Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Announcing pfSense plus

    Scheduled Pinned Locked Moved Messages from the pfSense Team
    152 Posts 53 Posters 82.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      SteveITS Galactic Empire @mcury
      last edited by

      @mcury I apologize if I'm wrong, but I suspect you're confusing "end of life" for the hardware with "no more software updates" for pfSense on that device. https://www.netgate.com/support/product-lifecycle.html as I understand it is just for the hardware. I've personally upgraded several devices on that list that are "past EOL" to 2.4.5, last fall.

      I have not heard that Netgate will stop pfSense from upgrading on old hardware. Obviously at some point hardware will just be too old to run new FreeBSD versions but that's different than blocking it.

      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
      Upvote 👍 helpful posts!

      1 Reply Last reply Reply Quote 1
      • H
        heper @johnpoz
        last edited by

        @johnpoz said in Announcing pfSense plus:

        That wording really sounds like pfsense CE could just die off..

        it was bound to happen sooner or later after chris decided it was useful to have a pension-plan ;)

        kiokomanK 1 Reply Last reply Reply Quote 1
        • kiokomanK
          kiokoman LAYER 8 @heper
          last edited by

          closed source ... Does this mean I can no longer piss off Jimp and Garga with a new report on Redmine?
          my only regret, what a shame 😁

          ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
          Please do not use chat/PM to ask for help
          we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
          Don't forget to Upvote with the 👍 button for any post you find to be helpful.

          1 Reply Last reply Reply Quote 1
          • N
            netblues
            last edited by

            @kiokoman No, you can still do that, even on closed source.
            What you cant do is see the code fix .
            You should also expect quicker resolution too.
            This is something that must also happen on a paid project to be successful.
            What is totally unclear to me is what will happen to the new generation features and the feeds that make it happen. Especially pfblockerng, snort and suricata. Far more people depend on that. compared to running at speeds @10g+. (and there is tnsr for that)
            If this is lost, opnsense will be a more palatable option.

            bmeeksB 1 Reply Last reply Reply Quote 2
            • A
              apollo13
              last edited by

              Is there a chance that customers will have access to the source code of pfSense plus? Being able to look through the box and (often) being able to locally fix issues before handing in a bug-report is a big plus imo (For customers as well as netgate because the quality of bugreports can be better due to that). How does this all play together with GPLed parts of the software?

              1 Reply Last reply Reply Quote 0
              • S
                Spacecase @dennis_s
                last edited by

                @dennis_s
                I have a Netgate appliance (MBT-4220) which uses CE. Will there be a migration path to pfSense plus?

                1 Reply Last reply Reply Quote 1
                • bmeeksB
                  bmeeks @netblues
                  last edited by

                  @netblues said in Announcing pfSense plus:

                  What is totally unclear to me is what will happen to the new generation features and the feeds that make it happen. Especially pfblockerng, snort and suricata. Far more people depend on that.

                  One thing people often fail to realize is that the rise of end-to-end encryption is basically a death knell for IDS packages. You can't inspect encrypted traffic unless you break the chain of trust via MITM (man-in-the-middle) interception/proxying. Already Snort and Suricata both bail on a session as soon as they see the packets are part of an HTTPS, TLS, or SSH encrypted stream. So now ask yourself how many malware payloads are served up via HTTPS either through malicious ads on web sites or file downloads. Who sends emails with attachments in the clear these days? Nobody. Everyone uses some manner of TLS with email. Even DNS traffic is beginning to move over encrypted channels (DoT and its devil child, DoH). So when you think about all of that, you begin to see how encryption is killing the effectiveness of IDS/IPS.

                  While this has no direct bearing on the conversation at hand, I just wanted to point out that due to the changing landscape of the Internet, the need for some packages is going to die no matter what direction pfSense takes.

                  johnpozJ N 2 Replies Last reply Reply Quote 5
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @bmeeks
                    last edited by johnpoz

                    ^ well stated.. And while its a tiny bit off topic with packages and +... Its still very relevant in my opinion..

