Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    A
    i am using pfsense 2.8.0 with haproxy 0.63_10 and i have 4 sites that redirect to two different web server, i am using two frontend, one for http request redirect to https using rule: scheme https, and a second with type ssl/https(tcp mode) to redirect the request with the acl and the action, now i want to add a new site to one of the web servers i create a new backend (and even tried duplicate) and add the proper acl and action as always did but for some reason since the update to 2.8.0 the redirect keeps going to the wrong backend, i tried a test and rewrote and old backend and updated the acl and rule in the frontend and it works fine, is there a known bug since the update because it keeps happening even after reboot to pfsense and the haproxy service and reinstall of the package.
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    cyb3rtr0nianC
    @rlrobs Yes it’s still working fine here.
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    K
    @pulsartiger The database name is vnstat.db and its location is under /var/db/vnstat. With "Backup Files/Dir" we are able to do backup or also with a cron.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    M
    I resolved this by accepting the T+Cs via https://www.maxmind.com/en/accounts/1205389/geolite2/eula
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    493 Topics
    3k Posts
    GertjanG
    @EChondo What's your pfSense version ? The instructions are shown here : [image: 1753262126227-1acdc586-cb29-4148-9e36-81ade4e5e60c-image.png] A restart of a service will start by re creating their config files. If a certificate changed, it will get included. When the process starts, it will use the new certificate. @EChondo said in Issue with ACME Certificates Refresh & Restarting HAProxy: I haven't been able to confirm if the above works(mine just renewed, don't feel like doing it again just to test), so we'll see in 60 days I guess. No need to wait x days. You can re test / renew right away, as you are 'allowed' to renew a couple (5 max ?) of times per week.
  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    J
    @div444 i'm finding the same - did you find a solution or did reverting fix it? Hoping there is a patch fix or something to get it working! Rather not rollback if i can avoid it
  • Discussions about the Tailscale package

    90 Topics
    578 Posts
    T
    Re: How to update to the latest Tailscale version? I am on latest released Netgate 6100 pfSense PLUS v24 ( pfSense_plus-v24_11_amd64-pfSense_plus_v24_11 ) pkg config abi FreeBSD:15:amd64 pkg -vv | grep -A 3 "pfSense:" pfSense: { url : "pkg+https://pfsense-plus-pkg.netgate.com/pfSense_plus-v24_11_amd64-pfSense_plus_v24_11", enabled : yes, priority : 0, cat /usr/local/etc/pkg.conf ABI=FreeBSD:15:amd64 ALTABI=freebsd:15:x86:64 PKG_ENV { SSL_CA_CERT_FILE=/etc/ssl/netgate-ca.pem SSL_CLIENT_CERT_FILE=/usr/local/etc/pfSense/pkg/repos/pfSense-repo-0001-cert.pem SSL_CLIENT_KEY_FILE=/usr/local/etc/pfSense/pkg/repos/pfSense-repo-0001-key.pem } This firewall is obviously running on FreeBSD 15 no longer on 14. But can I use the freshports link for FreeBSD 14 amd64 quarterly which is at tailscale 1.86.2 or can I only go up to version tailscale 1.84.2_1, and need to wait until they have a version of tailscale 1.86.2 or higher for the FreeBSD 15? Would it be good enough to tell it to ignore the OSVERSION? export IGNORE_OSVERSION=yes Note: use of 14 and not 15 ? pkg add https://pkg.freebsd.org/FreeBSD:14:amd64/quarterly/All/tailscale-1.86.2.pkg service tailscaled restart tailscale up
  • Discussions about WireGuard

    690 Topics
    4k Posts
    J
    I've read through some other posts about this, but they either didn't say whether the proposed solution worked or they were very convoluted and difficult to understand. Here is our scenario: We have 6 locations--Las Cruces (LC), Sunland Park (SP), El Paso (EP), Abilene (ABI), Fort Worth (FW), and Plano (PL). LC and ABI have software that is accessed by the other 4 locations via VPN. There are WireGuard VPNs set up between LC and those 4 locations (SP, EP, FW, PL), and ABI and those 4 locations (SP, EP, FW, PL). There is also a WireGuard VPN connection between LC and ABI. LC and ABI have 2 internet connections. SP, EP, FW, and PL each have one internet connection. If the primary internet connection goes down at either LC or ABI and failover occurs to the secondary internet connection, is there a way to set up the WireGuard VPN connections so that they also failover without purchasing some 3rd party application? Thanks.
  • MOVED: Only block source on specific SIDs

    Locked
    1
    0 Votes
    1 Posts
    489 Views
    No one has replied
  • Ping: sendto: Permission denied and snort

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • FreeRADIUS with Android and Unifi access point - problem to get going

