• New Squid 6.7 and Clamav 1.3.0

    squid upgrade proxy
    11
    8 Votes
    11 Posts
    2k Views
    T
    @lg1980 said in New Squid 6.7 and Clamav 1.3.0: https://git.labexposed.com/lgcosta/gists/src/branch/main/squid-6x Hi I hope you are doing well. I have reinstall pfsense OS ,i need to reconfigure squid Proxy, I am unable to download pakage from above github link.Can you share the new repo link.
  • Can't set SNI frontend HAProxy

    6
    0 Votes
    6 Posts
    617 Views
    M
    ahh my trouble is with one specefic server. This worked with other ones. Thanks!
  • Caching Steam / Epic and Windows updates?

    3
    0 Votes
    3 Posts
    765 Views
    A
    I found that lancache is better at caching steam and windows updates than squid. Though you can setup squid to cache these updates. Best way to do it is the following install squid and set it up and add refresh pattens https://github.com/mmd123/squid-cache-dynamic_refresh-list Configure all clients to use the proxy manually or setup pfsense to use a WPAD to do it automatically. For software that does not support autoconfigure proxy enable transparent proxy, do not rely on only the transparent proxy as it can break things. Enable transparent SSL and under SSL/MITM Mode either select spliceall or if you want to cache some ssl select custom 4a. under Custom Options (SSL/MITM) here you can create your squid rule, for an example if you do the follow Create a txt file at /home/bumpsites.txt /home/excludeSites.txt acl bump_sites ssl::server_name "/home/bumpsites.txt" acl excludeSites ssl::server_name "/home/excludeSites.txt" acl step1 at_step SslBump1 ssl_bump peek step1 ssl_bump splice bypassusers ssl_bump bump bump_sites ssl_bump splice all the bumpsites.txt are all the sites you want do decrypt so you can cache it, an example will be like this download.nvidia.com us.download.nvidia.com international-gfe.download.nvidia.com This will bump the nvidia driver url and will allow you to cache the update While it may seem nice to bump and decrypt everything sadly that breaks a lot of things and not everything can be cached. So the best option is to see what are the biggest download urls on your network, first see if you can are able to decrypt and cache it without any issues then add it to the to the list and restart squid. Play around with it and let me know how you go.
  • clamav won't start....

    1
    0 Votes
    1 Posts
    154 Views
    No one has replied
  • pfsense+ 24.11 - haproxy GUI crash

    2
    0 Votes
    2 Posts
    234 Views
    S
    https://redmine.pfsense.org/issues/15911
  • SQUID 100% LIBERADO NAO FUNCIONA O SKYPE

    3
    0 Votes
    3 Posts
    292 Views
    A
    @tiago-duarte Either white list all skype domains or switch to use splice mode and manually bump sites that you want to decrypt also try manually setting devices to use the proxy then have transparent as a fallback.
  • Squid troubles, http not working

    2
    0 Votes
    2 Posts
    1k Views
    JonathanLeeJ
    Squid has a default gateway directive. https://www.squid-cache.org/Doc/config/tls_outgoing_options/ https://www.squid-cache.org/Doc/config/tcp_outgoing_address/ Option Name: tcp_outgoing_address Replaces: Requires: Default Value: Address selection is performed by the operating system. Suggested Config: Allows you to map requests to different outgoing IP addresses based on the username or source address of the user making the request. tcp_outgoing_address ipaddr [[!]aclname] ... For example; Forwarding clients with dedicated IPs for certain subnets. acl normal_service_net src 10.0.0.0/24 acl good_service_net src 10.0.2.0/24 tcp_outgoing_address 2001:db8::c001 good_service_net tcp_outgoing_address 10.1.0.2 good_service_net tcp_outgoing_address 2001:db8::beef normal_service_net tcp_outgoing_address 10.1.0.1 normal_service_net tcp_outgoing_address 2001:db8::1 tcp_outgoing_address 10.1.0.3 Processing proceeds in the order specified, and stops at first fully matching line. Squid will add an implicit IP version test to each line. Requests going to IPv4 websites will use the outgoing 10.1.0.* addresses. Requests going to IPv6 websites will use the outgoing 2001:db8:* addresses. NOTE: The use of this directive using client dependent ACLs is incompatible with the use of server side persistent connections. To ensure correct results it is best to set server_persistent_connections to off when using this directive in such configurations. NOTE: The use of this directive to set a local IP on outgoing TCP links is incompatible with using TPROXY to set client IP out outbound TCP links. When needing to contact peers use the no-tproxy cache_peer option and the client_dst_passthru directive re-enable normal forwarding such as this. This clause only supports fast acl types. See https://wiki.squid-cache.org/SquidFaq/SquidAcl for details.
  • Memory pools

