• pfSense taking too long to reconnect after ISP hang

    1
    0 Votes
    1 Posts
    197 Views
    No one has replied
  • Upgrade to 21.02 - OpenVPN no longer works

    2
    0 Votes
    2 Posts
    356 Views
    M
    I ended up downgrading back to 2.4.5-p1 and everything is fine again. Maybe there's something specific to our configuration, but even with Netgate hardware, it doesn't look to me that 21.x is ready for prime time just yet. Maybe it's just us. In case it helps anyone, there were at least three show-stopper issues that we found before we gave up: 1 ) Severe routing latency between vlans 2) DNS Resolver (unbound) crashing if "Register DHCP leases in the DNS Resolver" is enabled. 3) OpenVPN completely unusable (users can't connect, widget says there is a problem, services say everything is fine).
  • Upgrade to 21.02 - High latency between local VLANs

    2
    0 Votes
    2 Posts
    347 Views
    M
    I ended up downgrading back to 2.4.5-p1 and everything is fine again. Maybe there's something specific to our configuration, but even with Netgate hardware, it doesn't look to me that 21.x is ready for prime time just yet. Maybe it's just us. In case it helps anyone, there were at least three show-stopper issues that we found before we gave up: 1 ) Severe routing latency between vlans 2) DNS Resolver (unbound) crashing if "Register DHCP leases in the DNS Resolver" is enabled. 3) OpenVPN completely unusable (users can't connect, widget says there is a problem, services say everything is fine).
  • Starry Internet Station Replacement with pfSense?

    16
    0 Votes
    16 Posts
    2k Views
    W
    @lastb0isct Did you ever manage to figure this out? Running into the same situation as you are.
  • pfsense machine restarting on its own

    2
    0 Votes
    2 Posts
    193 Views
    No one has replied
  • Site Blocking

    5
    0 Votes
    5 Posts
    609 Views
    T
    Unfortunately, Amazon Prime Video still wasn't cooperating so I had to disable blocking altogether. Here is a link to the documentation. Snort Pass Lists
  • Can't connect to F5 VPN

    2
    0 Votes
    2 Posts
    422 Views
    AKEGECA
    @nillyB , it could be your firewall settings probs. Would you share a screencapture of your firewall settings?
  • To 2.5.0 or not ? that is the question :)

