• Just wanted to say good job PF team

    1
    0 Votes
    1 Posts
    980 Views
    No one has replied
  • 0 Votes
    3 Posts
    2k Views
    jdillardJ

    I started a sticky thread here to get things started: https://forum.pfsense.org/index.php?topic=105184.0

  • Thread Page Numbers for Touch Screen

    3
    0 Votes
    3 Posts
    1k Views
    S

    Same here very difficult to browses. It would be great if Tapatalk is allowed

  • Pfsense forum language translations

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Feature request to allow DHCP Reservation anywhere in the range

    10
    1 Votes
    10 Posts
    4k Views
    johnpozJ

    You trying to run 2 subnets over the same wire??  devices on subnet 2 it would be impossible to get an dhcp address from subnet 4..  Unless you think you can just run 2 different address schemes over the same wire and run 2 different dhcp servers??

  • [solved] Post editing restrictions

    3
    0 Votes
    3 Posts
    1k Views
    D

    Hooray!  8)

  • Problem posting

    3
    0 Votes
    3 Posts
    1k Views
    C

    Yeah that's the bbcode for that smiley. Check the box, or put the output in a code or quote block (always best for command output), if you won't want it to do that.

  • IPv6 broken for pfsense.org sites

    13
    0 Votes
    13 Posts
    4k Views
    M

    lol
    My point was that maybe pfsense guys could do nothing about it :=)
    That issue was on higher level… Unheard levels...

  • MOVED: 2.2.5 HDD Kurulum

    Locked
    1
    0 Votes
    1 Posts
    913 Views
    No one has replied
  • Forum Home Scrolling News

    2
    0 Votes
    2 Posts
    1k Views
    C

    Updated earlier, thanks.

  • Need FAQ in Cache/Proxy for squid and squidguard/web filter

    2
    0 Votes
    2 Posts
    932 Views
    P

    +1

    Good idea!  8)

  • Idea for pfsense forum, tip of the day

    8
    0 Votes
    8 Posts
    2k Views
    jdillardJ

    I have thought about a similar idea of posting fairly short gifs that highlight different features of pfSense with a short description (140 chars or less…) in the hopes they get passed around the twittersphere. Maybe it is something that could also be community generated, we could post the specs of the gif (desired dimensions and length) and people could post their ideas...

  • Problems with mailing list?

    2
    0 Votes
    2 Posts
    1k Views
    C

    There was an issue, since fixed. Your post should have gotten through. If not, go ahead and re-send it.

  • Something screwed with packages.pfsense.org

    11
    0 Votes
    11 Posts
    3k Views
    johnpozJ

    I see the A+ score - nice!!!  Much better than a C ;)

  • Trouble uploading

    13
    0 Votes
    13 Posts
    3k Views
    D

    Ah well, obviously something munged at my end.
    I'll have to investigate further.

    Thanks for checking and confirming the Forum performance.

  • Forum running slow again?

    20
    0 Votes
    20 Posts
    4k Views
    P

    spoofed-DDOS (sDDOS, a new acronym?) really should be stopped at each ISP before it gets onto the internet backbone:
    a) Customers with public IPS:
    Each ISP has customers connected and knows what public IPs it has allocated to those customers. If it receives any packets from a customer with a source IP that is not one of the customer's proper allocated public IPs then drop the packet.

    b) Customers who are not given public IPs but are in a CGN or similar managed by the ISP and who end up on shared public IPs:
    The ISP can filter internally to make sure individual customer packets have source IPs that match the internal IP given to the customer.
    In any case the ISP will NAT this stuff out to the public internet so dodgy source IPs will (should) be NATed out to be the ISP public IP. Thus the "spoofed" and "distributed" are not effective. It becomes like an ordinary "DOS".

    c) In regions/countries where there are small ISPs that are [not willing|can't be trusted|do not have the technical skill] to do this filtering of traffic from their customers, then the next level up part of the backbone (to which these ISPs connect) should filter traffic, making sure that the source IP of all traffic received from "small and dodgy ISP X" is actually one of the public IPs that is allocated and routed to that ISP.

    If that was put in place, then end-customers could not mount spoofed DDOS attacks just from a single place.

    They could still do ordinary DOS from 1 or a few of their own source IPs. But that is easier to mitigate because the firewall can have pass rules that limit the number of new connections per second from each source IP and quickly start dropping the incoming SYN packets without creating state… - which should be much less processor intensive and not fill the state table.

    And of course if someone has a bot that that they have managed to get installed in 1 million hosts via some malware then they can mount a real DDOS, rather than sDDOS.

  • Password incorrect

    8
    0 Votes
    8 Posts
    3k Views
    stephenw10S

    I have seen similar behaviour on other sites, though not here, if you have load-balanced WANs. Connections coming from alternating addresses can confuse login status.

    Steve

  • Suggestion: hardware checking/testing functionality

    6
    0 Votes
    6 Posts
    2k Views
    D

    You can stick something like this into Cron package if you believe in S.M.A.R.T. :P

  • Bribing pfSense

    25
    0 Votes
    25 Posts
    6k Views
    ivorI

    @Mr.:

    'tIs a feature, not a bug ( ;D ;D ;D ).

    I don't know, perhaps it's BB's pfblockerNG tables that are being backupped too? (I don't know :-[ ).
    [/quote]

    Nope, it's not a feature. It's a result of very poor pfSense config. We offer paid support exactly to prevent that : )

  • Roll back packages

    4
    0 Votes
    4 Posts
    2k Views
    ivorI

    You're comparing pfSense to SAP. Pause. Think about what you're comparing.

    In addition to that, I personally dislike SAP because it's 1) horribly overpriced 2) incredibly bad.

    I linked what JimP said, it's just not possible.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.