Activity
From 05/01/2010 to 05/30/2010
05/30/2010
-
11:53 PM Revision 09637075: Simplify code that handles link specific data fields like local ip, gateway, and bandwidth.
-
10:56 PM Bug #626: System reboot does not disconnect ssh sessions
- That does not happen for me on Windows, OS X, BSD nor Linux. If you find something that is specifically wrong that is...
-
07:38 PM Bug #626: System reboot does not disconnect ssh sessions
- if i upgrade via the console at the end the system reboots and the ssh session will not be closed or terminated
my s... -
07:24 PM Bug #626 (Rejected): System reboot does not disconnect ssh sessions
- No idea what you're talking about, this isn't true. If you reboot in the GUI your SSH session gets:
*** FINAL Syste... -
07:10 PM Bug #626 (Resolved): System reboot does not disconnect ssh sessions
- if you were logged in via ssh and the system reboots, the connection will not be reseted by the ssh server like a nor...
-
07:11 PM Feature #625: Firmware Upgrade via Console
- Seeing as you supply the URL, and it is not done automatically, the user is assumed to know what they are downloading...
-
07:08 PM Feature #625 (Needs Patch): Firmware Upgrade via Console
- It will be nice if you can see the Current-Version and the Version of the Upgrade in the Console.
At the moment you ... -
07:01 PM Bug #516: Auto update doesn't work on embedded
- Not quite, the case of embedded is a bit more complex than that. It has nothing to do with that other ticket.
-
06:56 PM Bug #516: Auto update doesn't work on embedded
- similar ticket #457
the general problem of upgrading a nanobsd pfsense installation
i think it can be fixed after #... -
07:01 PM Bug #457 (Resolved): Upgrade failed, "Something went wrong when trying to update the fstab entry".
- Everything in that last backup looked normal. There are errors when I expect to see them (failsafe checks) and no err...
-
06:53 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- have a look on ticket #516
if this is fixed, next one will be #516 -
01:22 PM pfSense Packages Bug #618 (Resolved): TinyDNS depends on wrong versions of FreeBSD packages
-
01:16 PM pfSense Packages Bug #618: TinyDNS depends on wrong versions of FreeBSD packages
- I can confirm that the issue is now solved.
Thank you very much! -
02:43 AM Feature #624 (Needs Patch): Add more native way to connect on WAN via DHCP+PPTP/L2TP
- In some countries the connection to ISP works like this: A computer(pfsense in this case) takes an IP from the modem ...
05/29/2010
-
08:29 PM Feature #623 (Resolved): Status and Log icons which work like the Help icon
- Come up with icons for Status and Log, and a means by which they can be added to the page in the area near the Help "...
- 07:17 PM Revision 309b3a20: Remove typo
- 07:17 PM Revision 5d4f96c6: Refactor code
- 07:17 PM Revision 6bd7a614: Only allow installer.php on non pfSense and nanobsd platforms
-
05:48 PM Bug #374: "Register DHCP leases in DNS forwarder" doesn't work
- Any updates to this problem yet? Do we know why Ermal's solution is not working as expected?
-
02:30 PM Revision 6c05cfb0: Delete the interface_ppp_configure function and change how PPP data is saved.
- PPP data entered in interfaces.php was clobbering data that didn't have associated
fields in this page. Fixed now. Al... -
11:36 AM Revision 6c538d04: Clean up javascript even more, so unnecessary loops don't get executed.
-
04:13 AM Revision 7005d843: Merge branch 'master' of http://gitweb.pfsense.org/pfsense/mainline into mlppp
- Conflicts:
usr/local/www/interfaces.php -
03:55 AM Revision 93ee6323: little html tag change.
-
03:51 AM Revision fda60849: Merge branch 'master' of rcs.pfsense.org:pfsense/mainline
-
03:49 AM Revision 3a13f094: Fix up whitespace so file is easier to read, and fix a few missing tags.
-
03:11 AM Revision 68f0c07a: Merge branch 'master' of http://gitweb.pfsense.org/pfsense/mainline into mlppp
- Conflicts:
etc/inc/pfsense-utils.inc
usr/local/www/interfaces.php - 02:44 AM Revision 12fa7ea1: more text fixes
- 02:43 AM Revision 88e4881b: fix text
- 01:31 AM Revision 40e18a72: Revert "add a status tab to the CP screens as well", this is just a tad too long
- This reverts commit 881eb09217613337da4dd5376a038446a0e18b1c.
- 01:26 AM Revision 881eb092: add a status tab to the CP screens as well
- 01:12 AM Revision 943d4ad2: add auth logs tab to CP screens
05/28/2010
-
11:08 PM Bug #429 (Resolved): Upgrade failed from console disk full!
-
11:04 PM Bug #538 (Resolved): Installer is broken with recent RELENG_8 snapshot
- fixed
-
11:03 PM Bug #131 (Resolved): "Static route filtering" doesn't add rules for routes on WAN
- fixed
-
10:55 PM Bug #449 (Resolved): OpenVPN died when PPPOE link came up with a different IP.
- fixed
-
10:53 PM Bug #494 (Resolved): Additional DHCP options lost on input errors
- fixed
-
10:51 PM Bug #566 (Resolved): captive portal IP bypass issues
- this works now
-
10:49 PM Bug #562 (Resolved): Pass-through MAC bandwidth limits not working
- fixed
-
10:47 PM Bug #581 (Resolved): rate's promiscuous mode changes can cause connectivity issues
- fixed
-
10:45 PM Bug #602 (Resolved): restore using GUI doesnt work
- works
-
10:44 PM Bug #608 (Resolved): Captive Portal voucher concurrent login feature not working
- works
-
10:40 PM Revision fe383a26: Use REQUEST to hanle both POST/GET.
-
09:36 PM Bug #609 (Resolved): Captive Portal voucher information not being backed up
- looks good
-
09:30 PM Revision 5b87b24e: Make the logout page configurable like the other pages. The only difference is that this page/code will be treated as a .php page so it may contain internal php CP variables referenced.
-
09:01 PM Revision d462a851: Provide an error message to the call.
-
08:17 PM Revision 72b9e452: Some configurations want to be able to ask users about replacing their existing mac during auto mac passthrough logins if they change equipment. Allow this in the backend by requiring the user to need posting a replacemacpassthru field with the post. Also add the possibility to send back with a portal_reply_page generated page the username and password posted.
-
08:13 PM Revision 23e95c1a: Don't let someone add a custom PSK that conflicts with an existing username. While here, style formfields appropriately.
-
08:13 PM Revision 66a72c9f: Show user keys on PSK list, edit link reroutes to user edit page.
-
08:13 PM Revision 4ed2dde7: Add per-user PSKs to racoon.
-
08:13 PM Revision ddd1fb7f: Add IPsec PSK field to User Manager. No backend code to use this value yet.
-
07:44 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- upgrade
from pfSense-2.0-BETA1-4g-20100526-0339-nanobsd-upgrade.img.gz
to pfSense-2.0-BETA1-4g-20100528-0707-nanob... -
07:28 PM Revision 1b026311: Remove part of the message displayed some people might find its completely ok to use it.
-
07:16 PM Revision 1c291e64: Add the username to the auto added mac passthrough entry. Add an option to services->captiveportal page to activate/deactivate the auto-saving of username with the auto added mac passthrough.
-
06:59 PM Revision 9a31a1ce: Make sure to cleanup /tmp before using it. Solves config cache issue as a start.
-
06:56 PM Revision 8ca2c9ab: Remove stale code.
-
06:38 PM Revision fac13a5e: Add a function to find the mac address on a passthrough mac entry by username(if present) in the <username> tag of the entry.
-
06:35 PM Revision 4fc68c5a: Do comparions as meant not assignment. Pointy-hat: Myself
-
06:29 PM Bug #319: system_usermanager privilege not working as expected
- Then would it be possible to make it so that non-admin users with system_usermanager can grant only limited rights, s...
-
05:25 PM pfSense Packages Bug #618 (Feedback): TinyDNS depends on wrong versions of FreeBSD packages
- Applied in changeset commit:"5a5bd6a0fb414560c1e6b3e38e532c64fd00ec1b".
-
05:21 PM pfSense Packages Bug #618: TinyDNS depends on wrong versions of FreeBSD packages
- Committed, thanks!
-
01:45 PM pfSense Packages Bug #618: TinyDNS depends on wrong versions of FreeBSD packages
- patch:
@$diff pkg_config.8.xml.ORIG pkg_config.8.xml@... -
05:08 PM Bug #622 (Resolved): Static default gateway overridden by DHCP on WAN
- When you have a gateway marked as the default under System > Routing, but have a DHCP configured WAN, WAN's gateway i...
-
03:50 PM Bug #621 (Resolved): Certificate Manager won't accept a windows CA signed certificate
- When creating a new certificate request, the following message comes up:...
-
03:46 PM Revision d6366dd7: Really fix javascript . . .
-
03:23 PM Revision 041b35cc: Fix missing case statement for L2TP.
-
03:10 PM Revision 39f750b5: Add client l2tp support. Not complete yet.
-
03:05 PM Revision 114990f4: Fixed problems in javascript and added L2TP support to GUI.
-
01:15 AM Revision ebef8175: Fix javascript error.
-
01:00 AM Revision 8d657558: Clean up code in interfaces_ppps_edit.php and in javascript.
05/27/2010
-
07:33 PM Feature #620: No privilege choice to allow access to Dashboard
- I have now tried adding all the privileges that seem remotely related to the sections that aren't working on the Dash...
-
06:38 PM Feature #620: No privilege choice to allow access to Dashboard
- Ah, I see. Not quite intuitive, but that solved part of the problem. Now the issue is to display the dashboard correc...
-
06:03 PM Feature #620: No privilege choice to allow access to Dashboard
- That page identifies itself as "System: Login / Logout page" - not 100% sure why it can't be Dashboard, Index, or "Ma...
-
05:54 PM Feature #620 (Resolved): No privilege choice to allow access to Dashboard
- *+Scenario+*
You want a group of users (or a single one for that matter) to be able to log into pfSense and just h... -
06:49 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- today upgraded to
pfSense-2.0-BETA1-4g-20100526-0339-nanobsd-upgrade.img.gz
waiting for next 4G image to send th...
05/26/2010
-
08:47 PM Revision 2c9a4ed1: Compress RRD backup data. Results are dramatic.
-
08:47 PM Revision a2fb9e48: Default to NOT backup RRD data. It can get quite large, and should be chosen deliberately by the user.
- 05:15 PM Revision 505371be: Few cosmetic adjustments on classes to fix table borders
-
03:59 PM Revision 59d73709: Add nanobsd size to system info widget after platform.
-
02:21 PM Revision 6fdfa8fb: Update upgrade_config to remove 'defaultgw' from <ppp> config sections
-
02:17 PM Revision 82effddb: Remove all "defaultgw" settings from PPPs config page.
- Just use existing defaultgw configuration settings from System:Gateways settings.
-
02:07 PM Revision 0661b194: Fix many things related to PPP connections.
- Fixed tab array numbering in interfaces_* files. Enabled multilink over PPtP connections.
Fixed handling of bandwidth... -
12:33 PM Bug #480: Monitor IP config upgrade doesn't work
- Can confirm the problem.
05/25/2010
-
10:58 PM Revision e3a78007: Actually send the wan ip address as calledstationid as advertised on captiveportal configuration page. The same fix was previously done to radius authentication code.
-
10:24 PM Revision d1eea523: On gre/gif case when the interface is saved do a reconfigure of the underlying interface itself. This helps when an interface is enabled/disabled as reported on http://forum.pfsense.org/index.php/topic,25329.0.html.
-
09:35 PM Revision d76f45b1: Show friendly interface name.
-
09:30 PM Revision 1fd35e95: Do not show ipfw0 for assignment.
-
08:35 PM Revision 63276ecd: Correctly teardown states for down gateways.
-
07:03 PM Revision 89e52df8: Add a default setting to location type of wireless that leaves the setting at its default for the interface.
-
06:52 PM Revision 1cf76394: pfSense_get_interface_stats no longer gives the up/down status of the interface, so use pfSense_get_interface_addresses instead.
-
06:16 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- None of those files you used will have the code I checked in today. You need to wait for snapshots dated after the 25th.
-
06:12 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- Jochen Becker wrote:
> /conf/*log* data from upgrade nanobsd 4G from-20100515-0038 to 20100523-1142
>
> upgrade... -
06:10 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- /conf/*log* data from upgrade nanobsd 4G from-20100515-0038 to 20100523-1142
upgrade via console with upgrade pe... -
03:07 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- You'll have to wait for the snapshot builder to crank one out. It moves at its own special pace :-)
The log files ... -
02:39 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- okay, I will try, can you upload an upgrade SnapShot (Size 4G) and i will try it
which files do you need? -
11:37 AM Bug #457 (Feedback): Upgrade failed, "Something went wrong when trying to update the fstab entry".
- I found what was messing up the upgrade logs. I fixed it, but it won't really show until you upgrade from that new sn...
-
05:56 PM Bug #617 (Resolved): Installer stops at "waiting for backend"
-
05:50 PM Bug #617: Installer stops at "waiting for backend"
- Fixed in pfSense-2.0-BETA1-20100525-0647.
