Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    A

    @aGeekhere

    Update, will not be fixed as squid is deprecated from pfSense

  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    JonathanLeeJ

    I just noticed that if you set the following in the GUI the system tunable does not change to reflect that you disabled it

    Screenshot 2025-06-06 at 10.49.30.png

    for snort to work well Hardware TCP Segmentation Offloading must be disabled. However the GUI seems to not change the actual net.inet.tcp.tso to 0

    You have to also manually change it under system tunableables

    Screenshot 2025-06-06 at 10.52.35.png

    I don't know if anyone has spotted this issue.

  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    K

    @pulsartiger
    The database name is vnstat.db and its location is under /var/db/vnstat.
    With "Backup Files/Dir" we are able to do backup or also with a cron.

  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    M

    @tinfoilmatt

    here: running pfSense 2.8.0-RELEASE and pfBlockerNG 3.2.8-dev

    Made the suggested change to line 1232.

    Still same issue showing DNSBL (unbound mode) out of sync.

    Should I revert the channge to ensure that the patch when available works correctly?

    Thanks for nay help.

  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    98 Topics
    2k Posts
    J

    So far everything is stable without me changing anything else. Who knows why....

  • Discussions about the ACME / Let’s Encrypt package for pfSense

    491 Topics
    3k Posts
    jimpJ

    Let's Encrypt is removing the TLS Client Authentication EKU from certificates they sign in the near future:

    https://letsencrypt.org/2025/05/14/ending-tls-client-authentication/

    This shouldn't affect many, if any, users of ACME on pfSense as it isn't used as a client certificate, only as a server certificate in various context (e.g. GUI, Captive Portal, HAProxy)

    In the past we have discouraged using Let's Encrypt certificates in certain contexts (like for clients) since it wasn't typically a secure practice. For example, if you use a Let's Encrypt certificate for OpenVPN, it would trust any certificate signed by Let's Encrypt, which makes it useless as an authentication factor.

    So while this is something to be aware of and check, it's unlikely to be a problem for most people.

  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    B

    Hi,

    We are running 25.03-BETA and running into the issue of FRR and BGP processes disconnecting at the control level. It mitigates itself in BGP being stuck in the active state from the GUI and FRR point of view (even vtysh thinks so), while the BGP process is actively keeping the connection in the background. No routes are being populated into the routing table, but these are being announced as confirmed by our peer:

    Nothing in routing, BGP neighbor is active, so no routes should be in.

    10.206.238.225 4 65228 0 2309 0 0 0 never Active 0 Odido BGP via

    So far it looks good, but the session is already established:

    >>> tcpdump -i ipsec2 07:23:11.642870 IP 10.206.238.225.bgp > 10.206.238.226.49408: Flags [P.], seq 2440502671:2440502690, ack 2016892785, win 11, options [nop,nop,md5 shared secret not supplied with -M, can't check - 2ed14f304978416f8007afca427f988d], length 19: BGP 07:23:11.642939 IP 10.206.238.226.49408 > 10.206.238.225.bgp: Flags [.], ack 19, win 131, options [nop,nop,md5 shared secret not supplied with -M, can't check - 078b7005ba698e2b636e70eb2c37e234], length 0 >>> USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS ... frr bgpd 76872 22 tcp4 10.206.238.226:49408 10.206.238.225:179 The FRR restart doesn't help: /usr/local/etc/rc.d/frr restart Stopping watchfrr. Waiting for PIDS: 2357. Starting watchfrr. [58970|mgmtd] sending configuration Waiting for children to finish applying config... [59017|zebra] sending configuration [59963|bgpd] sending configuration [61500|staticd] sending configuration [61157|watchfrr] sending configuration [59017|zebra] done [58970|mgmtd] done [61157|watchfrr] done [61500|staticd] done [59963|bgpd] done

    The BGP process ID 59963 is different from 76872!!!

    >>>> ps -ax | grep 76872 76872 - Ss 0:02.09 /usr/local/sbin/bgpd -A 127.0.0.1 -F traditional -d 62041 0 S+ 0:00.00 grep 76872 >>>> sockstat -4 USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS ... frr bgpd 76872 22 tcp4 10.206.238.226:49408 10.206.238.225:179

    After killing the process, restarting the FRR, and checkign for the traffic and routes:

