Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Can not delete new uploade L7 protocol patterns

    Scheduled Pinned Locked Moved Traffic Shaping
    9 Posts 7 Posters 3.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      anas_xrt
      last edited by

      :o

      Hi, I have try to upload new pattern to block/limiter youtube video (have successful done the pattern on Mikrotik RouterOS). But, Unfortunately, I have double time upload difference file name via GUI upload (firewall–>traffic shapper --> layer7).

      Now I want to delete one of them, so I have access ssh to /usr/local/share/protocols/ and delete the .pat file that I want.

      So, now is the problem. Any time I come back to GUI on layer 7. The file .pat that I has deleted, it just come back... I believed it is a bug...

      Any one can confirm.

      Thanks
      2016-02-07_18-15-16.jpg
      2016-02-07_18-15-16.jpg_thumb

      1 Reply Last reply Reply Quote 0
      • D
        David_W
        last edited by

        The Layer 7 code is badly broken in pfSense 2.2.x, as the daemon used doesn't work properly on FreeBSD 10. Layer 7 support has been completely removed from pfSense 2.3 because it was so badly broken. To that end, there is really no point reporting Layer 7 related bugs.

        1 Reply Last reply Reply Quote 0
        • A
          anas_xrt
          last edited by

          Ahh… Thank you. It is really clear and good to know...

          1 Reply Last reply Reply Quote 0
          • A
            Abhishek
            last edited by

            Any hope L7 issue to be fixed in future or permanently removed

            2.3-RC (amd64)
            built on Mon Apr 04 17:09:32 CDT 2016
            FreeBSD 10.3-RELEASE
            Intel(R) Core(TM)2 Duo CPU E4500 @ 2.20GHz

            darkstat 3.1.2_1
            Lightsquid 3.0.3_1
            mailreport 3.0_1
            pfBlockerNG 2.0.9_1  
            RRD_Summary 1.3.1_2
            snort 3.2.9.1_9  
            squid 0.4.16_1  
            squidGuard 1.14_1
            syslog-ng 1.1.2_2

            1 Reply Last reply Reply Quote 0
            • D
              David_W
              last edited by

              @Merchant:

              Any hope L7 issue to be fixed in future or permanently removed

              Layer 7 cannot be brought back unless someone fixes ipfw-classifyd for FreeBSD 10 or an entirely new approach to Layer 7 classification emerges. If I found the correct source code repository, ipfw-classifyd seems to have been abandoned by its original developers.

              Whilst Layer 7 classification was a nice to have feature, I have my doubts that it is sufficiently important for the pfSense team to devote any attention to fixing it. Many people will already have got used to Layer 7 support not working correctly in pfSense 2.2.x, so will have stopped attempting to use it.

              It is, I think, almost certain that pfSense 2.3 will be released with Layer 7 support in its current state - there is no Layer 7 support and all Layer 7 related configuration is removed from your configuration file when it is upgraded.

              1 Reply Last reply Reply Quote 0
              • V
                Valex
                last edited by

                I think this is really sad…

                Barracuda Firewalls can detect specific traffic based on pre defined categories and block it or lower the priority for HTTPS encrypted traffic (facebook, youtube, windows updates etc.) this is such a great feature and i would love to see it on pfsense...
                Also it shows the active applications live!

                This is really a big (but almost the only) advantage over pfsense.

                applications.PNG
                applications.PNG_thumb
                categories.PNG
                categories.PNG_thumb

                1 Reply Last reply Reply Quote 0
                • N
                  Nullity
                  last edited by

                  @Valex:

                  I think this is really sad…

                  Barracuda Firewalls can detect specific traffic based on pre defined categories and block it or lower the priority for HTTPS encrypted traffic (facebook, youtube, windows updates etc.) this is such a great feature and i would love to see it on pfsense...
                  Also it shows the active applications live!

                  This is really a big (but almost the only) advantage over pfsense.

                  By using hostname aliases, can you not accomplish the same thing in pfSense?

                  I doubt that Barracuda uses L7 to recognize Bing vs Windows Update (etc, etc) because encryption hides most information at the application layer. They most likely match traffic based on ports & hostnames.

                  Please correct any obvious misinformation in my posts.
                  -Not a professional; an arrogant ignoramous.

                  1 Reply Last reply Reply Quote 0
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate
                    last edited by

                    For L7 blocking, look at snort's appid features.

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 0
                    • B
                      bwf.it35218
                      last edited by

                      Hi

                      I also find the removal of L7 a bit sad. Snort's OpenAppID feature is nice, as long as you want to block traffic, but what if you want to use L7 to send specific traffic types to a traffic shaper queue? Then OpenAppID wont work.

                      One idea might be to replace ipfw-classifyd with something like nDPI (http://www.ntop.org/products/deep-packet-inspection/ndpi/). It's opensource and has the advantage of being able to inspect SSL encrypted traffic as well. I've already created a feature request for it - https://redmine.pfsense.org/issues/5813

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.