    2
    0 Votes
    2 Posts
    246 Views
    JonathanLeeJ
    More research into this... I am happy someone else inquired about this to the Squid email system, here is the response. On 2024-12-02 03:56, Masanari Iida wrote: Hi, I would like to understand memory_pools and memory_pools_limits setting. In case memory_pools_limit is set to none (as default), all squid process memory that can be seen by ps(1) is being used by squid? Yes, for some definition of "being used". Some of the memory reported by ps is idle memory_pools memory that is not used by current Squid transactions (but it is still "used" by Squid in general sense). In case memory_pools_limit is set to 100MB and 1GB of memory is being used by squid, then actual memory usage is 900MB and 100MB is reserved as unused. If you are asserting that "100MB is reserved as unused", then I disagree with that assertion. Squid does not pre-allocate memory just because you enable memory pools. Special tricks (that I do not recommend using, and you are not discussing above) aside, Squid memory pools may only preserve previously used memory (to avoid re-allocation). memory_pools_limit limits how much previously used memory Squid can keep for that purpose. In this case, process memory usage seen by ps(1) is 1GB. Background of the question. I would like to know whether memory_pool_limit size is included in the process memory usage, seen from os commands such as ps(1), top(1). The short answer is "yes": OS commands do not know anything about Squid internals and, hence, include everything Squid is using, but there are different kinds of "use". N.B. Some Squid memory allocations do not go through memory pools. HTH, Alex.
  • HAProxy crashes when ACLing http_auth_group() and others

    1
    0 Votes
    1 Posts
    163 Views
    No one has replied
  • Offloading SSL in HAProxy to access NAS backend

    3
    0 Votes
    3 Posts
    246 Views
    triksT
    @noplan thanks for the reply, that’s exactly what I did, let me check over my settings again at least I know it’s possible.
  • HAProxy only Default backend is working

    4
    1 Votes
    4 Posts
    476 Views
    V
    @oldgeezy said in HAProxy only Default backend is working: I'm pretty sure I can set my firewall rules so that the incoming WAN traffic lands on the LAN listener and get the same result. Since you're talking about a VPN, where you get forwarded the traffic by the provider, I don't expect, that anything is coming in on the WAN, rather the VPN interface. Leads me to believe it's something to do with how my VPN service provider is forwarding the traffic, or my NAT / firewall rule If your main domain and subdomain resolve the the same IP, both should hit your interface or both not. The VPN server cannot intercept the HTTPS and split the traffic anyhow. I'm not sure how to troubleshoot traffic getting passed, Go to Diagnostic > Packet Capture and sniff the traffic on the involved interfaces. but getting striped of http headers along the way. Only a proxy working on the application layer can stripe a host header. And I don't expect, that you configured HAproxy to do this. Believe I am talking about HTTP, haha to the extent of my knowledge. So which application are you trying to reach and how. If you access it by an URL starting with http(s) it might obviously use HTTP.
  • Squid Proxy does not see external CA for SSL Interception

    2
    0 Votes
    2 Posts
    260 Views
    JonathanLeeJ
    Is it a certificate authority ?
  • Squid V6.10

    squid squid-proxy squid update
    32
    1 Votes
    32 Posts
    5k Views
    B
    @michmoor Yes, it works for them, unfortunately only there :(
  • squid sites sometimes don't load completely help pls