Recommend *close. -
05:38 PM Bug #617: Installer stops at "waiting for backend"
- Seeing the same thing. Also grabbed the same snapshot...
-
05:39 PM Revision b99544e8: Fix caps/grammar.
-
05:20 PM pfSense Packages Bug #619 (Resolved): TinyDNS tries to update itself on boot
- I had a 2010-04-21 03:15 snapshot with a working TinyDNS.
On May 6th, I rebooted the system.
During reboot, TinyD... -
05:11 PM pfSense Packages Bug #618 (Resolved): TinyDNS depends on wrong versions of FreeBSD packages
- Tiny-DNS worked fine for me on 21-april, but was broken on 6-may.
(pfSense snapshots originally as of 15-april and... -
04:50 PM Bug #281: Traffic initiated by PPTP clients not passed
- http://svn.freebsd.org/changeset/base/208553
This should fix this issues. Hopefully will be MFC'd before release o... -
04:45 PM pfSense Packages Bug #537 (Feedback): Recent RELENG_8 STABLE version breaks AutoConfigBackup pkg
- This seems to have been resolved!
-
04:43 PM Bug #608 (Feedback): Captive Portal voucher concurrent login feature not working
-
04:22 PM Revision 9b1a8d98: Ticket #444. Use noatime even here.
-
04:19 PM Revision f2033fc7: Ticket #444. Use noatime even here.
-
03:27 PM Revision 2cd85631: Remove logs from temp config backup so they aren't clobbered when restored.
-
03:27 PM Revision 78d7e759: Standardize upgrade log filenames
-
03:27 PM Revision ce09186c: Backup all of /conf including subdirectories during upgrade instead of just files in /conf/
-
03:22 PM Revision cffe41cb: Do not run netstat but use pfSense_get_interface_stats to gather interface statistics. This speedups a lot on nanobsd which needed some time to generate the statistics especially with dashboard
-
11:53 AM Bug #612 (Resolved): Member count of empty groups is inaccurate
- This works correctly for me now. Thanks!
-
10:45 AM Bug #444 (Feedback): All mounts should be noatime
- No it should comply to this.
-
10:02 AM Bug #566 (Feedback): captive portal IP bypass issues
- I think you/they need to retry again.
There was an include missing in captiveportal.inc regarding the loading of ipf... -
09:54 AM Bug #616 (Feedback): proxy ARP stops responding
- This seems to have come from the same problem as before.
The choparp port present in pfPorts was something too old. ... -
06:10 AM Bug #434: xmlparse.inc should not call die
- Ermal Luçi wrote:
> An exception handler will not do any good here since its a fatal error.
Ermal, please read my... -
05:57 AM Bug #434: xmlparse.inc should not call die
- An exception handler will not do any good here since its a fatal error.
All the package code needs to be patched to ...
05/24/2010
-
11:43 PM Revision 814992f7: Use url_redirection even on successful login case if present. Add a redir functionality to portal_reply_page to keep the code centralized.
-
11:01 PM Revision f49c1b00: Actually use the previous configured mac/ip, if present, for finding rules to be deleted.
-
10:58 PM Revision d5c56d72: When editing a mac/ip passthru entry readd the rules again since values might have changed.
-
10:54 PM Revision 0eb9b1b4: Actually use the radius WISPr(4) attribute 'url_redirection' when present.
-
10:18 PM Revision 27588018: Actually match the description and send the wan interface ip as Called-Station-Id on default settings.
-
10:12 PM Revision 9628bd1c: Actually use the radius WISPr(4) attribute 'url_redirection' if present.
-
08:43 PM Revision e588bd54: Insulate some variables as they are used.
-
06:57 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- The logs are stored in /conf/ and the partition is read/write when the logs are written, and I don't see that it gets...
-
06:41 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- Where does the log files will be written?
Both Partitions /dev/ufs/pfsense1 on / and /dev/ufs/cf on /cf are read on... -
05:17 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- The errors were meaningless. They were just for logging purposes, some fdisk commands were being run on other slices ...
-
03:29 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- I'll see if I can find out what might be causing those errors, but none of them appear to be fatal.
-
06:10 PM Revision 70d6b5c4: Ticket #612. Correctly show the number of users as 0 on a group with no users. Also handle the case of empty arrays on the xmlparser.
-
05:49 PM Revision 0914b6bb: Use mwexec where it does not make sense to use popen for something that does not take any parameters. Create a function to actually remove a user from its groups when the user itself is deleted.
-
05:30 PM Revision 042fa85c: Fix VIP list generation here also.
-
05:26 PM Revision 08a5d2eb: Properly generate a list of proxy arp VIPs for address drop-down list.
-
04:57 PM Revision f37caa93: Add to the System->Advanced an option to disable the redirect from port 80 when on https.
-
04:38 PM Revision cd12fce3: Let these files stay since they were brought back (for now).
-
04:33 PM Bug #617 (Feedback): Installer stops at "waiting for backend"
- Patch committed, jim-p tested, OK
-
03:04 PM Bug #617 (Resolved): Installer stops at "waiting for backend"
- On a snapshot from today (pfSense-2.0-BETA1-20100524-0526.iso), the installer stops at "waiting for backend" when inv...
-
03:25 PM Bug #434: xmlparse.inc should not call die
- Looks like the cleanup_backupcache() case is handled properly after all. If I manually corrupt a backup, it is detect...
-
02:10 PM Bug #616 (Resolved): proxy ARP stops responding
- Several users have reported flakiness that appears to be choparp randomly stops responding to some/many ARP requests.
-
12:15 PM Bug #612 (Feedback): Member count of empty groups is inaccurate
05/23/2010
- 11:35 PM Revision 58fdcb9c: Adding initial version of pc-sysinstaller GUI frontend which so far supports Quick/Easy install
- 08:12 PM Revision b713d790: Use hw.physmem when other methods fail
- 08:44 AM Revision 14cf5bf4: Do not copy verbose
- 08:07 AM Revision 514026a5: Reboot after install
- 07:45 AM Revision 07c47ddc: Do not run command in chroot
- 07:30 AM Revision e5ca8dfe: cd to / before running after_installation_routines.sh
- 07:05 AM Revision cb8b81c7: Make sure script it a+rx
- 06:54 AM Revision 18fd8c21: Copy to same target
- 06:42 AM Revision e427428a: Sort by ,
- 06:26 AM Revision abfcf13a: Move to INSTALLMEDIUM
- 06:12 AM Revision e4cce28b: Handle cpdup mode
- 05:43 AM Revision 99e0bc97: oops, make variable
- 05:38 AM Revision b44a76e7: Move cpdup to LiveCD INSTALLTYPE
- 05:09 AM Revision f9996791: Adding cpdup packageType
- 04:58 AM Revision 8b3a495b: Make installer unionfs
- 04:46 AM Revision 89e47a07: Add missing then
- 04:44 AM Revision efce1588: Add newline
- 04:40 AM Revision 0d1ee87f: Adding pfSense UFS example
- 04:34 AM Revision 58a8852c: Run /usr/local/bin/after_installation_routines.sh after installation
- 04:28 AM Revision b552874a: Correct example
- 04:27 AM Revision 8f8e4434: Reduce to two disks
- 04:25 AM Revision a9401cec: Adding pfSense example
- 04:11 AM Revision e3ccf050: cpdup correctly
- 04:03 AM Revision 3d99ee74: Customize for both PC-BSD and pfSense
- 03:57 AM Revision 996b3504: Adding cpdup option
- 03:18 AM Revision e5cd6d89: Do not include altq/shaper twice
- 03:04 AM Revision 2e98ba40: Removing desktop specific items
- 03:02 AM Revision 26e50f43: Adding changes file describing changes made so that installer works with pfSense in hopes of getting changes made upstream to accomidate both. Change test-live.sh to detect /dev/iso9660/pfSense
- 12:43 AM Revision ff161129: Adding pc-sysinstall so that I can start experimenting with a php based installer. This is necssary because PCBSD must live in the root of the disk and there is no way to include it in a unionfs. By default it will not be copied to a new hard disk installation.
- 12:36 AM Revision 4e920317: Do not reinclude filter.inc
05/22/2010
- 08:48 PM Revision 329b7707: Remove unionfs /, will have to come up with a new plan
- 08:30 PM Revision 0fd81918: Use unionfs for /
- 08:26 PM Revision 22af75a3: Add missing ;
- 07:32 PM Revision 055abc57: Add (C)ontinue option for the impatient
- 07:01 PM Revision cdf97b13: Generate a MFS partition for / since ZFS likes to mount its disk on /
- 06:19 PM Revision a57d6170: Ensure config.cache does not exist so the subsequent requests can cleanly reload the configuration. Ticket #601
- 05:50 PM Revision f76d5242: Move machine arch over a bit to the right
- 05:47 PM Revision 807c2e7a: Oops, include /etc/
- 05:47 PM Revision 2b0c49e3: We now have a restore command, note this
-
02:47 PM Bug #388 (Feedback): Setup GEOM Mirror with BSD Installer errors out
-
02:27 PM Bug #388: Setup GEOM Mirror with BSD Installer errors out
- This appears to work ok with the custom install method but the quick and easy install should be able to detect and us...
-
02:08 PM Bug #538 (Feedback): Installer is broken with recent RELENG_8 snapshot
- Tested a recent image and this is now OK.
- 03:09 AM Revision 3bc77cd3: Do not allow nonstop redirects to self
- 02:55 AM Revision 979f35f3: Check if file is tgz
- 02:38 AM Revision eb2c4175: We accept PHP pages now, note this
- 02:20 AM Revision 38080cc1: Move get_include_contents function to pfsense-utils.inc
- 02:18 AM Revision 7a7e94a7: Allow php code to be included in the primary captive portal page. Add new ORIGINAL_PORTAL_IP post item which will be experimenting with a master mutli voucher setup.
- 01:38 AM Revision 851f4184: Remove stray done
- 01:17 AM Revision 40a60696: Adding enablesshd pfSsh.php script
- 12:06 AM Revision 8022e257: Do not fsck /cf on each bootup
05/21/2010
- 11:54 PM Revision 842878b5: Unbreak nanobsd since Ticket #444
- 11:07 PM Revision ce8efd06: Unbreak nano since ticket #444
-
08:54 PM Revision cb88138a: Ups remove erroneous curly.
-
08:50 PM Revision 61d54be6: Actually return to previous function code for lookup_gateway_ip_by_name() to not create recursive loops. There is still the question of how dynamic interfaces should be handled here?
-
08:45 PM Revision 962625aa: Revert "Use a global array for the most part of using the return_gateways_array() function in the backend which should lower the memory allocated/cached by php a lot."
- This reverts commit e51cf5960f6718a14c07daa7b6e96337fdba1f0e.
-
07:44 PM Revision e51cf596: Use a global array for the most part of using the return_gateways_array() function in the backend which should lower the memory allocated/cached by php a lot.
-
06:45 PM Bug #614: Users in groups with ssh access are not actually given shell/ssh access
- For tunnels, it could probably even be a shell that just says something like "Press any key when you want to log out ...
-
03:04 PM Bug #614: Users in groups with ssh access are not actually given shell/ssh access
- Yeah that could get hairy, especially since any shell user can read the raw config which (necessarily) contains some ...
-
02:48 PM Bug #614: Users in groups with ssh access are not actually given shell/ssh access
- Related to this, we also need to look at how shell access in general should be handled for non-root users. The consol...
-
02:23 PM Bug #614 (Resolved): Users in groups with ssh access are not actually given shell/ssh access
- When you add a new user and make it a member of the any group that has ssh privileges, it does not get shell access. ...
-
06:13 PM Bug #615 (Closed): View current page for the portal page contents does not work
- works fine, it's always worked this way.
-
06:05 PM Bug #615 (Closed): View current page for the portal page contents does not work
- Results in the browser navigating to http://$IP:8000/
Clicking on the View current page for the error upload resul... -
05:45 PM Revision de792e62: Fix whitespace while I'm here.
-
05:31 PM Revision 6d1af0e9: Preserve DHCP numbered options when there is an input error. Fixes #494
- 04:42 PM Revision dc4f649e: Make Firewall Optimization Options text readable
-
02:58 PM Bug #548 (Resolved): Inconsistent DHCP behavior when renumbering LAN
- Looks like a good fix to me, and going this route, we don't imply that the user has to open a new window/tab or navig...
-
02:54 PM Bug #611: Firmware upgrade error: "There has been an error verifying the signature on this image."
- Hi Jim, Thanks for the response. I should have mentioned. I already have "Allow to update the system with auto-upda...
-
02:28 PM Bug #611 (Rejected): Firmware upgrade error: "There has been an error verifying the signature on this image."
-
02:28 PM Bug #611: Firmware upgrade error: "There has been an error verifying the signature on this image."
- The snapshots are not signed.
Go to the Updater Settings tab and check the box to ignore the image signing. -
02:14 PM Bug #611 (Rejected): Firmware upgrade error: "There has been an error verifying the signature on this image."
- Whenever I attempt to upgrade the firmware I get the below error.
"There has been an error verifying the signature... -
02:23 PM Bug #613 (Resolved): New users are not added/counted in All Users group
- The "all users" group is only showing a count of 1 when there are 4 users on the system. Looking in the config, there...
