Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    N

    Can I use pgblockerng aliases in Haproxy?

    80758505-9bad-4dad-a80b-c159be1045a2-image.png

    If it was a firewall rule, typing pfb would produce a dropdown to select.

    Here it has to be written, but will it work? Is it supported?

  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    bmeeksB

    I saw where the Netgate kernel developer updated the Suricata package in the pfSense 25.07 development branch to work with the new kernel PPPoE driver. But so far as I know that updated package has not been migrated to 2.8 CE.

    Here is the commit into the DEVEL branch: https://github.com/pfsense/FreeBSD-ports/commit/68a06b3a33c690042b61fb4ccfe96f3138e83b72.

  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    K

    @pulsartiger
    The database name is vnstat.db and its location is under /var/db/vnstat.
    With "Backup Files/Dir" we are able to do backup or also with a cron.

  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    GertjanG

    @AlexK-0 said in Can't receive GeoIP databases updates anymore, banned:

    Days ago, I received from MaxMind an email, notifying me that my country has been banned to receive GeoLite City database updates.

    You've found a reason to use a VPN.

  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    99 Topics
    2k Posts
    K

    @elvisimprsntr thanks for your suggestion. I will give it a try.

  • Discussions about the ACME / Let’s Encrypt package for pfSense

    493 Topics
    3k Posts
    johnpozJ

    @MacUsers

    https://help.zerossl.com/hc/en-us/articles/360060119933-Certificate-Revocation

    edit: oh you prob out of luck

    You can revoke any certificate issued via the ZeroSSL portal. Currently, certificates issued via ACME can not be revoked from inside the portal - please follow the instructions of your ACME client for revoking those certificates.

    the gui in pfsense does not have the ability to revoke - you prob have to move the certs to something you have certbot installed to and revoke that way.

  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    R

    I had a similar issue with Routed VTI over IPsec recently. FRR lost its neighbors after rebooting or when a tunnel went down. It never re-discovered it automatically. Only restarting FRR (either in GUI or via CLI) brought the neighbors back.

    When I manually added those under the OSPF neighbors tab in the GUI it seems to solve the problem as well.

  • Discussions about the Tailscale package

    89 Topics
    574 Posts
    A

    Hello,
    I am unable to get the Tailscale package to work. The page at VPN > Tailscale > Authentication is stuck. It displays the error "Tailscale is not online," but also shows a "Logout and Clean" button, with no option to log in.
    link text

    This state persists even after performing the following troubleshooting steps:

    Rebooting the pfSense router.

    Completely uninstalling and reinstalling the Tailscale package multiple times.

    Clearing browser cache and using a private browser window.

    Toggling the main "Enable Tailscale" checkbox in the settings.

    Checking the logs, which show the service gets a "terminate" signal and shuts down cleanly; it does not crash.

    Manually trying to delete the state file with rm /var/db/tailscale/tailscaled.state, which failed because the file does not exist.

    It appears that the package's configuration is corrupted in a way that persists even after reinstallation. Can anyone advise on how to perform a complete manual cleanup of all Tailscale files and settings?

  • Discussions about WireGuard

    689 Topics
    4k Posts
    P

    @patient0 Thanks for further suggestions. The tunnel is definitely up and so I don't think this is a CGNAT issue after all. WAN firewall rule is in place for UDP on port 51823 (otherwise the tunnel wouldn't work, right?). I can ping from client 1 -> client 2 and visa versa and also ping all points in between like you suggest. I just can't open an HTTPS connection from pfSenseB from Client 1 using a browser. But I can do this the other way round i.e. from Client 2 to pfSenseA

    I will try and do some packet capture to see if that reveals anything.

  • Simple rule causes snort to crash

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB

    @Sander88:

    Thanks! It works now. I have added "classtype:bad-unknown; rev:1;" and the alert shows up now.  :)

    Quite some time back the Snort VRT folks must have changed the Snort binary such that now it requires a classtype: in a rule or it will segfault and crash when the rule fires.  I think in times past the classtype parameter was optional, but apparently not anymore.  Unfortunately very few if any of the Snort custom rules examples show the inclusion of the classtype parameter  :(

  • WPAD not detected while pfSense on https in "webConfigurator"

    14
    0 Votes
    14 Posts
    7k Views
    A

    thank you all for helping me
    vHost working for me
    I create
    Host: wpad.dat
    Port : 80
    Directory : /usr/local/www

    but squidGuard error pages not working, can you u give any idea to configure this

  • Help with a squid transparent proxy install?

    1
    0 Votes
    1 Posts
    872 Views
    No one has replied
  • Squid-dev v3.3.10 pkg 2.2 - squid.pid not being created or updated

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Snort SID 120:3 with antivirus updates

    16
    0 Votes
    16 Posts
    5k Views
    ?

    Snort keeps a previous log of alerts generated by a host, but doesn't actually act based on them. Let's take an example:
    host 1.1.1.1 was banned because of rule "I don't like this host because."
    That was considered a false positive and added to the suppression list (or rule disabled is actually the proper procedure). Snort restarted, host removed from blocked tab.

