Activity
From 08/12/2013 to 09/10/2013
09/10/2013
-
06:02 PM Revision eed5b507: Include CA in generated .p12 file. Fixes #2147 the way it was originally intended.
-
03:44 PM Revision 1e2cb1f8: No need to treat PHP errors as a crash on -RELEASE for now.
-
03:08 PM Revision b832d617: This broke correct detection of primary/secondary -- the person in that thread may have had some other config issue, but this broke working/valid configurations. Revert "Correct check to match the right vip based on configured ip. Reported-by: http://forum.pfsense.org/index.php/topic,66234.0.html"
- This reverts commit 25f9f3322863eae12f705137d8d414643d7b853f.
-
03:07 PM Revision a3d6166b: Fix didn't help -- backing this out and the change that made it necessary. Revert "Correctly check the secondary/primary parameter setting on dhcp failover configuration"
- This reverts commit 24670866827b4e2d7a4a05baaf6d09ee377ce7cb.
-
01:08 PM Revision 9633e518: Simplify the update URL definition in globals.inc and add some comments to it.
-
01:06 PM Revision 408ebb78: Fix update URL so the -RELEASE version looks at the stable updates URL by default rather than the snapshots server.
- 12:15 PM Revision c312ee8f: Update an existing cron entry for pppoe periodic resets
- The array variable name was incorrect in the test, so the existing cron entry was not being matched. Fixes #3192
- 12:14 PM Revision 09d2bef3: Merge pull request #801 from phil-davis/master
- Update an existing cron entry for pppoe periodic resets
- 11:52 AM Revision f1593bfe: Update an existing cron entry for pppoe periodic resets
- The array variable name was incorrect in the test, so the existing cron entry was not being matched. Fixes #3192
-
09:35 AM Revision 767afbb1: Require IPv6.inc header so that if ipv6 functions are called no surprises arise
-
09:35 AM Revision 8d8f5e49: Require IPv6.inc header so that if ipv6 functions are called no surprises arise
-
09:27 AM Revision fa4d4be6: Leave a trace that rtsold did fire the dhcp6c client so troubleshooting is easier
-
09:26 AM Revision 58fbb3f0: Leave a trace that rtsold did fire the dhcp6c client so troubleshooting is easier
- 09:22 AM Revision e4cf52ed: Do not include disabled OpenVPN in vpn_networks and negate_networks
-
09:10 AM Revision a01f8bfc: Correctly check the secondary/primary parameter setting on dhcp failover configuration
-
09:10 AM Revision 24670866: Correctly check the secondary/primary parameter setting on dhcp failover configuration
-
08:20 AM Revision 20809a21: Correct typo that prevents dhcp rules from properly being generated.
-
08:18 AM Revision 168a1948: Correct typo that prevents dhcp rules from properly being generated.
-
07:19 AM Bug #3193: All connections lost when a WAN IF gets disconnected
- There were a few days when "overactive" state clearing was in place. That got fixed on 5 Sep by https://github.com/pf...
-
07:13 AM Bug #3193 (Rejected): All connections lost when a WAN IF gets disconnected
- That was an issue on snapshots around that day, update to a current snapshot (or -RELEASE when it drops)
-
07:11 AM Bug #3193 (Rejected): All connections lost when a WAN IF gets disconnected
- We have multiple WAN lines with periodic resets. If a WAN line gets physically disconnected all current connections f...
-
07:10 AM Bug #3192: Multiple periodic resets scheduled for WAN interface
- Applied in changeset commit:c312ee8fe59e1e12d565d41d61dd090c63ac2dca.
-
07:10 AM Bug #3192 (Feedback): Multiple periodic resets scheduled for WAN interface
- Applied in changeset commit:f1593bfe1c9195f31a27d50f50422d77befed613.
-
06:50 AM Bug #3192: Multiple periodic resets scheduled for WAN interface
- See https://github.com/pfsense/pfsense/pull/801
Looks like a plain old bug that nobody ever noticed. -
04:21 AM Bug #3192 (Resolved): Multiple periodic resets scheduled for WAN interface
- We have two German VDSL lines with periodic 24h reset so I want to schedule the reset to a time where no one cares ab...
-
06:49 AM Revision 6e46621b: Merge pull request #800 from phil-davis/master
- Do not include disabled OpenVPN in vpn_networks and negate_networks
-
06:47 AM pfSense Packages Bug #3164 (Rejected): Varnish:XMLRPC Sync, start everytime without be needed
- The log says the function has started, it doesn't mean it's running. Inside the function there is a check, and when t...
-
06:33 AM pfSense Packages Bug #3188 (Rejected): IPsec Auth
- It's not an issue, it's always set to external, and a script is called to deal with authentication, as you can see on...
- 02:30 AM Revision 771c14a3: Do not include disabled OpenVPN in vpn_networks and negate_networks
09/09/2013
- 09:44 PM Revision d2f0b142: the time has come - bump to 2.1-RELEASE
-
07:18 PM Revision 0281db8c: Fix errant display of "0 table deleted" during filter reload on console.
-
07:18 PM Revision b841bc23: Fix errant display of "0 table deleted" during filter reload on console.
- 07:10 PM Revision 772e49ce: Remove unecessary capitalized WARNING from disabled APC message
- 07:09 PM Revision 4831f5df: Remove unecessary capitalized WARNING from disabled APC message
-
06:47 PM Bug #1044 (Closed): Authentication servers in LDAP and TLS mode needs ca certificate
- this was addressed quite some time ago
-
06:46 PM Bug #1694 (Closed): /etc/hosts gets dhcp clients entries with wrong domainnames
- duplicate of #1819 and it has better info.
-
06:40 PM Bug #2868 (Closed): Inescapable loop in installer
- not fixing issues with the current installer, it'll be replaced
-
06:39 PM Bug #2954 (Closed): Increase FIRMWARE_MAX to 50 for bwn and bwi wifi firmware
- we'll get this on newer FreeBSD versions
-
06:38 PM Bug #2988 (Resolved): Aliases not displaying in Diagnostics-Tables
- works in 2.1.
-
04:48 PM Bug #3191 (Resolved): Quality RRD inaccuracies and failure to update status in some circumstances
- There are some circumstances in which apinger puts in incorrect quality RRD data and fails to notice downtime. This n...
-
04:32 PM Bug #3184 (Resolved): DHCPv6 failover configuration is broken
-
04:32 PM Bug #3179 (Resolved): Gateway failure not properly detected in certain cases using a monitor IP outside of the WAN's subnet
- this particular issue is fixed, the issue with 10 vs. 30 seconds with packet loss still exists but isn't a regression...
-
04:31 PM Todo #3183 (Resolved): add config upgrade code to disable state killing on gateway failure
-
04:29 PM Bug #3127 (Resolved): Missing encoding of single quotes in pkg_edit.php / XSS
-
03:42 PM Bug #3189: Growl Notifications not sending anything
- All versions of "Growl for Windows" support the old UDP based protocol previous to GNTP.
After updating to latest b... -
03:25 PM Revision c7d48867: Allow for easier override on $g values if needed.
-
03:02 PM Bug #2627: Old delegated prefixes are not removed from the LAN interface
- I have sent you the system log and the config description.
-
01:14 PM Bug #2627: Old delegated prefixes are not removed from the LAN interface
- Can you show system log for this?
-
02:38 PM Bug #3139: pkg-utils function stop_packages causes Syntax error bad fd number with more than one script file.
- I downloaded the snapshot created yesterday and the problem is still there. I checked "etc/inc/pkg-utils.inc" and th...
-
08:30 AM Bug #3139: pkg-utils function stop_packages causes Syntax error bad fd number with more than one script file.
- Just to clarify, I did make the changes and they do not fix the issue. I see now in the "diff" it is clear exactly w...
-
07:12 AM Bug #3187: LiveCD boot issue on multicore systems.
- This doesn't seem to be a general issue with multi-core systems, but may be with that line of chips instead.
We in... -
07:04 AM Bug #3190 (Rejected): build server ova images are missing
- They're not missing, they were disabled on purpose. More info to come later.
-
04:37 AM Bug #3190 (Rejected): build server ova images are missing
- tried to download ova images and they are all missing.
09/08/2013
-
11:57 PM Revision fae7ef31: Test growl whether or not growl is disabled.
-
11:57 PM Revision 1e940f77: Test growl whether or not growl is disabled.
-
06:53 PM Bug #3189 (Resolved): Growl Notifications not sending anything
- The only unique bug here is that testing growl didn't work when growl was disabled. I just pushed a fix for that.
... -
04:53 PM Bug #3189: Growl Notifications not sending anything
- According to forum posts i have found, this function has worked in previous 2.0 versions, with Growl for Windows(ment...
-
04:12 PM Bug #3189: Growl Notifications not sending anything
- This thing is dead, #2942
-
03:45 PM Bug #3189 (Resolved): Growl Notifications not sending anything
- When Growl Notifications are configured in System -> Advanced - > Notifications. The Test button does nothing. Also G...
-
08:02 AM pfSense Packages Bug #3188 (Rejected): IPsec Auth
- I have pfsense 2.1-RC2 (i386) built on Fri Sep 6 19:47:34 EDT 2013
When I create a ipsec configuration and I sele...
09/07/2013
-
09:58 PM Bug #3187: LiveCD boot issue on multicore systems.
- I've also verified that the above hangs don't happen on Freebsd 8.3-release-dvd1 either for booting or installation, ...
-
09:56 PM Bug #3187 (Resolved): LiveCD boot issue on multicore systems.