-
02:20 PM Bug #612 (Resolved): Member count of empty groups is inaccurate
- If you add a new group and give it no members, the group list shows that the member count is 1 and not 0 as expected....
-
01:50 PM Bug #494 (Feedback): Additional DHCP options lost on input errors
- Applied in changeset commit:"6d1af0e9d8e4398f71a572bb1cf2b4174ac5503b".
-
12:29 PM Revision 61630681: Remove unecessary check.
-
10:10 AM Bug #608: Captive Portal voucher concurrent login feature not working
- This is working as it should on my tests
Probably being more specific helps. - 04:23 AM Revision c099a987: Add space between the and forum
-
04:18 AM Bug #459 (Closed): ip2long (and possibly others) return bogus values on 64 bit
-
04:08 AM Bug #459: ip2long (and possibly others) return bogus values on 64 bit
- Thanks again, I've verified it is now working on my 64-bit system.
- 04:05 AM Revision d7f742c2: Do not process items in which we cannot resolve the config file
-
03:41 AM Bug #88: TXCSUM forced on at boot which breaks wireless bridging
- It might not be affected by this when the bridge has the IP address and the members have no IP addresses. That is my...
-
12:14 AM Bug #88 (New): TXCSUM forced on at boot which breaks wireless bridging
- Now appears to be an issue in 8.1 with some bridging scenarios and vr NICs. Probably need the same fix from 1_2 applied.
- 02:16 AM Revision 1f06d217: Revise text
- 02:15 AM Revision 6cf2e475: pipe to more
- 02:14 AM Revision ea546e49: Minor fixes
-
12:34 AM Revision d9e2c171: Merge branch 'master' of http://gitweb.pfsense.org/pfsense/mainline into mlppp
- Conflicts:
usr/local/www/interfaces.php
Not sure why there was a conflict since the last change to this file ...
05/20/2010
- 11:59 PM Revision 02bdb544: Use echo
- 11:55 PM Revision 7ec0aeb1: Adding restore script for rc.create_full_backup. First argument is the restore filename
-
11:09 PM Revision 30ade846: Fixing whitespace so this file is more readable. And comment out extra html tags at the end of the file.
- This file was in bad shape wrt tab spaces lining up. It should be more readable now.
- 10:16 PM Revision c0ed686f: Do not allow duplicate Roll #'s
-
10:02 PM Feature #605: Upgrade to new package versions should be controlled by GUI
- You can open a new ticket that is specific to TinyDNS and its reinstallation problems but please do not update this t...
-
09:55 PM Feature #605: Upgrade to new package versions should be controlled by GUI
- See however http://forum.pfsense.org/index.php/topic,24912.msg131122.html#msg131122
-
09:12 PM Feature #605: Upgrade to new package versions should be controlled by GUI
- OK, I will hope for some comments on
http://forum.pfsense.org/index.php/topic,24912.0.html
and
http://redmine.pfse... -
08:56 PM Feature #605 (Rejected): Upgrade to new package versions should be controlled by GUI
- Packages are updated from System > Packages on the installed packages tab. It shows there if a new version is availab...
-
08:12 PM Feature #605: Upgrade to new package versions should be controlled by GUI
- Fair enough, sorry for the noise ))-:
However, when are packages then updated?
I.e. if there is a security update... -
07:59 PM Feature #605: Upgrade to new package versions should be controlled by GUI
- That is a problem specific to that one package, not a general problem with the system as a whole.
-
07:58 PM Feature #605: Upgrade to new package versions should be controlled by GUI
- Well, I might be mistaken here, but my experience is this:
- I have installed TinyDNS; and it worked like a charm.
... -
07:53 PM Feature #605: Upgrade to new package versions should be controlled by GUI
- Packages are not automatically upgraded at all. They may be installed at boot if the config is present but the files ...
-
07:43 PM Feature #605 (Rejected): Upgrade to new package versions should be controlled by GUI
- Currently, as far as I can tell, pfSense checks for upgrades to packages at boot time, and automatically installs any...
-
09:47 PM Feature #603: Add proxy support for internal HTTP functions
- Curl on the CLI has proxy command line arguments, and the PHP module can use curl_setopt() to use proxy options. Look...
-
09:33 PM Feature #603: Add proxy support for internal HTTP functions
- We use curl or xmlrpc for important stuff so those need to have proxy support too.
-
03:56 AM Feature #603: Add proxy support for internal HTTP functions
- Every function that makes a remote HTTP/HTTPS call (file_get_contents, fopen, etc) can take a context parameter with ...
-
03:46 AM Feature #603 (Resolved): Add proxy support for internal HTTP functions
- In some environments it's difficult to pull packages, auto update, etc. because you need to hit a proxy for outbound ...
-
09:36 PM Revision 79f9b9bc: Fixes #610. Do not use the value of mtu blindly test it is set or use 1500 as default.
-
09:24 PM Bug #609 (Feedback): Captive Portal voucher information not being backed up
-
08:59 PM Bug #609 (Resolved): Captive Portal voucher information not being backed up
- When you backup the Captive Portal configuration area via Backup/Restore the Voucher configuration should be included...
- 09:24 PM Revision fdb085fa: Add captive portal voucher configuration backup area option Ticket #609
-
09:04 PM Bug #610 (Resolved): max-mss -39
- I don't know how the following is getting into rules.debug:
"scrub in on $WAN all max-mss -39 fragment reassemble"... -
05:40 PM Bug #610 (Feedback): max-mss -39
- Applied in changeset commit:"79f9b9bcdd6f684ff3fc629047609579ed0f1da4".
-
08:59 PM Bug #608 (Resolved): Captive Portal voucher concurrent login feature not working
- When using the Captive Portal vouchers in addition to the disable concurrent login feature the Captive Portal allows ...
-
08:42 PM Bug #607 (Rejected): Creating a 2nd or 3rd voucher roll on captive portal does not download correctly
- Pilot error.
-
08:37 PM Bug #607 (Rejected): Creating a 2nd or 3rd voucher roll on captive portal does not download correctly
- When creating the 2nd or 3rd+ voucher clicking the blue download icon will result in the 1st roll being downloaded on...
-
07:45 PM Feature #606 (Rejected): Alert administrator on new pfSense versions or package versions
- I would suggest a possibility to have pfSense send an email to a pre-configured address whenever a new pfSense versio...
-
07:38 PM Revision 02611466: Do not aritificially add spaces around values on CDATA fields. Tested-by: Jim
- 07:36 PM Revision fa90d701: Add note about required enabled WPA option for 802.1x
-
05:40 PM Feature #604: Need to show interrupts per second for interfaces
- RRD graphs? We do have system wide interrupt time, but not per interface. Any particular use for this? I can imagine ...
-
02:47 PM Feature #604 (Needs Patch): Need to show interrupts per second for interfaces
- Need to show interrupts per second for interfaces on Status -> Interfaces screen for each interface
-
05:10 PM Bug #459: ip2long (and possibly others) return bogus values on 64 bit
- Thanks Erik, I'll test once it is in the nightly build.
-
05:07 PM Bug #459 (Feedback): ip2long (and possibly others) return bogus values on 64 bit
- I've made changes throughout the code to various things that used ip2long and long2ip that should fix it. I only cha...
-
05:00 AM Bug #459: ip2long (and possibly others) return bogus values on 64 bit
- I've also seen places where subnet masks are negated with the bitwise not operator. In these places, we may also nee...
-
04:54 AM Bug #459: ip2long (and possibly others) return bogus values on 64 bit
- The issue on 64-bit is likely that all the high 32 bits are set from sign extension because it considers it negative,...
-
04:55 PM Revision 96033063: Various fixes to usage of ip2long, long2ip, and negated subnet masks, mostly affecting 64-bit. Ticket #459
-
04:04 AM Bug #565 (Resolved): Deleting pass-through MAC doesn't apply changes
- fixed
-
02:12 AM Bug #444: All mounts should be noatime
- The issue Henrik was seeing was just from having multiple partitions and them not getting fscked properly at boot tim...
-
02:09 AM Bug #444 (New): All mounts should be noatime
-
01:24 AM Bug #444 (Feedback): All mounts should be noatime
- Thanks for the patch!
- 01:32 AM Revision 986a3acc: block carp traffic to hosts self to avoid loops. fixes #598
-
01:22 AM Revision 9978e156: Fix HTML tags in interfaces.php and delete extra javascript function in ppps_edit.js
- 01:19 AM Revision 69490b55: Handle mounting of extra filesystems correctly. Ticket #444
- 01:08 AM Revision c4995e62: move mount up for cases where /usr and other partitions may be separate, and needed for other things to function
-
12:48 AM Bug #434: xmlparse.inc should not call die
- The function cleanup_backupcache() is also adversely affected by the die() calls in xmlparse.inc. It tries to detect ...
- 12:27 AM Revision a23a6db3: get rid of flowtable
05/19/2010
-
11:42 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- this update works, but i have many mistakes about the partitiontable
see update.log file as attachment
on my 1.2.... -
10:56 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- Automatic update has never, ever, worked on NanoBSD. It will be worked on eventually though.
Use one of the snapsh... -
10:40 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- Update URL ?
i flashed the CF card with "pfSense-2.0-BETA1-4g-20100515-0038-nanobsd.img.gz" and want to update fro... -
10:03 PM Revision 091cb5e9: Add a global declaration.
-
09:35 PM Bug #598 (Feedback): Need to block carp traffic to hosts self to avoid loops
- Applied in changeset commit:"986a3accd40a7d45c0a3d48d2b42d2c58a231d99".
-
08:16 PM Revision cd25a2b2: Refactor this function a little so it will also rebuild the cache if it does not already exist. Fixes missing config history after reboot on NanoBSD.
-
07:19 PM Revision eef52225: Use the PHP call here instead of a shell exec.
-
07:12 PM Revision cf9a4467: Fix post-restore reboot on NanoBSD. Fixes #602
-
07:11 PM Bug #602: restore using GUI doesnt work
- It looks like it's a problem with running /etc/rc.reboot from within the GUI on NanoBSD.
It should be fixed now. -
03:15 PM Bug #602 (Feedback): restore using GUI doesnt work
- Applied in changeset commit:"cf9a4467e5c0a421aeed171b1b134a20ce2004a5".
-
04:31 PM Bug #459: ip2long (and possibly others) return bogus values on 64 bit
- Sure, let me test tonight more thoroughly and I'll submit tomorrow.
-
04:30 PM Bug #459: ip2long (and possibly others) return bogus values on 64 bit
- It would probably be better to make our own ip2long function that does it right, and then change all our calls to use...
-
04:28 PM Bug #459: ip2long (and possibly others) return bogus values on 64 bit
- Can you provide us a patch that wraps all ip2long calls with unpack?? We can get that committed. Probably will not...
-
01:41 PM Bug #459: ip2long (and possibly others) return bogus values on 64 bit
- From what I've read it this is not considered a bug from PHP's perspective since it is documented "Because PHP's inte...
-
04:06 PM Feature #96 (New): Add "All local networks" to source and destination drop down boxen in firewall rules
- This isn't the same as the other ticket.
The other ticket is a list of IPs directly assigned to the router itself ... -
03:56 PM Feature #96 (Closed): Add "All local networks" to source and destination drop down boxen in firewall rules
- Duplicate/Solved with http://redmine.pfsense.org/issues/597
-
03:49 PM Feature #591 (Closed): Add disc(4) interfaces to the GUI
- This can already be done by other means.
-
01:44 PM Revision 71fdaecd: Include filter.inc for the ipfw load function.
-
01:25 PM Feature #520: ALIX reset button
- I tested this and made a small fix to it also last night. It works fine. Just hold in the reset button while the syst...
-
01:12 PM Feature #520 (Feedback): ALIX reset button
- Scott merged the factory reset feature the same as m0n0wall yesterday.
-
01:09 PM pfSense Packages Bug #253 (Feedback): Package - Fit123
-
01:06 PM Feature #256 (Feedback): LoadBalance from the pfSense Box itself.
- This can be done from floating rules.
Some more improvements will be merged soon too for this. -
09:55 AM Bug #567 (Resolved): Firewall's hostname gets multiple hosts entries
- Recreated the hosts file after configuring interfaces so that it is created properly. Verified this fixes 567
-
08:39 AM Bug #567: Firewall's hostname gets multiple hosts entries
- On a snapshot from 2010-05-16 it only writes the localhost entry.
Seen on multiple upgraded installs.... -
09:52 AM Revision 4994b350: Re-create the hosts file on bootup after configuring all the interfaces. Ticket #567
-
04:52 AM Revision 7f039071: Move this up in the boot sequence, the reset button check relies on its existence.
- 01:16 AM Revision 1a2911a7: Use nanobsd
- 01:06 AM Revision 223ef06a: Use !=
05/18/2010
-
11:10 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- I just updated a 2GB image from the GUI and the CLI and both worked, though I did check some fixes in for the "consol...
-
09:19 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- NanoBSD Firmware upgrade in progress...
File list:
Warning: file_get_contents(/conf/file_upgrade_log.txt): fail... -
08:56 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- system alix board 4GB kingston flashcard
-
08:52 PM Bug #457: Upgrade failed, "Something went wrong when trying to update the fstab entry".