    A couple days later, the same host, host 1.1.1.1 gets banned because of rule "I don't like all same numbers in IP."

    Now the blocked tab will say:

    1.1.1.1 "I don't like this host because." and a date/time stamp.
                "I don't like all same numbers in IP." and a date/time stamp.

    The host appears to be blocked because of 2 reasons, but snort's most recent ban is based on the most recent alert generated ("I don't like all same numbers in IP."). The older data (I don't like this host because.") is just there to remind us that a host is really really bad.

    If a host gets banned again after adding some rule to the suppression list/disabling the rule, then snort's interface was not restarted. Or something else triggered on that host. If neither of those happens, then it's not the expected behaviour.

    Cisco? Is that a microwave oven maker? Can't remember…...oh, THAT cisco. Yeap, snort is pretty much doomed. After they add the remote update feature. Which is needed for the remote backdoor. For remote support of course.
    Disclaimer: cisco mentioned in the paragraph above is entirely fictional. Any similarities to an actual company are purely coincidental. cough

  • Openvpn ip address conflict ?

    2
    0 Votes
    2 Posts
    2k Views
    P

    You are correct - the OpenVPN link will not route from work to-from home if both work and home have the same subnet (like 192.168.1.0/24). Packets will never get sent across the link, because the source device will think the (remote) target device is in its local LAN, because the target device has an IP address in the local subnet.
    Time to choose the easiest network to change, and change it. Or even better, during the holiday season, change both. No-one will notice, they will all be on leave  ;)

  • Lightsquid error on pfSense on ESXi

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • sites are blocked after upgraded snort

    9
    0 Votes
    9 Posts
    16k Views
    bmeeksB

    739 MB of RAM is a challenge for Snort with a full rule set.  Snort is a memory hog.  Depending on the number of rules active, RAM usage can quickly grow beyond 2 GB.  If your box begins swapping RAM out to the swap file, then performance will slow to a crawl.  Currently the Dashboard does not indicate any swap usage, so that may not be the problem.

    You can test Snort as the cause of your slowness issue by simply turning Snort off on the interfaces it is running on.  Just click the green arrow icon on the Snort Interfaces tab and wait for it to turn into a red X.  Snort is then stopped and is not consuming any resources nor doing anything to network traffic.  If things are still slow and you have web browsing issues, then Snort is not at fault and you know to look elsewhere.

    Now if Snort was blocking a number of web sites, that can also give the appearance of being slow.  What happens is most web sites use advertising, and that advertising is served up by external sources (meaning not from the same web server as the content you went to see is served from).  Sometimes those external sources are either known suspicious sites with poor reputations that are on a Snort block list, or the external site may use some non-standard HTTP encoding that the Snort HTTP_INSPECT preprocessor does not like.  Either way the incoming ad stream is blocked.  Some web pages will pause or simply not load when any of their embedded ads don't completely load.  You may be seeing some of that behavior as well.  Properly configuring a Suppress List will help in this area.

    Bill

  • Antivirus solution required

    8
    0 Votes
    8 Posts
    2k Views
    E

    :-\ any news of squid-dev integration with antivirus. soooo  critical.

    Thanks and merry christmas

  • Squid3 disappeared

    6
    0 Votes
    6 Posts
    2k Views
    B

    Hi Robert,

    I am amazed that there are not more reactions to this issues.
    It seems like a serious bug to me…

    regards.

  • Snort WAN Interface generates multicast traffic.

    5
    0 Votes
    5 Posts
    2k Views
    C

    :)
    Thanks a lot again.

  • PfSense 2.1 Dansguardian ACL Page not work

    2
    0 Votes
    2 Posts
    891 Views
    V

    It is working now but i don't understand how it is fixed.

  • PfBlocker - unable to add list

    2
    0 Votes
    2 Posts
    952 Views
    denningsrogueD

    Solved my own problem (sort of).  When I set up pfSense, I created a new administrator account and made it part of the administrator group and disabled the default admin account.  Apparently, the group privileges for the administrator group are not applying to the new admin account.  If I use the default admin account, everything works.  Strange.

  • Proxy Exceptions with Dansguardian

    5
    0 Votes
    5 Posts
    2k Views
    A

    the default status is off and it never comes on and it makes dansguardian unusable since it cant scan content.

    GUI notifies that freshclam is running but i know its not. By default freshcalm does not have any permissions to run updates, i had previously activated this and fixed all permission errors, but dansguardian always shows clamav status off

    I got pretty far but could not find clamd.conf as it didnt exist anywhere. Now i reinstalled everything and starting from square and need some directions.

    Update: On a side-note i got squid (non-transparent mode) working with dansguardian. Just like i want: all traffic is redirected based on my 1 NAT rule, instead of having rules+multiple exceptions. I made a mistake when testing dansguardian proxy which lead me to believe that proxy wasn't working. All i need is Clamav setup and ll be greatful!!!