    17
    0 Votes
    17 Posts
    1k Views
    M
    @JonathanLee I put my mod in custom mode and re-wrote the certificate. I'll try it a bit and I'll let you know again depending on the situation. 2024/11/17 12:44:10| Processing Configuration File: /usr/local/etc/squid/squid.conf (depth 0) 2024/11/17 12:44:10| Processing: http_port 192.168.2.1:3128 ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=10MB cert=/usr/local/etc/squid/serverkey.pem cafile=/usr/local/share/certs/ca-root-nss.crt capath=/usr/local/share/certs/ cipher=EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:!RC4:!aNULL:!eNULL:!LOW:!3DES:!SHA1:!MD5:!EXP:!PSK:!SRP:!DSS tls-dh=prime256v1:/etc/dh-parameters.2048 options=NO_SSLv3,NO_TLSv1,SINGLE_DH_USE,SINGLE_ECDH_USE 2024/11/17 12:44:10| WARNING: UPGRADE: 'cafile=/usr/local/share/certs/ca-root-nss.crt' is deprecated in http_port. Use 'tls-cafile=' instead. 2024/11/17 12:44:10| WARNING: Failed to decode EC parameters '/etc/dh-parameters.2048' OpenSSL-saved error #1: 0x1e08010c 2024/11/17 12:44:10| ERROR: Unsupported TLS option SINGLE_DH_USE 2024/11/17 12:44:10| ERROR: Unsupported TLS option SINGLE_ECDH_USE 2024/11/17 12:44:10| Processing: http_port 127.0.0.1:3128 intercept ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=10MB cert=/usr/local/etc/squid/serverkey.pem cafile=/usr/local/share/certs/ca-root-nss.crt capath=/usr/local/share/certs/ cipher=EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:!RC4:!aNULL:!eNULL:!LOW:!3DES:!SHA1:!MD5:!EXP:!PSK:!SRP:!DSS tls-dh=prime256v1:/etc/dh-parameters.2048 options=NO_SSLv3,NO_TLSv1,SINGLE_DH_USE,SINGLE_ECDH_USE 2024/11/17 12:44:10| Starting Authentication on port 127.0.0.1:3128 2024/11/17 12:44:10| Disabling Authentication on port 127.0.0.1:3128 (interception enabled) 2024/11/17 12:44:10| WARNING: UPGRADE: 'cafile=/usr/local/share/certs/ca-root-nss.crt' is deprecated in http_port. Use 'tls-cafile=' instead. 2024/11/17 12:44:10| WARNING: Failed to decode EC parameters '/etc/dh-parameters.2048' OpenSSL-saved error #1: 0x1e08010c 2024/11/17 12:44:10| ERROR: Unsupported TLS option SINGLE_DH_USE 2024/11/17 12:44:10| ERROR: Unsupported TLS option SINGLE_ECDH_USE 2024/11/17 12:44:10| Processing: https_port 127.0.0.1:3129 intercept ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=10MB cert=/usr/local/etc/squid/serverkey.pem cafile=/usr/local/share/certs/ca-root-nss.crt capath=/usr/local/share/certs/ cipher=EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:!RC4:!aNULL:!eNULL:!LOW:!3DES:!SHA1:!MD5:!EXP:!PSK:!SRP:!DSS tls-dh=prime256v1:/etc/dh-parameters.2048 options=NO_SSLv3,NO_TLSv1,SINGLE_DH_USE,SINGLE_ECDH_USE 2024/11/17 12:44:10| Starting Authentication on port 127.0.0.1:3129 2024/11/17 12:44:10| Disabling Authentication on port 127.0.0.1:3129 (interception enabled) 2024/11/17 12:44:10| WARNING: UPGRADE: 'cafile=/usr/local/share/certs/ca-root-nss.crt' is deprecated in https_port. Use 'tls-cafile=' instead. 2024/11/17 12:44:10| WARNING: Failed to decode EC parameters '/etc/dh-parameters.2048' OpenSSL-saved error #1: 0x1e08010c 2024/11/17 12:44:10| ERROR: Unsupported TLS option SINGLE_DH_USE 2024/11/17 12:44:10| ERROR: Unsupported TLS option SINGLE_ECDH_USE 2024/11/17 12:44:10| Processing: icp_port 0 2024/11/17 12:44:10| Processing: digest_generation off 2024/11/17 12:44:10| Processing: dns_v4_first on 2024/11/17 12:44:10| ERROR: Directive 'dns_v4_first' is obsolete. 2024/11/17 12:44:10| dns_v4_first : Remove this line. Squid no longer supports preferential treatment of DNS A records. 