Subcategories

  • Discussions and feedback related to this forum

    607 Topics
    3k Posts
    johnpozJ

    @microserfs and what IP was that - clearly your current IPv6 address is not block that I show you connected with.. And the only other IPv4 I see you using is not blocked.. You would have to let me know what IP you were coming from that was blocked.. Send it to me via PM if you don't want to make it public.

  • Community Hiring and For Hire postings related to jobs that require pfSense software skills

    27 Topics
    114 Posts
    w0wW

    @sef1414
    Name it "run.sh", copy to pf and chmod according documentation
    https://docs.netgate.com/pfsense/en/latest/development/boot-commands.html#shell-script-option
    You will see messages in the system log like those quoted in the script after logger command.

  • I configured HTTPS introducion but people still go HTTPS facebook

    20
    0 Votes
    20 Posts
    9k Views
    H

    Also ignoring that you broke HTTPS in the process. You can't proxy HTTPS without breaking its security. Many exploits have been done around this, like forcing Windows update to install Malware. Amazing what you can do when you tell clients to trust fake CAs.

  • Cisco 3750 behind pfsense

    3
    0 Votes
    3 Posts
    2k Views
    M

    if i wanted to turn pfsense into bridge mode how would i configure this on a 3750 switch? I followed this guide to bridge

    http://people.pharmacy.purdue.edu/~tarrh/Transparent%20Firewall-Filtering%20Bridge%20-%20pfSense%202.0.2%20By%20William%20Tarrh.pdf

    but am having trouble getting my PS4 out of a NAT type 3.  I figured putting the router in bridge mode would make things a little simpler when it comes to getting by the NAT type 3 as right now i think i have a double NAT issue

  • 0 Votes
    3 Posts
    883 Views
    D

    I love the feature! Can you pull it on pfSense? Could drive people away from the darned proxy stuff.  ;D ;D ;D

  • PfSense and/or/vs Sophos?

    5
    0 Votes
    5 Posts
    8k Views
    DerelictD

    I used Astaro/Sophos at home for a couple or three years.

    It, like pfSense, takes some getting used to and networking knowledge to make work.

    It's URL filtering and Antivirus are an integrated part of the product, and is free to license for home users (or at least it used to be).  If that is important to you, it might be worth a look.

    Its hardware requirements are larger.  If you like a more modern GUI, that might be for you, but it's very, very javascript-heavy.  I don't think it'll run on a serial console node, and to run it in a business setting is not cheap.

    It's Linux/iptables not FreeBSD/pf.

    The 50 local IP address limit is probably going to be enough for most home users.  It used to be 10.  I was one of the people squawking loudly and they eventually upped it to 50.  Never came close to the state limit.

    I can't remember why I switched back to pfSense, to tell you the truth.  Probably the less expensive (!) licensing for businesses.

    Sophos UTM is a solid product.  Or at least it was since about the time Sophos bought Astaro.  Haven't looked at it much since.

  • I found this and it gave me a chuckle. Check it out.

    7
    0 Votes
    7 Posts
    2k Views
    R

    Does he really have to use profanity all thru the video? Makes him look really immature.

  • 13 Character String Crashes some Browsers

    1
    0 Votes
    1 Posts
    765 Views
    No one has replied
  • Another OpenSSL bug or two?

    5
    0 Votes
    5 Posts
    1k Views
    K

    I don't think its that big a deal but these guys need something to write about I guess.

  • Is this good?

    6
    0 Votes
    6 Posts
    1k Views
    K

    And now you are chatting me?

    Ohhhhhh…  Yeah.  You are screwed for sure.

    Seriously, these days I'd be surprised if some public service wasn't archived forever...

  • PHP CURL script with CSRF support

    3
    0 Votes
    3 Posts
    6k Views
    J

    $csrf = substr($buffer, strpos($buffer,'sid:') , 110);

    Actually needs to be $csrf = substr($buffer, strpos($buffer,'sid:') , 55); in order to get the csrf token working.
    This is because the token length is 55.

  • FYI–-UDP Flood XAMPP Exploit

    1
    0 Votes
    1 Posts
    794 Views
    No one has replied
  • 2.2.1 soon

    3
    0 Votes
    3 Posts
    1k Views
    jimpJ

    We're doing some internal testing yet but it is quite close.

  • 18 month SSD endurance stress test

    17
    0 Votes
    17 Posts
    3k Views
    stephenw10S

    The abacus doesn't even need to exist.  ;)

    http://www.newscientist.com/article/dn20775-mental-abacus-does-away-with-words.html

    Steve

  • Windows Domain Auth Issues after Patch Tuesday

    3
    0 Votes
    3 Posts
    858 Views
    P

    And if you stop applying patches then you won't get new Microsoft bugs.

  • MOVED: Squid as transparent allowing only HTTPS sites.

    Locked
    1
    0 Votes
    1 Posts
    521 Views
    No one has replied
  • Adobe Flash Player is the new Java

    32
    0 Votes
    32 Posts
    6k Views
    ?

    Thinking back, I had to buy an winsock2 software just to get wfw 3.11 to connect to the internets..

  • Rowhammer

    7
    0 Votes
    7 Posts
    1k Views
    P

    @stan-qaz:

    From the first link:

    We built two working privilege escalation exploits that use this effect. One exploit uses rowhammer-induced bit flips to gain kernel privileges on x86-64 Linux when run as an unprivileged userland process. When run on a machine vulnerable to the rowhammer problem, the process was able to induce bit flips in page table entries (PTEs). It was able to use this to gain write access to its own page table, and hence gain read-write access to all of physical memory.

    So it isn't a random flip and hope issue but something that can be targeted at a specific machine.

    Yeh, that's why I put "random" in quotes. It takes some number of (re)writes to for the bit flips to happen, and it depends on analog charge leakage properties of the memory storage locations. That will vary from location to location, chip to chip, brand to brand… So any attack can be statistically targeted in a way that does make it "possible" to achieve bit flips in something like the bit pattern the attacker is aiming for.

    The articles I have seen do not give any idea about how well targeted the bit flipping can be in real life - i.e. on a typical real-world system with other user processes doing real stuff, how many times does the attacking code bugcheck the system, compared to achieving exploitable privilege escalation without bugchecking the system.

  • Lenovo pre-installs PCs with HTTPS hijacking adware

    39
    0 Votes
    39 Posts
    6k Views
    K

    To make sheeples see green instead of red….

  • Poetic justice: Can't wait.

    10
    0 Votes
    10 Posts
    1k Views
    ?

    I think this article nails the case. they have my market at #1 checkmated by Verizon. Totally correct as well.

    http://www.techrepublic.com/article/the-google-fiber-lottery/

  • Recent tweets from the pfSense team

    1
    0 Votes
    1 Posts
    713 Views
    No one has replied
  • 0 Votes
    1 Posts
    765 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.