- In the course of testing the amd64 builds on my various systems, I've come across a LiveCD-related issue that occurs ...
-
04:49 PM Bug #3130 (Resolved): System tunables - unknown/readonly values
-
01:28 PM Bug #3130: System tunables - unknown/readonly values
- Fixed, thanks.
-
11:57 AM Feature #3186 (Resolved): Firewall: NAT: 1:1: Edit
- Creating/editing a record is unnecessarily hard. The description for External IP Subnet and Destination are not clear...
09/06/2013
-
08:46 PM Bug #3143 (Resolved): Orphaned OpenVPN Client Specific Overrides
-
08:05 PM Bug #3143: Orphaned OpenVPN Client Specific Overrides
- Looks good in 2.1-RC1(amd64), Aug 30.
-
05:56 PM Revision cf07d574: Do not sync DHPCv6, it must operate independetly. Ticket #3184
-
05:56 PM Revision d3b3240b: Remove failover peer IP settings from DHCPv6, DHCPv6 doesn't support failover the way that DHPv4 did. Fixes #3184
-
05:56 PM Revision 1d47cb37: Do not sync DHPCv6, it must operate independetly. Ticket #3184
-
05:56 PM Revision 8571cdd5: Remove failover peer IP settings from DHCPv6, DHCPv6 doesn't support failover the way that DHPv4 did. Fixes #3184
- 04:59 PM Revision 279c2f42: Disable kill_states by default on upgrade, it fixes #3183
- 04:58 PM Revision af0a477a: Disable kill_states by default on upgrade, it fixes #3183
-
01:15 PM Bug #2627: Old delegated prefixes are not removed from the LAN interface
- Yes, otherwise it would not receive any kind of IPv6 address at all.
-
01:14 PM Bug #2627: Old delegated prefixes are not removed from the LAN interface
- is the option "Use IPv4 connectivity as parent interface" set on WAN interface?
-
12:48 PM Bug #2627: Old delegated prefixes are not removed from the LAN interface
- No improvement with:
2.1-RC2 (amd64)
built on Thu Sep 5 21:38:32 EDT 2013
What's different from the previous bu... -
01:09 PM Feature #3185 (New): Accommodate a DHCPv6 failover-like mechanism
- Currently, the ISC DHCPv6 daemon doesn't support failover, instead they recommend that unique pools be run independen...
-
01:00 PM Bug #3184: DHCPv6 failover configuration is broken
- Applied in changeset commit:d3b3240bd0991224f7caa3ba308ada532dea6bbe.
-
01:00 PM Bug #3184 (Feedback): DHCPv6 failover configuration is broken
- Applied in changeset commit:8571cdd51a9e18c7a22fe2e934708b920b512f70.
-
12:14 PM Bug #3184 (Resolved): DHCPv6 failover configuration is broken
- See http://forum.pfsense.org/index.php/topic,66093.0/topicseen.html
Failover causes a bad config for the dhcpv6 da... -
12:00 PM Todo #3183: add config upgrade code to disable state killing on gateway failure
- Applied in changeset commit:279c2f425ed41104b41ff4438b291c9a6d4da49c.
-
12:00 PM Todo #3183 (Feedback): add config upgrade code to disable state killing on gateway failure
- Applied in changeset commit:af0a477a1fe1aa1da9c0543142f892d4109e91fd.
-
11:25 AM Todo #3183 (Resolved): add config upgrade code to disable state killing on gateway failure
- Now that state killing on gateway failure actually does what it's supposed to, having it enabled by default is going ...
- 11:10 AM Revision da95bdcd: Fix #3127
- By default htmlspecialchars does not consider single quotes, what can be
a problem when value attribute is set using ... - 11:08 AM Revision 605ae553: Fix #3127
- By default htmlspecialchars does not consider single quotes, what can be
a problem when value attribute is set using ... -
09:22 AM Bug #3166: status_services.php:starts services 2-3 times;
- they are changed .. week ago
but i remeber ive have installed pfblocker,arpwatch,varnish3 -
05:27 AM Bug #3166: status_services.php:starts services 2-3 times;
- Please show me the <installedpackages><service> section of your config.xml
-
06:10 AM Bug #3127: Missing encoding of single quotes in pkg_edit.php / XSS
- Applied in changeset commit:da95bdcd9202e0f240099af3bfdf284b8f404d9f.
-
06:10 AM Bug #3127 (Feedback): Missing encoding of single quotes in pkg_edit.php / XSS
- Applied in changeset commit:605ae5537da157adfb414cc8837d465c132f4c8c.
09/05/2013
-
06:27 PM Revision 9e6043cc: Allow for easier override on $g values if needed.
-
06:27 PM Revision 8346b5c4: Allow for easier override on $g values if needed.
-
02:06 PM Bug #3066: Proxy ARP failing with kernel error
- Any testing I can do for this? Anything I can clarify? At the moment this breaks Proxy ARP operation. Willing to help...
-
12:39 PM Revision 25f9f332: Correct check to match the right vip based on configured ip. Reported-by: http://forum.pfsense.org/index.php/topic,66234.0.html
-
12:39 PM Revision 9d7ca11f: Correct check to match the right vip based on configured ip. Reported-by: http://forum.pfsense.org/index.php/topic,66234.0.html
-
12:29 PM Revision 36fa13a6: Ticket #3181 do the state flushing only on down gateway detection rather than any time.
-
12:28 PM Revision 19d723d2: Ticket #3181 do the state flushing only on down gateway detection rather than any time.
-
12:24 PM Revision 5aa44e98: Revert "Revert back the behaviour to cleanup all states for 2.1 Fixes #3181 and related to Ticket #1629. This commit is only for 2.1 since on master development will continue for better alternatives"
- A bit too excessive need to get right.
This reverts commit c59dd719e0a6d9ee8deecaa7bff0d6ee8c76e4ca. -
12:17 PM Bug #2833: Add a knob to prefer IPv4 over IPv6 for rare situations that require it
- On my pfsense ipv6 is disabled (but pfsense didn't disable and only hide v6).
Since my ISP enabled v6 on my subnet p... -
09:34 AM Bug #3139: pkg-utils function stop_packages causes Syntax error bad fd number with more than one script file.
- I replaced just the stop_packages function in 2.0.3 Release with the committed function and it does not fix the issue...
-
07:14 AM Bug #3139: pkg-utils function stop_packages causes Syntax error bad fd number with more than one script file.
- Charlie Singleton wrote:
> What was changed? Excuse my ignorance. I am new to reporting issues. The code I submitted... -
06:53 AM Bug #3139: pkg-utils function stop_packages causes Syntax error bad fd number with more than one script file.
- What was changed? Excuse my ignorance. I am new to reporting issues. The code I submitted does fix the issue. Are you...
-
06:43 AM Bug #3139 (Feedback): pkg-utils function stop_packages causes Syntax error bad fd number with more than one script file.
- Did the committed change fix the issue?
-
08:52 AM Bug #2863 (Resolved): Wrong heading for system_gateway_groups_edit.php
-
07:20 AM Bug #3130 (Feedback): System tunables - unknown/readonly values
- Applied in changeset pfsense-tools:commit:c343307d06a5cfe6ebff877246ae80bc0e78e98a.
-
06:48 AM Bug #3140 (Resolved): pfblocker 2.1 error (Cannot allocate memory) with builds after "Aug 1 19:39:40"
-
03:00 AM Bug #2878 (Resolved): radvd does not restart properly
- This is not radvd fault in latest snapshots.
Its mostly process that trigger the restart of it so this is corrected ...
09/04/2013
-
08:27 PM Revision c22f4809: Ba-bump-bump.
-
04:09 PM Bug #1974 (Resolved): Captive Portal RADIUS accounting bytes wrong
- Ermal thought this was specific to 32 bit, but it seems to be fine on both 32 and 64 now. A number of test sessions l...
-
03:03 PM Revision d6df2c4c: When the v4 wan is dynamic and v6 is type dhcp and v6 information is retrieved through v4 link than trigger dhcp6c reconfiguration.
-
03:03 PM Revision 0b18ef05: When the v4 wan is dynamic and v6 is type dhcp and v6 information is retrieved through v4 link than trigger dhcp6c reconfiguration.
-
12:05 PM Bug #2700 (Resolved): ppp-linkdown uses /32 for $3 which already has /32
-
12:05 PM Bug #863 (Closed): floating rules breaks passive mode ftp
-
12:04 PM Todo #1071 (Closed): Reevaluate locks
-
12:01 PM Bug #848 (Closed): Remove 'Close' button from firmware update screen?
-
11:59 AM Feature #87 (Needs Patch): Wizards needed
-
11:57 AM Feature #664 (Resolved): Add support for multiple DHCP ranges in a single subnet
- exists in 2.1.
-
11:57 AM Feature #625 (Needs Patch): Firmware Upgrade via Console
-
11:54 AM Feature #246 (Needs Patch): Allow dragging firewall rules over tab to reassign the interface
-
11:51 AM Bug #878 (Closed): Drag and Drop firewall rules causes corruption
-
11:44 AM Feature #1599 (Needs Patch): Browser detection for captive portal
-
11:43 AM Bug #1657 (Closed): Timezone should be synchronized on all utilities
-
11:41 AM Todo #2346 (New): do we need to change our require() calls to require_once()?
-
11:30 AM Todo #2346 (Closed): do we need to change our require() calls to require_once()?
