Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    2.1.5 RELEASE Now Available

    Scheduled Pinned Locked Moved Messages from the pfSense Team
    41 Posts 16 Posters 12.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kejianshi
      last edited by

      I'm not going to whine too loudly because I'm sure the Devs are already working a fix.

      1 Reply Last reply Reply Quote 0
      • KOMK
        KOM
        last edited by

        I'm just glad that I no longer install pfSense updates immediately, and instead I wait until they have had at least a week or two to let the early-adopters and enthusiasts shake out the problems before I even think about putting it into production.

        1 Reply Last reply Reply Quote 0
        • ?
          Guest
          last edited by

          …same with me, I wait at least some days or try it on a back-up system first. The last 2-3 updates I did complete fresh installs on all systems running, as nano had its very special problems (wrong images, snort) in addition...

          1 Reply Last reply Reply Quote 0
          • jdillardJ
            jdillard
            last edited by

            To those that were having issues, if you want to try the newest snapshot at https://snapshots.pfsense.org, I committed a fix for the top nav wrap.

            https://forum.pfsense.org/index.php?topic=81165.msg443999#msg443999

            1 Reply Last reply Reply Quote 0
            • M
              Mr. Jingles
              last edited by

              I didn't have any problems anymore after an F5 (Firefox).

              6 and a half billion people know that they are stupid, agressive, lower life forms.

              1 Reply Last reply Reply Quote 0
              • A
                archedraft
                last edited by

                Is anyone having issues with OpenVPN clients "Unable to contact daemon"? If I  restart it seems to go away for a few hours but then it happens again. The weird thing is that I believe all the traffic is still being directed through the vpn clients…

                Version: 2.1.5-RELEASE (i386)
                built on Mon Aug 25 07:44:26 EDT 2014

                EDIT: Include Log

                Sep 10 13:00:25 openvpn[83477]: Exiting due to fatal error
                Sep 10 13:00:25 openvpn[83477]: Cannot open TUN/TAP dev /dev/tun2: Device busy (errno=16)
                Sep 10 13:00:25 openvpn[83477]: TUN/TAP device ovpnc2 exists previously, keep at program end
                Sep 10 13:00:23 openvpn[83477]: [VPN PROVIDER] Peer Connection Initiated with [AF_INET] EDITED_OUT_IP#:PORT#
                Sep 10 13:00:22 openvpn[83477]: WARNING: this configuration may cache passwords in memory – use the auth-nocache option to prevent this
                Sep 10 13:00:22 openvpn[83477]: UDPv4 link remote: [AF_INET]EDITED_OUT_IP#:PORT#
                Sep 10 13:00:22 openvpn[83477]: UDPv4 link local (bound): [AF_INET]EDITED_OUT_IP#
                Sep 10 13:00:22 openvpn[83431]: NOTE: the current –script-security setting may allow this configuration to call user-defined scripts
                Sep 10 13:00:22 openvpn[83431]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
                Sep 10 13:00:22 openvpn[83431]: OpenVPN 2.3.3 i386-portbld-freebsd8.3 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 15 2014

                Capture.PNG
                Capture.PNG_thumb

                1 Reply Last reply Reply Quote 0
                • ?
                  Guest
                  last edited by

                  Yep, normally tunnel stays fully functional. Reboot resolves it, but may pop up again. No idea why…

                  1 Reply Last reply Reply Quote 0
                  • K
                    kejianshi
                    last edited by

                    I've only seen this when running it as a VM myself.  Quite annoying and consistently reoccurs but only on my virtualized instances of pfsense.

                    1 Reply Last reply Reply Quote 0
                    • A
                      archedraft
                      last edited by

                      Well I am happy to hear that I am not the only one but I agree that it is quite annoying. I am running bare metal so would seem to be something in the 2.1.5 release.

                      1 Reply Last reply Reply Quote 0
                      • K
                        kejianshi
                        last edited by

                        It started a couple updates back for me.  It has had no impact on performance so I ignore it.

                        1 Reply Last reply Reply Quote 0
                        • A
                          archedraft
                          last edited by

                          @kejianshi:

                          It started a couple updates back for me.  It has had no impact on performance so I ignore it.

                          I have come to find that this does affect rules and port forwarding. I have a few website setup to use the my local ISP and not the VPN, however, when the VPN shows the arrow down, the website rules get messed up and for some reason is trying to send the traffic through the VPN (when the VPN is up then the rules function normally??) Also I have a script that checks to make sure my VPN's port is being forwarded correctly and if it detects that the VPN port has been closed it restarts the VPN to find a new open port. When the VPN is up then it functions as it should. When the VPN is down it thinks that the port is open when in fact the port is closed.

                          Has anyone found a solution to fix this issue? It is really starting to be a nuisance.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.