Re: [pfSense] Layer7 container rule halts all traffic

2012-02-03 Thread mayak-cq



 From what I read on this forum many people are complaining that L7
 blocks nothing.
 
 On my system all traffic (not vpn though) are blocked. 
 
 I added an all pass Lan rule (tcp/udp) and selected the container
 under advanced options. The container is set to block torrent traffic.
 The moment I add this rule all is blocked.
 
 Many other posts report this to work so I'm suspecting something wrong
 on my side.
 
 I'm running pf 2.01
 
 It'd be great if I could get this working.

morning all,

i've got the exact same issue --

if LAN rule is applied to all, all traffic blocked. I've applied the
rule to a single LAN test host, and it only is blocked.

can some some suggest how to diagnose this further? no entries in
firewall log for the host's blocked packets.

thanks

m
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] OpenVPN clients affected by upgrade from 1.2 to 2.0?

2012-02-03 Thread Jim Pingle
On 2/3/2012 3:16 AM, Chris Buechler wrote:
 On Fri, Feb 3, 2012 at 2:04 AM, Pete Boyd petes-li...@thegoldenear.org 
 wrote:
 I have pfSense 1.2.3 setup to use its OpenVPN server. I use TinyCA to
 create CA and client certificates and keys on a separate computer,
 giving the CA cert to pfSense and the client certs  keys to users.

 If I upgrade pfSense 1.2.3 to 2.0.1, the OpenVPN will migrate fine, but
 will OpenVPN clients continue to be able to VPN into the pfSense OpenVPN
 server despite them not being in the User Manager, or do I have to
 additionally, manually, create accounts and paste in certs  keys using
 the User Manager?

 
 It'll stay exactly as it is. You won't be able to use the OpenVPN
 Client Export without importing the user keys, but what you already
 have will work just the same.

^ That, with a couple exceptions. There were some bugs in the upgrade
code for OpenVPN that I fixed post-2.0.1

https://github.com/bsdperimeter/pfsense/commit/0d2156e5fa7a6504c7a7ceef24bc51dfe402c6ea
https://github.com/bsdperimeter/pfsense/commit/d87d2f6767707193cde5fab59bf954db51ae430b
https://github.com/bsdperimeter/pfsense/commit/4724f8b8bb6d3495c5c41296e25f64e05b113502
https://github.com/bsdperimeter/pfsense/commit/3ef4cae6048c1763b2666aa991bc2b58683932bf

Most people didn't hit those, but still worth being on the lookout for.

Jim

___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] squid over ipsec dial-in

2012-02-03 Thread Fuchs, Martin
Hi !

I'l have to wait now until Wednesday when our ISP will establish the IPSec 
tunnel and then we'll try further ;-)

Thanks so far,

Martin

-Ursprüngliche Nachricht-
Von: list-boun...@lists.pfsense.org [mailto:list-boun...@lists.pfsense.org] Im 
Auftrag von Jim Pingle
Gesendet: Donnerstag, 2. Februar 2012 17:12
An: pfSense support and discussion
Betreff: Re: [pfSense] squid over ipsec dial-in

On 2/2/2012 10:32 AM, Fuchs, Martin wrote:
 For OpenVPN you mean assign the OpenVPN as a interface under interfaces - 
 assign ?
 Sounds reasonable...

Yep. When it's assigned there you can do NAT (inbound or out) and even listen 
on the interface.

 But how would I do such a port forward inbound ?
 I tried to setup a NAT rule from IPSec to any dst tcp 80 forward to 
 127.0.0.1:3128 but it seemed it did not work (but perhaps I missed sth...) 
 But that would be the right way, correct ?

Sounds about right. I've never tried that so I didn't know if it would work, 
but I suspected it wouldn't given the history of IPsec+NAT.

Jim
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list

___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Dual wan issues

2012-02-03 Thread Ugo Bellavance

On 2012-02-03 11:56, - Dickie Bradford - wrote:


On 1/1/2012 8:11 PM, - Dickie Bradford - wrote:


On 12/28/2011 1:55 AM, bruno.deb...@cyberoso.com wrote:

Le Tue, 27 Dec 2011 22:53:15 -0500,
- Dickie Bradford -dbradf...@never-enuff.net a écrit :


I am currently running dual wans to help with traffic load, I have
sticky connections and allow default gateway switching checked, My
wans are both setup as tier1 in gateway groups and my rules allow
outbound traffic out via that group. This has been working pretty
well except for a hand full of websites that just behave odd, ( 1
off hand: Vonage) when I log in and when I go to check my voicemail
on line, it makes me login again, it seems like it looses its
session. I have made a work around rule the for the few particular
sites i know of, I just send all their traffic out a single gateway
and this works fine and normal, but may get to be a pain if I have to
do it to my other dual wan systems. Is there anything else I could
look for or do to remedy this?

Thnx

Dickie


I did have the same problem. On https sites, authentication randomly
goes away.
As a workaround, I had to force one box as the gateway for https
traffic (which is allmost only for these sites in my case anyway)
Seems sticky connections does not work on https?


Maybe a limitation of the built-in package responsiable for server load 
balancing (relayd).  The haproxy package may be an alternative.


___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Dual wan issues

2012-02-03 Thread Chris Bagnall

On 3/2/12 4:56 pm, - Dickie Bradford - wrote:

Does anyone know why sticky connections do not work on https ?


Is it possible that although the url is the same, the IP address behind 
it fluctuates. As I understand things, the 'sticky connections' option 
is by IP (i.e. layer 3) rather than by url (layer 7).


Kind regards,

Chris
--
This email is made from 100% recycled electrons
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Orange 3G+ USB Dongle

2012-02-03 Thread Mehma Sarja

On 2/3/12 6:56 AM, Seth Mos wrote:
Try this, connect the 3g dongle, then reboot the device and try to 
access it again. I have a ZTE modem that does not release the cdrom 
device until after it is rebooted or I press save on the 3G wan 
interface again. So it doesn't work on cold boot, but it does work 
after a warm reboot.



Since there is mild interest on the list, I share our findings:

UPON CONNECTING the modem, huawei mobile model number EC 122, we see 
this in /var/log/system.log:
feb 3 07:11:02 firewall kernel: da0: HUAWEI SD storage 2.31 removable 
direct access SCSI-2 device
feb 3 07:11:02 firewall kernel: da0: attempt to query device size 
failed: NOT READY, media not present


and we see nothing having to do with usb or huawei in /var/log/system.log

The modem light remains a flashing blue as if it is working. I'll try 
the warm boot, heck even I work well after a warm bath.


I am thinking of going over to Safaricom to tide us over.

Mehma
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


[pfSense] OpenVPN as default gateway

2012-02-03 Thread Richard Connon

Hi, I've got two pfsense machines connected using OpenVPN.
Does anyone know if it's possible to set the client machine to use the 
openvpn tunnel for its default gateway?

___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list