-
11:39 AM Feature #1687 (Resolved): GetText code inspection
-
11:37 AM Bug #1915 (Resolved): LDAP "authentication containers" select button is inoperative.
-
11:37 AM Bug #1996 (Resolved): status_graph.php is not displaying real-time bw stats
-
11:34 AM pfSense Packages Bug #2602 (Closed): BandwidthD - Reported Traffic / Usage is approximately Double real amount
- haven't ever seen this. It's almost certainly a problem within bandwidthd itself under some specific unusual circumst...
-
11:33 AM Feature #2492 (Needs Patch): identify changes lines before "apply"
-
11:25 AM pfSense Packages Feature #2925 (Needs Patch): "Monit" Monit for customized monitoring and alerting
-
11:25 AM pfSense Packages Feature #2908 (Needs Patch): Add nginx package to available for install
-
11:23 AM Bug #3033 (Rejected): Static IPv6 route to OpenVPN tunnel ignored
- not a bug, config issue somewhere.
-
11:20 AM Bug #3064 (Closed): Broadcom BCM57780 Nic lights not working (Activity and Link)
- we'll get this fix in 2.2
-
11:18 AM pfSense Packages Bug #3110 (Rejected): apinger down messages
- no problems along these lines, this doesn't have a specific problem that we can do anything with.
-
11:16 AM Feature #1321 (Closed): Expose the maximum number of state entries a rule can create
- exists in 2.x
-
11:15 AM Feature #590 (Closed): Allow a detailed description on interfaces page
- notes package suffices I think
-
11:13 AM Feature #1104 (Closed): mwl driver patch to enable generation of new BSSIDs for additional VAPs
-
11:12 AM Bug #1105 (Closed): WLAN Broadcom BCM 4306 problems -the fw file(bwn_v4_ucode5) not found
-
11:11 AM Feature #627 (Closed): Ruleset for FIREWALL in web Interface. TAB (FW) in FIREWALL: RULES
- possible in 2.x
-
11:08 AM Bug #1615 (Resolved): rrd graph not refreshing the correct time frame
-
11:07 AM Todo #1528 (Resolved): Automatic outbound NAT from localhost needs a little work
-
11:07 AM Feature #1630 (Resolved): lagg ALTQ support
- fixed a while ago
-
11:06 AM Bug #1658 (Resolved): Adding new Gateway in interface page needs input validation
- this has been added in 2.1
-
11:05 AM pfSense Packages Bug #1820 (Closed): widescreen package doens't show ipv6 link
-
11:04 AM Feature #1901 (Needs Patch): Maintain IP range tables for popular Internet sites
-
11:01 AM Feature #2239 (Resolved): Use Firewall Alias in Static Routing setup
-
10:59 AM Bug #2556 (Closed): PPTP Server not working since 2.0.x Upgrade
- no known issues in PPTP in any 2.x version.
-
10:56 AM Feature #2631 (Needs Patch): Highlight unapplied changes
-
10:53 AM Bug #2928 (Closed): Authentication attempts against multiple radius servers should stop when the first reject is received.
- current behavior is correct
-
10:46 AM Bug #3066 (Feedback): Proxy ARP failing with kernel error
- proxy ARP is done in userland and hence couldn't trigger any such messages. There's something else going on there, no...
-
10:43 AM Revision b9eae2ba: Actually the / here is not needed.
-
10:43 AM Revision 0ec64bd2: Actually the / here is not needed.
-
10:39 AM Bug #2798 (Closed): Captive Portal does not capture anyone
- there were CP issues in general at that point, since fixed.
-
10:36 AM Revision c088fe72: Related to Ticket #3045 avoid races in the ntpdate_sync_one script due to killall returning without the process really exiting.
-
10:36 AM Revision b8b78b9a: Related to Ticket #3045 avoid races in the ntpdate_sync_one script due to killall returning without the process really exiting.
-
10:34 AM Bug #3111 (Resolved): Passive FTP does not pass through pfSense with debug.pfftpproxy=0 (default)
-
10:06 AM Bug #2627: Old delegated prefixes are not removed from the LAN interface
- I just pushed a commit for this as well https://github.com/pfsense/pfsense/commit/d6df2c4c71678b5edd98892ca40facbb80f...
-
07:46 AM Bug #2627: Old delegated prefixes are not removed from the LAN interface
- Is this still an issue for new snapshots of september?
-
09:49 AM Bug #3045 (Resolved): NTPD crash / doesn't come up
- none of us have seen any issues reported here in a while, seems fine.
-
09:48 AM Bug #3174 (Resolved): OpenVPN Client bound to a gateway group should not start on backup CARP vip
- CARP will very briefly take master status while booting before reverting to backup, which is likely why. This particu...
-
03:19 AM Bug #3174: OpenVPN Client bound to a gateway group should not start on backup CARP vip
- The fix is there. Thx. But I am still seeing some instances where OpenVPN Client is starting up when bound to a GW gr...
-
09:35 AM Bug #3181 (Resolved): Fix handling of state killing on WAN failure
- works
-
09:03 AM Bug #3004 (Resolved): config upgrade code needs to change VIP binding on IPsec
- fixed
-
08:56 AM Bug #2159 (Resolved): Upgrade code breaks RRD databases on nano
- fixed
-
08:48 AM Revision 8171a2c2: Introduce two new functions to be used on locking.
- - try_lock: used for trying to get an EXCLUSIVE lock for a specified timeout by default of 5
- unlock_force: which ju... -
08:31 AM Revision f33dcc5c: Add safety belts to code in rc.openvpn to avoid php errors to leave stale locks around
-
08:31 AM Revision 5d1bde96: Add safety belts to code in rc.openvpn to avoid php errors to leave stale locks around
-
08:29 AM Bug #3182 (Resolved): VMware vmxnet interfaces are not detected as VLAN capable
- A VMware vmxnet interface, e.g. vxn0 is capable of using VLANs with a reduced MTU, but they do not appear in the list...
-
08:23 AM Bug #2951 (Resolved): OpenVPN and alternative monitoring IP in 2.1
- confirmed fixed
-
08:19 AM Revision 48085d0c: Make the operation of saving old rule nearby the writing operation to be logical to spot
-
08:18 AM Revision dc8b4c4e: Make the operation of saving old rule nearby the writing operation to be logical to spot
-
08:12 AM Revision b214bf3a: Sprinkle some unsets to reduce footprint and correct some whitespaces
-
08:12 AM Revision 53ce7798: Sprinkle some unsets to reduce footprint and correct some whitespaces
-
07:29 AM Bug #3173 (Resolved): NEGATE_ROUTE rule does not respect port numbers
- 07:22 AM Revision e8090840: filter_generate_port error log function name
- Absolutely minor adjustment to make the error log message refer to the new function name.
-
07:19 AM Revision 2eebeecb: Merge pull request #797 from phil-davis/master
- filter_generate_port error log function name
- 01:03 AM Revision 3b6596b7: filter_generate_port error log function name
- Absolutely minor adjustment to make the error log message refer to the new function name.
09/03/2013
-
08:41 PM Bug #3173: NEGATE_ROUTE rule does not respect port numbers
- The change did not quite make the snapshot of 2.1-RC1 (i386)
built on Tue Sep 3 14:08:44 EDT 2013. I copied the /etc... -
01:40 PM Bug #3173: NEGATE_ROUTE rule does not respect port numbers
- Applied in changeset commit:44f0f09bda6b59c0f2f08c87c4d4e32b149555bb.
-
01:40 PM Bug #3173 (Feedback): NEGATE_ROUTE rule does not respect port numbers
- Applied in changeset commit:81d81b942b5a6e81b97d2d0b159ae2bdcb739bd4.
-
07:44 PM Bug #3045 (Feedback): NTPD crash / doesn't come up
- It looks stable on latest snapshots
-
07:05 PM Revision c59dd719: Revert back the behaviour to cleanup all states for 2.1 Fixes #3181 and related to Ticket #1629. This commit is only for 2.1 since on master development will continue for better alternatives
-
06:40 PM Revision 44f0f09b: Fixes #3173 if any port information exists on the rule than put it on the NEGATE rule generated.
-
06:39 PM Revision 81d81b94: Fixes #3173 if any port information exists on the rule than put it on the NEGATE rule generated.
- 06:19 PM Revision 3cb55704: Remove SPD when disable phase2, it fixes #2719
- 06:13 PM Revision 03131eb9: Remove SPD when disable phase2, it fixes #2719
- 05:31 PM Revision f70df069: Increased needed memory for APC to 512M + code cleanup
- - Increased the needed memory for APC to 512M as we often run into memory problems on our 256M box
- fixed the RAM ca... - 05:29 PM Revision fcca1783: Merge pull request #786 from individual-it/master
- Increased needed memory for APC to 512M + code cleanup
- 05:08 PM Revision be40ce0b: Merge pull request #796 from phil-davis/master
- Traffic Shaper GUI text typos
- 05:05 PM Revision faf4b1fc: Merge pull request #796 from phil-davis/master
- Traffic Shaper GUI text typos
- 05:04 PM Revision 0c1870ca: Merge pull request #790 from shahidsheikh/RELENG_2_1
- #3174 Added handling of gateway groups in openvpn_restart
- 05:03 PM Revision fcb5121d: Merge pull request #793 from shahidsheikh/master
- Fix #3174 Handling of gateway groups in openvpn_restart()
- 05:03 PM Revision 96551a20: Merge pull request #794 from phil-davis/RELENG_2_1
- Backport get_memory changes to 2.1
-
04:52 PM Revision 32a9eb18: Bring back static routes to fix issues reported on Ticext #3179
-
04:52 PM Revision c9d099d7: Bring back static routes to fix issues reported on Ticext #3179
- 04:36 PM Revision c59e21b5: Fix #3004:
- . Create a function to replace strings on deep associative arrays
. Use the recent created function array_replace_val... - 04:00 PM Revision 243680e5: Disable state killing on gateway failure by default for new configs.
