[pfSense] Bandwidth quota on pfsense.

2014-09-18 Thread Muhammad Yousuf Khan
i have been working on Pfsense for few years its a best firewall tool that
i have worked with.
Now i want assign quota to every IP behind the firewall.
let say i have a static quota of 10 GB . now i want to assign 10 GB each
client ip.

for example.

192.168.1.10 = 10GB limit
192.168.1.11 = 10GB limit
192.168.1.12 = 10GB limit
and so on

i see the option Limiter in QOS, it can be use for channeling the
bandwidth but what i want is to limit total download of the month. a user
can not go beyond that limit.

Can anyone please help.

Thanks,
MYK
___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list

Re: [pfSense] Added ntopng.pbi via command line, how do I add to webui?

2014-09-18 Thread Renato Botelho
On Sep 17, 2014, at 20:48, Wade Blackwell wa...@bablam.com wrote:
 
 Good afternoon all,
   I added ntopng to my platform via command line and restarted the 
 webconfigurator. I was expecting to see the package show up under 
 diagnostics, as it did on my other platform that I installed the package via 
 webui package installer, but it doesn't. Is there a way to add that? Searches 
 on this topic have been inconslusive. Thanks, install looked like this;
 
 [2.1.5-RELEASE][r...@firewall.domain.com]/usr/local/pkg(21): pbi_add 
 --no-checksig ntopng-1.1_1-amd64.pbi
 Verifying Checksum...OK
 Extracting to: /usr/pbi/ntopng-amd64
 Adding group: redis
 Adding user: redis
 Installed: ntopng-1.1_1

Web interface components are not distributed inside PBI. You should install it 
using System - Packages menu.

--
Renato Botelho

___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list


[pfSense] CVE-2004-0230

2014-09-18 Thread Martin Fuchs
 Hi !
Does CVE-2004-0230 affect pfSense 2.1.5 ?
 
regards,
Martin
  ___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list

Re: [pfSense] CVE-2004-0230

2014-09-18 Thread Vick Khera
According to 
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc
the workaround is to turn on pf.

Therefore, the answer to your question is technically yes but in
practice no.


On Thu, Sep 18, 2014 at 8:55 AM, Martin Fuchs mar...@fuchs-kiel.de wrote:
  Hi !
 Does CVE-2004-0230 affect pfSense 2.1.5 ?

 regards,
 Martin

 ___
 List mailing list
 List@lists.pfsense.org
 https://lists.pfsense.org/mailman/listinfo/list
___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] CVE-2004-0230

2014-09-18 Thread Martin Fuchs
sounds reasonable ;-)
thanks a lot,
 
martin
 
 Date: Thu, 18 Sep 2014 09:03:16 -0400
 From: vi...@khera.org
 To: list@lists.pfsense.org
 Subject: Re: [pfSense] CVE-2004-0230
 
 According to 
 https://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc
 the workaround is to turn on pf.
 
 Therefore, the answer to your question is technically yes but in
 practice no.
 
 
 On Thu, Sep 18, 2014 at 8:55 AM, Martin Fuchs mar...@fuchs-kiel.de wrote:
   Hi !
  Does CVE-2004-0230 affect pfSense 2.1.5 ?
 
  regards,
  Martin
 
  ___
  List mailing list
  List@lists.pfsense.org
  https://lists.pfsense.org/mailman/listinfo/list
 ___
 List mailing list
 List@lists.pfsense.org
 https://lists.pfsense.org/mailman/listinfo/list
  ___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list

[pfSense] Routing issue

2014-09-18 Thread Nenhum_de_Nos
Hail,

I have a strange issue. I get default route by OSPF. And that is fine. But I, 
then, need not to
have default routes and gateways configured in. So far, so good. Now I need to 
set a route to
another network, no default route then.

I create the gateway, and as I have no other one the WebUI sets it as default:

GW_OI (default) OSPF_1  172.16.1.1  172.16.1.1

no matter how much times I unclick on the default box. When I create it, it is 
not click as well.

Although this shows, my routes won't show that router as default:

netstat -rn -f inet

Routing tables

Internet:
DestinationGatewayFlagsRefs  Use  Netif Expire
default192.168.199.2  UG1 0 1267 em0_vl
127.0.0.1  link#5 UH  0 6723lo0
172.16.1.0/24  link#10U   0  392 em0_vl
172.16.1.2 link#10UHS 00lo0
172.18.1.2 192.168.199.2  UGH100 em0_vl
192.168.1.0/24 link#7 U   0 2409242779ue0
192.168.1.1link#7 UHS 00lo0
192.168.197.0/24   192.168.199.2  UG1 00 em0_vl
192.168.198.0/32   172.16.1.1 UGS 00 em0_vl =
192.168.198.0/24   192.168.199.2  UG1 05 em0_vl
192.168.199.0/24   link#9 U   0   24 em0_vl
192.168.199.3  link#9 UHS 00lo0

My main concern is this be great now, but later then it changes something, as 
in a reboot. This is
a test environment but will soon get in production.

