thankfully it's not a fatal thing.  Just disable Barnyard2 on the interface again and save the update. There are some problems with updating synced pairs with sync still on.  I recommend turning off sync, upgrading all the machines to the same version, then re-enable sync. Bill
  • [Suricata IDS] Extracting encrypted and unencrypted data files

    9
    0 Votes
    9 Posts
    4k Views
    bmeeksB
    @pfNeo: I did another test and I did find some files in the directory, but not the actual dll file. I found file.1 and file.1.meta. file.1 contained the following (stripped) text {"status":"success","url":"http:\/\/www.SOMEWEBSITE.com\/PHPFILE.php?=somecodeinphp"} file.1.meta contains the following TIME:              [stripped content] SRC IP:            [stripped content] DST IP:            [stripped content] PROTO:              [stripped content] SRC PORT:          [stripped content] DST PORT:          [stripped content] HTTP URI:          [stripped content] HTTP HOST:        [stripped content] HTTP REFERER:      [stripped content] HTTP USER AGENT:  [stripped content] FILENAME:          /URLPATH/file.dll MAGIC:            <unknown>STATE:            CLOSED SIZE:              126</unknown> Thanks for the feedback.  Just got back in the country from a vacation and still catching up.' Sorry about giving you the wrong rules file name.  It is custom.rules.  The snort.rules are all the pre-packaged rules. As I mentioned, testing of the file capture ability in Suricata is not something I had a chance to test.  One possible issue is I may have the "magic file" setting messed up.  If you have some knowledge and want to experiment, you can edit that feature in the suricata.yaml file.  There is a "template" for that file in /usr/local/pkg/suricata called suricata_yaml_template.inc. Please post back what you discover.  I want to get this working properly.  I have been multitasking with the Snort package and working on Suricata blocking.  This has limited my time to experiment more with this feature. Bill
  • NEW - Suricata 1.4.6 IDS pkg. v0.2-BETA Released

    39
    0 Votes
    39 Posts
    18k Views
    bmeeksB
    @Supermule: Thanks a billion Bill!! Youre SO much the man of this project right now! Thank you.  One caveat for Suricata blocking.  Initially it will have to operate the same way as Snort does using libpcap.  Thus it won't be true inline-mode IPS.  Ermal has to make some changes in the ipfw code within pfSense in order to accommodate true inline IPS mode.  However, due to the problem of context switching between kernel mode and user-land, IPS mode when it comes won't be nearly as fast as the pseudo-IPS mode Snort uses (and that Suricata will use initially).  So true inline IPS is probably not going to be very useful for heavily loaded firewalls.  That's just the nature of the beast unless you go to highly customized code, and if you do that then you can't easily follow the upstream updates. The kernel changes to support true IPS may or may not make it into 2.2.  That is not up to me.  It is up to the pfSense team.  However, I can include the pseudo-IPS mode without those kernel changes.  That means pseudo-IPS can work with 2.1.x releases.  The pseudo-IPS mode is what I am working on now. Bill
  • Snort blocked ips in reverse order

    5
    0 Votes
    5 Posts
    1k Views
    bmeeksB
    @BBcan17: In my installations I see the Alerts tab showing the entries newest first. When you look at the Blocked Page, I think it displays the first alert only for the spp_rep Alert. If you sort by the "#" column it actually isn't in order (By date/time) which I assume should be. Ah…OK.  I will look into that.  The BLOCKED tab does some grouping by taking a blocked IP and then finding all the matching entries for that particular IP anywhere in the Alerts log file.  So if IP address 1.2.3.4 has been blocked say 10 times in the last 3 days, when it gets blocked again, the BLOCKED tab will show all the previous 10 entries along with the current one.  This assumes two things:  (1) you have the blocks being automatically cleared on some interval, and (2) the alerts log has not been itself cleared out. UPDATE:  there is no sorting of the grouped IP data.  That is, the code does not specifically sort by alert time when grouping IPs for display on the BLOCKED tab. Bill
  • Snort does not run in WAN interface in pfSense 2.1

    26
    0 Votes
    26 Posts
    12k Views
    Z
    FYI The following being enabled kept the WAN interface from turning on. It will show enabled, but it will have that red X next to it and it refused to start. After troubleshooting, I narrowed it down to this very specific rule (which you need to add to your exception list) 2011695 ET WEB_CLIENT Possible Microsoft Internet Explorer Dynamic Object Tag/URLMON Sniffing Cross Domain Information Disclosure Attempt Disclosure Attempt If I disable that, then the WAN interface is able to show the green play button (running) without issue.
  • PfBlocker Widget XHTML Errors

    2
    0 Votes
    2 Posts
    865 Views
    D
    Honestly? pfBlocker needs a severe diet, getting rid of useless stuff such as the GeoIP-based lists years and years old and completely useless the legacy HTML tables layout needs to get eradicated everywhere across the pfSense code these "validator" fixes caused a bunch of severe regressions (such as completely breaking the schedules) lately so IMNSHO this just should be left as it is as long it works
  • PfBlocker Errors

    2
    0 Votes
    2 Posts
    844 Views
    BBcan177B
    Goto  Advanced:Firewall/NAT  and increase the "Firewall Maximum Table Entries".
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.