    Moved
    104
    1 Votes
    104 Posts
    26k Views
    AKEGECA
    If I may suggest for users who experienced bugs, just do a clean install 2.5.0 or you could try 2.5.1 (for testing purpose only) please note no WireGuard: https://snapshots.netgate.com/amd64/pfSense_RELENG_2_5_1/installer/ Then do re-configure from the scratch. About WireGuard, in my opinion there was some miscommunication between Netgate team and Jason A. Donenfeld (WireGuard). I really hope they would come to some agreement that benefit for their users and not waiting until June. Here is a full statement from Jason A. Donenfeld : Hi everybody, I’m pleased to announce that WireGuard now runs inside the FreeBSD kernel, with a driver called if_wg. It has full support of wg(8) and wg-quick(8) [5], as well as general integration into FreeBSD userland. Performance should be decent. The implementation in FreeBSD’s main branch should pretty much work, though it’s something of a so-so work in progress. To learn what I mean there, read on… Sometime ago, a popular firewall vendor tasked a developer with writing a WireGuard implementation for FreeBSD. They didn’t bother reaching out to the project. That’s okay, I figured, I’ll reach out and see if I can help and coordinate. What followed over the next year was a series of poor communications – messages unanswered, code reviews ignored, that kind of thing. Usually collaborations I’ve had with others have been full of excitement, but it just didn’t work out here. In the few discussions we were able to have, I did get across some key points, like, “you’ll save a bunch of time if you use the OpenBSD code as a starting point.” But mostly it seemed like a stop-and-go effort that the WireGuard project didn’t have much to do with. Then, at some point, whatever code laying around got merged into the FreeBSD tree and the developer tasked with writing it moved on. Fortunately, two weeks before FreeBSD 13.0 was due to be released, FreeBSD core developer Kyle Evans emailed the list about integrating wireguard-tools (wg(8) and such). In the ensuing discussion I mentioned that we really need to get the actual if_wg kernel implementation up to snuff. We took the conversation to IRC, and agreed that we should work on figuring out what to do before the release date. At the same time, Matt Dunwoodie, who worked on the OpenBSD implementation, also took a look at what had become of that implementation in FreeBSD. Over the next week, the three of us dug in and completely reworked the implementation from top to bottom, each one of us pushing commits and taking passes through the code to ensure correctness. The result was [6]. It was an incredible effort. The collaboration was very fast paced and exciting. Matt and Kyle are terrific programmers and fun to work with too. The first step was assessing the current state of the code the previous developer had dumped into the tree. It was not pretty. I imagined strange Internet voices jeering, “this is what gives C a bad name!” There were random sleeps added to “fix” race conditions, validation functions that just returned true, catastrophic cryptographic vulnerabilities, whole parts of the protocol unimplemented, kernel panics, security bypasses, overflows, random printf statements deep in crypto code, the most spectacular buffer overflows, and the whole litany of awful things that go wrong when people aren’t careful when they write C. Or, more simply, it seems typical of what happens when code ships that wasn’t meant to. It was essentially an incomplete half-baked implementation – nothing close to something anybody would want on a production machine. Matt had to talk me out of just insisting they pull the code entirely, and rework it more slowly and carefully for the next release cycle. And he was right: nobody would have agreed to do that, and it would only have fostered frustration from folks genuinely enthusiastic about if_wg. So our one and only option was to iteratively improve it as fast as we could during the two weeks before release, and try to make it as simple and close as possible to OpenBSD so that we could benefit from the previous analysis done there. With that as our mission, we set out auditing and rewriting code. One curious thing of note is that there were 40,000 lines of optimized crypto implementations pulled out of the Linux kernel compat module but not really wired up correctly, and mangled beyond repair with mazes of Linux→FreeBSD ifdefs. I wound up replacing this with an 1,800 line file, crypto.c [1], containing all of the cryptographic primitives needed to implement WireGuard. Aside from its place in the FreeBSD story, this is kind of neat in its own right: these are simple, but fast enough, reference implementations. It’s not deliberately tiny or obfuscated like TweetNaCl is, yet is still just a single file, and the Curve25519 field arithmetic in it is formally verified. Maybe other projects will find use for it. Future releases will hopefully get rid of crypto.c and hook into FreeBSD’s already existing optimized implementations [4], which should give a nice performance boost, but given the time crunch, having something boring, safe, and simple seemed like the way to go. We reduced the project structure down to four C files – the aforementioned crypto.c, two files copied verbatim from OpenBSD – wg_noise.c and wg_cookie.c – and if_wg.c, the actual interface device driver implementation and protocol logic. The IPC interface was reworked as well, and wg(8) in the wireguard-tools package grew support for it (also rewritten from the original attempt). The three of us spent countless hours across three time zones auditing state machine logic, running trials, and generally trying to get this working and workable. There are now even a few automated tests! I think we’ve mostly succeeded in producing something that behaves like WireGuard. The net result certainly isn’t perfect, though – the Linux and OpenBSD implementations were long, careful, slow projects by comparison – but it is at least a base on which to build and improve over time. Going forward, I think there’ll be additional systems coding issues to work out – locking, lifetimes, races, and that sort of thing. But now that there’s at least a stable base, developers can work out remaining issues incrementally. But perhaps this is a good moment to step back and ask how we got here, and what WireGuard itself really is. Traditionally, network protocols are specified in a document of protocol behaviors. Then different organizations implement that specification. Then everybody interoperates and all goes well. In practice, it often doesn’t go well (see IPsec woes), but this at least has been the traditional way of doing this on the Internet, and in some ways it works. But that is not the approach taken by the WireGuard project. In contrast, WireGuard is both a protocol and a set of implementations, implemented with a particular set of security and safety techniques. That’s a radical departure from the traditional model, and one surely to raise some grumbles amongst graybeards. But I believe this is a necessary and beneficial quality for having the types of high assurance software that is needed for core Internet security infrastructure. When you use WireGuard, you’re not just using some protocol that is capable of producing packets that are legible by others. You’re also using an implementation that’s been designed to avoid security pitfalls, and that provides interfaces for using it that mitigate footguns. In that way, the WireGuard project is more expansive than a mere protocol project or a mere software project or a mere cryptography project or a mere specification project or a mere interface project. It combines all of those things into a single unified approach. (For this same reason, the original WireGuard paper [2] has been difficult for folks to categorize. Is this a systems paper? A networking paper? A crypto paper?) Because of that, I think this was an understandable predicament. After all, why shouldn’t a company be able to task a developer with writing some ring-0 WireGuard code in C? And why does it matter to me whether the code is garbage if it can at least produce protocol packets? The reason is that the WireGuard project’s mission is wider than that. We deeply care about code quality and implementation particulars. While we now have the FreeBSD code in a maintainable state, there are other projects too that could use some attention from us. Looking forward, for example, we hope to be able to lend a hand similarly to the NetBSD developers soon to help them finish their implementation; this is long overdue on my part, and I owe them some time and energy there. And I hope that others don’t hesitate to email the list asking for collaboration. This kind of thing is, of course, one of the reasons that the project as an organization exists. To return to the primary announcement, I had originally hoped to say that this would be shipping for 13.0, and have some instructions for setup there, but unfortunately, and contrary to our plans, it looks exceedingly likely that given the grave issues we found in the existing code, they’ll in the end just disable the module from the release, and revisit for 13.1, rather than merging our fixes a few short days before the release. That’s a bit of a bummer, given how hard we worked to get things done in the time crunch, but it’s also probably a very wise decision that takes some courage to make, and this will give us more time to really get this rock solid for 13.1. As well, hopefully we’ll have backport modules for the 13.0 and 12.y release, making it as available as possible. Kyle or I will update the list when we’ve got a standalone backport module ready, with instructions, as well as updating [3] per usual. There’s also ongoing work to integrate WireGuard interface setup into rc, and hopefully that will land during the the next release window, as well as the aforementioned improvements to optimized crypto and systems issues. Enjoy, Jason
  • (SpaceX) Starlink internet service