    6
    0 Votes
    6 Posts
    5k Views
    P
    OK Here's what's happening: I created a FW rule to allow traffic from wifi AP to LAN on port 1812.  That definitely was missing!  Good catch ;)  At least now I see something in the system logs… After that I followed your instructions, that is, created a new cert under "System > Cert. manager > Certificates" (named pfsense-RADIUS) then exported the root CA (under System > Cert. manager > CAs) to my Android phone. Then I modified the wifi connection on the phone and assigned the newly imported root CA to it.  Then I modified RADIUS's config and selected the certificate "pfSense-RADIUS"  (under EAP tab > SSL Server Certificate). Finally I tried connecting to the Wifi network, but the phone still says "Authentication problem" and pfsense logs show: Oct 16 18:54:11 radiusd 22391 Login incorrect (TLS Alert read:fatal:unsupported certificate): [wifiuser] (from client unifi-ap-ac-lite port 0 cli XX-XX-XX-XX-XX-XX) Oct 16 18:54:11 radiusd 22391 SSL: SSL_read failed inside of TLS (-1), TLS session fails. Oct 16 18:54:11 radiusd 22391 rlm_eap: SSL error error:14094413:SSL routines:SSL3_READ_BYTES:sslv3 alert unsupported certificate Oct 16 18:54:11 radiusd 22391 TLS_accept: failed in SSLv3 read client certificate A Oct 16 18:54:11 radiusd 22391 TLS Alert read:fatal:unsupported certificate Oct 16 18:53:31 radiusd 22391 Login incorrect (TLS Alert read:fatal:unsupported certificate): [wifiuser] (from client unifi-ap-ac-lite port 0 cli XX-XX-XX-XX-XX-XX) Oct 16 18:53:31 radiusd 22391 SSL: SSL_read failed inside of TLS (-1), TLS session fails. Oct 16 18:53:31 radiusd 22391 rlm_eap: SSL error error:14094413:SSL routines:SSL3_READ_BYTES:sslv3 alert unsupported certificate Oct 16 18:53:31 radiusd 22391 TLS_accept: failed in SSLv3 read client certificate A Oct 16 18:53:31 radiusd 22391 TLS Alert read:fatal:unsupported certificate Oct 16 18:53:09 radiusd 22391 Login incorrect (TLS Alert read:fatal:unsupported certificate): [wifiuser] (from client unifi-ap-ac-lite port 0 cli XX-XX-XX-XX-XX-XX) Oct 16 18:53:09 radiusd 22391 SSL: SSL_read failed inside of TLS (-1), TLS session fails. Oct 16 18:53:09 radiusd 22391 rlm_eap: SSL error error:14094413:SSL routines:SSL3_READ_BYTES:sslv3 alert unsupported certificate Oct 16 18:53:09 radiusd 22391 TLS_accept: failed in SSLv3 read client certificate A Oct 16 18:53:09 radiusd 22391 TLS Alert read:fatal:unsupported certificate Oct 16 18:51:34 radiusd 22391 Login incorrect (TLS Alert read:fatal:unsupported certificate): [wifiuser] (from client unifi-ap-ac-lite port 0 cli XX-XX-XX-XX-XX-XX) Oct 16 18:51:34 radiusd 22391 SSL: SSL_read failed inside of TLS (-1), TLS session fails. Oct 16 18:51:34 radiusd 22391 rlm_eap: SSL error error:14094413:SSL routines:SSL3_READ_BYTES:sslv3 alert unsupported certificate Oct 16 18:51:34 radiusd 22391 TLS_accept: failed in SSLv3 read client certificate A Oct 16 18:51:34 radiusd 22391 TLS Alert read:fatal:unsupported certificate Oct 16 18:50:52 radiusd 22391 Login incorrect (TLS Alert read:fatal:unsupported certificate): [wifiuser] (from client unifi-ap-ac-lite port 0 cli XX-XX-XX-XX-XX-XX) Oct 16 18:50:52 radiusd 22391 SSL: SSL_read failed inside of TLS (-1), TLS session fails. Oct 16 18:50:52 radiusd 22391 rlm_eap: SSL error error:14094413:SSL routines:SSL3_READ_BYTES:sslv3 alert unsupported certificate Oct 16 18:50:52 radiusd 22391 TLS_accept: failed in SSLv3 read client certificate A Oct 16 18:50:52 radiusd 22391 TLS Alert read:fatal:unsupported certificate Oct 16 18:50:29 radiusd 22391 Login incorrect (TLS Alert read:fatal:unsupported certificate): [wifiuser] (from client unifi-ap-ac-lite port 0 cli XX-XX-XX-XX-XX-XX) Oct 16 18:50:29 radiusd 22391 SSL: SSL_read failed inside of TLS (-1), TLS session fails. Oct 16 18:50:29 radiusd 22391 rlm_eap: SSL error error:14094413:SSL routines:SSL3_READ_BYTES:sslv3 alert unsupported certificate Oct 16 18:50:29 radiusd 22391 TLS_accept: failed in SSLv3 read client certificate A Oct 16 18:50:29 radiusd 22391 TLS Alert read:fatal:unsupported certificate Oct 16 18:50:16 radiusd 22391 Ready to process requests. Oct 16 18:50:16 radiusd 22010 Loaded virtual server <default></default> Thats weird no?
  • Siproxd 0.8.1 to 0.8.2 ?

