Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    3.1.0_6 UPDATE

    Scheduled Pinned Locked Moved pfBlockerNG
    77 Posts 14 Posters 16.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      JMV43 0
      last edited by

      Ok so is there a 3.1.0_6 for PfSense+? Don't see the usual message traffic generated on updates.

      S 1 Reply Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @JMV43 0
        last edited by

        @jmv43-0 _5 came out the other day but only for 2.6 apparently.

        Per the last comment in https://redmine.pfsense.org/issues/13154, _6 doesn't include (i.e. reverts if patched) the CPU usage/logging bug fix, although that's listed as an Aug. 31 commit at https://github.com/pfsense/FreeBSD-ports/commits/devel/net/pfSense-pkg-pfBlockerNG-devel.

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote 👍 helpful posts!

        M S 2 Replies Last reply Reply Quote 2
        • M
          mcury @SteveITS
          last edited by

          @steveits said in 3.1.0_6 UPDATE:

          came out the other day but only for 2.6 apparently.

          It is also available for plus, updated yesterday.

          dead on arrival, nowhere to be found.

          S keyserK 2 Replies Last reply Reply Quote 1
          • S
            SteveITS Galactic Empire @mcury
            last edited by SteveITS

            @mcury said in 3.1.0_6 UPDATE:

            It is also available for plus, updated yesterday

            OK, I didn't notice that before seeing posts about _6 today.

            Edit: interesting, I looked at a 2.6 just now and it is still only offering _5.

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote 👍 helpful posts!

            1 Reply Last reply Reply Quote 1
            • ?
              A Former User
              last edited by

              OK, I didn't notice that before seeing posts about _6 today.

              I run pfS+ (22.05) and 3.1.0_6 where able to install today as
              I found out, but it could also be earlier available to get,
              because I was not the whole week looking over or in the pfSense firewall.

              And the update is eating my ram and cpu horse power.
              Would be nice to see a patch for it, but I don´t really know
              how to get the Commit ID for it to install the patch.

              It is really sad that the patch will not be shown in the Patches field, because many users sitting in that "trap" I think.

              S J 2 Replies Last reply Reply Quote 0
              • S
                SteveITS Galactic Empire @A Former User
                last edited by

                @dobby_ You can edit the file from the Diagnostics menu: https://redmine.pfsense.org/issues/13156#note-3

                Change ) to a space.

                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                Upvote 👍 helpful posts!

                ? 1 Reply Last reply Reply Quote 0
                • ?
                  A Former User @SteveITS
                  last edited by A Former User

                  @steveits
                  Thank for the hint I used it.

                  EDIT: (17.10.2022)
                  For me the patch does the trick! All numbers are normal again since that "patch".

                  pfblockerng_patch.jpg

                  GertjanG 1 Reply Last reply Reply Quote 0
                  • J
                    JMV43 0 @A Former User
                    last edited by

                    @dobby_ Concur, took me a while to chase down thru notes and past posts in Netgate Forums and reddit to get to a fix.

                    JMV

                    ? 1 Reply Last reply Reply Quote 0
                    • ?
                      A Former User @JMV43 0
                      last edited by

                      @jmv43-0
                      I really think the is owed to the different versions of pfSense
                      2.6 stable and 2.7 devel and on the other side pfblocker-ng
                      as stable, 3.1.0_4, 3.1.0_5 and actual 3.1.0_6. So the patch is
                      really unique and must match exactly to the versions you
                      installed. Or better said it should be clear and save that this
                      patch is also matching whatever combination you have installed. At my site it was pfs+ (22.05) together with
                      pfBlocker-NG devel 3.1.0_6 (upgraded to it before ~24 hours)

                      But finding it really out for me was not so easy until the post from @SteveITS he wrote below my post.

                      1 Reply Last reply Reply Quote 1
                      • GertjanG
                        Gertjan @A Former User
                        last edited by

                        @dobby_ said in 3.1.0_6 UPDATE:

                        All numbers are normal again since that "patch".

                        e4db38e4-3d28-4845-81ca-26b5b49ee351-image.png

                        That "load average" and swap usage, are these current numbers ? Or from before ?

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        ? 1 Reply Last reply Reply Quote 0
                        • ?
                          A Former User @Gertjan
                          last edited by A Former User

                          @Gertjan

                          That "load average" and swap usage, are these
                          current numbers ?

                          This are the current numbers after applying the patch!

                          Or from before ?

                          And this are also the numbers before I updated pfSense (pfs+ 22.05) to pfblockerng (3.1.0_6), after upgrade to pfblockerng 3.1.0_6 I got nearly 50 % Swap usage and something around +/-91 % RAM usage, and CPU was
                          spiking up to something around 60% - 80%.

                          GertjanG 1 Reply Last reply Reply Quote 0
                          • GertjanG
                            Gertjan @A Former User
                            last edited by

                            @dobby_ said in 3.1.0_6 UPDATE:

                            This are the current numbers after applying the patch!

                            When the swap space start to get used, see that as a signal that your device, starting with memory, can't cope any more.
                            Two solutions :
                            Lower significantly the work load.
                            Double your memory and CPU.

                            No "help me" PM's please. Use the forum, the community will thank you.
                            Edit : and where are the logs ??

                            ? 1 Reply Last reply Reply Quote 0
                            • ?
                              A Former User @Gertjan
                              last edited by

                              @gertjan

                              When the swap space start to get used, see that as a
                              signal that your device, starting with memory, can't
                              cope any more.

