Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    E
    I even tried deleting and creating a new certificate. Any suggestions?
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    bmeeksB
    @NRgia said in Suricata on Pfsense: Your suggestion is preferred, but from I understood from you, nobody is interested or have the knowledge. Again thank you, for updating this package over the years. I'm sure there is someone here on the forum using the package that has the knowledge to maintain it. Another option if IDS/IPS is critical is to use the Linux package on a separate virtual machine or hardware appliance. Inline IPS performance would actually be very good using a Linux box (or even a FreeBSD box) with two separate NICs and configure true netmap hardware-to-hardware mode. That is many times more performant than the hardware-to-host mode that is required when using netmap within pfSense. Of course using a separate box would mean no GUI, but that's how the vast majority of the world uses Suricata already (without a GUI).
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    572 Topics
    3k Posts
    keyserK
    @Antibiotic No it’s not possible with NtopNG as it is not a Netflow collector. You need nProbe for that which will “translate” recieved netflows into flows that NtopNG understands and can visualize (with very very little detail might I add as Netflows has no additonal information apart from sender/reciever and volume). The NtopNG package and the product in general is more geared towards visualising and recording traffic details from actual packet captures. This contains MUCH more metadata about the sessions than netflows (DNS names, protocol information and myriads of other things). But pffSense Plus has a builtin Netflow exporter if you have an external netflow collector on hand.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    High_VoltageH
    @wesley33taylor okay, now I have to ask, just due to being especially dense today, what and how did you do that? what do others need to change, so that there is written history for anyone else that might end up finding this thread and wanting to do the same, the usefulness of archival purposes and the desire to confirm I've done the same drive me to ask this. please advise.
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    501 Topics
    3k Posts
    A
    Hi, Please help to forward / report the bugs in ACME 1.0 package. Thanks.
  • Discussions about the FRR Dynamic Routing package on pfSense

    295 Topics
    1k Posts
    J
    Anyone else happen to notice that when configuring BFD, if you create a peer and select a profile - after save, re-edit the peer and the Profile is not represented. It appears as "None". You have to check the raw config to determine if the profile was actually assigned to the peer. This is on 2.8.1 (all packages up to date as of the date/time of this post). UPDATE: if re-edit and save (without re-configuring the profile none to what you want) - the save will strip the profile from the peer.
  • Discussions about the Tailscale package

    91 Topics
    611 Posts
    T
    Hi All, I use HAProxy to redirect to a range of https internal resources, this works really well at the moment through the WAN where I have source limits set up, and I can connect to the internal resources from limited external IP Addresses. Given I have tailscale I would like to basically be able to put custom dns entries in to point these hostnames to my pfsense tailscale IP4 address (100.89.148.118) but I am not having any luck getting this working. At the moment, I am just trying to connect to HAProxy using https://100.89.148.118 but it is getting blocked by the firewall. Sep 11 11:55:58 tailscale0 Default deny rule IPv4 (1000000103) 100.89.148.10:53148 100.89.148.118:443 TCP:S I have tried with and without NAT redirecting internally to 127.0.0.1, and I also have rules set up to allow any traffic to and from my tailnets (defined in an alias) but I still keep getting these connections from my other tailscale machines being blocked on the pfsense machine. Can someone give me some pointers on what I am missing because I can see the requests are coming through to the pfsense machine, and in theory the rules should allow it through but I cant see why they don't. I do have tailscale ACL in place, but clearly that is not an issue as the requests are making it through to the firewall. 0/0 B IPv4+6 TCP/UDP TailNets * TailNets * * none Allow across Tailnets 0/0 B IPv4+6 TCP/UDP * * * 443 (HTTPS) * none Allow Tailscale IP4 I also tried adding a EasyRule but because the tailscale0 interface doesn't exist in pfsense it throws an error and won't let me add that rule. Appreciate any help or tips, Cheers.
  • Discussions about WireGuard

    701 Topics
    4k Posts
    QuantumParadoxQ
    I am on PFsense Plus 25.07.1 and I am trying to setup my VPN's wireguard and at first it worked now it will not. Once I set up WireGuard for the first time, it all worked. I could toggle on and off the WireGuard and everything would work as it should, so I made a backup of the system. A few days later, after I rebooted PFsense, the writeguard came on but it disabled the Unbound DNS. and when I went to enable it, I still would not get any traffic. Once I disable Wireguard, I'll get internet again. I went and reinstalled the backup and same thing, it does not work. The VPN I am using is TORguard, and I had the techs from TORguard remotely into my machine to set it up, and they have the same issue. they can ping their VPN traffic out and they can Ping my IPS traffic but there is a bug with switching between the two. Can anyone on here help me with this?
  • Squid and Squidguard not working in pfsense 2.0