2024/11/17 12:44:10| Processing: pid_filename /var/run/squid/squid.pid 2024/11/17 12:44:10| Processing: cache_effective_user squid 2024/11/17 12:44:10| Processing: cache_effective_group proxy 2024/11/17 12:44:10| Processing: error_default_language en 2024/11/17 12:44:10| Processing: icon_directory /usr/local/etc/squid/icons 2024/11/17 12:44:10| Processing: visible_hostname localhost 2024/11/17 12:44:10| Processing: cache_mgr admin@localhost 2024/11/17 12:44:10| Processing: access_log /var/squid/logs/access.log 2024/11/17 12:44:10| Processing: cache_log /var/squid/logs/cache.log 2024/11/17 12:44:10| Processing: cache_store_log none 2024/11/17 12:44:10| Processing: netdb_filename /var/squid/logs/netdb.state 2024/11/17 12:44:10| Processing: pinger_enable on 2024/11/17 12:44:10| Processing: pinger_program /usr/local/libexec/squid/pinger 2024/11/17 12:44:10| Processing: sslcrtd_program /usr/local/libexec/squid/security_file_certgen -s /var/squid/lib/ssl_db -M 4MB -b 2048 2024/11/17 12:44:10| Processing: tls_outgoing_options cafile=/usr/local/share/certs/ca-root-nss.crt 2024/11/17 12:44:10| Processing: tls_outgoing_options capath=/usr/local/share/certs/ 2024/11/17 12:44:10| Processing: tls_outgoing_options options=NO_SSLv3,NO_TLSv1,SINGLE_DH_USE,SINGLE_ECDH_USE 2024/11/17 12:44:10| ERROR: Unsupported TLS option SINGLE_DH_USE 2024/11/17 12:44:10| ERROR: Unsupported TLS option SINGLE_ECDH_USE 2024/11/17 12:44:10| Processing: tls_outgoing_options cipher=EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:!RC4:!aNULL:!eNULL:!LOW:!3DES:!SHA1:!MD5:!EXP:!PSK:!SRP:!DSS 2024/11/17 12:44:10| Processing: sslcrtd_children 5 2024/11/17 12:44:10| Processing: logfile_rotate 5 2024/11/17 12:44:10| Processing: debug_options rotate=5 2024/11/17 12:44:10| Processing: shutdown_lifetime 3 seconds 2024/11/17 12:44:10| Processing: acl localnet src 192.168.2.0/24 2024/11/17 12:44:10| Processing: forwarded_for on 2024/11/17 12:44:10| Processing: uri_whitespace strip 2024/11/17 12:44:10| Processing: refresh_pattern -i windowsupdate.com/..(cab|exe|ms[i|u|f|p]|[ap]sf|wm[v|a]|dat|zip|psf) 43200 80% 129600 reload-into-ims 2024/11/17 12:44:10| Processing: refresh_pattern -i microsoft.com/..(cab|exe|ms[i|u|f|p]|[ap]sf|wm[v|a]|dat|zip|psf) 43200 80% 129600 reload-into-ims 2024/11/17 12:44:10| Processing: refresh_pattern -i windows.com/..(cab|exe|ms[i|u|f|p]|[ap]sf|wm[v|a]|dat|zip|psf) 43200 80% 129600 reload-into-ims 2024/11/17 12:44:10| Processing: refresh_pattern -i microsoft.com.akadns.net/..(cab|exe|ms[i|u|f|p]|[ap]sf|wm[v|a]|dat|zip|psf) 43200 80% 129600 reload-into-ims 2024/11/17 12:44:10| Processing: refresh_pattern -i deploy.akamaitechnologies.com/.*.(cab|exe|ms[i|u|f|p]|[ap]sf|wm[v|a]|dat|zip|psf) 43200 80% 129600 reload-into-ims 2024/11/17 12:44:10| Processing: cache_mem 512 MB 2024/11/17 12:44:10| Processing: maximum_object_size_in_memory 1024 KB 2024/11/17 12:44:10| Processing: memory_replacement_policy heap GDSF 2024/11/17 12:44:10| Processing: cache_replacement_policy heap LFUDA 2024/11/17 12:44:10| Processing: minimum_object_size 0 KB 2024/11/17 12:44:10| Processing: maximum_object_size 4 MB 2024/11/17 12:44:10| Processing: cache_dir ufs /var/squid/cache 100 16 256 2024/11/17 12:44:10| Processing: offline_mode off 2024/11/17 12:44:10| Processing: cache_swap_low 90 2024/11/17 12:44:10| Processing: cache_swap_high 95 2024/11/17 12:44:10| Processing: cache allow all 2024/11/17 12:44:10| Processing: refresh_pattern ^ftp: 1440 20% 10080 2024/11/17 12:44:10| Processing: refresh_pattern ^gopher: 1440 0% 1440 2024/11/17 12:44:10| Processing: refresh_pattern -i (/cgi-bin/|?) 0 0% 0 2024/11/17 12:44:10| Processing: refresh_pattern . 