                              Ok that is right, but in normal the half of the ram and
                              swap is free and this over a long time only if ClamAV,
                              snort and pfblocker-ng are updating the lists and rules
                              it goes here and there nearly 70 % of both, but after the update it goes back to the above shown levels.

                              Two solutions :
                              Lower significantly the work load.

                              Could be the way for me, I run Snort, Squid & SquidGuard,
                              and pfBlocker-NG plus ClamAV on a PC Engines APU4D4.
                              In the future it comes on top of all, WiFi with Captive Portal and FreeRadius.

                              Double your memory and CPU.

                              In the near future this is planed for the whole setup.
                              Only some MacBooks, 1 PC and 1 Laptop at home usage.
                              So I really don´t know what to take I am between some
                              different solutions and not at the moment ready to chose.

                              But thanks anyway for the tip, you were right with the ram
                              and cpu load. The older APU will then be a GPS based NTP
                              and OpenLDAP server with some other services for the LAN.

                              GertjanG 1 Reply Last reply Reply Quote 0
                              • GertjanG
                                Gertjan @A Former User
                                last edited by

                                @dobby_ said in 3.1.0_6 UPDATE:

                                Snort, Squid & SquidGuard, plus ClamAV

                                Just for my own curiosity : knowing that 99,x % of all traffic is TLS these days, so the traffic payload is completely random for pfSense, what should ClamAV do ? Scanning virus in the packet headers ?

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                ? 1 Reply Last reply Reply Quote 0
                                • ?
                                  A Former User @Gertjan
                                  last edited by

                                  @gertjan said in 3.1.0_6 UPDATE:

                                  what should ClamAV do ? Scanning virus in the packet headers ?

                                  I use Squid as a caching-proxy and let ClamAV do the av scanning on it.

                                  GertjanG 1 Reply Last reply Reply Quote 0
                                  • GertjanG
                                    Gertjan @A Former User
                                    last edited by

                                    @dobby_

                                    Ok, that's the way to do it ;)

                                    No "help me" PM's please. Use the forum, the community will thank you.
                                    Edit : and where are the logs ??

                                    1 Reply Last reply Reply Quote 0
                                    • keyserK
                                      keyser Rebel Alliance @mcury
                                      last edited by keyser

                                      @mcury said in 3.1.0_6 UPDATE:

                                      @steveits said in 3.1.0_6 UPDATE:

                                      came out the other day but only for 2.6 apparently.

                                      It is also available for plus, updated yesterday.

                                      I wonder whats going on here… Rumors have it that it is Netgate that maintains this package now and @BBcan177 is no longer on board.

                                      Regardless if that is true or not, it makes less than NO sense to release not one but two minor fixes of the package where the most glaring obvious bug i still present.
                                      Has the package been hijacked, and is now delivering malware instead?

                                      We need some proper information about these release from whoever is responsible for the included changes and who approved it.

                                      Love the no fuss of using the official appliances :-)

                                      fireodoF ? S R 4 Replies Last reply Reply Quote 2
                                      • fireodoF
                                        fireodo @keyser
                                        last edited by fireodo

                                        @keyser

                                        Hi,

                                        as far as I can see, has the content of pfblockerng.inc between line 4136 and 4142 completely been reworked (that was the part that made the problems
                                        https://redmine.pfsense.org/issues/13154 )

                                        But I agree - a clarification from Netgate or whoever would be very much appreciated!

                                        Regards,
                                        fireodo

                                        Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
                                        SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
                                        pfsense 2.7.2 CE
                                        Packages: Apcupsd Cron Iftop Iperf LCDproc Nmap pfBlockerNG RRD_Summary Shellcmd Snort Speedtest System_Patches.

                                        keyserK 1 Reply Last reply Reply Quote 0
                                        • ?
                                          A Former User @keyser
                                          last edited by

                                          @keyser

                                          Has the package been hijacked, and is now delivering
                                          malware instead?

                                          Why? Because Netgate is now the maintainer? Then you could not trust the whole system (pfSense) and this makes
                                          no sense for me. If I trust someone (Netgate) and use his entire system I will also trust them if they (Netgate) maintain a package!

                                          We need some proper information about these release
                                          from whoever is responsible for the included changes
                                          and who approved it.

                                          Thinking one step ahead please, it is better in my eyes getting the hands on a package that is available and present, then one is not maintained any more!

                                          I will be more lucky with a patch, given in a short time
                                          that is working, I mean it is better then watching out the whole ticket parade and not patch is available.

                                          keyserK 1 Reply Last reply Reply Quote 0
                                          • keyserK
                                            keyser Rebel Alliance @fireodo
                                            last edited by

                                            @fireodo said in 3.1.0_6 UPDATE:

                                            @keyser

                                            Hi,

                                            as far as I can see, has the content of pfblockerng.inc between line 4136 and 4142 completely been reworked (that was the part that made the problems
                                            https://redmine.pfsense.org/issues/13154 )

                                            But I agree - a clarification from Netgate or whoever would be very much appreciated!

                                            Regards,
                                            fireodo

                                            If that is completely reworked, why does it still suffer the same issue then? I haven't updated yet because of this, and as far as I can tell people are still applying the same "fix" by removing the ")" in line 4136. So something is still the same in that section.

                                            Love the no fuss of using the official appliances :-)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.