- Clarify the text describing the option while here.
- 04:00 PM Revision 7050776a: Disable state killing on gateway failure by default for new configs.
- Clarify the text describing the option while here.
-
03:47 PM Bug #3158 (Rejected): Captive portal, two radius accounting packets sent.
- You have issues with your radius server rather than pfSense.
Either the radius servier is busy or something else in ... -
03:42 PM Revision 497841f5: Correct typo on variable name
-
03:39 PM Revision 6f8cf553: Correct typo on variable name
- 03:37 PM Revision f2cc3344: Fix #3004:
- . Create a function to replace strings on deep associative arrays
. Use the recent created function array_replace_val... -
02:20 PM Revision 628a64a9: Fix issue reported on http://forum.pfsense.org/index.php/topic,66160.0.html
-
02:20 PM Revision a8ab2b76: Fix issue reported on http://forum.pfsense.org/index.php/topic,66160.0.html
-
02:19 PM Bug #2719 (Resolved): Deleting IPsec tunnel does not remove SPDs
-
01:20 PM Bug #2719: Deleting IPsec tunnel does not remove SPDs
- Applied in changeset commit:3cb55704924734aa19de58349198ca99d15e00ea.
-
01:20 PM Bug #2719 (Feedback): Deleting IPsec tunnel does not remove SPDs
- Applied in changeset commit:03131eb95c975ed990ddf955c762ef51137288a0.
-
11:31 AM Bug #2719 (New): Deleting IPsec tunnel does not remove SPDs
- this works with one exception, if you disable a P2 entry, its SPD is not removed. Deleting a P2 or P1 works fine, and...
-
02:10 PM Bug #3181 (Feedback): Fix handling of state killing on WAN failure
- Applied in changeset commit:c59dd719e0a6d9ee8deecaa7bff0d6ee8c76e4ca.
-
12:26 PM Bug #3181 (Resolved): Fix handling of state killing on WAN failure
- For 2.1, we need to change the state killing on WAN failure to wipe the entire state table. The current state killing...
-
01:54 PM Bug #3119 (Resolved): apinger falls into a loop with assigned OpenVPN interface, restarting itself and triggering events indefinitely
-
01:45 PM Bug #3179: Gateway failure not properly detected in certain cases using a monitor IP outside of the WAN's subnet
- It now appears as though apinger sees the gateway as down but does not report nor graph the result as expected.
If... -
11:49 AM Bug #3179 (Feedback): Gateway failure not properly detected in certain cases using a monitor IP outside of the WAN's subnet
-
11:00 AM Bug #3179: Gateway failure not properly detected in certain cases using a monitor IP outside of the WAN's subnet
- Attaching a capture file that shows the ICMP actually is going out the right interface and is experiencing loss. But ...
-
09:36 AM Bug #3179: Gateway failure not properly detected in certain cases using a monitor IP outside of the WAN's subnet
- I can provide some input on this issue as well.
On 2 of 8 of my firewalls I have this problem happen consistently.... -
07:59 AM Bug #3179 (Resolved): Gateway failure not properly detected in certain cases using a monitor IP outside of the WAN's subnet
- Still researching this a bit but it needs an entry so things don't get lost.
Currently, I have two WANs, DSL and C... -
01:44 PM Bug #1629: invalid state table entries after WAN IP change
- #3181 is a band-aid for 2.1, this will need to wait 2.2
-
12:18 PM Bug #2887 (Resolved): ppp-linkdown state killing not right
-
12:06 PM Bug #3174: OpenVPN Client bound to a gateway group should not start on backup CARP vip
- Thanks, merged. If you could, please gitsync and confirm fix here.
-
12:00 PM Bug #3174: OpenVPN Client bound to a gateway group should not start on backup CARP vip
- Applied in changeset commit:fcb5121d6fa41e9858beb3111de24e56b0b49c07.
-
12:00 PM Bug #3174 (Feedback): OpenVPN Client bound to a gateway group should not start on backup CARP vip
- Applied in changeset commit:330ecea1bf568f1284d31628668b84250641e066.
- 11:56 AM Revision 7ca8bef4: Make sure RRD data is restored from backup before upgrading data and a new backup is done after. It should fix #2159
- 11:55 AM Revision 42ec9337: Make sure RRD data is restored from backup before upgrading data and a new backup is done after. It should fix #2159
-
11:55 AM Bug #2303 (Resolved): SPD on secondary not cleared after config sync
- works
- 11:45 AM Revision 794195d1: Traffic Shaper GUI text typos
- and note the Queue Limit is a number of packets (not packets per second)
-
11:40 AM Bug #3004: config upgrade code needs to change VIP binding on IPsec
- Applied in changeset commit:c59e21b5c706b46159ecc19b33977299754b07b9.
-
10:40 AM Bug #3004 (Feedback): config upgrade code needs to change VIP binding on IPsec
- Applied in changeset commit:f2cc3344a19134a3dc594ff767be06f5af800553.
-
07:46 AM Bug #3004 (New): config upgrade code needs to change VIP binding on IPsec
- that config upgrade code either gets skipped somehow or doesn't work, the attached config for example still has <inte...
-
11:24 AM Bug #2896 (Resolved): IPsec failover may not fully attach to new interface address
- this work-around suffices for 2.1, if we find the root cause we can start a new ticket to address that at a later time.
-
11:22 AM Bug #3172 (Resolved): function return_gateway_groups_array() returns the incorrect vip
-
09:05 AM Bug #3172: function return_gateway_groups_array() returns the incorrect vip
- Yep, its fixed. Thx.
-
08:36 AM Bug #3172: function return_gateway_groups_array() returns the incorrect vip
- Shahid: can you please confirm if that fixed what you were seeing?
-
10:27 AM Revision 7cb3f7d2: Resolves #3177. Do a filter reconfigure if the dynds ipsec hosts are present and being reloaded.
-
10:27 AM Revision bee7cd82: Resolves #3177. Do a filter reconfigure if the dynds ipsec hosts are present and being reloaded.
-
10:23 AM Bug #3175: <Firewall: NAT: Port Forward: Edit> takes range in "Redirect target port"
- ...
-
09:48 AM Bug #3175: <Firewall: NAT: Port Forward: Edit> takes range in "Redirect target port"
- The problem is is_port will be true even if there is a range. So you have explicitly test for a range....
-
08:04 AM Bug #3175: <Firewall: NAT: Port Forward: Edit> takes range in "Redirect target port"
- The SEO will be amused if no rules are loaded and all ports are open.
- 09:33 AM Revision 254261e0: fix text
- 09:07 AM Revision 4cdae0ac: fix text
-
09:05 AM Revision 18f3c2fd: add option to send prefix hint for requesting desired prefix length for delegation
- This change adds an option on the interfaces page for sending a prefix hint for the selected delegation size. If enab...
-
08:34 AM Bug #2951: OpenVPN and alternative monitoring IP in 2.1
- I can replicate this, but I think fixing #3179 will fix this as well. Will leave to feedback to test again after 3179...
-
08:30 AM Bug #3180 (Closed): SMTP notifications not work with 587 port and SSL/TLS
- SMTP notifications (System>Advanced>Notifications) not work with 587 port and SSL/TLS authentication checked. The sys...
-
08:16 AM Bug #754: hifn driver and AES192 and 256
- I can confirm the problem on pfSense 2.0.3, Alix.2D13 and soekris VPN1411 (hifn 7955).
There is no difference in thr... -
08:13 AM Bug #3146 (Resolved): Apinger still putting spaces after gateway names, leading to failing commands
-
08:12 AM Bug #3125: hifn on 2.1 breaks certain ciphers w/openssl
- not really anything we can do here. will revisit.
-
07:59 AM Bug #2993: IPsec in transport mode, tunneled traffic does not flow through enc0
- not a regression, pushing to 2.2
-
07:53 AM Bug #2409 (Resolved): ipfw - entryzerostats
-
07:50 AM Bug #3098 (Resolved): Advanced Options - Multiple State / Connection Controls Not Working
- Confirmed this is all good now.
-
07:16 AM Bug #2910 (Resolved): monitoring-disabled gateway causes wrong tiered gateway in route-to
- fixed
-
07:15 AM Revision a2ac3661: Merge pull request #792 from razzfazz/RELENG_2_1
- add option to send prefix hint for requesting desired prefix length for ...
-
07:06 AM Revision 4a6f3d96: Merge pull request #791 from jean-m-cyr/RELENG_2_1
- Dummynet does not require burst size specification
-
07:03 AM Bug #3095 (Resolved): Name column uses old (original) interface name
-
07:00 AM Bug #2159: Upgrade code breaks RRD databases on nano
- Applied in changeset commit:7ca8bef40e29d1a4ef7a641141401f51297cc101.
-
07:00 AM Bug #2159 (Feedback): Upgrade code breaks RRD databases on nano
- Applied in changeset commit:42ec9337ea432906c7fa9ee99f763946fd974e3c.
-
02:46 AM Bug #2159 (New): Upgrade code breaks RRD databases on nano
- this regressed at some point. Current status same as in original.