                    Like to mention - everyone loves the FREE ssl certs anyone can get in 2 minutes if their IP resolves to a domain with ACME... This also makes it nobrainer simple for even the lamest of scriptkiddie malware pushers to have your box use https to their device via a tunnel, and trust the shit out of it - nor warnings of any kind.. Hiding whatever they might be doing from any sort of ips/ids..

                    The internet is changing place - and everyone wants you info... Send your dns to me - oh your company doesn't want that - well F your company and its policies.. Will just have your browser sneak their dns via a tunnel over standard ports to make it PITA for your company to even know or block..

                    To be honest I have no freaking idea what these people that came up with doh were thinking - my opinion is all they were thinking about is $ signs.. Think of all the money we can make with these uses sending us free money, I mean data ;)

                    Ad companies - oh your domains are blocked because you serve up ads.. No worry, for a very low cost we will serve up your domains via our dns.. Yeah Yeah - the users "trust" us to do all their dns ;) we can serve them anything you want to serve.. Malware - oh that will cost you just a few pennies more per hit.. No the companies can not stop us - we just bypass all their controls ;) But say they can stop if after they jump through a billion hoops, that sure some of the top players will be able to do... But the millions of smbs and ma and pop shops wont have a clue ;)

                    sorry got on a bit of a rant there ;)

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    1 Reply Last reply Reply Quote 0
                    • N
                      netblues @bmeeks
                      last edited by

                      @bmeeks Still, some filtering is better than no filtering.
                      If pfsense wants to compete with e.g fortigate or sophos utm, then it needs feeds.
                      Professionally maintained and supported.

                      Interesting times.

                      bmeeksB 1 Reply Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks @netblues
                        last edited by

                        @netblues said in Announcing pfSense plus:

                        @bmeeks Still, some filtering is better than no filtering.
                        If pfsense wants to compete with e.g fortigate or sophos utm, then it needs feeds.
                        Professionally maintained and supported.

                        Interesting times.

                        I don't disagree with you. I would point out, though, that NGFW (Next Generation Firewall) can have a lot of differently nuanced meanings. And some of them might actually be marketing hype (translation, BS ... ☺).

                        Let's not derail this thread with this topic. If desired, we can discuss further over in the IDS/IPS sub-forum. My original post here was just to say that having Snort or Suricata is not a make-or-break thing in my opinion because of how end-to-end encryption is hiding lots of stuff from the eyes of the IDS anyway.

                        bmeeksB 1 Reply Last reply Reply Quote 0
                        • bmeeksB
                          bmeeks @bmeeks
                          last edited by

                          @bmeeks said in Announcing pfSense plus:

                          @netblues said in Announcing pfSense plus:

                          @bmeeks Still, some filtering is better than no filtering.
                          If pfsense wants to compete with e.g fortigate or sophos utm, then it needs feeds.
                          Professionally maintained and supported.

                          Interesting times.

                          I don't disagree with you. I would point out, though, that NGFW (Next Generation Firewall) can have a lot of differently nuanced meanings. And some of them might actually be marketing hype (translation, BS ... ☺).

                          Let's not derail this thread with this topic. If desired, we can discuss further over in the IDS/IPS sub-forum. My original post here was just to say that having Snort or Suricata is not a make-or-break thing in my opinion because of how end-to-end encryption is hiding lots of stuff from the eyes of the IDS anyway.

                          Can't seem to edit a post in this forum, so I want to follow up on my remark above about NGFW. I really meant to say UTM more so than NGFW, but they are really closely associated. My remark is not aimed at any vendor, but just refers to those concepts in general terms. End-to-end encryption is fouling up a lot of old-school network-level inspection, and is moving it instead to the endpoint clients.

                          1 Reply Last reply Reply Quote 0
                          • K
                            kdub1234
                            last edited by

                            I appreciate that a no cost home/lab version will be offered, but is there any chance we can get a direct version upgrade instead of how the free TNSR offering is setup?

