Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    E
    I even tried deleting and creating a new certificate. Any suggestions?
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    bmeeksB
    @NRgia said in Suricata on Pfsense: Your suggestion is preferred, but from I understood from you, nobody is interested or have the knowledge. Again thank you, for updating this package over the years. I'm sure there is someone here on the forum using the package that has the knowledge to maintain it. Another option if IDS/IPS is critical is to use the Linux package on a separate virtual machine or hardware appliance. Inline IPS performance would actually be very good using a Linux box (or even a FreeBSD box) with two separate NICs and configure true netmap hardware-to-hardware mode. That is many times more performant than the hardware-to-host mode that is required when using netmap within pfSense. Of course using a separate box would mean no GUI, but that's how the vast majority of the world uses Suricata already (without a GUI).
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    572 Topics
    3k Posts
    keyserK
    @Antibiotic No it’s not possible with NtopNG as it is not a Netflow collector. You need nProbe for that which will “translate” recieved netflows into flows that NtopNG understands and can visualize (with very very little detail might I add as Netflows has no additonal information apart from sender/reciever and volume). The NtopNG package and the product in general is more geared towards visualising and recording traffic details from actual packet captures. This contains MUCH more metadata about the sessions than netflows (DNS names, protocol information and myriads of other things). But pffSense Plus has a builtin Netflow exporter if you have an external netflow collector on hand.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    High_VoltageH
    @wesley33taylor okay, now I have to ask, just due to being especially dense today, what and how did you do that? what do others need to change, so that there is written history for anyone else that might end up finding this thread and wanting to do the same, the usefulness of archival purposes and the desire to confirm I've done the same drive me to ask this. please advise.
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    501 Topics
    3k Posts
    A
    Hi, Please help to forward / report the bugs in ACME 1.0 package. Thanks.
  • Discussions about the FRR Dynamic Routing package on pfSense

    295 Topics
    1k Posts
    J
    Anyone else happen to notice that when configuring BFD, if you create a peer and select a profile - after save, re-edit the peer and the Profile is not represented. It appears as "None". You have to check the raw config to determine if the profile was actually assigned to the peer. This is on 2.8.1 (all packages up to date as of the date/time of this post). UPDATE: if re-edit and save (without re-configuring the profile none to what you want) - the save will strip the profile from the peer.
  • Discussions about the Tailscale package

    91 Topics
    611 Posts
    T
    Hi All, I use HAProxy to redirect to a range of https internal resources, this works really well at the moment through the WAN where I have source limits set up, and I can connect to the internal resources from limited external IP Addresses. Given I have tailscale I would like to basically be able to put custom dns entries in to point these hostnames to my pfsense tailscale IP4 address (100.89.148.118) but I am not having any luck getting this working. At the moment, I am just trying to connect to HAProxy using https://100.89.148.118 but it is getting blocked by the firewall. Sep 11 11:55:58 tailscale0 Default deny rule IPv4 (1000000103) 100.89.148.10:53148 100.89.148.118:443 TCP:S I have tried with and without NAT redirecting internally to 127.0.0.1, and I also have rules set up to allow any traffic to and from my tailnets (defined in an alias) but I still keep getting these connections from my other tailscale machines being blocked on the pfsense machine. Can someone give me some pointers on what I am missing because I can see the requests are coming through to the pfsense machine, and in theory the rules should allow it through but I cant see why they don't. I do have tailscale ACL in place, but clearly that is not an issue as the requests are making it through to the firewall. 0/0 B IPv4+6 TCP/UDP TailNets * TailNets * * none Allow across Tailnets 0/0 B IPv4+6 TCP/UDP * * * 443 (HTTPS) * none Allow Tailscale IP4 I also tried adding a EasyRule but because the tailscale0 interface doesn't exist in pfsense it throws an error and won't let me add that rule. Appreciate any help or tips, Cheers.
  • Discussions about WireGuard

    701 Topics
    4k Posts
    QuantumParadoxQ
    resolved! Issue was the following I corrected a few things on your config: Your Outbound NAT configuration was malformed. I corrected it to utilize Hybrid mode and configured a single Outbound NAT for your Wireguard connection, which should be much cleaner. I updated your routing table to be Automatic and switched to Policy-based routing within the firewall rules under Firewall --> Rules --> LAN I updated the name of the interface for the Wireguard tunnel to be called TORGUARD and set the MSS clamping to 1350. This can probably be bumped back up to 1400, but I wanted to make sure the clamping was small enough to avoid fragmentation. I cleaned up some redundant firewall rules and a few other "odds and ends".
  • Snort Package Request:Remembering Enabled/Disabled Sigs

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    K
    I know that which is fine for common false positives. The problem however is: a) you don't actually disable the rule so it is still inspecting the traffic with the rules and then not alerting so if it was something that was really heavy load and hitting often - it is actually disabled so you are still getting that load. b) you can't enable any rules (well have them stay enabled after your update) that you may want to use c) you can't properly tune the sensor to disable what you don't need to improve performance d) you don't reduce the false positive risk (i.e you may suppress the FPs you have seen but you don't know if a sig for some 2006 vulnerability is going to block something even though you patched it and it isn't used anymore by attacks). Regards, Kevin
  • Snort: Alterts Filter Function

    Locked
    1
    0 Votes
    1 Posts
    829 Views
    No one has replied
  • [Snort] Manually block an IP and HTTP server flow depth

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    T
    Well I actually fixed two of problems: Suppressing those Snort alerts via this link: http://forum.pfsense.org/index.php/topic,41533.msg220893.html#msg220893 and adding the ability to view offending packets in the Snort logs using this mod: http://redmine.pfsense.org/issues/2008 So, the only question left is: Is it possible to manually block an IP with Snort, without adding a new firewall rule?
  • SquidGuard + time