Anyone have seen this ? Is it really harmless ?

thanks,

matheus


-- 
We will call you Cygnus,
The God of balance you shall be

A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

http://en.wikipedia.org/wiki/Posting_style
___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] CVE-2004-0230

2014-09-18 Thread Jim Pingle
On 9/18/2014 8:55 AM, Martin Fuchs wrote:
 Does CVE-2004-0230 affect pfSense 2.1.5 ?

As Vick mentions, practically the answer is 'no'.

There are some rare cases when it might, however. It would require:

1. Disabled pf (System  Advanced, Firewall/NAT tab, check Disable all
packet filtering)
1a. Or the default rules were replaced by interface and floating rules
in every direction set to 'no state'

2. The firewall is still reachable by the attacker

3. Connections are being made _to_ pfSense (not _through_ pfSense), e.g.
local services such as the GUI, packages such as haproxy or squid, etc,
*NOT* WAN-to-LAN or LAN-to-DMZ type connections.

If all of the above are true then it may be susceptible to the attack
described in the FreeBSD SA.

I don't think I have ever witnessed a setup that met all of those
criteria, and even those that could meet the criteria wouldn't
necessarily have long-lived connections for which such a TCP session
reset would have any meaningful impact.

We will have the fix in 2.2 but I'm not sure if there will be another
2.1.x release at this time, but we'll see what happens.

Jim
___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] CVE-2004-0230

2014-09-18 Thread Jim Thompson
Maybe a blog post about this?

-- Jim

 On Sep 18, 2014, at 10:01, Jim Pingle li...@pingle.org wrote:
 
 On 9/18/2014 8:55 AM, Martin Fuchs wrote:
 Does CVE-2004-0230 affect pfSense 2.1.5 ?
 
 As Vick mentions, practically the answer is 'no'.
 
 There are some rare cases when it might, however. It would require:
 
 1. Disabled pf (System  Advanced, Firewall/NAT tab, check Disable all
 packet filtering)
 1a. Or the default rules were replaced by interface and floating rules
 in every direction set to 'no state'
 
 2. The firewall is still reachable by the attacker
 
 3. Connections are being made _to_ pfSense (not _through_ pfSense), e.g.
 local services such as the GUI, packages such as haproxy or squid, etc,
 *NOT* WAN-to-LAN or LAN-to-DMZ type connections.
 
 If all of the above are true then it may be susceptible to the attack
 described in the FreeBSD SA.
 
 I don't think I have ever witnessed a setup that met all of those
 criteria, and even those that could meet the criteria wouldn't
 necessarily have long-lived connections for which such a TCP session
 reset would have any meaningful impact.
 
 We will have the fix in 2.2 but I'm not sure if there will be another
 2.1.x release at this time, but we'll see what happens.
 
 Jim
 ___
 List mailing list
 List@lists.pfsense.org
 https://lists.pfsense.org/mailman/listinfo/list
___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list


[pfSense] VIP,MAC Arp

2014-09-18 Thread Nick Upson
Hi

I'll try to make this as short as possible without leaving important
information

I've been running a pfsense 1.2 box for several years, all is fine. I now
need to have an additional WAN connection which will be made up of 3 adsl
lines bonded by a firebrick. From the POV of the pfsense its just a very
good adsl connection.

We have a new /27 range to go with this new installation and here is the
problem, external ping/connectivity to the new IPs doesn't work except one
the .225 address, it seems the firebrick requires ARP in order to route
them. I have setup several different Virtual IPs (tried different types,
individually and as a range) and they don't work, the firebrick ARP table
only contains the .255 with a MAC address, the rest don't have one and so
are not used (I'm told).

How can I configure the VIP's so that they will all have a pseudo-MAC and
hence work.



Nick Upson, Telensa Ltd, Senior Operations Network Engineer
direct +44 (0) 1799 533252, support hotline +44 (0) 1799 399200
___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list

Re: [pfSense] VIP,MAC Arp

2014-09-18 Thread Chris Bagnall

On 18/9/14 8:13 pm, Nick Upson wrote:

We have a new /27 range to go with this new installation and here is the
problem, external ping/connectivity to the new IPs doesn't work except one
the .225 address, it seems the firebrick requires ARP in order to route
them. I have setup several different Virtual IPs (tried different types,
individually and as a range) and they don't work, the firebrick ARP table
only contains the .255 with a MAC address, the rest don't have one and so
are not used (I'm told).


In my experience (and one of our clients had a similar setup a couple of 
years back before they got FTTC), you want a Proxy ARP entry on your 
pfSense VIP page for the whole IP range, so assuming the subnet you've 
been given is a.b.c.224/27, just create a corresponding VIP rule.


Here's one of mine for a much smaller range:
a.b.c.176/29ADSL2   proxy arp

(note the choice of interface - make sure you choose the interface to 
which you've connected the Firebrick)


As an idle curiosity - is this an AAISP connection you're using? If so, 
their IRC channel is usually populated with some pretty clueful folks, 
some of whom run pfSense, so it might also be worth asking on there.


Kind regards,

Chris
--
This email is made from 100% recycled electrons
___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list