-
06:56 AM Bug #2440 (Resolved): Wireless client nic set for DHCP does not start dhclient
- works
- 06:49 AM Revision e9215ad4: Use physmem and realmem from get_memory() in the appropriate places
- Backport to 2.1
- 06:43 AM Revision 98c10c92: Use new names for get_memory parameters
- 06:35 AM Revision 68b253ad: Use hw.physmem when calculating pfsense_default_state_size
- hw.physmem is the actual amount of memory that FreeBSD/pfSense can get its hands on, so use this for the calculation....
- 06:27 AM Revision 324e112d: touch up text, s/nat/NAT/
- 06:26 AM Revision ec532672: touch up text, s/nat/NAT/
-
05:55 AM Bug #3177 (Resolved): Dynamic IPsec endpoints not added in rules.debug
- Yep, that fixes it. Confirmed
-
05:30 AM Bug #3177: Dynamic IPsec endpoints not added in rules.debug
- Applied in changeset commit:7cb3f7d26dd5770f666207f86899fb1529991622.
-
05:30 AM Bug #3177 (Feedback): Dynamic IPsec endpoints not added in rules.debug
- Applied in changeset commit:bee7cd82f805daf11c53515059f45ad0da20de7f.
-
04:59 AM Bug #3177 (Resolved): Dynamic IPsec endpoints not added in rules.debug
- On boot the Dynamic DNS endpoint rules for IPsec tunnels with the DynDNS name are not added to rules.debug.
This c... -
05:39 AM Feature #3178 (Duplicate): IPSec dynamic hosts for IPv6
- The framework of dynamic host names does not work presently for IPv6.
Leaving this here as an issue for future relea... -
04:20 AM Bug #3176 (Feedback): Hosts file corrupted when using "Register DHCP leases in DNS forwarder"
- haven't seen this anywhere or heard of it elsewhere
-
04:03 AM Bug #3176: Hosts file corrupted when using "Register DHCP leases in DNS forwarder"
- Cant reproduce the problem anymore. When i disabled the "DHCP leases in DNS forwarder" my problem was gone but after ...
-
03:52 AM Bug #3176: Hosts file corrupted when using "Register DHCP leases in DNS forwarder"
- > What pfSense version are you on?
Like in issue description: 2.1-RC1 (amd64) built on Tue Aug 27 16:56:42
> How ... -
03:13 AM Bug #3176: Hosts file corrupted when using "Register DHCP leases in DNS forwarder"
- I am running:
2.1-RC1 (i386)
built on Sun Sep 1 01:17:51 EDT 2013
FreeBSD 8.3-RELEASE-p10
"Register DHCP leases... -
02:55 AM Bug #3176 (Resolved): Hosts file corrupted when using "Register DHCP leases in DNS forwarder"
- When the option "Register DHCP leases in DNS forwarder" is enabled the Host Overrides are not working correctly. They...
-
02:47 AM Bug #3104 (Closed): Upgrade 2.1RC0 code breaks RRD databases on nano
- duplicate of #2159
-
02:22 AM Bug #2950 (Resolved): Upgrading RRD upgrade from 2.0 causes Out of Memory on 128MB embedded systems
- still an RRD upgrade issue on nano but that's covered elsewhere
-
01:23 AM Revision 330ecea1: Fix #3174 Handling of gateway groups in openvpn_restart()
- If the underlying vip of a gateway group that an openvpn client is bound
to is in backup mode then the client should ... -
01:08 AM Bug #3126 (Resolved): sync up ixgbe driver with r253865
-
01:08 AM Bug #1399: rrdtool respawning too fast
- doesn't seem to happen anymore, but will put it out to 2.2 for confirmation.
-
01:07 AM Bug #2325 (New): Limiters don't work on OPT WAN rules w/rdr
- issue unchanged in general for the specific circumstance in the original. Non-regression, postponing to 2.2.
-
12:55 AM Bug #2882: 6RD not working in latest snapshots
- Hi Chris,
Well that's quite the disappointing news.
Any chance you could just roll back whatever changes were m... -
12:33 AM Bug #2882: 6RD not working in latest snapshots
- 6rd works in general, but there are issues due to the lack of proper v6 frag handling that makes it not functional in...
-
12:38 AM Bug #2332 (Resolved): gateways always renamed to "dynamic". Implement proper IPv6 support
-
12:36 AM Bug #3083 (Resolved): Firewall rule toggle fails after several enable/disable cycles : 2.1 RC0 and 2.0.3 release
-
12:35 AM Bug #2979 (Resolved): Increase RRD Max values to account for 10Gbit/s Ethernet
-
12:35 AM Bug #2922 (Resolved): vpn_ipsec_force_reload() needs to be skipped when not really needed
-
12:35 AM Bug #2935 (Resolved): Revert "Backup RRD files using the xml dump and restore from RRD tools" changes
-
12:34 AM Revision 90652fbf: add option to send prefix hint for requesting desired prefix length for delegation
- This change adds an option on the interfaces page for sending a prefix hint for the selected delegation size. If enab...
-
12:31 AM Bug #2941 (Resolved): Prohibit adding aliases containing FQDNs in static routes
-
12:31 AM Bug #3030 (Resolved): When using LAGG+VLAN+ALTQ, the shaper wizard does not fill in the interface bandwidth
-
12:30 AM Bug #3077 (Resolved): FTP patches in revision 39802d4e cause kernel panics on FTP traffic
-
12:30 AM Bug #3150 (Resolved): Ping, Traceroute, and related pages need fixes to ensure IPv6 addresses are scoped properly.
- 12:10 AM Revision 9880a11d: Dummynet does not require burst size specification
- Dummynet traffic shaper does not require burst size specification and
assumes 0 if not specified. Allow user to leave...
09/02/2013
-
09:35 PM Bug #3175 (Rejected): <Firewall: NAT: Port Forward: Edit> takes range in "Redirect target port"
- not a bug, how things are supposed to work.
-
12:12 PM Bug #3175 (Rejected): <Firewall: NAT: Port Forward: Edit> takes range in "Redirect target port"
- If putting a range or an alias with a range in "Redirect target port" the rules crashes.
pfctl -s rules will be empt... -
08:33 PM Bug #3174: OpenVPN Client bound to a gateway group should not start on backup CARP vip
- Pull requests #793 (for master) and #790 (for RELENG_2_1). Thx.
-
07:16 AM Bug #3174: OpenVPN Client bound to a gateway group should not start on backup CARP vip
- Could you please send a pull request to pfSense repo [1] at github? This is the right path to submit patches. Here yo...
-
08:13 PM Revision 6eb6e720: #3174 Handling of gateway groups in openvpn_restart()
- If the underlying vip of a gateway group that an openvpn client is bound to is in backup mode then the client should ...
-
08:09 PM Revision 414edd3e: #3174 Added handling of gateway groups in openvpn_restart
- 06:08 PM Revision e7a209f5: Merge pull request #789 from jean-m-cyr/master
- shaper burst may be blank, but if not then must be numeric
- 06:01 PM Revision 6aab2ea3: shaper burst may be blank, but if not then must be numeric
-
02:10 PM Bug #2719: Deleting IPsec tunnel does not remove SPDs
- Grischa Zengel wrote:
> Now I checked it:
> If I disable IPsec phase1 the ping goes thru openvpn.
> If I only dele... -
01:30 PM Bug #2719: Deleting IPsec tunnel does not remove SPDs
- Now I checked it:
If I disable IPsec phase1 the ping goes thru openvpn.
If I only delete phase2 the SPD still exist... -
12:30 PM Bug #2719: Deleting IPsec tunnel does not remove SPDs
- I didn't check if the SPDs still be there but I had the conclusion of this.
From both sides I could ping both ends o... -
07:05 AM Bug #2719 (Feedback): Deleting IPsec tunnel does not remove SPDs
- Grischa Zengel wrote:
> The problem still exists.
>
> After deleting IPsec tunnels routing didn't work for these ... - 11:12 AM Revision 0c3a7a05: Use updated get_memory var names
- Backport to 2.1
- 11:01 AM Revision 7a6851df: Fix #3172, return_gateway_groups_array() was returning the last vip since it was using wrong variable name on iteration
- 11:00 AM Revision 22234bbb: Fix #3172, return_gateway_groups_array() was returning the last vip since it was using wrong variable name on iteration
- 10:54 AM Revision d613b9d5: Improve var names in get_memory
- Backport from master
-
08:26 AM Revision ce4aea3a: Merge pull request #788 from jean-m-cyr/master
- Dummynet does not require burst size specification
- 06:55 AM Revision b3e0fedf: Dummynet does not require burst size specification
- Dummynet traffic shaper does not require burst size specification and
assumes 0 if not specified. Allow user to leave... -
06:00 AM Bug #3172: function return_gateway_groups_array() returns the incorrect vip
- Applied in changeset commit:7a6851dff7763fc85d03648ca30039fcd53ac620.
-
06:00 AM Bug #3172 (Feedback): function return_gateway_groups_array() returns the incorrect vip
- Applied in changeset commit:22234bbb2f3ea46fc61bb5adeabec1e94ccf167f.
09/01/2013
-
06:50 PM Bug #3174 (Resolved): OpenVPN Client bound to a gateway group should not start on backup CARP vip
- There is no handling for gateway groups in ...
-
12:51 PM Bug #2882: 6RD not working in latest snapshots
- Same issue here.
Using CenturyLink for 6RD so not limited to Charter. Upgraded from an August 2012 build to Sun...