0 20% 4320 2024/11/17 12:44:10| Processing: acl allsrc src all 2024/11/17 12:44:10| Processing: acl safeports port 21 70 80 210 280 443 488 563 591 631 777 901 3128 3129 1025-65535 2024/11/17 12:44:10| Processing: acl sslports port 443 563 2024/11/17 12:44:10| Processing: acl purge method PURGE 2024/11/17 12:44:10| Processing: acl connect method CONNECT 2024/11/17 12:44:10| Processing: acl HTTP proto HTTP 2024/11/17 12:44:10| Processing: acl HTTPS proto HTTPS 2024/11/17 12:44:10| Processing: acl step1 at_step SslBump1 2024/11/17 12:44:10| Processing: acl step2 at_step SslBump2 2024/11/17 12:44:10| Processing: acl step3 at_step SslBump3 2024/11/17 12:44:10| Processing: acl allowed_subnets src 192.168.2.1/24 192.168.2.0/24 2024/11/17 12:44:10| WARNING: aclIpParseIpData: Netmask masks away part of the specified IP in '192.168.2.1/24' 2024/11/17 12:44:10| WARNING: (B) '192.168.2.0/24' is a subnetwork of (A) '192.168.2.0/24' 2024/11/17 12:44:10| WARNING: because of this '192.168.2.0/24' is ignored to keep splay tree searching predictable 2024/11/17 12:44:10| WARNING: You should probably remove '192.168.2.0/24' from the ACL named 'allowed_subnets' 2024/11/17 12:44:10| Processing: acl whitelist dstdom_regex -i "/var/squid/acl/whitelist.acl" 2024/11/17 12:44:10| Processing: http_access allow manager localhost 2024/11/17 12:44:10| Processing: http_access deny manager 2024/11/17 12:44:10| Processing: http_access allow purge localhost 2024/11/17 12:44:10| Processing: http_access deny purge 2024/11/17 12:44:10| Processing: http_access deny !safeports 2024/11/17 12:44:10| Processing: http_access deny CONNECT !sslports 2024/11/17 12:44:10| Processing: http_access allow localhost 2024/11/17 12:44:10| Processing: request_body_max_size 0 KB 2024/11/17 12:44:10| Processing: delay_pools 1 2024/11/17 12:44:10| Processing: delay_class 1 2 2024/11/17 12:44:10| Processing: delay_parameters 1 -1/-1 -1/-1 2024/11/17 12:44:10| Processing: delay_initial_bucket_level 100 2024/11/17 12:44:10| Processing: delay_access 1 allow allsrc 2024/11/17 12:44:10| Processing: url_rewrite_program /usr/local/bin/squidGuard -c /usr/local/etc/squidGuard/squidGuard.conf 2024/11/17 12:44:10| Processing: url_rewrite_bypass off 2024/11/17 12:44:10| Processing: url_rewrite_children 16 startup=8 idle=4 concurrency=0 2024/11/17 12:44:10| Processing: http_access allow whitelist 2024/11/17 12:44:10| Processing: acl youtubedst dstdomain -n www.youtube.com m.youtube.com youtubei.googleapis.com youtube.googleapis.com www.youtube-nocookie.com 2024/11/17 12:44:10| Processing: request_header_access YouTube-Restrict deny all 2024/11/17 12:44:10| Processing: request_header_add YouTube-Restrict none youtubedst 2024/11/17 12:44:10| Processing: acl splice_it ssl::server_name .microsoft.com 2024/11/17 12:44:10| Processing: acl splice_it ssl::server_name .windowsupdate.com 2024/11/17 12:44:10| Processing: acl splice_it ssl::server_name .akamaitechnologies.com 2024/11/17 12:44:10| Processing: acl splice_it ssl::server_name .akadns.net 2024/11/17 12:44:10| Processing: acl splice_it ssl::server_name .cloudns.net 2024/11/17 12:44:10| Processing: ssl_bump peek step1 2024/11/17 12:44:10| Processing: acl hasRequest has request 2024/11/17 12:44:10| Processing: access_log daemon:/var/log/squid/access.log hasRequest 2024/11/17 12:44:10| Processing: http_access allow allowed_subnets 2024/11/17 12:44:10| Processing: http_access allow localnet 2024/11/17 12:44:10| Processing: http_access deny allsrc 2024/11/17 12:44:10| WARNING: use of 'reload-into-ims' in 'refresh_pattern' violates HTTP 2024/11/17 12:44:10| Requiring client certificates. 2024/11/17 12:44:10| Loaded signing certificate: /CN=internal-ca/C=TR 2024/11/17 12:44:10| Not requiring any client certificates 2024/11/17 12:44:10| Loaded signing certificate: /CN=internal-ca/C=TR 2024/11/17 12:44:10| Not requiring any client certificates 2024/11/17 12:44:10| Loaded signing certificate: /CN=internal-ca/C=TR 2024/11/17 12:44:10| Not requiring any client certificates
  • HAProxy backend server DOWN