    3
    0 Votes
    3 Posts
    857 Views
    T
    Thanks a lot !  ;D
  • Syslog-ng advanced tab broken in pfsense 2.3.2

    1
    0 Votes
    1 Posts
    680 Views
    No one has replied
  • Bind DNS Server with Master over IPSEC VPN

    2
    0 Votes
    2 Posts
    1k Views
    C
    I vaguely recall a similar behavior with pfSense looking at Name Servers over an IPSec tunnel.  IIRC, they had a static route configured for the IP of the DNS server which used the pfSense LAN IP as the Gateway.  (This was an infrastructure I inherited, I promptly dropped IPSec and moved to OpenVPN.) Might also work with the Null4 (127.0.0.1) entry?  Would have to try it. …ct
  • NRPE in pfsense 2.3

    22
    0 Votes
    22 Posts
    8k Views
    J
    Im using Check_mk, can it talk to this nrpe plugin?
  • Successfully monitoring a UPS connected to a Synology RS?

    25
    0 Votes
    25 Posts
    17k Views
    dennypageD
    Note that even if there were a way to override the fsd signal on the slave, it would be a bad idea because the signal generally indicates that the master is about to instruct the UPS to turn the load off.
  • FreeRADIUS XMLRPC sync not working automatically

    3
    0 Votes
    3 Posts
    2k Views
    J
    The "Authentication servers (e.g. LDAP, RADIUS)" checkbox under System > High Avail. Sync doesn't seem to have anything to do with the freeradius2 package because the package continues to try XMLRPC syncs even when that box is not checked.
  • NUT Package - UPS Load: 0%

    2
    0 Votes
    2 Posts
    1k Views
    dennypageD
    It appears that this unit is known to incorrectly report load as 0. http://networkupstools.org/ddl/APC/Back-UPS_ES_550.html
  • Whitelist domains on incoming WAN interface

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • 2.3.2-p1 regression - NUT will no longer start, config page is 404

    5
    0 Votes
    5 Posts
    1k Views
    dennypageD
    https://forum.pfsense.org/index.php?topic=115349.msg650408#msg650408
  • Any Spam Solution for 2.3.2?

    5
    0 Votes
    5 Posts
    2k Views
    jimpJ
    Then perform spam checking on the mail server(s) or use a separate VM/appliance for mail filtering, it's not the firewall's job. A spam-filtering MTA combination like postfix adds a gigantic attack surface to the firewall. Far too many moving parts that interact and could break in insecure ways.
  • Restarting OpenVPN with cron job

    6
    0 Votes
    6 Posts
    4k Views
    B
    I tried this command "/usr/local/sbin/pfSsh.php playback svc restart openvpn client 1" and now I can't login to the web interface, not even after restart. any tips for me? :P
  • Help for c-icap/e2guardian access.log rotation and low free memory

    2
    0 Votes
    2 Posts
    2k Views
    R
    @CBRom: /var/log/c-icap/access.log (that actually does not contain useful data) Hi. I've just been struggling to disable this file. It was receiving several lines of useless information every few seconds. The c-icap configuration file is located in /usr/local/etc/c-icap/c-icap.conf. You can edit it but, somehow, the webinterface replaces it while saving the configuration so this is what I (blindly) did. I'm sure there has to be a better way: Edit /usr/local/etc/c-icap/c-icap.conf.pfsense Locate the line AccessLog /var/log/c-icap/access.log Replace it with AccessLog /dev/null Go to Services/Squid Proxy Server and just save the configuration Check that both /usr/local/etc/c-icap/c-icap.conf.pfsense and /usr/local/etc/c-icap/c-icap.conf have the "AccessLog /dev/null" line Reboot the server (maybe restarting the icap service would be enough) Browse some site and check for modifications to the access.log file Regards.
  • Syslog-NG Package Broken after Update to Version 2.3.2

    3
    0 Votes
    3 Posts
    1k Views
    S
    What can be done about this?
  • Unable to install openvpn-client-export, wrong version

    4
    0 Votes
    4 Posts
    2k Views
    DerelictD
    Excellent. Glad it's working.
  • Minidlna on pfSense

    2
    0 Votes
    2 Posts
    2k Views
    johnpozJ
    Well for starters what are you interfaces called in pfsense.  From this error seems it can not even find the interface it wants to bind too "Network interface ath0 not found"
  • Services for packages that no longer exist 2.3.2

    2
    0 Votes
    2 Posts
    974 Views
    S
    I'm pretty sure these services are installed with the Squid package, and are only active when the respective functions have been enabled.
  • BIND Package (or similar functioning authoritative DNS server)

    52
    0 Votes
    52 Posts
    19k Views
    V
    Hi, the source for the bind package comes from the freeBSD port git repository. You would have to ask in the freeBSD mailing list when this is going to be updated there. Best Sven Voleatech pfSense Select Partner www.voleatech.de
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.