    Update2: Got pretty far after finding a thread with same problem. Now i just need to know how to get blacklist working, DG does not download the specified list..

  • Dashboard Widget: Snort Alerts pkg v0.3.6 Update

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB

    @denningsrogue:

    Installed but the changes don't save.

    Try adding the widget first, then click the SAVE button for the Dashboard itself.  After that, go back into the Snort Alerts widget, click the wrench icon in the upper right, enter a number of rows to display and then click Save in the Alerts widget.  See if that works.  It did for me.  For some reason, trying to enter and save a value at the same time you add the widget to the Dashboard failed with a session state error.

    Bill

  • Windows Activation

    3
    0 Votes
    3 Posts
    2k Views
    D

    Thank you very much!

    I made exception such as *microsoft.com. Everything is fine. Unfortunately direct links doesn't work, because IE don't understand CRL lists.

    Thanks again

  • Dansguardian Weighted Lists doesn't work

    2
    0 Votes
    2 Posts
    955 Views
    marcellocM

    What you get on logs?

  • Postfix forwarder - quick start guide

    3
    0 Votes
    3 Posts
    6k Views
    B
    /your_domain_here/ REJECT [HELO01]

    marcelloc,

    Would it be sensible to add this as well?

    /127.0.0.1/ REJECT [HELO02]
  • Snort 2.9.5.5 pkg. v3.0.0 – Update Released

    67
    0 Votes
    67 Posts
    25k Views
    bmeeksB

    @BBcan17:

    Hi Bill,

    I have been going thru the Snort rules and disabling/Enabling the ones to suit my network and I came across a few ideas.

    My replies are below.  Thank you for the ideas.  Unfortunately, one of them I really don't think can ever work; however, the other two are possible.

    @BBcan17:

    Ability to create Multiple Snort Interfaces. Only one Interface per NIC would be online, the others could be offline.  It could also allow testing of Rulesets without compromising the Primary Interface settings.

    I think the template idea suggested by user Supermule is a way to accomplish this.  It sounds like what you are really talking about is a way to quickly switch on or off a group of rules for an interface.

    @BBcan17:

    The ability to Copy the "Snort Interface" to another pfSense Box. This would allow managing rulesets for several boxes with similar setups.

    This feature is available now thanks to user Marcelloc here on the forum.  He contributed the XML RPC sync part of Snort.  It is currently marked experimental, but in fact works quite well.  You can sync the Snort configuration across multiple boxes.  The one requirement for now is they must have the same NIC hardware so the real interface names match.  For example, em0, em1, etc.  I think the users currently making use of this sync feature are doing so on groups of virtual machines where the virtual hardware is identical.

    The template idea I mentioned above might also fill this need when implemented.  Maybe I can incorporate something into the template code that would handle automatically the change in real interface names.

    @BBcan17:

    In Global Settings, the option for "Remove Blocked Host Interval" could be set separately in each category so that we can better control how long the Block should last for.

    This one can't be done because it's not Snort that does the clearing.  Remember Snort is simply stuffing IP addresses into a pf table.  The table is called snort2c.  Once an IP is inserted there, it's the responsibility of the packet filter engine code to keep up with it.  The pf engine keeps a counter on "activity" by IP address.  In other words, it monitors the connections.  There is a cron job that the Snort package creates that calls the expiretable utility once per the interval you set (1 hr, 1 day, etc.).  The expiretable utility is given the pf table to clear and how many seconds of "no activity" must be in the stats for an entry to be removed.  The pf table has no way to store additional data about the IP address (such as what rule fired it, etc.).  This means Snort can't offer selective clear times based on rule origin.

    Bill

  • Snort rules will not update - pfSense noobie

    6
    0 Votes
    6 Posts
    2k Views
    ?

    As none other than Mr. Allan Jude himself would have said; "Patch your shit!". (not a personal attack in any way, shape and/or form. A strong suggestion to keep up to date with all software)
    As suggested, always upgrade to the latest versions of everything (I'll do my psychic voodoo and say the web app being protected is something based on a no longer maintained version of a webserver, quite possibly IIS).
    The proper procedure to upgrade is: First upgrade, then notify the customers of what's not working. A golden rule in my case. Any system running 1month old software (of which a new version has been available for the past 3 weeks) is to be considered compromised, no questions asked. A zeroing of the drive and,if it's UEFI*,  a new motherboard, installed with a newer version of the software is the only industry accepted practice to recover it.
    As soon as a new update is available, start testing it. You have 24 hours to update the production systems, or they are to be considered highly likely to be compromised and should be treated as hostile to other hosts on the network.

    My personal suggestion is to stop looking for ways to work around a 2 year old appliance and start downloading the new version.

    *there are ways to flash a pre-OS exploit on a motherboard, have been publicly available for the past year. Not publicly available, well that's another story  ;)

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.