    >>> kill -KILL 76872 >>> ps -ax | grep 76872 21650 0 S+ 0:00.00 grep 76872 >>> /usr/local/etc/rc.d/frr restart Stopping watchfrr. Waiting for PIDS: 88383. Starting watchfrr. [27380|mgmtd] sending configuration [27540|zebra] sending configuration [28677|bgpd] sending configuration Waiting for children to finish applying config... [27380|mgmtd] done [30560|staticd] sending configuration [30405|watchfrr] sending configuration [27540|zebra] done [28677|bgpd] done [30560|staticd] done [30405|watchfrr] done >>> ps -ax | grep bgp 11708 - Ss 0:05.87 /usr/local/sbin/bgpd -A 127.0.0.1 -F traditional -d 31648 0 S+ 0:00.00 grep bgp >>> tcpdump -i ipsec2 07:31:08.709787 IP 10.206.238.225.bgp > 10.206.238.226.26294: Flags [P.], seq 1180140056:1180140117, ack 3799507337, win 11, options [nop,nop,md5 shared secret not supplied with -M, can't check - d6b2c0bac2ebb8cf1058d365224d4c5c], length 61: BGP 07:31:08.709850 IP 10.206.238.226.26294 > 10.206.238.225.bgp: Flags [.], ack 61, win 131, options [nop,nop,md5 shared secret not supplied with -M, can't check - 9dec3ac243f71d5f90e285627b2cd9e5], length 0 >>> show bgp summary Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd PfxSnt Desc 10.206.238.225 4 65228 3 494 5 0 0 00:00:48 4 5 Odido BGP via >>> show bgp ipv4 unicast Network Next Hop Metric LocPrf Weight Path *> 10.204.50.4/32 10.206.238.225 0 65228 ? *> 10.204.50.12/32 10.206.238.225 0 65228 ? *> 10.204.52.4/32 10.206.238.225 0 65228 ? *> 10.206.238.192/27 0.0.0.0 0 32768 ? *> 172.27.0.0/16 10.206.238.225 0 65228 ? >>> netstat -rn ... B>* 10.204.50.4/32 [20/0] via 10.206.238.225, ipsec2, weight 1, 03:42:44 B>* 10.204.50.12/32 [20/0] via 10.206.238.225, ipsec2, weight 1, 03:42:44 B>* 10.204.52.4/32 [20/0] via 10.206.238.225, ipsec2, weight 1, 03:42:44 B>* 172.27.0.0/16 [20/0] via 10.206.238.225, ipsec2, weight 1, 03:42:44

    Did anyone see anything like it? We could've lived with the BGP down and no routes, but it is announcing, and the traffic is being expected on the wrong interface in the destination FW.

    Regards

  • Discussions about the Tailscale package

    86 Topics
    556 Posts
    E

    @brinkmann I personally am not running 2.8.0 yet, but yes.

  • Discussions about WireGuard

    682 Topics
    4k Posts
    S

    My eyes are having a hard time getting beyond 250.0.0.0. Just something about it. I say this as a free thinker that regularly uses 172.20.20.0 or 172.21.21.0

    I'm putting my money on a DNS entry feeding a public IP address instead of an internal IP address, and therefore not trying to send the 25 out the tunnel, and then the ISP knocking down the port 25 traffic.

  • System Patches Package v2.2.20_1 / v2.2.11_17

    Pinned
    12
    12 Votes
    12 Posts
    2k Views
    S

    There are new system patches available (2.2.21), maybe I miss the announcement here...
    https://github.com/pfsense/FreeBSD-ports/commit/8ffb307ed8845ebeeba2d00f258fd51256d0e756

    Yes I do...
    https://forum.netgate.com/post/1214795

  • DNS Broken for pkg.pfsense.org

    Pinned Locked
    3
    0 Votes
    3 Posts
    13k Views
    jimpJ

    https://forum.netgate.com/topic/115789/pkg-pfsense-org-appears-to-be-dead/2

  • Packages wishlist?

    Pinned
    661
    0 Votes
    661 Posts
    2m Views
    O

    PRTG

  • HA proxy with ssl

    2
    0 Votes
    2 Posts
    21 Views
    R

    hi team anyone could advise please?

  • Telegraf on PFsense Error

    7
    0 Votes
    7 Posts
    53 Views
    G

    @pst Cool thank you I will get it updated and see how I do. Fingers crossed.

  • 0 Votes
    29 Posts
    2k Views
    dennypageD

    @johnpoz said:

    but seems to me that is lack of configuration on arpwatch part. Should be able to tell it hey on igb0, that also has igb0.10 and igb0.20 since your too stupid to understand that .10 network is for the .10 network only and not .20 - don't mark networks abc you see on igb0 or any of subs as bogon.

    So does arpwatch allow for this config, but its not exposed in the gui? Where I can tell it - hey if you see networks A,B(vlanX) or C(vlanY) on the parent interface - not to report it as bogon?

    No, Arpwatch does not offer any vlan configuration. Arpwatch itself allows you to say net/cidr (nothing to do with vlans) should be considered local, but it is not exposed in the pfSense package.

    I take it andwatch allows for this - and will be able to configure it, I would think it could be auto figured out to be honest if you tell it to listen on igb0 and igb0.x and igb0.y etc..