- same problem with fresh image 14.05.2010 by upgrading try to 18.05.2010 via webinterface
(sytemlog) php: : New ale... - 10:08 PM Revision d16af75d: Nuke nonsense
- 10:03 PM Revision 31c9379c: Add back needed functions
- 09:59 PM Revision fa83737d: Only check g['platform'] for nanobsd
- 09:58 PM Revision 7188fc6d: Add missing functions and move check earlier since this only checks on bootup
- 09:31 PM Revision 2c7d67ff: Add system_identify_specific_platform()
- 09:27 PM Revision 15f14889: Add reset button support to alix/wrap. Obtained-from: m0n0wall
-
08:13 PM Bug #320: Using special characters (e.g. åäö) in certificate "Descriptive name" breaks entire WebGUI
- This should be fixed now.
All characters will be encoded/decoded properly and they will be shown properly too in the... -
08:03 PM Revision 2e6a43a1: Encode/decode special characters with htmlentities/html_entity_decode combo to make the parser not bail on special characters.
-
07:31 PM Revision e490f995: Do not bail out when we write a new config. Seems that we can write some special characters but might not be able to read them back but we still should be able to recover from this. Include globals.inc before calling any config.lib.inc functions.
-
07:22 PM Revision 873b2f0c: Fix NanoBSD update detection for console update by URL
-
06:04 PM Revision 7382c59d: Do not duplicate gateway entries when status file is not present. Mostly an innocuos programmer error.
-
05:36 PM Revision 01207fd8: Fixes #536. More fixes and optimizations on the various functions and status pages used for gateways [groups].
-
05:36 PM Revision fe22a89b: Fixes #536. More fixes and optimizations on the various functions used for gateways [groups].
-
05:36 PM Revision d9dda2a5: Fixes #536. Actually add all available gateways to the gateway_groups array so all up members will be present for balancing.
-
04:54 PM Revision 4e6593de: Unbreak automatic updates.
-
04:51 PM Revision c1191d5b: Add myself to copyright for gwlb file.
-
04:47 PM Bug #536: apinger at times fails to touch filter_dirty
- Perry,
try latest snapshots i have identified the issue should work correctly now. -
01:40 PM Bug #536: apinger at times fails to touch filter_dirty
- Applied in changeset commit:"d9dda2a5718709341852fed8b3328cfa2fd48198".
-
01:40 PM Bug #536: apinger at times fails to touch filter_dirty
- Applied in changeset commit:"fe22a89b4e8014b1160edb3c9d176312ea3df6b2".
-
01:40 PM Bug #536: apinger at times fails to touch filter_dirty
- Applied in changeset commit:"01207fd8487803b40559c62cac65ffbebf5bfcab".
-
01:30 PM Bug #536: apinger at times fails to touch filter_dirty
- No change for me on a day old snapshot. Had a longer fallout on wan2.
After the connection came back I could tracero... -
03:40 PM Revision c2b2b571: PPPoE config upgrade code and bump config version in globals.inc
-
03:06 PM Revision 9db6993f: Fix deletion of authentication servers. Fixes #600.
-
11:15 AM Bug #600 (Resolved): Unable to delete authentication servers
- Applied in changeset commit:"9db6993f9ad8de7add4d8b042583c56014cef853".
-
09:52 AM Revision 2666de59: Merge branch 'master' of http://gitweb.pfsense.org/pfsense/mainline into mlppp
-
09:38 AM Revision e40e6724: Modify and fix code to set pppoe periodic reset.
-
05:30 AM Bug #602 (Resolved): restore using GUI doesnt work
- restoring config using webgui crashes the webgui and pfsense wont reboot also leaving in a desperate situation on the...
05/17/2010
-
11:26 PM Bug #429: Upgrade failed from console disk full!
- It seems you probably did already at least get past the part where the image was too large to upload, so this is prob...
-
07:08 PM Bug #429: Upgrade failed from console disk full!
- That is a full image, not an upgrade image. You need, for example, pfSense-2.0-BETA1-1g-20100517-0921-nanobsd-upgrade...
-
07:02 PM Bug #429: Upgrade failed from console disk full!
- Erik Fonnesbeck wrote:
> Do you mean that the uncompressed size is around 1 GB or that you used the image for the 1 ... -
06:58 PM Bug #429: Upgrade failed from console disk full!
- Do you mean that the uncompressed size is around 1 GB or that you used the image for the 1 GB NanoBSD platform? The ...
-
05:54 PM Bug #429: Upgrade failed from console disk full!
- Jim P wrote:
> That last message seems to indicate you were trying to load a 2G update onto a CF originally written ... -
02:22 PM Bug #429: Upgrade failed from console disk full!
- That last message seems to indicate you were trying to load a 2G update onto a CF originally written with a 1G image.
-
01:53 PM Bug #429: Upgrade failed from console disk full!
- I've tested from web interface and the error is this I've tested from snapshot 03-05-2010 and from snapshot 12-05-201...
-
11:21 PM Bug #586 (Resolved): Linked filter rule editing problems
- My fix seems to have done the job. Besides the tests I performed before committing, users on the forum have also rep...
-
10:52 PM Bug #571 (Resolved): Destination on rdr incorrect on interface addresses
-
10:49 PM Bug #316 (Resolved): Serial console on full installs drops to shell
- I haven't seen this issue again so far. Currently the console menu will show on both consoles after bootup finishes ...
-
10:12 PM Bug #493 (Resolved): Checkboxes saved outside of setup wizard do not show checked in wizard
- It seems to be fixed now. I tried enabling/disabling it on either page and both now show the correct enabled or disa...
-
12:29 PM Bug #493 (Feedback): Checkboxes saved outside of setup wizard do not show checked in wizard
-
09:48 PM Bug #568: firewall rules advanced clean up
- Is it not easier to just tag all set fields in the css class as being an unhidden type? That means far less code. the...
- 09:18 PM Revision 98be58a2: Tag for beta 2
-
08:40 PM Bug #482: OpenVPN config upgrade problems
- After some tests, it seems the vpnid field of an OpenVPN connection is what is used to create its device name. That v...
-
04:30 PM Bug #482: OpenVPN config upgrade problems
- I found some problems in the upgrading/handling of the "disable" option for OpenVPN clients/servers. They should prop...
-
08:11 PM Revision bd7ca506: Revert "Allow the user to override OpenVPN interface name in custom options (e.g. dev tap99 or dev tun99) and set related options appropriately. ticket #482 Item 2a/2b." - Revert for now, may cause more issues than it fixes.
- This reverts commit be58c36ded298a1cb7a0eac40cd2edd62908d882.
-
07:55 PM Revision be58c36d: Allow the user to override OpenVPN interface name in custom options (e.g. dev tap99 or dev tun99) and set related options appropriately. ticket #482 Item 2a/2b.
-
07:03 PM Bug #601 (Resolved): VHID changes do not apply immediately on secondary
- When changing the VHID on the primary, it's applied immediately on the primary and synced to the secondary so its con...
-
06:03 PM Bug #108 (Resolved): Xauth is forced for IPsec mobile clients
- what we went through here appears to be fine now, can open more specific tickets if there are any outstanding issues ...
-
01:56 PM Bug #108: Xauth is forced for IPsec mobile clients
- It appears to work as intended, tunnels establish OK with the new setup. However, ipsec-tools 0.8 does not have worki...
-
04:36 PM Bug #449 (Feedback): OpenVPN died when PPPOE link came up with a different IP.
- I found that the OpenVPN client page was not properly testing/setting the disable variable, and it was also not being...
-
04:19 PM Revision b65f56f6: Fix copypasta error. Part of ticket #449.
-
04:14 PM Revision 763a1b52: Fix OpenVPN upgrade code to properly handle the disable option. Fixes item 1a (and probably 1b) in #482 and should be the rest of the fix for #449.
-
03:54 PM Revision 8319ee63: Fix OpenVPN client disable variable. It is being set/tested improperly (or at least inconsistently). Partial fix for #449.
-
02:20 PM Revision 373a1e7b: Ticket #493. Set a value for checkboxes since the parsers marks empty tags(<tag/>) as arrays.
-
01:57 PM Bug #600 (Resolved): Unable to delete authentication servers
- If you add two RADIUS servers then try to delete them, at first it appears that one deleted, but in fact neither of t...
-
12:37 PM Bug #541 (Feedback): Missing binaries on 64 bit
- A note for the adventerous, uploading a amd64 tgz to a i386 1.2 or 2.0 pfSense box does complete, but does not reboot...
-
12:28 PM Bug #566: captive portal IP bypass issues
- In their case, it didn't work immediately after boot. Is it possible that the boot-time initialization is not working...
-
10:07 AM Bug #566: captive portal IP bypass issues
- There is no place in code that this can happen unless something is clearing the tables(manually?)!
On the code pat... -
11:56 AM Revision 79f30c1c: Do not throw the error message unnecerssarily. It is legal on 2.0 to not specify default gw on 2.0 with pppoe/pptp links specified.
-
09:43 AM Bug #344: Multiple P2s causes instability
- This is most likely related to ipsec-tool 0.8. I've confirmed this issue with ipsec-tools 0.8 on 1.2.3-RC candidates....
-
09:41 AM Bug #408 (Resolved): Static routes are not converted properly on upgrade
- Code works as intended. All the static routes worked after upgrade from 1.2 to 2.0.
Snapshot 2010-05-16 -
09:38 AM Bug #295 (Resolved): UID error in User Manager/SSH password sync with Web Admin User
- I recently committed code for alternate usernames in ticket #574 for alternate usernames on upgrades. That also produ...
-
09:35 AM Bug #354 (Resolved): RRD upgrade code problems
-
09:33 AM Bug #409 (Closed): Quality RRD graphs on embedded not working
- Duplicate of ticket #536
-
09:23 AM Revision b61154fb: Reduce the amount of logic in system_routing_configure to check for existing routes. This code is in the same style as used
- by Ermal. Ticket #507
-
09:19 AM Bug #507 (Resolved): system_routing_configure should not delete and re-add all routes
- Confirmed fixed in snapshot 2010-05-16. Also reduced logic to be in line with existing code.
-
09:08 AM Bug #486 (Resolved): Rules with gateway selected not upgraded properly
- Confirmed Fixed in snapshot 2010-05-16
05/14/2010
-
09:42 PM Revision bcbcc2f8: Use client-side values in the function call rather than PHP-generated values for further calls to this client-side function.
-
09:20 PM Bug #566 (New): captive portal IP bypass issues
- It looks like there are still some issues here. A support customer called and their bypass IP was not working. It was...
-
09:20 PM Bug #493 (New): Checkboxes saved outside of setup wizard do not show checked in wizard
-
09:17 PM Bug #493: Checkboxes saved outside of setup wizard do not show checked in wizard
- This is still an issue with latest code.
-
02:26 PM Bug #493 (Feedback): Checkboxes saved outside of setup wizard do not show checked in wizard
- Patched.
-
08:23 PM Bug #455: On initial wizard reload button do not put browser on new assigned ip.
- Somehow it needs to figure out which interface it was accessed on to redirect to the correct address from the configu...
-
04:51 PM Bug #455: On initial wizard reload button do not put browser on new assigned ip.
- after hitting reload at the last page in the wizard in 1.2.3, it redirects to the changed IP if you're accessing it u...
-
02:34 PM Bug #455: On initial wizard reload button do not put browser on new assigned ip.
- This will not be possible because the new ip is not yet setup in the interface and it need to be added special code t...
-
08:12 PM Bug #561: Destination address for upgraded port forward is incorrect
- I think the case of having picked an address from the list was the one case that was already handled correctly; thoug...
-
12:16 PM Bug #561: Destination address for upgraded port forward is incorrect
- On my upgraded work config I have about ~20 port forwards in total, but all of those use a carp address and did not c...
-
04:55 PM Bug #598 (New): Need to block carp traffic to hosts self to avoid loops
- That's not the case, I think because of the state that sending the traffic creates (maybe). Otherwise VMware's loopin...
-
12:21 PM Bug #598 (Resolved): Need to block carp traffic to hosts self to avoid loops
- The antispoof directive we already have on each interface should already prevent such looping, or any traffic from en...
-
01:59 AM Bug #598 (Resolved): Need to block carp traffic to hosts self to avoid loops
- block in log quick proto carp from (self) to any
Without this change if the firewall sees traffic for itself (ethe... -
04:42 PM Bug #526 (Resolved): bug in /etc/rc.php_ini_setup
-
04:08 PM Bug #526: bug in /etc/rc.php_ini_setup
- works here.
beastie# /bin/cat /var/run/dmesg.boot | /usr/bin/awk '/avail memory/ { memory=($4 / 1048576); printf("... -
01:12 PM Bug #526 (Feedback): bug in /etc/rc.php_ini_setup
- Changed the used awk function to use the byte value and calculate from there.
Alternatively. Provide the strong fr... -
04:21 PM Revision ba374e4b: Ticket #493. Ticket #302. Actually correct code flow to be correct and consistent to what it should do.
-
03:46 PM Bug #409 (Feedback): Quality RRD graphs on embedded not working
- Should be ok as now apinger runs as root.