08/31/2013
- 02:31 PM Revision f89f3b3d: Merge pull request #787 from phil-davis/master
- Provide get_uptime_sec in a common include file
-
06:18 AM Bug #3173 (Resolved): NEGATE_ROUTE rule does not respect port numbers
- See forum: http://forum.pfsense.org/index.php/topic,65886.0.html
If I add a rule on LAN to pass source all, destin... -
06:13 AM Bug #3172 (Resolved): function return_gateway_groups_array() returns the incorrect vip
- I am not even a PHP novice so please take these findings with a grain of salt.
The vip returned is always the last... -
04:27 AM Bug #3163: XS4All IPv6 does not work
- adding version couldn't hurt either I suppose.
FreeBSD xxxx.xxxxxx.xxx 8.3-RELEASE-p10 FreeBSD 8.3-RELEASE-p10 #0:... -
04:15 AM Bug #3163: XS4All IPv6 does not work
- maybe the output of the dhcp6c helps.
-
02:48 AM Bug #3163: XS4All IPv6 does not work
- i have that checked all the time ! no that doesn't make it right
08/30/2013
-
05:37 PM Revision 3fcb6a21: Show a count of the CPUs if more than one is detected, and show how those CPUs are supplied by the hardware.
-
05:37 PM Revision b097a7cf: Show a count of the CPUs if more than one is detected, and show how those CPUs are supplied by the hardware.
-
05:28 PM Bug #3163: XS4All IPv6 does not work
- avink in the forum is right. Checking the box "Use IPv4 connectivity as parent interface" makes the config files use ...
-
03:04 AM Bug #3163: XS4All IPv6 does not work
- Also posted on the forum.
It looks to me like the setup of the ipv6 WAN interface is broken.
Instead of configuri... -
11:53 AM Feature #410: Eliminate the interface mismatch prompt and try to do the right thing automatically
- about restong the backup, that only works if that yet doesn't include the missing interface. my wlan usb stick was qu...
-
11:49 AM Feature #410: Eliminate the interface mismatch prompt and try to do the right thing automatically
- I'd like to add a situation that I recently eperienced: One interface was gone (just a usb stick for WLAN) and networ...
-
11:18 AM Bug #3171: Network interface mismatch on next boot after adding usb-stick based WLAN
- That has been discussed many times. If *any* interface is missing, it's best to stop and not try to assume it is safe...
-
11:15 AM Bug #3171: Network interface mismatch on next boot after adding usb-stick based WLAN
- Jim P wrote:
> This was due to your wireless device not being present when it needed it to be there, so it's not a s... -
11:14 AM Bug #3171: Network interface mismatch on next boot after adding usb-stick based WLAN
- Update: This can be fixed according to the solution in https://redmine.pfsense.org/issues/3170.
Yet I can't unders... -
11:13 AM Bug #3171 (Rejected): Network interface mismatch on next boot after adding usb-stick based WLAN
- This was due to your wireless device not being present when it needed it to be there, so it's not a separate issue bu...
-
09:42 AM Bug #3171 (Rejected): Network interface mismatch on next boot after adding usb-stick based WLAN
- After adding a new interface where I selected run0 (an rt3070 based usb wlan stick, edimax EW-7711UMn) and not doing ...
-
11:12 AM Bug #3170: USB WLAN stick only recognized after plugging in and out
- We can't load every conceivable driver, and run devices have also been known to have panics on some chips/devices, so...
-
11:11 AM Bug #3170: USB WLAN stick only recognized after plugging in and out
- (Hint came from wallabybob here: http://forum.pfsense.org/index.php?topic=65227.new;topicseen#new)
-
11:10 AM Bug #3170: USB WLAN stick only recognized after plugging in and out
- Update: This problem can be fixed by adding...
-
10:11 AM Bug #3170 (Rejected): USB WLAN stick only recognized after plugging in and out
- driver problem we have no control over. Hopefully will get better with 2.2 (FreeBSD 10) if it isn't already in 2.1.
-
09:37 AM Bug #3170 (Rejected): USB WLAN stick only recognized after plugging in and out
- I am using an rt3070 based usb wlan stick, edimax EW-7711UMn. in the interface assign pulldown choice, it's only avai...
-
05:46 AM Bug #2882 (New): 6RD not working in latest snapshots
-
05:42 AM Bug #3112 (Resolved): AHCI disk devices are not detected in Diagnostics > SMART Status
08/29/2013
-
10:20 PM Bug #2882: 6RD not working in latest snapshots
- Hello,
Having the same issue here. I also have Charter for my carrier. I am able to get a IPv6 IP, but am unable t... -
09:41 PM Bug #3112: AHCI disk devices are not detected in Diagnostics > SMART Status
- I have a solid state disk in an Atom D525 that I switched over to use AHCI. I now can see ada0 in the SMART status pa...
- 05:38 PM Revision 35eb76fa: Use ipprotocol to check gateway protocol, this fix a issue that allow to set more than one default gateway when it's dynamic
- 05:38 PM Revision beb7cd97: Use ipprotocol to check gateway protocol, this fix a issue that allow to set more than one default gateway when it's dynamic
- 07:12 AM Revision 806e5979: Call get_uptime_sec from functions.inc.php
- to avoid code duplication
- 07:09 AM Revision df0cb10b: Provide get_uptime_sec in a common include file
- so it is available to anything that cares.
- 06:32 AM Revision 73fa0178: Increased needed memory for APC to 512M + code cleanup
- - Increased the needed memory for APC to 512M as we often run into memory problems on our 256M box
- fixed the RAM ca... -
05:24 AM pfSense Packages Bug #3168 (Rejected): siproxd
- siproxd_registered_phones.php lists a maximum of 10 registered Phones, even if more are connected via pfsense-siproxd...
-
04:00 AM Bug #2833: Add a knob to prefer IPv4 over IPv6 for rare situations that require it
- Agreed - I've had situations where DNS returns a v6 IP, v6 connectivity isn't working, so checking for updates fails ...
08/28/2013
- 11:58 PM Revision 58ddb24f: Merge pull request #785 from phil-davis/master
- Tidy up use of hw.physmem and hw.realmem from get_memory()
- 08:13 PM Revision 5517f604: Use physmem and realmem from get_memory() in the appropriate places
- 08:11 PM Revision 6b0739ac: Use new names for get_memory parameters
- 08:09 PM Revision 386758bb: Use hw.physmem when calculating pfsense_default_state_size
- hw.physmem is the actual amount of memory that FreeBSD/pfSense can get its hands on, so use this for the calculation.
- 08:05 PM Revision 493360f5: Use updated get_memory var names
- The value of minimum_ram_warning is designed to be compared to hw.physmem - so do that. Usse the appropriate physmem ...
- 08:01 PM Revision 517fb89e: Improve var names in get_memory
- realmem is the amount of actual (real) memory installed - the size of the RAM card - e.g. 256MB
physmem is the amount... -
05:54 PM Revision f6339216: s/require/require_once/g for filter.inc to avoid redeclaration errors in some rare cases.
-
05:53 PM Revision b6239962: s/require/require_once/g for filter.inc to avoid redeclaration errors in some rare cases.
-
02:49 PM Revision a41c0316: If upgrading NanoBSD, try to grab the previous timezone file so the zone is preserved on the next boot.
-
02:48 PM Revision 495dd804: If upgrading NanoBSD, try to grab the previous timezone file so the zone is preserved on the next boot.
-
02:44 PM Revision fa92a6a4: Also run mtree check post-upgrade.
-
02:43 PM Revision 636307a5: Also run mtree check post-upgrade.
-
02:09 PM Bug #3163: XS4All IPv6 does not work
- edit: http://forum.pfsense.org/index.php/topic,65832.msg359062.html#msg359062 starting the dhcp6c client manually mad...
-
01:00 PM Revision c53f1e0c: Support the names used by the status page as well as those used internally by service entries.
-
01:00 PM Revision aed00539: Support the names used by the status page as well as those used internally by service entries.
08/27/2013
-
11:37 PM pfSense Packages Feature #3167 (Needs Patch): Add iStat as a package
- This guy did most of the work already:
http://geekness.eu/content/istat-pfsense-and-server-monitoring
Would lik... -
07:50 PM Bug #2919: IPv6 - WAN and LAN (DHCP-PD) does not renew address
- The IPv6 address may survive the loss of connectivity *to* the cable modem (i.e., from pfSense's point of view, link ...
-
11:33 AM pfSense Packages Bug #2199 (Closed): Varnish3 fails on start with sysctl-ish errors
- Thanks config syntax fixed from an over-zealous search and replace.
-
11:14 AM pfSense Packages Bug #2199: Varnish3 fails on start with sysctl-ish errors
- Well i found one your mistake were u forgot.
Foward client IP :
(append X-Forwarded-For):
set req.http.X-Forwarde... -
09:05 AM pfSense Packages Bug #2199: Varnish3 fails on start with sysctl-ish errors
- I think about the problem from before is gone => Close
-
08:56 AM pfSense Packages Bug #2199: Varnish3 fails on start with sysctl-ish errors
- Yeah i noticed that. Those are two separate bugs. If you can please log two new bugs related to those issues then we ...
-
08:53 AM pfSense Packages Bug #2199: Varnish3 fails on start with sysctl-ish errors
- Yes, now its better. Saving and running normally.
Works only the first backend, "# backend Web02 not in use." is sho... -
02:50 AM pfSense Packages Bug #2199 (Feedback): Varnish3 fails on start with sysctl-ish errors
- I pushed a few commits for this - please let me know how it goes.