    Locked
    13
    0 Votes
    13 Posts
    5k Views
    A
    use ext url found but webpages are not blocking pls help
  • LIGHT SQUID REPORT ERROR

    Locked
    3
    0 Votes
    3 Posts
    27k Views
    J
    Thanks for your response.  I figured it out last night; embarrassingly it was a cache issue with my browser.  :-[  PICNIC !! Thank you though for that link, the video actually proved useful for a HAVP query i had.
  • Ntop core dump

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    B
    Thanks jimp, two new pfSense machines are in the works as we speak,,,doing pfSense-2.0.1 1.2.3 has worked like a champ really… Seems I m always a generation behind..times .:) Take Care, Barry
  • Add file for package?

    Locked
    21
    0 Votes
    21 Posts
    6k Views
    N
    Thank you everyone! I have submitted a proper (I think) patch for both 8* configs now. I'm eagerly waiting to see if the nightly build will pick it up if approved, like jimp suggested. That should complete the framework I had in mind. I assume dropping additional files into a directory can be accomplished as so (like the widescreen package): <additional_files_needed><prefix>/usr/local/pkg/widescreen/</prefix> <chmod>644</chmod> http://www.pfsense.org/packages/config/widescreen/bin/all.css_</additional_files_needed> EDIT: How do I issue a pull request for new files uploaded to my repository (via Git gui??) The files I'm talking about are here: https://github.com/namezero111111/pfsense-packages/tree/master/config/nrpe2
  • SquidGuard + IE9

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    J
    Thank you for the interesting response. As far as i am aware, squidGuard error page is using a 302 redirect.  Even if i configure the denied error message to be a blank page i have the problem.
  • Snort on LAN interface?

    Locked
    3
    0 Votes
    3 Posts
    4k Views
    J
    Thanks for the reply. I'm pretty new to snort and just figuring things out. I probably have a lot more research to do. I've done some testing. I have a pfsense box on my home network so I installed snort and set it up on the LAN interface only and I selected the icmp rules. Then from my pc inside the network I pinged google.com. and got the alert in snort below… #  PRI  PROTO DESCRIPTION     CLASS               SRC     SPORT    FLOW   DST       DPORT     SID           Date 7 3 ICMP ICMP Echo Reply Misc activity 74.125.224.134 empty -> 10.11.12.100 empty 1:408:5 02/13-23:41:07 On the setup at work I select the same icmp rules and have snort enabled only on the LAN interface. When I ping google from the LAN I don't see any alert at all in snort. As far as I can tell all settings are identical between the two setups. Both network layouts are the same, MODEM > PFSENSE/SNORT > LAN. Nothing between the modem and pfsense. I reinstalled snort but no go. The setup at work has been running for over a week. There's about 30 workstations and I can go an entire day without seeing any alerts at all being generated from snort on the LAN interface. At home running the same rules and only 2 computers on the LAN I'll get several everyday. I really have no idea what can be different between the setups.
  • Socat (and others) in 2 easy steps !

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    jimpJ
    We've got a couple wiki pages that cover that. Really though you don't want to use packages-8-stable. There is a chance it refers to libraries that do not exist. http://doc.pfsense.org/index.php/Installing_FreeBSD_Packages
  • 0 Votes
    3 Posts
    3k Views
    jimpJ
    Yep.. that's the most common mistake there. Local users have to have their certs assigned to the user they're associated with. Otherwise it wouldn't know that they are valid users with certs for the VPN.
  • Varnish Configuration

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    marcellocM
    Current varnish package version listen on all interfaces but you can setup any varnish config arg on custom field at gui.
  • Snort: generates alerts but won't block them

    Locked
    7
    0 Votes
    7 Posts
    5k Views
    L
    I installed the php5-mbstring Module but the problem isn't gone :-( Can anyone help me please?
  • Snortsam in pfsense 2 RC1

    Locked
    8
    0 Votes
    8 Posts
    5k Views
    D
    @mdima: is there any news about that? Apparently a couple of weeks ago Ermal commited improvement to spoink code, in order to allow more versatile blocking (src/dst): https://github.com/bsdperimeter/pfsense-tools/commit/4e3502810b2f718e70c2bfe0cea768f1c9490141
  • Bandwidthd or darksat executing in pfsense nano 2.0\. remote bd

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • HAVP [0.91_1 ] pfSense [2.0.1 i386]

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    I
    Hy, Can you help me? I have the same troublem, but I want to use transparent option. That you can confirm that transparent mode have trouble?
  • Snort Blocking

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Snort: Using custom rules & OVPNS interfaces?

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    C
    Thanks ermal and Cino for the pointers. I will assign VPN interfaces from now on and wait for customs rule functionality to be completed. Count me in for volunteering to test the modified snort package as and when updated.
  • How to test Squid to see if its doing its job?

    Locked
    16
    0 Votes
    16 Posts
    52k Views
    J
    @marcelloc: @JohnnyBeGood: Are you referring to this project http://code.google.com/p/youtube-cache/ Or this one too http://wiki.squid-cache.org/ConfigExamples/DynamicContent/YouTube?highlight=%28youtube%29 Thanks!
  • Squid-reverse - VIP issues, interface LISTEN selection

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    gwhynottG
    @marcelloc: In my case, if I want to change from interfaces list to ips, I have to rewrite whole page in php and leave xml. I understand,  forget that.  8) maybe just a help blurb about VIPs and how to configure..  but i'm sure there are many more important items on the radar. take care Marcello, -g
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.