    4
    0 Votes
    4 Posts
    709 Views
    V
    @jdenny If you use the HTTP check, you will need to configure it properly. You can specify the method, URL and also the protocol version. Note that HAproxy just request the server by its IP and port as stated in the backend setting. It doesn't send a host header to the backend. If your server requires this, the check will fail. Also it just requests the server root / if you didn't state any other URL. So ensure, that your server is responding to such requests.
  • pfsense squid

    Moved
    4
    0 Votes
    4 Posts
    699 Views
    JonathanLeeJ
    Do you have a blacklist?
  • How to use haproxy with valid SSL certificates other than ACME?

    3
    0 Votes
    3 Posts
    449 Views
    P
    @accidentallyadmin I use them with Godaddy, Sectigo and more. no issues - one of the best "features" with pfsense/Haproxy combo imho. :)
  • HAProxy very bad performance / throughput

    haproxy performance throughput pfsense+
    4
    0 Votes
    4 Posts
    1k Views
    P
    @AndyD Finally an explanation what happened after 2.4 where HAProxy performance dropped like a stone :), lets hope this comes to CE version too.
  • Squid managing wpad

    2
    1 Votes
    2 Posts
    302 Views
    A
    @JonathanLee There is an Unofficial-pfSense WPAD package https://forum.netgate.com/topic/116163/unofficial-wpad-package-for-pfsense-software https://github.com/freitasbr/unofficial-pfsense-wpad Works really well if you want to run a proxy and do not want to fully rely on the transparent proxy (which can have connection issues on some programs like sites not working in chrome). You can also set it up manually however the package makes it easy.
  • HAProxy jwt_verify on disk certificate location?

    haproxy 2.7.2
    1
    0 Votes
    1 Posts
    217 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.