-
10:28 AM Bug #3166 (Resolved): status_services.php:starts services 2-3 times;
- file: service-utils.inc...
-
10:21 AM Bug #3165 (Resolved): OpenVPN Bridge with Client Specific Override
- Configuring an OpenVPN bridge on 2.1-RC1 (i386) (built on Mon Aug 26 16:51:15 EDT 2013)
I use the Wizard to create... -
09:16 AM pfSense Packages Bug #3164 (Rejected): Varnish:XMLRPC Sync, start everytime without be needed
- (Automatically sync Varnish configuration changes) is not checked.
in the logs see other
>php: config.inc: [varnish... -
04:49 AM Bug #3161 (Resolved): apinger pings loopback instead of gateway on gif tunnels
-
01:43 AM Bug #3161: apinger pings loopback instead of gateway on gif tunnels
- Thanks, fixed now with Aug 26 16:51:36 EDT 2013 snapshots.
-
02:46 AM Bug #3163: XS4All IPv6 does not work
- I think this is related to the item I posted 2 days ago on the forum, I also have native ipv6 issue it used to work a...
08/26/2013
-
05:54 PM Bug #3161: apinger pings loopback instead of gateway on gif tunnels
- Michael Kellogg wrote:
> 2.1-RC1 (amd64)
> built on Mon Aug 26 01:13:05 EDT 2013
>
> ping times on my tunnel ar... -
02:32 PM Bug #3161: apinger pings loopback instead of gateway on gif tunnels
- 2.1-RC1 (amd64)
built on Mon Aug 26 01:13:05 EDT 2013
ping times on my tunnel are still .x ms unlike the norma... -
07:01 AM Bug #3161: apinger pings loopback instead of gateway on gif tunnels
- Please try later snapshot
-
07:00 AM Bug #3161 (Feedback): apinger pings loopback instead of gateway on gif tunnels
- Applied in changeset pfsense-tools:commit:b5c0231c6801d25a1555c97c0a82e64b90a994d1.
-
05:53 PM Bug #3155 (Resolved): rc.newipsecdns will trigger new static route but didn't delete old route
-
01:11 PM Bug #3155: rc.newipsecdns will trigger new static route but didn't delete old route
- The old routes disappear now.
-
05:25 PM Bug #3163 (Resolved): XS4All IPv6 does not work
- Ever since 2.1-RC1 my IPv6 connection (XS4all DHCPv6-PD) is broken.
I use a Vigor120 ADSL modem as PPPoA to PPPoE br... -
03:11 PM pfSense Packages Bug #2199: Varnish3 fails on start with sysctl-ish errors
- PS; I try to add now the two backends but only the 1st one is in .vcl config file
> # backend Web02 not in use.
i... -
02:40 PM pfSense Packages Bug #2199: Varnish3 fails on start with sysctl-ish errors
- 2 servers, but no matters how much backends have there.
Problem is in pfsense Varnish config generator, see http://f... -
08:50 AM pfSense Packages Bug #2199: Varnish3 fails on start with sysctl-ish errors
- Valentin Georgiev wrote:
> php: /status_services.php: The command '/usr/local/etc/rc.d/varnish.sh stop' returned exi... -
03:34 AM pfSense Packages Bug #2199: Varnish3 fails on start with sysctl-ish errors
- php: /status_services.php: The command '/usr/local/etc/rc.d/varnish.sh stop' returned exit code '2', the output was '...
-
02:33 PM Feature #3162 (New): MLPPP Status of connections
- Would like to see if using Multi-WAN/MLPPP have something in status like 4 of 4 connections up in pfSense's Dashboard...
- 11:33 AM Revision 4b1c16b9: Merge pull request #783 from phil-davis/master
- Add option to specify client management port for OpenVPN client export use
-
10:30 AM Bug #2719 (New): Deleting IPsec tunnel does not remove SPDs
-
08:46 AM Bug #2719: Deleting IPsec tunnel does not remove SPDs
- The problem still exists.
After deleting IPsec tunnels routing didn't work for these subnets.
I first deleted pha... -
08:44 AM Bug #3157: the bug from #2719 still exists
- But this won't open this issue...
-
06:21 AM Bug #3157 (Rejected): the bug from #2719 still exists
- If you are having the same issue from #2719, please add comments on it instead of open a new ticket.
- 06:23 AM Revision faf61f12: Add option to specify client management port for OpenVPN client export use
- See forum http://forum.pfsense.org/index.php/topic,63668.0.html and OpenVPN Manager GitHub discussion https://github....
-
06:20 AM Feature #3160 (Rejected): Pull request from master to 2.1-RC
- It's such a big change to apply to 2.1 at this point.
08/25/2013
-
04:48 PM Bug #3161 (Resolved): apinger pings loopback instead of gateway on gif tunnels
- As described on this post: http://forum.pfsense.org/index.php/topic,65231.msg358058.html#msg358058...
-
11:41 AM Feature #3160 (Rejected): Pull request from master to 2.1-RC
- Hi.
Is it possible to also pull the request made on master to the 2.1 RC1 (cf. https://github.com/pfsense/pfsense/...
08/24/2013
-
11:58 PM Bug #2919 (Resolved): IPv6 - WAN and LAN (DHCP-PD) does not renew address
- Thanks for the feedback. I also have done some experimentation and haven't seen any issues, looks like this issue is ...
-
06:46 AM Bug #2919: IPv6 - WAN and LAN (DHCP-PD) does not renew address
At this point, I am no longer seeing any problems.
1) DHCP-PD IPv6 addressing has survived multiple renewals.
...-
11:55 AM Bug #2945: Installation stucks at 36%: /usr/local/bin/cpdup -vvv -I -o /usr /mnt/usr
- I was able to correct this issue by:
# Unplugging the network cables and SFP from my NICs
# Using Option #3 to Bo...
08/23/2013
-
10:15 PM Bug #3159: inconsistency in IPv6 logging
- No, default deny rules should be consistent in their logging. They are. What you're proposing is the opposite of cons...
-
09:50 PM Bug #3159: inconsistency in IPv6 logging
- Chris Buechler wrote:
> it's not inconsistent. If you're logging things blocked by default deny, the IPv6 block logg... -
08:09 PM Bug #3159 (Rejected): inconsistency in IPv6 logging
- it's not inconsistent. If you're logging things blocked by default deny, the IPv6 block logging is enabled too. If yo...
-
06:31 PM Bug #3159 (Rejected): inconsistency in IPv6 logging
- these are the relevant configuration settings:
Advanced: Networking -> "Allow IPv6" is unchecked
Status: Syst... -
09:39 PM Revision a91773bb: Merge pull request #781 from PiBa-NL/CreateCertificate_DigestAlgorithm
- Certificate Manager, for 'Create an internal Certificate' use the correct 'Digest Algorithm'
-
07:48 PM Revision 8f07b51c: Certificate Manager, for 'Create an internal Certificate' use the correct 'Digest Algorithm'
-
02:42 AM Bug #3158 (Rejected): Captive portal, two radius accounting packets sent.
- Hi, I hope this isn't a duplicate, I searched reasonably well.
In the latest version of 2.1 (I took the daily build ...
08/22/2013
- 07:14 PM Revision e89c3caf: Delete old route for remote gateway when its IP changes. It fixes #3155
- 07:14 PM Revision 083a9e6d: Delete old route for remote gateway when its IP changes. It fixes #3155
-
02:10 PM Bug #3155: rc.newipsecdns will trigger new static route but didn't delete old route
- Applied in changeset commit:e89c3caf2c4e69e255d18c8a19d163b2d36490e0.
-
02:10 PM Bug #3155 (Feedback): rc.newipsecdns will trigger new static route but didn't delete old route
- Applied in changeset commit:083a9e6d0ba00c4f80859e4c5d450a0b37d552ce.
-
01:20 PM Bug #3155 (Resolved): rc.newipsecdns will trigger new static route but didn't delete old route
- Each time the peer address changes there will be a new static route to the peer.
The old route should be removed.
A... -
01:45 PM Bug #3157 (Rejected): the bug from #2719 still exists
- After deleting IPsec tunnels routing didn't work for these subnets.
I first deleted phase2 and than phase1 and routi... -
01:33 PM Feature #3156 (Duplicate): Grouping rules
- I would like to define groups of rules and add them on block to interfaces.
Grouping interfaces is not efficient. No... - 03:34 AM Revision 475aa214: fix text to remove non-applicable copy/paste from v4 relay
- 03:33 AM Revision afde5956: fix text to remove non-applicable copy/paste from v4 relay
08/21/2013
-
07:21 PM Revision 35e125b4: Fixup check for existing easyrule block rule to account for the ipproto and when the ipproto is blank.
-
07:20 PM Revision 4475997e: Fixup check for existing easyrule block rule to account for the ipproto and when the ipproto is blank.
-
02:35 PM Bug #3150 (Feedback): Ping, Traceroute, and related pages need fixes to ensure IPv6 addresses are scoped properly.
- Only ping and test port needed to be changed.
-
07:20 AM pfSense Packages Bug #3154 (Rejected): pfSense should not require users' private keys to be uploaded to generate certificates.
- This is better handled as a discussion on the forum rather than here in the bug tracker.
Currently there are no fu... -
07:07 AM pfSense Packages Bug #3154 (Rejected): pfSense should not require users' private keys to be uploaded to generate certificates.