-
02:47 PM Revision 07b54e8c: Do not unconditionaly remove the default route and readd it. This should make system_routing_configure more
- reliably. Ticket #507
stability -
02:44 PM Bug #536 (Feedback): apinger at times fails to touch filter_dirty
- This seem to work ok with Chris workaround.
@Perry,
try latest snapshots it should be ok. -
02:25 PM Bug #302 (Feedback): Shaper wizard remembers values on error, but are disabled
- Patched.
-
02:24 PM Bug #464 (Feedback): Problems with setup wizard
- This should be feedback.
-
01:06 PM Revision 839cad07: Improve the parsing of the memory value, use the reported amount of bytes, divide to get megabytes and get the 1st result. Ticket #526
-
12:23 PM Feature #597: add (self) to available source and destination drop down boxes
- The antispoof rules should make this unnecessary for normal rules, but this may still be useful for rules on the Floa...
-
01:57 AM Feature #597 (Resolved): add (self) to available source and destination drop down boxes
- Add (self) option to drop down.
-
12:05 PM Bug #574 (Resolved): Config upgrade for non-default admin username broken
- Verified that this change correctly sets the shell for the administrator user.
-
12:05 PM Bug #465 (Resolved): Description input validation too strict
- stripping the < character before comparison works here. Confirmed that it still triggers on <
-
12:02 PM Revision 08825acc: Allow the use of ">" in filter rule descriptions. Even whilst stripping the > before the comparison htmlentities
- will still trigger on the <. It is safe to assume here that creating any sort of html tag is unlikely. Ticket #465
-
11:54 AM Revision ee23ccab: Ticket #295. Use empty to prevent some ghost entries in some configurations.
-
09:59 AM Bug #295 (Feedback): UID error in User Manager/SSH password sync with Web Admin User
-
09:53 AM Feature #591: Add disc(4) interfaces to the GUI
- As discussed further this can even be done through aliases or through black hole routes so no neccessary to include d...
-
09:29 AM pfSense Packages Bug #594 (Feedback): freeradius: default port should be 1812 and not 1892
- Patched.
-
02:14 AM Bug #599 (Resolved): interfaces.php should split MTU and MSS clamping into 2 options
- In certain situations it is ideal to adjust the mss clamping but leave the interfaces mtu intact. Need to separate t...
- 12:58 AM Revision c1263bbd: fix typo
05/13/2010
-
11:36 PM Revision 96372523: fix seperation between href and class
-
11:29 PM Bug #429: Upgrade failed from console disk full!
- Yeah, 76% of 81 MB is about 61.5 MB and the new snapshots are smaller than that, so it might work at least on a syste...
-
09:29 PM Bug #429 (Feedback): Upgrade failed from console disk full!
- Can you please test with latest snapshots which have debugging removed?
-
09:43 PM pfSense Packages Todo #596 (Closed): Varnish package suggestions for VCL syntax checking
- I work in a web shop design company and we use varnish as a reverse proxy for mostly sites builded using Drupal, Code...
-
09:31 PM Todo #595 (Closed): Test IPsec with NAT
- Ermal said that after looking at some code paths, IPsec may work with NAT now on 2.0, but needs some testing.
-
09:18 PM Bug #131 (Feedback): "Static route filtering" doesn't add rules for routes on WAN
- This is not the case anymore in 2.0.
It will add the bypass for each interface a static route is there and you can c... -
09:17 PM Revision 5337fe2e: Simplify/optimize code.
-
09:05 PM Todo #515 (Feedback): Test sloppy state tracking
- This seems to work and the flags option can be controlled through the GUI now.
-
08:39 PM Revision e774e3b3: Its bits/sec now.
-
08:36 PM Revision 6894b25a: Add PSK tab to all IPsec pages, it was missing from some.
-
07:46 PM Revision fb586a16: Add a GUI field to let the user configure the maxium table entries size. Resolves #588
- NOTE: Actual tables, not states.
-
07:35 PM Bug #581 (Feedback): rate's promiscuous mode changes can cause connectivity issues
- Patched to not go promiscious and other fixes.
The port needs to be rebuilt on the builder though. -
07:32 PM Revision ef021ff7: Use full path to rate and pass -b option to show the speeds in bits/s rather than byte/s in conformance with the traffic graph metric which is bits/s.
-
06:56 PM Revision f83fa942: Test correctly for previous existing entries of linked rules otherwise some bad deletions might happen. Reported-by: http://forum.pfsense.org/index.php/topic,25091.0.html
-
06:52 PM Bug #548 (Feedback): Inconsistent DHCP behavior when renumbering LAN
-
06:51 PM Revision 2b001b5d: Ticket #548. Change message displayed when modifying an interface to actually tell people to modify dhcp server setting after applying settings since the interface configuration/ip will only change after applying settings and pfSense does not read the interface address from the config but from the interface itself and the complications for this and possibly other cases are not worth the effort.
-
06:42 PM pfSense Packages Bug #592: SquidGuard package problem with Squid 2.7.8_2
- Version squidGuard and pfSense exists? (Probably pfSense 2.x)
-
06:30 PM pfSense Packages Bug #594 (Resolved): freeradius: default port should be 1812 and not 1892
- The default port number in in the settings page when not entering anything yourself is set to 1892.
However, the d... -
06:24 PM Todo #544 (Feedback): Restore locking
- It seems the w+ mode was the culprit creating this.
Also moved the lock/unlock to support read/write locking schema ... -
06:23 PM Revision b6c34bfc: Ticket #544. Restore locking, seems w+ migh already lock the file sometimes. While there improve the locking to a read/write locking schema. Make the default locking a read only lock and if explicitly specified a write locking can be specified through LOCK_EX optional parameter to lock(). During config manipulation do the filesystem mounting in rw, if needed, before doing any locking to avoid possible problems and also to be consistent through out the code on the method used. Also update calls to config to lock exclusively where required.
-
06:03 PM Bug #337 (Feedback): sticky connections do not work
- I tried this and it works as expected.
For Port forwarding possibly it needs to be handled properly in backend sin... -
05:59 PM Bug #354: RRD upgrade code problems
- Verified that system, traffic, packets and quality graphs have been succesfully upgraded and historic data has not be...
-
05:08 PM Bug #574 (Feedback): Config upgrade for non-default admin username broken
- Changed the pw usermod for the administrator account from /bin/sh to /etc/rc.initial. This should fix the wrong shell...
-
05:03 PM Revision 883b2552: Correct the shell for the admin account, this should be /etc/rc.initial. Not /bin/sh
-
03:50 PM Todo #588 (Resolved): Add table entries size setting like state table size
- Applied in changeset commit:"fb586a1633ba53584dab6208a64f96798be4869d".
-
03:41 PM Revision 99b9708b: Fix static route for DNS from DHCP servers.
-
12:58 PM Feature #593: Preserve interface assignments based on last MAC address (possibly optionally)
- If I even implement this myself, I do not intend to do it anytime soon (which is why I set no target version). My in...
-
08:03 AM Feature #593: Preserve interface assignments based on last MAC address (possibly optionally)
- Please do not do such thing since you will break pfSense in big blows.
VLANs share the same mac and so do the clones... -
01:04 AM Feature #593: Preserve interface assignments based on last MAC address (possibly optionally)
- One thing to watch out for if this is implemented is that the MAC address can probably only be reliably determined at...
-
01:00 AM Feature #593 (Closed): Preserve interface assignments based on last MAC address (possibly optionally)
- Some have requested to have the ability to automatically detect when the name of an interface has changed, based on t...
-
11:46 AM Revision fe19e7d7: Using binat for reflection rules created some NAT issues under certain circumstances. Use rdr with the bitmask address pool type instead.
05/12/2010
-
10:16 PM Revision 4d52a9b9: Tag all config write cases with the username.
-
10:10 PM Bug #574: Config upgrade for non-default admin username broken
- The line already said /bin/sh, but if that part wasn't working before, then it wouldn't have changed it. It is proba...
-
08:56 PM Bug #574 (New): Config upgrade for non-default admin username broken
- This is now giving admin a shell of /bin/sh when it should be /etc/rc.initial
-
09:05 PM pfSense Packages Bug #592 (Closed): SquidGuard package problem with Squid 2.7.8_2
- During SquidGuard installation, it looks like it's installing the 2.7.7 squid cache, which is conflicting with 2.7.8....
-
07:12 PM Feature #591 (Closed): Add disc(4) interfaces to the GUI
- Requested by Scott to have this feature request for....
-
07:07 PM Revision 362b8147: Include username of person making the change in config change description, and in the config itself.
-
06:47 PM Feature #590 (Closed): Allow a detailed description on interfaces page
- It would be nice to have a textarea on interfaces page to allow a through and detailed description of the interface.
... -
06:30 PM Revision 3f2ef8d7: Fixing bugs and ommissions.
-
06:30 PM Revision 98c3eaa8: Ensure the URL table file is not empty at this step.
-
04:12 PM pfSense Packages Bug #577 (Resolved): Squid Guard package install information incorrect
- Closing per e-mail from dvserg:
> Hello
>
> Please close this ticket
> http://redmine.pfsense.org/issues/577
... -
04:12 PM pfSense Packages Bug #589 (Closed): Squid cache_dir and aufs error
- Cannot start squid due to squid[19587]: Bungled squid.conf line 28: cache_dir aufs /var/squid/cache 3000 16 256
-
01:02 PM Bug #354 (Feedback): RRD upgrade code problems
-
12:19 PM Bug #354: RRD upgrade code problems
- I just made a replica of my entire work infrastructure in ESX with both the internal carp and the external carp clust...
-
12:57 PM Revision c9ba2835: Move RRD quality databases to reflect the gateway name instead of the interface name. This should prevent a flurry of duplicate but
- unused RRD files on 2.0 where we use the gateway names for the RRD file. Fix ticket #354
-
12:27 PM Revision 37df6d7b: Merge branch 'master' of http://gitweb.pfsense.org/pfsense/mainline into mlppp
- Conflicts:
etc/inc/upgrade_config.inc -
12:02 PM Revision e256e9d4: Change the exec() calls to mwexec, this supresses the rrdtool messages during boot if the rrd files have a newer timestamp then the attempt to update
-
11:38 AM Revision 04d36b1f: Small changes to fix up these pages a little bit.
-
11:36 AM Revision d85ba87f: Make changes to interfaces.php to be compatible with new PPPoE, PPtP code and config style.
- Now this page will write the config info the same was that the interfaces_ppps_configure.php
writes the config info. -
03:53 AM Revision 00b702cc: Bandwidth, MTU, MRU settings working.
-
02:14 AM Bug #586 (Feedback): Linked filter rule editing problems
-
02:09 AM Revision 1122a892: Fix source input validation, saving, and the "View the NAT rule" link on linked filter rules. Ticket #586
-
12:21 AM Revision 3e3582a9: It wasn't clear enough why source port should usually be any. Make it more clear.
- 12:14 AM Revision 24fb2263: fix up text
05/11/2010
- 10:00 PM Revision aeccfd0e: remove duplicate cancel button
-
08:35 PM Bug #267: Old package .inc files can prevent system from booting properly
- Alternately, sometime before here in the boot process it could force a reinstall of packages if it sees /conf/needs_p...
-
08:27 PM Bug #267 (Feedback): Old package .inc files can prevent system from booting properly
- This should be fixed with the commit I just made. Post upgrade we should have /conf/needs_package_sync and we can jus...
-
08:26 PM Revision c57a3ac8: Don't load the package include files if the packages are out of sync, which can lead to the system not booting properly. Should help with ticket #267.
- 06:07 PM Revision 53b18623: Hard code mode to redirect and comment out the mode option. Suggested-by: BillM
- 06:03 PM Revision 4d1e2971: Nuke Relay Protocols and Relay actions tabs. Suggested-by: BillM
- 06:01 PM Revision 10d3ff84: Revert "Nuke XXX TODO option. Suggested-by: BillM"
- This reverts commit 207148139ec648b8955c81ae908d0bdb7c472cda.
- 05:58 PM Revision 20714813: Nuke XXX TODO option. Suggested-by: BillM
- 05:13 PM Revision 9b08f477: Add machine to banner notice
-
03:29 PM Todo #588 (Resolved): Add table entries size setting like state table size
- Ifa lot of data is loaded into a persist table, they can exhaust pf's default table entry limits easily.
On 2.0 it... -
03:17 PM Bug #53 (Resolved): Some packages with RC scripts start twice at bootup
-
03:17 PM Bug #53: Some packages with RC scripts start twice at bootup
- I've done all I can think of to do in the base system for this, the rest is up to package maintainers.
If a packa... -
03:05 PM Revision 1f0f301c: Make /var/run/booting exist for more of the actual booting process. Ticket #53.
-
03:05 PM Revision 24d5fc0a: Fix booting checks. Part of ticket #53.
-
03:01 PM Bug #491 (Resolved): Dynamic DNS upgrade code not working
- Seth Mos wrote:
> The config upgrade code worked a bit too well, it produced empty dyndns config items on upgrades w... -
03:00 PM Bug #491: Dynamic DNS upgrade code not working
- The config upgrade code worked a bit too well, it produced empty dyndns config items on upgrades when none existed be...