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    D
    @rdevries: I am having the same issue. The blacklist is not downloading. I click on the download button and nothing happens. Try to use Chrome or FFox browser's, IE version's can have problem with ajax scripts.
  • Ntop - Error 400 - won't start

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • SquidGuard vs. DansGuardian

    Locked
    4
    0 Votes
    4 Posts
    23k Views
    marcellocM
    @mahoon: Hi marcelloc ,Squid +Dansguardian provide content filtering in addition to acl.Is there  performans losing ? Not at all. I'm using it in production with more levels without issues. dansguaridan + squid works fine A complex setup I could get working was: squid_with_kerberos_auth_and_no_cache  –> dansguardian ---> varnish ---> squid_cache
  • Can't find Lightsquid in Package List

    Locked
    6
    0 Votes
    6 Posts
    2k Views
    K
    have a look at this (by nachtfalte) http://forum.pfsense.org/index.php/topic,43384.msg224600.html#msg224600
  • 0 Votes
    1 Posts
    683 Views
    No one has replied
  • Unbound 1.4.14_01 with 2.1-dev snapshot - not working

    Locked
    7
    0 Votes
    7 Posts
    2k Views
    johnpozJ
    So your saying its already installed and I don't need to install the package?  I don't see it listed as service to start, etc. So how do I get it running on 2.1 snapshot?
  • Dansguardian + windowsupdate.com

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    marcellocM
    You can see logs with a tail -f /var/log/dansguardian/access.log from console or via ssh.
  • Imspector installation failed.

    Locked
    9
    0 Votes
    9 Posts
    3k Views
    N
    My ISP is the problem. they are filtered the IMSPECTOR word . thanx for reply.
  • Snort automatic restart after pfsense reboot

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    R
    Mar 6 20:30:32 snort[16260]: TCP Overlaps: 0 Mar 6 20:30:32 snort[16260]: TCP Segments Queued: 0 Mar 6 20:30:32 snort[16260]: TCP Segments Queued: 0 Mar 6 20:30:32 snort[16260]: TCP Segments Released: 0 Mar 6 20:30:32 snort[16260]: TCP Segments Released: 0 Mar 6 20:30:32 snort[16260]: TCP Rebuilt Packets: 0 Mar 6 20:30:32 snort[16260]: TCP Rebuilt Packets: 0 Mar 6 20:30:32 snort[16260]: TCP Segments Used: 0 Mar 6 20:30:32 snort[16260]: TCP Segments Used: 0 Mar 6 20:30:32 snort[16260]: TCP Discards: 0 Mar 6 20:30:32 snort[16260]: TCP Discards: 0 Mar 6 20:30:32 snort[16260]: TCP Gaps: 0 Mar 6 20:30:32 snort[16260]: TCP Gaps: 0 Mar 6 20:30:32 snort[16260]: UDP Sessions Created: 0 Mar 6 20:30:32 snort[16260]: UDP Sessions Created: 0 Mar 6 20:30:32 snort[16260]: UDP Sessions Deleted: 0 Mar 6 20:30:32 snort[16260]: UDP Sessions Deleted: 0 Mar 6 20:30:32 snort[16260]: UDP Timeouts: 0 Mar 6 20:30:32 snort[16260]: UDP Timeouts: 0 Mar 6 20:30:32 snort[16260]: UDP Discards: 0 Mar 6 20:30:32 snort[16260]: UDP Discards: 0 Mar 6 20:30:32 snort[16260]: Events: 0 Mar 6 20:30:32 snort[16260]: Events: 0 Mar 6 20:30:32 snort[16260]: Internal Events: 0 Mar 6 20:30:32 snort[16260]: Internal Events: 0 Mar 6 20:30:32 snort[16260]: TCP Port Filter Mar 6 20:30:32 snort[16260]: TCP Port Filter Mar 6 20:30:32 snort[16260]: Dropped: 0 Mar 6 20:30:32 snort[16260]: Dropped: 0 Mar 6 20:30:32 snort[16260]: Inspected: 0 Mar 6 20:30:32 snort[16260]: Inspected: 0 Mar 6 20:30:32 snort[16260]: Tracked: 0 Mar 6 20:30:32 snort[16260]: Tracked: 0 Mar 6 20:30:32 snort[16260]: UDP Port Filter Mar 6 20:30:32 snort[16260]: UDP Port Filter Mar 6 20:30:32 snort[16260]: Dropped: 0 Mar 6 20:30:32 snort[16260]: Dropped: 0 Mar 6 20:30:32 snort[16260]: Inspected: 0 Mar 6 20:30:32 snort[16260]: Inspected: 0 Mar 6 20:30:32 snort[16260]: Tracked: 0 Mar 6 20:30:32 snort[16260]: Tracked: 0 Mar 6 20:30:32 snort[16260]: =============================================================================== Mar 6 20:30:32 snort[16260]: =============================================================================== Mar 6 20:30:32 snort[16260]: =============================================================================== Mar 6 20:30:32 snort[16260]: =============================================================================== Mar 6 20:30:32 snort[16260]: Snort exiting Mar 6 20:30:32 snort[16260]: Snort exiting Mar 6 20:30:34 ^M ^M Mar 6 20:30:35 ^M ^M Mar 6 20:31:24 apinger: /usr/local/bin/rrdtool respawning too fast, waiting 300s. its a amd64 install. Hpe this helps
  • Snort DNS Spoof messages (confused)