    6
    0 Votes
    6 Posts
    1k Views
    R
    @ind1g0 Thanks for the info. I have my "dishy" but am waiting for them to ship their "pipe mount" as I have to use a mast to clear the valley of the pines I live amongst in the Sierras. I've considered keeping my current ISP online for a while, but until I see some stability numbers on my own system there will be no way to make that call. I'm retired, so I really don't have a need to VPN back to my system. There is a young Canadian gent on YouTube who is doing some Starlink/pfSense stuff. I wonder if we could get a Starlink section here on the forum? Rick
  • Traffic Monitor broken on upgrade to 2.5.0

    6
    0 Votes
    6 Posts
    665 Views
    buggzB
    Wow, and now LAN Traffic Graph magically works for the first time. I did update ntopng to the latest, but it didn't work then. Does now on reboot.
  • pfsense crash 2.5

    2
    0 Votes
    2 Posts
    455 Views
    M
    @messerchmidt here is a better link via my google drive: https://drive.google.com/file/d/1LjmwhmAyct2ScxPhZg0gQQMhpPi_JEBu/view?usp=sharing
  • New features?

    2
    0 Votes
    2 Posts
    456 Views
    stephenw10S
    You can add them as a feature request in Redmine. Or add comments to an existing request there uf there is something close enough to yours. Steve
  • Cannot use PKGs from FreeBSD...

    5
    0 Votes
    5 Posts
    633 Views
    stephenw10S
    Indeed, you should not do that! Mostly because enabling the complete FreeBSD pkg repo that can very easily pull in packages that break functionality by replacing the customised versions we have in pfSense. Installing individual pkgs directly using the full path like that can work as long as the dependencies list is met. If it needs a huge list of other things there's every chance it will break something. Small basic utilities. Plex is not that! Steve
  • Anyone else using pfSense and Virgin Media UK?

    2
    0 Votes
    2 Posts
    813 Views
    stephenw10S
    When it get's an IP but you're unable to ping anything beyond the WAN subnet what error you see when you try? That sounds like it has a bad default route or no default route. Check the routing table. If you have more than one gateway defined on the firewall make sure the WAN DHCP gateway is set as default in System > Routing > Gateways. Steve
  • Reset Interface Statistics

    2
    0 Votes
    2 Posts
    351 Views
    stephenw10S
    Those values are pulled from netstat and I'm not aware of any way to reset them unfortunately. https://www.freebsd.org/cgi/man.cgi?query=netstat Steve
  • Strange log msg from miniupnpd

    miniupnpd
    2
    0 Votes
    2 Posts
    1k Views
    stephenw10S
    miniupnpd cannot use a private IP as the WAN and will fail to add forwards. If something is restarting it you will see that logged. See: https://redmine.pfsense.org/issues/10398 Steve
  • WOL wakes ALL devices when trying to wake up ONE device

    2
    0 Votes
    2 Posts
    315 Views
    stephenw10S
    I would open a bug report for that: https://redmine.pfsense.org/ Include the same details you have here. Seems reasonable not to expect that behaviour. Steve
  • WAN interface drops connection

    2
    0 Votes
    2 Posts
    437 Views
    P
    I was able to solve the gateway being listed as pending by adding an IPv6 gateway monitoring address (I used Google). But no progress on the other issue. Does anyone have any insight?
  • State table size >89% error

    3
    0 Votes
    3 Posts
    412 Views
    A
    @derelict thank you i will try that
  • PPPoE disconnects few times a day for 20 seconds

    2
    0 Votes
    2 Posts
    169 Views
    AKEGECA
    @Chrischevy , what pfsense packages did you install?
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.