-
02:53 PM Revision 246aceaa: Prevent empry dyndns array items on config upgrade ticket #491
-
02:09 PM Todo #506: Bring back unequal route-to balancing
- Fair enough, since the original method wasn't really "official" anyhow. We may just want to make a note of this in th...
-
02:07 PM Todo #506 (Resolved): Bring back unequal route-to balancing
- Better not go down the upgrade route for the weight. A lot of users have multiple loadbalancer pools, which means we ...
-
01:58 PM Bug #574 (Resolved): Config upgrade for non-default admin username broken
-
11:14 AM Bug #574 (Feedback): Config upgrade for non-default admin username broken
- Fixed the local user account sync, this had the admin user account hardcoded. It also attempted to perform a usermod ...
-
01:50 PM Revision 57de741a: Bump the config version properly so that the theme is properly upgraded. Ticket #233
-
09:08 AM Revision 5adb44fb: Fix creation of admin user account with uid of 0. This fixes ticket #574
-
08:41 AM Revision 0810c115: Fix up final bits of PPPoE Periodic reset and disable setting of bandwidths for mlppp links for now.
-
06:50 AM Revision 1852fef0: Unbreak the switch statement, pointy hat to me
-
02:06 AM Bug #548: Inconsistent DHCP behavior when renumbering LAN
- I apologize, I am seeing this exact error message on a new install without having changed the LAN subnet and noticed ...
-
01:51 AM Bug #548: Inconsistent DHCP behavior when renumbering LAN
- No, I am seeing this on 32-bit. And it is not an IP calculation issue, the DHCP page retains the old subnet when it s...
-
01:44 AM Bug #548: Inconsistent DHCP behavior when renumbering LAN
- Looks to be related to Bug #459, where ip2long returns an unsigned int on 64 bit.
05/10/2010
-
10:23 PM Bug #583 (Feedback): pppoe period reset doesnt work
- Might be better on new snapshots but needs tested.
-
10:20 PM Revision 5fac8174: Rework check for PPPoE reset setting, it wasn't matching at bootup so the reset file was not getting added properly. Ticket #583.
-
07:06 PM Revision 2c7bc9d0: Fix package URLs that use $myurl. Resolves #584
-
07:06 PM pfSense Packages Bug #584: Wrong URL in Diagnostics/ntop
- I committed a fix to 2.0 for this, it wasn't a problem specific to ntop.
-
03:10 PM pfSense Packages Bug #584 (Resolved): Wrong URL in Diagnostics/ntop
- Applied in changeset commit:"2c7bc9d0442817229e67ccafca155276fab384a4".
-
06:49 PM pfSense Packages Bug #585: Unable to start the ntop service
- It looks like the includes on that package are rather messed up. It's trying to install a bunch of unneeded X librari...
-
02:42 PM Revision 38564fde: Allow the webui admin account to have a duplicate user ID of 0.
- Make sure to create that account before attempting to modify it's attributes
-
12:44 PM Bug #552: OpenDNS dynamic dns update does not work
- Applied the fix manually on my system and OpenDNS updates seem to be working fine now.
-
11:00 AM Bug #552 (Feedback): OpenDNS dynamic dns update does not work
- Fixed the dyndns.class in the repo. Please test a newer snapshot soon to tell use if it has been resolved.
-
11:56 AM Bug #281: Traffic initiated by PPTP clients not passed
- Many many thanks Mr. Luçi! A couple of friends and myself are ready to test when you would like testing!
-
10:14 AM Bug #281: Traffic initiated by PPTP clients not passed
- There is a patch to apply to freebsd 8 for this.
I will see if i can add it to the snapshots. -
11:15 AM Revision a832b901: Comment out the linkage of carp with alias members. As it is it does not work and passing 30000 addresses to match is not fun either in some edge cases.
-
10:55 AM Revision 6bccf4ca: Make sure to send the hostname as part of the openDNS update process
- Fix ticket #552
-
10:12 AM Revision 3fbc3487: Fix an edge error in getting the carp interfaces reported by Effone.
-
09:59 AM Revision 1d002dc9: Do not prepend empty lines to the first member this might trigger errors on code that relies on space to be a separator.
-
09:57 AM Bug #233 (Resolved): Config upgrade should change theme
- Added Upgrade code 62 to 63, this allows us to convert deprecated legacy themes to pfsense_ng
-
09:36 AM Revision 0f8266ed: Correct the function name so that it upgrades properly
-
09:35 AM Revision 168a1e48: Make sure to upgrade deprecated themes to pfsense_ng.
- The switch() should make it easy to add other deprecated themes here.
-
09:25 AM Revision 0b1f6634: When doubleclicking a tunable, bring up the edit screen
-
01:13 AM Revision 766bd6d0: PPPoE Periodic Reset via cron working.
-
12:07 AM Bug #363 (Resolved): Dynamic DNS issues
- This is all working now, there may be some enhancements we can look at later for post-2.0 in a new ticket
05/09/2010
-
09:25 PM Bug #281: Traffic initiated by PPTP clients not passed
- As of "2.0-BETA1 Sat May 8 14:47:13 EDT 2010" this bug is still present.
I was unable to work around it with the Vir... -
07:20 PM Bug #586 (Resolved): Linked filter rule editing problems
- Two problems with editing a NAT-linked filter rule, new after the latest rdr changes I'm pretty sure.
1) The "Vie... -
06:42 PM pfSense Packages Bug #585 (Closed): Unable to start the ntop service
- I've installed the latest snapshot pfSense-2.0-BETA1-20100507-1115 with quick install.
I installed ntop as a packa... -
06:38 PM pfSense Packages Bug #584 (Resolved): Wrong URL in Diagnostics/ntop
- I've installed the latest snapshot pfSense-2.0-BETA1-20100507-1115 with quick install.
I installed ntop as a packa... -
02:55 PM Revision e951d0a9: Clean up of last revert commit. Revert requested by CMB. (Bring back PPP tab in diag_logs).
- All client side connection of PPPoE, PPP, and PPtP will be logged under the PPP tab
for easy separation of normal sys... -
02:35 PM Revision 55f3ca1d: Revert "Remove PPP tab these all go to the system log now."
- This reverts commit 62e74b4261b4044f523ade7c3b45e4484bbd2f8d.
Conflicts:
usr/local/www/diag_logs_slbd.php -
12:14 PM Bug #583 (Resolved): pppoe period reset doesnt work
- period reset in pppoe doesnt seem to work and more info on this on this link
http://forum.pfsense.org/index.php/topi... -
05:52 AM Bug #582 (Closed): Add all Diffserv options
- ToS:
http://www.ietf.org/rfc/rfc1349.txt
DiffServ:
http://tools.ietf.org/html/rfc2474
prompted by: ... -
05:39 AM Bug #581 (Resolved): rate's promiscuous mode changes can cause connectivity issues
- I've never seen it, but at least a couple people have reported connectivity issues when viewing the traffic graph. Mo...
-
04:41 AM Revision cec4323f: Make interface sort order on creation consistent with the order displayed elsewhere, and fix possible missing description on LAN upon creation.
- 03:17 AM Revision c013d3f5: check more closely for match here, to fix multiple items being marked as "selected", leading to the wrong interface being selected.
-
03:06 AM Todo #311 (Closed): Test large numbers of interfaces
- The mentioned issue isn't a problem (and actually works ok on 1.2.3 as well though I didn't test it as much there). I...
-
12:17 AM Revision aba2f06d: Do not install reflection rules for port forwards when the destination is invalid.
05/08/2010
-
10:54 PM Revision ed69be7a: Add note that reflection timeout only applies for port forwards.
-
10:40 PM Revision bff94015: Revert changes to reflection for port forwards until finished and approved.
-
10:16 PM Revision e31f58fc: Merge http://gitweb.pfsense.org/pfsense/efonne-new_nat_reflection into master
-
06:34 PM Revision 5f2e5c8e: Remove remote network from wizard, it is not used for a Remote Access VPN.
-
04:19 PM Revision b008c1eb: Hide "Local Network" field when creating/editing an OpenVPN shared key server, because you can't push routes with shared key.
-
04:13 PM Revision 6180c3ae: Fix the same problem with sharing an OpenVPN instance w/existing shared key on the client page this time.
-
04:12 PM Revision 21c776dd: Fix OpenVPN server validation logic. It was failing if you tried to save a shared key server instance with an existing shared key.
-
04:12 AM Revision a986f97f: Working on PPPoE periodic reset. Writing out pppoe_restart_XXX file still needs work.
05/07/2010
- 11:00 PM Revision 520b1e07: Add 0x10 diffserv option. http://forum.pfsense.org/index.php/topic,24954.0.html
-
09:54 PM pfSense Packages Bug #580: dns-server fails to install and remove
- Please also see http://forum.pfsense.org/index.php/topic,24912.0.html; I think this may be the same issue
-
07:38 PM pfSense Packages Bug #580 (Resolved): dns-server fails to install and remove
- I've installed the latest snapshot pfSense-2.0-BETA1-20100507-1115 with quick install.
After the reboot I tried to... -
09:49 PM Revision 8aff4a0c: The global reference declaration is needed.
-
07:32 PM Bug #579 (Closed): Keymap setting not followed
- I've installed the latest snapshot pfSense-2.0-BETA1-20100507-1115.
I selected for keymap "be.iso.acc" and left all ... -
05:16 PM Revision 7726c308: Preserve previous behaviour of having all alarms on for all gateways. Not sure this should be/is the right behaviour though.
-
05:12 PM Revision 023920e7: Move the settings of down/latency/loss to per gateway. This allows more fine grained control on gateways.
-
03:34 PM Bug #363 (Feedback): Dynamic DNS issues
- This can be postponed after 2.0 for now i think?
-
03:31 PM Revision 1b38ac36: Use common function to return gateway array so consinstency is preserved around code.
-
03:13 PM Revision 6cae2c44: Do not put ip address on teh name since pfctl does not like an ip as part of macro name.
-
02:43 PM Revision 2557738e: Correct delay matching on outgoing load balancer code.
-
01:58 PM Revision 3327ac10: Use require_once() to overcome problems with includes.
-
01:41 PM Revision a842e988: Ticket #408. Provide code to upgrade static routes.
-
01:27 PM Revision e08e4ebc: Make list the same. Remove whitespace at the end so it does not get interpreted as special tag.
-
12:47 PM Bug #408 (Feedback): Static routes are not converted properly on upgrade
-
12:43 PM pfSense Packages Bug #578: Snort to OpenVPN menu navigation
- This is because snort replaces fbegin.inc which is what defines the menus. It's replacing 2.0's copy with its own whi...
-
04:50 AM pfSense Packages Bug #578 (Resolved): Snort to OpenVPN menu navigation
- Attempting to load the OpenVPN page from the Snort config page give error "Warning: fopen(/usr/local/pkg/openvpn.xml)...
-
11:37 AM Revision 906f11b5: Fix link_ip_to_carp_interface. This unbreak at least Carp on CP and other consumers of it.
-
11:02 AM Revision 8d964cea: Add scpecific scripts for when ovpn goes up and down so we get neccessary values for used in varius areas of pfSense. TODO is find out how to get DNS info form openvpn.
-
10:22 AM Revision da9d6701: Check if interface exists before issuing a command when disabling captiveportal.
-
10:10 AM Revision f1e7ae16: Prevent gateway groups of having the same name as a gateway because this is not valid.
-
10:05 AM Revision 28955fee: Use a global array to prevent errors on rulesets which have invalid gateways. If such are found do not use the gateway at all. Probably the rule should be skipped too?.
-
09:57 AM Revision fad4fae8: Move auto generated rule for static routes on same subnet. Use sloppy states to speed things up and use flags any in tcp case so sloppy state does not choke.
-
04:13 AM pfSense Packages Bug #577 (Resolved): Squid Guard package install information incorrect
- SquidGuard package install is parsing to the config.xml using http://files.pfsense.org/packages/8/All/squidGuard-1.3_...
-
02:24 AM Bug #575: Ticket 1297: Policy routing to multiple gateways on a single interface
- I found it in 2.0. Thanks very much.
05/06/2010
-
10:50 PM Revision 75466131: Catch up with latest apinger changes to make easier to extract the status of gateways.
-
10:20 PM Todo #576 (Resolved): Make sure IPsec upgrade code properly handles mobile clients
- The IPsec code changes from 1.2.3 to 2.0 are quite large in some areas. Now that it is possible to replicate a 1.2.3-...
-
09:47 PM Bug #575: Ticket 1297: Policy routing to multiple gateways on a single interface
- Thanks. I'll check it out. See you in Ottawa.
-
09:28 PM Bug #575 (Closed): Ticket 1297: Policy routing to multiple gateways on a single interface
- already exists in 2.0.
-
09:24 PM Bug #575 (Closed): Ticket 1297: Policy routing to multiple gateways on a single interface
- Ticket 1297 was closed back in 2008, but I do not believe this is possible today; "Policy routing to multiple gateway...
-
09:27 PM Bug #108 (Feedback): Xauth is forced for IPsec mobile clients
- This is ready for testing. It generates a mobile config in racoon.conf which is equivalent to one found in 1.2.3 if y...