                            After initial excitement of the TNSR free tier, I decided not to install largely because of the upgrade hassle. I am definitely not a fan of having to backup, reregister, re-provision and restore my appliance for every new patch/feature.

                            1 Reply Last reply Reply Quote 0
                            • A
                              al
                              last edited by

                              To the pfSense team:
                              Why would it be a problem for 'pfSense Plus' to be held open source like pfSense CE in regards to adding trust & confidence to the product as well as adding to security and privacy in regards to be able to look under the hood of e.g. the GUI, the backend and the various tools?

                              opensource.png

                              F 1 Reply Last reply Reply Quote 4
                              • S
                                slu @dennis_s
                                last edited by

                                @dennis_s

                                it would be so great to have the gold membership back, only for sponsoring the CE edition / Netgate. Call it "gold sponsoring", we buy it per year (as the gold membership was).

                                pfSense Gold subscription

                                1 Reply Last reply Reply Quote 1
                                • RicoR
                                  Rico LAYER 8 Rebel Alliance
                                  last edited by

                                  Back in the days when I was asked 'what is so great about pfSense?' my answers (sorted in order of importance):

                                  1. Open Source, you can trust the code 100%
                                  2. rock stable
                                  3. really nice feature set
                                  4. awesome community

                                  Good old times... 😔

                                  -Rico

                                  V 1 Reply Last reply Reply Quote 12
                                  • M
                                    matsan
                                    last edited by

                                    Too bad, for us the USP of pfSense was the open source model, knowing there are (at least potentially) multiple and external eyes on the code.
                                    Been supporting the project with both hardware purchases and gold subscriptions during the years. With open source gone the differentiator between our deployed SG-3100:s and the USG from UniFi is lost and we can move to a fully-integrated UniFi experience that is another closed-source-trust-the-company-running-it-relationship.

                                    Wishing you best of luck. So long and thank you for all the years!

                                    1 Reply Last reply Reply Quote 4
                                    • V
                                      Vollans @Rico
                                      last edited by

                                      @rico said in Announcing pfSense plus:

                                      2x Netgate XG-7100 | 11x Netgate SG-5100 | 6x Netgate SG-3100 | 2x Netgate SG-1100

                                      Surely Netgate have to be nervous when someone who has over 20 devices and has been a big supporter of those is worried?

                                      I’m only a new convert to pfSense, as of about July, but the fact it was open source was a big thing as I was fed up of hardware that had rubbish firewalls that promised lots and delivered nothing with unresponsive support that ignored requests to fix things. I did almost buy your hardware just after Christmas, but decided to wait. I’m glad I did. :(

                                      Cool_CoronaC 1 Reply Last reply Reply Quote 1
                                      • Cool_CoronaC
                                        Cool_Corona @Vollans
                                        last edited by

                                        Just to make things clear....

                                        Currently testing freebsd based FW's for the foreign state department here and closed source is a no go.

                                        They have issues with the US spying on live traffic thats encrypted. So it can be done...

                                        And I will always, on a personal level, run MiTM and not make anybody beeing able ro run anything other than the DNS provided.

                                        1 Reply Last reply Reply Quote 0
                                        • ExordiumE
                                          Exordium @dennis_s
                                          last edited by

                                          @dennis_s said in Announcing pfSense plus:

                                          Read our latest blog which includes a FAQ to learn more about this exciting change.

                                          I can't see anything exciting in this post... only stupid decisions.

                                          Just my 0,02$

                                          - pfSense Gold Subscriber -

                                          Sense 1: Shuttle DS57U3 (private)
                                          Sense 2: Supermicro Atom Barebone (Company Test)
                                          Sense 3 : 2 x Supermicro SYS-5018D-FN8T (Company Office)

                                          1 Reply Last reply Reply Quote 1
                                          • Bob.DigB
                                            Bob.Dig LAYER 8
                                            last edited by

                                            I am ok with it, if there is a full free version for home use, because I don't think that those people will pay for a firewall in the first place... unless it becomes a full-fledged WiFi-router. Pls don't. 😝

                                            JeGrJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.