    No, ANDwatch does not offer any vlan configuration either. ANDwatch does allow you to specify extensions of the pcap filter, so in theory you could exclude vlan tagged packets if your implementation allowed it, but this would be OS/bpf/pcap build dependent.

    From my pov, best practice is to avoid the whole situation by not mixing tagged and untagged traffic on physical interfaces.

    YMMV.

  • 0 Votes
    7 Posts
    1k Views
    fireodoF

    @jimp

    Hi,

    as far as I know the lcd driver (LCDd) is connected to the display via USB/Serial/Parallel but the lcdproc process is connected to the driver in this way:

    Bind=127.0.0.1 Port=13666

    Extract from pfctl -ss:

    lo0 tcp 127.0.0.1:20639 -> 127.0.0.1:13666 ESTABLISHED:ESTABLISHED lo0 tcp 127.0.0.1:13666 <- 127.0.0.1:20639 ESTABLISHED:ESTABLISHED

    So there could be a possibility to loose connection when states get killed ... IMHO (If I'm wrong please correct)

    EDIT: I cleared all states and this made the lcdproc also to loose connection flooding the syslog. After restarting lcdproc all fine again.

    Regards,
    fireodo

  • Install OpenRTSP on pfSense

    4
    0 Votes
    4 Posts
    200 Views
    johnpozJ

    @heavymetalforever78 pfsense can for sure run on 1gb of ram - and other VMs could run on far less.. I have both a 2.8 vm and a 24.03 vm running on my nas, they only get 1GB each, etc.

    Don't try running some type 2 VM, run something like esxi or proxmox or something on the hardware..

    To be honest if your goal is a NVR - get an actual NVR.. They use very little power, and are not all that expensive. I see some on amazon for like 60 bucks.. You would have to add some HDD.. but how much can a 2 or 4TB disk cost these days?

    Trying to use your "firewall" as your everything box is never a good idea.

  • TFTP Server WAN Interface

    1
    0 Votes
    1 Posts
    77 Views
    No one has replied
  • LCDProc crashes - exceeds max allowed memory size

    1
    0 Votes
    1 Posts
    130 Views
    No one has replied
  • Zabbix 6.4.x required for pfsense 2.8.0-RELEASE

    1
    0 Votes
    1 Posts
    105 Views
    No one has replied
  • 1 Votes
    9 Posts
    2k Views
    F

    Confirmed still an issue as of May 2025 with pfSense CE 2.8.0 and FreeRADIUS package version 0.15.14

    I also updated the Redmine bugtracker: https://redmine.pfsense.org/issues/11054

    Can this security vulnerability please get some attention? Wi-Fi supplicants are able to join an 802.1x WPA2-Enterprise network without the username in the client certificate validated at all.

  • crowdsec

    2
    0 Votes
    2 Posts
    218 Views
    Bob.DigB

    @hescominsoon I don't think so and there is no real need for it on a firewall. Run it on your server(s), if you think, it is worth it.

  • How to update to the latest Telegraf version

    8
    0 Votes
    8 Posts
    1k Views
    R

    @rocket

    Updated May 23-2025

    pfsense 24.11 - Telegraf freebsd-15

    pkg add -f https://pkg.freebsd.org/FreeBSD:15:amd64/latest/All/telegraf-1.34.2.pkg

    pfsense 2.7.2 - Telegraf freebsd-14

    pkg add -f https://pkg.freebsd.org/FreeBSD:14:amd64/latest/All/telegraf-1.34.4.pkg

    https://www.freshports.org/net-mgmt/telegraf/#history

  • Zabbix proxy 7 don't start on pfsense 24.03

    1
    0 Votes
    1 Posts
    121 Views
    No one has replied
  • Package Notes does not exist???

    2
    0 Votes
    2 Posts
    232 Views
    GertjanG

    @DominikHoffmann

    24.03 ? A Beta version ?

  • Zabbix Agent 7

    3
    0 Votes
    3 Posts
    866 Views
    M

    @jwilli5646

    I see it is still the fact (May 2025), any update about Zabbix agent 7?

  • Pfsense Package License

    4
    0 Votes
    4 Posts
    477 Views
    S

    @MarinSNB Not sure, but I would guess you're likely to run into a problem if the Plus router is a newer FreeBSD version. The config sync could be a problem too because there are versions of the config file.

    https://docs.netgate.com/pfsense/en/latest/releases/versions.html

  • Ignore MAC OUI in Arpwatch?

    1
    0 Votes
    1 Posts
    154 Views
    No one has replied
  • Arpwatch - sent wrong arp op 5

    6
    0 Votes
    6 Posts
    442 Views
    dennypageD

    Arpwatch has no way to suppress protocol errors such as this. ANDwatch, a pending package to replace the Arpwatch package, allows suppression by way of pcap filtering.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.