-
09:20 PM pfSense Packages Bug #200 (Resolved): 100% CPU on PHP with Snort
-
09:18 PM pfSense Packages Bug #200: 100% CPU on PHP with Snort
- Can someone close this bug report.
Robert
-
09:20 PM pfSense Packages Bug #547 (Resolved): Snort rules drop down only works in Firefox
-
09:16 PM pfSense Packages Bug #547: Snort rules drop down only works in Firefox
- robert zelaya wrote:
> Can someone close this bug report.
>
>
> Robert
-
09:15 PM pfSense Packages Bug #547: Snort rules drop down only works in Firefox
- Can some on close this bug report.
Robert -
09:17 PM pfSense Packages Todo #532: little bug in snort_rules_edit.php (missing include)
- Can someone close this bug report.
Robert
-
09:15 PM Revision 10d171f2: Add a few comments. This should be ready for testing/feedback. Ticket #108
-
08:57 PM Revision cee72940: Add missing ;
-
08:56 PM Revision bdf4ad85: Set proposal check and passive as needed for this scenario also. Ticket #108
-
08:53 PM Revision d98f1fa9: Ensure initial_contact is 'on' in this case to behave as 1.2.3 did. Ticket #108
-
08:51 PM Revision fa1f4827: Set generate_policy to "on" to behave as 1.2.3 does in this case. Ticket #108
-
08:40 PM Revision 36d047f5: Only specify peer ID if we are not dealing with a mobile PSK-only tunnel. Ticket #108.
-
08:34 PM Revision 9b2e9133: Do not specify subnet in sainfo if we are dealing with a mobile PSK-only tunnel. Ticket #108
-
08:13 PM Revision 1f65618b: Only enforce peer ID and psk on p1 screen if we are NOT dealing with a pure-psk mobile tunnel (which is the behavior in 1.2.3). Hide irrelevant options. Part of ticket #108.
-
07:43 PM Revision 71d61aa5: Reorder Auth. Method and PSK field to a more logical sequence. Part of ticket #108.
-
07:33 PM Revision 2ef1b601: Write out IPsec PSKs for mobile clients. Part of ticket #108.
-
07:27 PM Bug #574 (Resolved): Config upgrade for non-default admin username broken
- Configs with an admin username other than 'admin' don't upgrade properly.
-
07:25 PM Revision 7d8a886a: More tab fixes.
-
07:24 PM Revision b24479d6: A couple small fixes to the tabs/titles on these pages.
-
07:06 PM Revision 958420c5: Bring back IPsec PSK Tab/Edit. Part of ticket #108. Still needs backend code to use the resulting keys.
-
06:20 PM Bug #126 (Feedback): XML parser errors when enabling SSH
- Latest snapshot should be ok with this.
To test just 'touch /cf/conf/use_xmlreader' -
06:19 PM Bug #127 (Feedback): Empty config entries returned as array
- Latest snapshot should be ok with this.
To test just 'touch /cf/conf/use_xmlreader' -
05:20 PM Feature #573 (Needs Patch): Multiple gateways via DHCP
- ISC DHCP (and other DHCP implementations) support giving clients multiple gateways to use. It might be good to suppor...
-
04:55 PM Bug #285 (Resolved): Dashboard widget settings not being saved
- Applied in changeset commit:"acc5dd59f9c5f60ae67e135376506e9c9f70c154".
-
04:52 PM Revision bb927ed4: Previous commit also fixed traffic graph state changing, so re-enable that as well.
-
04:52 PM Revision acc5dd59: Fix widget settings in general. Initialize widget list before use. Fixes #285.
-
04:35 PM Revision a669395c: Enable even xmlwriter module.
-
04:34 PM Revision ab83fce0: Ticket #320. Use xmlreader and xmlwriter to read/write xml since it encodes decodes itself special chars.
-
04:08 PM Bug #511 (Resolved): pkg_generate_rules
-
11:21 AM Bug #511: pkg_generate_rules
- Ermal Luçi wrote:
> I merged fixes yesterday to not penalize the other packages.
Thanks Ermal - that is perfect.
... -
07:56 AM Bug #511: pkg_generate_rules
- I merged fixes yesterday to not penalize the other packages.
-
04:04 PM pfSense Packages Bug #448 (Resolved): dnscache is not starting
-
03:50 PM pfSense Packages Bug #448: dnscache is not starting
- I concur. The issue is now fixed.
Thank you! -
03:47 PM Bug #444: All mounts should be noatime
- In this case the power yank isn't what really needs testing, it's whether or not the mount commands and changes would...
-
03:46 PM Bug #444: All mounts should be noatime
- Unfortunately I don't have VMware, and my only KVM capable PC is out of service.
In any case I am not so sure that u... -
03:15 PM Bug #444: All mounts should be noatime
- If you have access to VMware Workstation, you can make a NanoBSD VM to test in. The serial port can be virtualized by...
-
03:12 PM Bug #444: All mounts should be noatime
- I have only tested on full install from live CD.
It is quite difficult for me to try nano, as I have to dismantle th... -
03:40 PM Bug #320 (Feedback): Using special characters (e.g. åäö) in certificate "Descriptive name" breaks entire WebGUI
- Get a new snapshot and try with 'touch /cf/conf/use_xmlreader
-
03:11 PM Revision e77ea573: Fix config backup download on IE8+HTTPS. Reported-By: Seth on the Dev list
-
02:20 PM Bug #572 (Resolved): OpenVPN Inter-client communication option doesn't work.
- Applied in changeset commit:"1b8b44dc661b45ea2752467a2c57433be69c051b".
-
01:24 PM Bug #572 (Resolved): OpenVPN Inter-client communication option doesn't work.
- The Inter-client communication option in the OpenVPN server configuration does not function properly. The XML file sh...
-
02:17 PM Revision 1b8b44dc: Add client-to-client to OpenVPN server config if the option is checked. Resolves #572.
-
02:07 PM Bug #295: UID error in User Manager/SSH password sync with Web Admin User
- Looking through the history, this "backend" setting seems to be something that was removed, so this check in /etc/rc....
-
11:43 AM Bug #295: UID error in User Manager/SSH password sync with Web Admin User
- This is probably related to an issue I've seen that the root/admin password on the console is not updated after I do ...
-
12:08 PM Revision 34a2fb1b: Allow using the default session timeout.
-
10:43 AM Revision 07f1ca1d: Correct file_notice usage.
-
10:22 AM Bug #561: Destination address for upgraded port forward is incorrect
- Added another fix. I used the wrong value name before.
-
10:20 AM Revision fcf4e8cd: Fix upgrade code for port forwards with "Interface address" set on external address. Ticket #561
- 09:13 AM Revision 416ae3d6: Fix the empty array check, a empty load balancer tag has a value of 1, not 0.
- 09:06 AM Revision 92a2ceae: Do not trip with configuration upgrades on a empty load balancer tag.
-
08:54 AM Bug #571 (Feedback): Destination on rdr incorrect on interface addresses
- Should be fixed now.
-
08:31 AM Bug #571: Destination on rdr incorrect on interface addresses
- Confirmed that the issue is not exclusive to port forwards. The same happens with firewall rules.
-
08:25 AM Bug #571: Destination on rdr incorrect on interface addresses
- Actually, it seems to be an issue only when using opt interfaces.
-
08:20 AM Bug #571: Destination on rdr incorrect on interface addresses
- I've tried it out and haven't been able to reproduce this. I get just the IP address.
-
04:49 AM Bug #571 (Resolved): Destination on rdr incorrect on interface addresses
- When you select any interface address in port forward entries now, it puts them into the config as something like:
... -
08:47 AM Revision 0167a9bf: Fix the regular expression used in filter_generate_address for OPT subnet so that it only matches the case intended. Ticket #571
-
05:56 AM pfSense Packages Bug #524: nvnstat not saving records on embedded
- n the 4th may nanobsd snap, the package gets installed properly and GUI works but doesnt colelct any data and counter...
-
01:34 AM Revision 129bc052: Merge remote branch 'mainline/master' into patches
- Resolved conflicts:
usr/local/www/system_advanced_firewall.php
05/05/2010
-
11:21 PM Bug #444: All mounts should be noatime
- Also, why do you use separate usr, var, and tmp?? That is not what the installer defaults to and is widely tested to...
-
11:18 PM Bug #444: All mounts should be noatime
- This all looks sane but have you tested these changes on all of the distributions (livecd, nanobsd, etc)?
- 11:18 PM Revision 257c5205: Revert last commit .. This might not work on Nano
- 11:14 PM Revision d8d5e511: Use mount -a instead of -uw Ticket #444
-
08:56 PM Revision 7a31647e: Ticket #511. Do not penailize other packages if rules of one package are erroneous during package rule generation.
-
08:02 PM Bug #568 (Feedback): firewall rules advanced clean up
-
08:01 PM Revision 8ba13f00: Ticket #568. Programatically decide if to show an advanced button or the value if non default.
-
07:26 PM Revision b8ed2a11: Implement tcp flags and sloppy state on the GUI.
- 06:56 PM Revision b315e307: Merge remote branch 'mainline/master'
- Introduce gettext() calls on usr/local/www/{pkg_,system_}*.php
-
04:59 PM Revision 83e16ead: The gui defaults to https in 2.0 correct it to make sure it is not stopped by CP on the CP interface[s].
-
03:28 PM Revision 9faa6c3c: Improve/correct the passthrumac rules when this option is enabled.
- 11:22 AM Revision 9ff30853: Merge remote branch 'mainline/master'
-
09:39 AM Revision 64d124c5: Code configured to use new interfaces_ppps_configure function for PPP, PPPoE, and PPtP links.
-
07:29 AM Revision cb37d8fa: New code working with PPP connections, and probably PPPoE/PPtP but I haven't tested yet.
- It makes the proper mpd config files for PPPoE and MultiLink PPPoE.
-
04:31 AM Revision e57d0897: Slightly change wording of NAT reflection description.
-
04:27 AM Revision 9fc22c6f: Add configuration option in System: Advanced: Firewall/NAT for NAT reflection on 1:1 NAT.
-
03:54 AM Revision c8bbe66f: Add backend code for NAT reflection on 1:1 NAT mappings.
-
03:11 AM Revision b06be629: Removed some redundant/obsolete code that is superceded by the new NAT reflection code.
-
03:11 AM Revision e9d8ecf2: Add the NAT that goes with the reflection redirects.
-
03:11 AM Revision e9dd5cea: Added reflection redirect rule and rearranged some related code that goes with it.
-
01:19 AM Bug #543: IP alias input validation problem
- When changing it to none, if there are already existing alias VIPs, it could either not allow changing it to none unt...
05/04/2010
-
11:27 PM Revision 1c826e48: Remove "pfSense nat bouncing" entries from the service ports list.
-
11:24 PM Revision 0bf53f55: Remove note about reflection being skipped on large port ranges.
-
11:20 PM Revision df66409b: Removed unused NAT reflection timeout setting.
-
11:14 PM Revision 9015e152: Remove the old reflection implementation and prepare for the new one.
-
11:09 PM Bug #543: IP alias input validation problem
- It probably really doesn't make sense to add a VIP IP alias on an interface configured without an IP. So the solution...
-
02:04 PM Bug #543: IP alias input validation problem
- I am not sure if there is a solution to this.
I investigated on providing a fix for this but otherwise it will break... -
10:02 PM Revision f3c5638e: Put all of these lines in the block under this condition and remove the irrelevant comment.
-
05:40 PM pfSense Packages Bug #448 (Feedback): dnscache is not starting
- This is already committed.
-
05:30 PM Bug #491 (Feedback): Dynamic DNS upgrade code not working
- It was there just it wasn't working because 'dyndns' now i considered as a member of an array.
-
05:24 PM Bug #535 (Feedback): Layer 7 - Error when deleting L7 rules group
-
04:22 PM Bug #459: ip2long (and possibly others) return bogus values on 64 bit
- Sorry wrong link.
I can't find the right one now, but 32-bit will return signed int, and 64-bit will return unsigned... -
04:16 PM Bug #459: ip2long (and possibly others) return bogus values on 64 bit
- This should have been fixed in the PHP5 source as of last April (2009).
If the issue is still there, maybe a bug rep... -
01:03 PM Bug #459: ip2long (and possibly others) return bogus values on 64 bit
- As noted by someone on the mailing list, this also affects input validation on things such as the DHCP server that ju...
-
04:10 PM Revision 34a3694b: Fix displaying the Enable/Disable checkbox. Previously after a save button click it will show the old saved value.
-
04:02 PM Todo #506: Bring back unequal route-to balancing
- A quick before-and-after from one scenario, load balanced WAN and OPT1 where WAN was weighted 3 in the old style.
Be... -
03:57 PM Revision 96cbc5aa: Fix displaying the Enable/Disable checkbox. Previously after a save button click it will show the old saved value.
-
03:03 PM Bug #541: Missing binaries on 64 bit
- dnsmasq and dhcpleases should both be fixed now
-
12:11 PM Bug #560 (Resolved): loader.conf is empty after a firmware update.
- Looks like the latest fix from Scott is good:
https://rcs.pfsense.org/projects/pfsense-tools/repos/mainline/commit... -
01:11 AM Bug #560: loader.conf is empty after a firmware update.