    Locked
    2
    0 Votes
    2 Posts
    4k Views
    F
    Maybe this somewhat older article helps: http://taosecurity.blogspot.com/2003/12/understanding-snort-dns-ttl-alerts.html Using Wireshark is too much work for me, but a concise dig command also helps: [007@wopr ~]$ dig +nocmd -x 8.8.8.8 +noall +answer 8.8.8.8.in-addr.arpa.  44632  IN      PTR    google-public-dns-a.google.com. Your dns server is unlikely the authorative one for this address, so you'll see only the remainig time to live (the number in red), which is still a bit larger than 60s. You should probably check your DNS setup, but Google doesn't seem to work with very short TTL values. As the article indicates, sid 254 is not really that useful, as real man-in-the-middle attackers would probably use lower values to attack you, or at least not exactly 60s…
  • SpamD whitelist entire source domains

    Locked
    1
    0 Votes
    1 Posts
    981 Views
    No one has replied
  • Squid: Bypass proxy for Private Address Space

    Locked
    4
    0 Votes
    4 Posts
    5k Views
    marcellocM
    @Nachtfalke: 192.168.0.0/16 172.17.0.0/12 10.0.0.0/8 it's 172.16.0.0/12  ;)
  • Dansguardian step-by-step set-up doc for noobs for 2.0.1?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    marcellocM
    There in no guide yet. :( When you install dansguardian package 95% of default config is applied, you have just to select squid ip and port. In the help tab there is a link for a dansguardian wiki that helps you on understanding how dansguardian works. the usual setup is dansguardian -> squid -> internet
  • I need Squid/SquidGuard log analyzer

    Locked
    7
    0 Votes
    7 Posts
    7k Views
    marcellocM
    I'm very busy on my job, maybe next week.  ;)
  • Unbound undocumented fatal error, and a few questions

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    W
    @stilez: How do I view or clear pfsense's own hosts file and local DNS cache? pfSense's host files is populated with the entries in the Host override section and also if you have DHCP hosts been automatically added. @stilez: Unbound is creating unwanted entries for my LAN IPs and some WAN side IPs ("local-data-ptr: "x.x.x.x PC_NAME.DOMAIN"" etc). What's the necessary config code for Unbound to not create records for, or to refuse to act as a DNS server for, specific IP ranges? Delete the entries from your host and domain overrides as Unbound makes use of that to populate its entries.
  • Using Snort as IDS in the beggining

    Locked
    8
    0 Votes
    8 Posts
    2k Views
    F
    Don't worry about the memory. You've got more than enough.
  • SquidGuard db problem

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    F
    This is another example where reading part of the docs is worse than none. squidGuard uses its own compare function (domainCompare()), so db_verify() cannot possibly know about the intended sort order. This is why verifying fails. The -o flag allows for skipping the sort order verification and when checking the domains.db files db_verify -o domains.db should be called. Needless to say, all db files are ok.
  • Shell command to remove squid

    Locked
    2
    0 Votes
    2 Posts
    5k Views
    marcellocM
    If you installed squid pfsense package, during uninstall it removes squid binaries. find / -name squid will find all folders/files with this name To remove a folder, you can use rm -rf /path_to_folder_you_want_to_remove. Be carefull, rm can destroy your installation.
  • RRD modifications

    Locked
    1
    0 Votes
    1 Posts
    936 Views
    No one has replied
  • Squid3 access.log rotation

    Locked
    9
    0 Votes
    9 Posts
    9k Views
    A
    Something that worked this time, who knows why.  I stopped the squid service and then started it usingsquid -d 9to get it to log what was going on to the console.  In a separate console I ran``` squid -k rotate ***EDIT**** Found same thing was occurring on a second pfsense box, same version, same installed add-ons, much less traffic.  Did the commands listed above and rotate finally worked again.  I'm also killing the squid -d 9 process that I started for doing the log rotation and starting squid again through the web console.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.