- Would we not need /boot/loader /boot/loader.rc and /boot/loader.4th - especially over a base OS version upgrade?
I... -
01:02 AM Bug #560 (Feedback): loader.conf is empty after a firmware update.
- should be resolved by:
https://rcs.pfsense.org/projects/pfsense-tools/repos/mainline/commits/7bd58f242717f23919756b... - 11:12 AM Revision 1cfa0465: Merge commit 'mainline/master'
-
10:56 AM Revision 156a7868: Add a gitsync option for reverting to the commit used when building the image.
-
10:27 AM Revision e31c90fc: Ticket #491. Fix upgrade code. Since dyndns is considered and array item it failed with previous code. Use index of 0 since 1.2.x does not have multiple entries.
-
10:19 AM Revision 9fdfdc5b: When 'No RDR' is set, skip some code that does not apply.
-
09:44 AM Revision 8ea2f022: This check is no longer needed here.
-
09:42 AM Revision 6735f23a: Return if not a supported protocol for reflection.
-
09:39 AM Revision bb37dc86: Ticket #535. Correct from where we get the port number.
-
09:37 AM Revision db843ceb: 'pass' is not valid with 'no rdr'
-
09:32 AM Bug #570 (Resolved): When "No RDR" is checked on a port forward, hide fields that do not apply.
- When "No RDR" is checked on a port forward; Redirect target IP, Redirect target port, and Filter rule association hav...
-
09:11 AM Revision f28e13de: Skip code for generating inetd.conf entries when 'no rdr' is used.
-
08:35 AM Revision 42809b4a: Use "PPPs" as the new Tab name in Interfaces -> Assign. Rename files and update affected files.
- Also, add upgrade_config function 062_to_063.
-
07:26 AM Bug #449: OpenVPN died when PPPOE link came up with a different IP.
- There might be issues with restarting openvpn.
Maybe a sleep should be introduced somewhere! -
07:15 AM Bug #567 (Feedback): Firewall's hostname gets multiple hosts entries
-
07:13 AM Revision e3495c34: Modify reflection code to avoid having duplicate rule generation code for when the protocol is different.
-
06:35 AM Revision 8659bc21: Reflection can have side effects unexpected to the user with rules using any for destination address, so change any to the interface subnet for reflection rules, which should be closer to the desired behavior in most cases but without the side effect.
-
05:39 AM Revision 13b37be2: Use the same destination address and port in reflection rules as is used in the port forward's main rule.
-
05:20 AM Revision 1a3d911e: In reflection rules, fix the end of the port range in port range forwards.
-
05:06 AM Bug #569 (Closed): deleting L7 container error
- duplicate of #535
-
05:05 AM Bug #569 (Closed): deleting L7 container error
- while deleting L7 containers, this error occurs
Fatal error: Call to a member function GetRPort() on a non-object ... - 04:57 AM Revision 6785f06a: add Logs tab
-
02:05 AM Revision c6bfc426: Move the reflection enabled check out of filter_generate_reflection, so this function can be used elsewhere regardless of the system setting for it (in preparation for reflection support on 1:1 NAT mappings).
-
12:51 AM Bug #568: firewall rules advanced clean up
- Having the PHP output javascript for unhiding them when the conditions are met might be the best way to do this. Whe...
-
12:27 AM Bug #434: xmlparse.inc should not call die
- Lorenz: I would vote for config.lib.inc
05/03/2010
-
10:22 PM Revision e5995f9d: Ticket #567. Create an entry on hosts file with the ip address of lan or the first inerface ip without a gateway if lan is not present.
-
09:26 PM Revision b6fe3414: Fix more inconsistent capitalization.
-
08:29 PM Revision a4973f08: Fix punctuation.
-
06:43 PM Revision 18f8f9a3: Fix some inconsistent capitalization on labels
-
06:14 PM Revision d5ae560d: Ticket #565. Correct deleting passthru mac entries. revert back to always allow a passthru mac as with allowed ips. Remove the check during login for passthru mac entries they will never make it to the login page.
-
05:45 PM Bug #562 (Feedback): Pass-through MAC bandwidth limits not working
- PAtched.
-
05:43 PM Revision b01792a0: Ticket #566. Reimplement the allowed ips keeping previous funcitonality and improving by adding a both direction. The problem with previous commit is that it always assumes that allowed ip address would have a pipe configured and entires without one would just get dropped.
-
05:43 PM Bug #565 (Feedback): Deleting pass-through MAC doesn't apply changes
-
02:14 PM Bug #566 (Feedback): captive portal IP bypass issues
- 12:55 PM Revision 8a0b4f14: Adding missing gettext() calls
- 12:49 PM Revision 456e7c76: Removing invalid string from code
- 12:38 PM Revision 5be999d3: Merge remote branch 'mainline/master'
- Conflicts:
usr/local/www/system_gateway_groups.php
usr/local/www/system_gateway_groups_edit.php
... -
10:30 AM Bug #511: pkg_generate_rules
- Hey Chris
Chris Buechler wrote:
> Warren: can you confirm if this is now fixed for the scenario you could replica... -
10:25 AM Bug #511: pkg_generate_rules
- Hey Chris
Chris Buechler wrote:
> Warren: can you confirm if this is now fixed for the scenario you could replica...
05/02/2010
-
08:23 PM Revision 7133ab35: Various fixes for handling of ports in port forwards.
- - Removed unused $srcport variable.
- Moved setting the $protocol variable to after setting the ports, so it can
cl... -
07:52 PM Bug #433 (New): layer7 not blocking anything
- doesn't appear to matter what you put into a L7 config, it doesn't work. Easy test: create one that blocks HTTP, kill...
-
07:45 PM Bug #568 (Resolved): firewall rules advanced clean up
- The new advanced hiding, and splitting the screen into two parts, really messes up working with rules with advanced o...
-
07:37 PM Feature #56 (Resolved): VAP code
- this is working fine. May be some edge case issues, can open tickets later if any are found.
-
07:35 PM Bug #542 (Resolved): when schedule time expires, the rules skippied give error in systemlog
- not doing that for me anymore, looks to be fixed
-
07:13 PM Bug #567 (Resolved): Firewall's hostname gets multiple hosts entries
- In /etc/hosts, the firewall's hostname is entered once for each interface IP. This leaves you with a round robin DNS ...
-
06:52 PM Bug #566 (Resolved): captive portal IP bypass issues
- A few issues here.
1) It no longer works. Adding a rule with keep-state fixes it, such as:
allow ip from any to... -
06:20 PM Bug #565 (Resolved): Deleting pass-through MAC doesn't apply changes
- After deleting a pass-through MAC entry and applying changes, the pass-through isn't actually removed until you click...
-
10:21 AM Revision 4818f161: Moving reflection's interface listing code to its own function, for use in future NAT reflection improvements.
-
09:39 AM Revision de77ffdb: Code to save data on a per port(bandwidth, mtu, mru, etc.) basis is working.
-
09:22 AM Feature #13: wireless page to have option to select transmit and receive antennas
- all that i can say is when tx and rx antenna r set to 0 and diversity off then i get much better signal strength in f...
-
06:35 AM Feature #13: wireless page to have option to select transmit and receive antennas
- I'm fairly sure 0 does mean auto on those sysctl settings, so that's what should be labeled auto if this setting is e...
-
02:22 AM Feature #13: wireless page to have option to select transmit and receive antennas
- mine is a atheros 5414 chipset but BSD reports it as 5413 due to drivers
-
02:17 AM Feature #13: wireless page to have option to select transmit and receive antennas
- from one of mine (Atheros 5413)
# athstats
297648 data frames received
388321 data frames transmit
4570 ... -
01:44 AM Feature #13: wireless page to have option to select transmit and receive antennas
- $ athstats
3605891 data frames received
133799 data frames transmit
2900 short on-chip tx retries
47625 ... -
08:38 AM Revision 414e21e0: Fix a check for "any" in port forwards.
-
08:09 AM Revision 6fcc9db6: Merge branch 'master' of http://gitweb.pfsense.org/pfsense/mainline into mlppp
-
08:08 AM Revision 44d57a2b: Merge branch 'master' of http://gitweb.pfsense.org/pfsense/mainline into mlppp
-
08:03 AM Revision d123e3bd: Make script files for getting ppp connection uptime executable.
-
08:00 AM Revision c9797064: Working on javascript for bandwidth, mtu, mru inputs on mlppp gui.
-
07:36 AM Revision 0acae2a0: Add a note about the regulatory domain and cards that have an unrecognized default.
-
06:51 AM Revision f4094f0d: Display some extra information about the available wireless channels.
-
02:24 AM Bug #511: pkg_generate_rules
- Warren: can you confirm if this is now fixed for the scenario you could replicate?
05/01/2010
-
08:39 PM Feature #13: wireless page to have option to select transmit and receive antennas
- Other than the sysctl values, what does athstats say about antennas on your card?
By the way, I've found on a syst... - 07:39 PM Revision 4b85f096: properly create auto AON rules for PPTP, PPPoE, L2TP and OpenVPN
- 07:27 PM Revision 4f529aa8: fix "Invalid argument supplied for foreach"
-
04:43 PM Bug #558 (Resolved): Dynamic gateways are not saved/edited properly
- This seems to work fine now for me.
-
04:40 PM Bug #559 (Resolved): Dynamic gateways are not used properly in groups
- Ermal's fix works great. Dynamic gateways make it into groups fine and no longer cause the rules to fail.
-
03:41 PM Bug #406 (Resolved): OpenVPN tunnel network should be automatically added for Outbound NAT
- https://rcs.pfsense.org/projects/pfsense/repos/mainline/commits/4b85f09622889a4a6665e55a61bcf732da8d1bd2
-
03:22 PM Bug #535 (New): Layer 7 - Error when deleting L7 rules group
- Deleting L7 group now results in the above fatal error.
-
01:29 PM Bug #563 (Rejected): pfsense tracert disappears when gateway is set in a specific rule
- that's how pf's route-to functions, it's not a bug.
-
11:55 AM Bug #563 (Rejected): pfsense tracert disappears when gateway is set in a specific rule
- Hi,
situation:
pfsense: 192.168.99.1/192.168.98.2
pc: 192.168.99.2
gateway: 192.168.98.1
if there is a rule ... - 06:59 AM Revision 77eddca8: fix display of PARP VIP ranges. Resolves #386
- 06:03 AM Revision 8788e899: add double click to edit
- 05:57 AM Revision 0d13b2e2: fix text
- 05:50 AM Revision d535ab71: fix up text
- 05:44 AM Revision 687b5432: fix up text
-
04:38 AM Revision 9291bf44: Fix up javascript and add id # to interfaces_mlppp page.
-
04:14 AM Bug #426 (Resolved): DNS server list not overriden by DHCP/PPP on WAN with PPPoE
- fixed
-
03:53 AM Feature #411 (Resolved): Regulatory domain and country settings for wireless
- looks to work fine, thanks!
-
03:43 AM Bug #116 (Resolved): Carp and Captive portal don't work together
- this works. it redirects to the interface IP rather than the CARP IP, but that should be irrelevant.
-
03:32 AM Bug #231 (Resolved): carp_input: packet received on non-carp interface log flooding
-
03:29 AM Bug #259 (Resolved): When disabling a dhcp interface, dhclient is not stopped
- fixed
-
03:25 AM Bug #471 (Resolved): Un-assigning VLAN parent interface makes VLANs stop working
- fixed, thanks
-
03:24 AM Bug #441 (Resolved): Can't set loss rate in limiter
-
03:21 AM Bug #525 (Resolved): Schedule rules outside of time show incorrect note
- fixed, thanks
-
03:16 AM Bug #487 (Resolved): PPP does not auto-reconnect
-
03:14 AM Bug #517 (Resolved): Do not check gateway within interface's IP subnet for dynamic gateways
- fixed
-
03:10 AM Bug #540 (Resolved): PPPoE Reconnect Issues
-
03:09 AM Bug #539 (Resolved): inet.flowtable flooding systemlog
-
03:05 AM Bug #386 (Resolved): Proxy ARP range does not show all usable IPs
- Applied in changeset commit:"77eddca8aeabefab83130ec073241a6018026410".
-
02:49 AM Bug #386 (New): Proxy ARP range does not show all usable IPs
- still a problem
-
02:27 AM Bug #470 (Resolved): Captive portal on VLANs bypassed when parent interface is assigned
- This is fixed, nice work! Parent interface assigned now works fine with captive portal on only VLANs.
-
02:10 AM Bug #562 (Resolved): Pass-through MAC bandwidth limits not working
- The global bandwidth limiting is working fine, but the pass-through MAC and IP limits are not functional (traffic pas...
-
12:57 AM Todo #506: Bring back unequal route-to balancing
- And I'm not sure if we'd want to keep this ticket open or start a new one for the upgrade code to migrate from the ol...
-
12:55 AM Todo #506: Bring back unequal route-to balancing
- This is working great for me now.
I set a weight of 1 on my DSL (PPPoE, 3Mbit), and 3 on cable (DHCP, 10Mbit), and ... -
12:22 AM Bug #543 (New): IP alias input validation problem
- Sent you a config to replicate it.
Also available in: Atom