- Hi,
In the certificate manager, the UI used to import existing certificates *requires* that you provide both the c... -
07:01 AM Bug #2891: Limiter does not work with high speed
- Screen dumps to se symptoms
1) Create a normal limiter with queue size set under advanced settings:
https://dl.dr... -
06:22 AM Bug #2891: Limiter does not work with high speed
- This forum post is probably about same problem. But a much more detailed description:
http://forum.pfsense.org/index... -
03:24 AM Bug #2891: Limiter does not work with high speed
- Hello.
I would like to reopen this bug.
There is still an issue.
# I cannot create a limiter with 50Mbpits that ... -
06:08 AM Bug #3045: NTPD crash / doesn't come up
- Benjamin H. wrote:
> Updatet to latest snapshot, 2.1 RC1 amd64 and replaced the NTPD file again with your provided f... -
06:03 AM Bug #3104 (Feedback): Upgrade 2.1RC0 code breaks RRD databases on nano
- The error message "No DS called 'inpass6'" means the database was not converted to new format, what happens when conf...
-
01:24 AM Revision b4dcdbcf: Remove this particular form tag that doesn't appear to serve any purpose on this page, and breaks the drop-down zone selector. Fixes #3153
-
01:23 AM Revision 8cd1d911: Remove this particular form tag that doesn't appear to serve any purpose on this page, and breaks the drop-down zone selector. Fixes #3153
08/20/2013
-
08:20 PM Bug #3153: Captive Portal Status Select List Inop with Vouchers
- Applied in changeset commit:b4dcdbcff58fab82d8f62bd8641f0c04429218ea.
-
08:20 PM Bug #3153 (Feedback): Captive Portal Status Select List Inop with Vouchers
- Applied in changeset commit:8cd1d911dc2f1ecf9fb7cd00ee1a102c35479008.
-
07:45 PM Bug #3153 (Resolved): Captive Portal Status Select List Inop with Vouchers
- Steps to reproduce:
Define CP zones, one with and one without vouchers enabled. When viewing Captive Portal Statu... -
07:41 PM Revision eb0287e9: Add patch from the ticket to fix #3149
-
07:41 PM Revision 51f9b7e4: Add patch from the ticket to fix #3149
- 07:30 PM Revision d318da67: Add scope to target when it is a link-local, it helps ticket #3150
- 07:29 PM Revision 3830eeb3: Add scope to target when it is a link-local, it helps ticket #3150
- 05:39 PM Revision 8f61cb87: Add scope to target when it is a link-local, it helps ticket #3150
- 05:37 PM Revision bd6ff328: Add scope to target when it is a link-local, it helps ticket #3150
-
05:18 PM Feature #1825: Dynamic DNS client IPv6 support
- freedns.afraid.org also works, http://freedns.afraid.org/dynamic/update.php?<Authentication Token>&address=<IPv6>
- 11:17 AM Revision 86797a92: Merge pull request #779 from CharlieMarshall/fileCss
- remove css from edit.php page
-
08:51 AM Feature #972: Allow adding gateways outside of interface subnet
- Apparently -cloning has been deprecated in FreeBSD, so that parameter should be removed from the above command.
<p...
08/19/2013
-
08:30 PM Bug #3149: SMART status widget always displays error with SCSI drives
- I've now confirmed across multiple versions of multiple operating systems that SCSI drives consistently report "SMART...
- 08:12 PM Revision 45ce573d: Revert "Improve sh syntax using ${} for all variables"
- This was cherry-pick'd by mistake
This reverts commit 1702a838194d2f4ffaa99359f888a42b0832472a. -
05:55 PM Revision bbd87523: Attempt to recognize pfsync entries from pf logs.
-
05:54 PM Revision e56cb3de: Attempt to recognize pfsync entries from pf logs.
-
05:34 AM Bug #3152: Updater should fall back to IPv4 if IPv6 fails
- Feature described at #2833 can help on this
-
12:57 AM Bug #3152: Updater should fall back to IPv4 if IPv6 fails
- if it appears you have v6 connectivity and you actually don't, you need to disable IPv6. Having it disabled on all yo...
08/18/2013
- 11:12 PM Revision 289dd691: Merge pull request #778 from N0YB/patch-11
- Update functions.inc.php
- 09:37 PM Revision 4fd09104: remove css
-
02:55 PM Bug #2627: Old delegated prefixes are not removed from the LAN interface
- Tested using:
2.1-RC1 (amd64)
built on Sat Aug 17 21:32:08 EDT 2013
FreeBSD 8.3-RELEASE-p9
Step 1
Freshly boot... -
02:17 PM Bug #3152 (Closed): Updater should fall back to IPv4 if IPv6 fails
- Updater tries to use ipv6 even if ipv6 is disabled.
If ISP connect ipv6 segment to WAN updater uses ipv6 and could n... -
01:31 PM Bug #3104: Upgrade 2.1RC0 code breaks RRD databases on nano
- Here are some related tickets which were perhaps closed prematurely:
Issue #2651
Issue #2159
Please let me know ... -
01:29 PM Bug #3104: Upgrade 2.1RC0 code breaks RRD databases on nano
- This also happened to me when upgrading from the latest stable 2.0 release to 2.1-RC1. The 2.1 build used for the up...
-
06:09 AM Feature #3151 (Resolved): Disable gateway monitoring actions without disabling gateway monitoring
- Mentioned in this thread: http://forum.pfsense.org/index.php/topic,65452.0.html
In sites with single WAN, I still pu... - 02:01 AM Revision ffd2f320: Update functions.inc.php
- May as well remove this errant td end tag too.
-
01:31 AM Revision 30416166: Strip off scope before attempting to resolve the IPv6 IP here.
-
01:31 AM Revision 5d6d1958: Strip off scope before attempting to resolve the IPv6 IP here.
- 12:16 AM Revision e6cfcd26: Update functions.inc.php
- Fix gateway widget size change on first update.
Inner table size changes because the table in update data does not ha...
08/17/2013
-
02:17 PM pfSense Packages Bug #2292: DarkStat interface selection needs to only allow single interface
- Well, it seems that multiple interfaces are supported since v3.0.716. There are also some IPv6 fixes, would be nice t...
- 10:11 AM Revision 44e72b7c: Fix selection of IPv6 target IP for IPv6 Outbound NAT rules.
- This makes it possible (without source hacking) to do many:1 NAT of IPv6.
Some will rejoice. Some will curse.
This ... - 10:05 AM Revision 31202953: Fix selection of IPv6 target IP for IPv6 Outbound NAT rules.
- This makes it possible (without source hacking) to do many:1 NAT of IPv6.
Some will rejoice. Some will curse.
This ...
08/16/2013
- 08:06 PM Revision 5ef99bd9: Obsolete more ntp binaries from base
- 07:55 PM Revision 6d501aef: Use ntpdate from ports also and obsolete base one
-
07:49 PM Revision 17921b7e: Ooops fix this to add only th einterface
-
07:48 PM Revision f8436649: Ooops fix this to add only th einterface
- 07:43 PM Revision 62580df4: Obsolete base ntpd since we are using the one from ports
- 07:43 PM Revision 4a19d53c: Obsolete base ntpd since we are using the one from ports
-
07:35 PM Revision 42f33846: Add scope identifier to target when its link-local
-
07:35 PM Revision 7d3eaae2: Add scope identifier to target when its link-local
-
06:48 PM Revision f7ff77fa: Fix Diag > Tables AJAX fadeOut after deletion for rows with CIDR mask format.
-
06:48 PM Revision 68b0311c: Rather than doing auto-detection, fall back to a glob for now when listing potential PPP serial devices. This will allow us to push ticket #2433 back to 2.2 with a more proper long-term fix for the auto-detection.
-
06:48 PM Revision 0f78c59e: Fix Diag > Tables AJAX fadeOut after deletion for rows with CIDR mask format.
-
03:27 PM Bug #3149: SMART status widget always displays error with SCSI drives
- Nope... even after running a self-test, the output from "smartctl -H" remains unchanged. SCSI drives do SMART differ...
-
12:30 PM Bug #3149 (Needs Patch): SMART status widget always displays error with SCSI drives
- IIRC that is the default behavior until you have run a self-test on the drive, whether it is IDE or SCSI.
If someo... -
10:39 AM Bug #3149: SMART status widget always displays error with SCSI drives
- OK, that formatting was just a teensy bit annoying... see attached.
-
10:37 AM Bug #3149: SMART status widget always displays error with SCSI drives
- This seems to fix it, at least for my case, but I don't have an ATA-based system handy to verify I didn't break it fo...
-
10:29 AM Bug #3149 (Resolved): SMART status widget always displays error with SCSI drives
- (As of 2.1-RC1 (i386) built on Wed Aug 14 14:47:17 EDT 2013 FreeBSD 8.3-RELEASE-p9)
The SMART widget always displa... -
03:00 PM Revision f2999907: Add also a special case so the correct ip is returned for the case when WAN is v4 PPP type and v6 is DHCP but with option fetch v6 info from v4.
-
03:00 PM Revision 420aa48b: Add also a special case so the correct ip is returned for the case when WAN is v4 PPP type and v6 is DHCP but with option fetch v6 info from v4.
-
02:47 PM Bug #2882: 6RD not working in latest snapshots
- Hello,
I assume the second build just fixes the new problem with the WAN interface not getting an address at all?
... -
03:10 AM Bug #2882: 6RD not working in latest snapshots
- The first build on Thu Aug 15 had issues. The later build that day should be better:
2.1-RC1 (i386)
built on Thu Au... -
02:45 PM Revision f253e928: When using DHCPv6 and only requesting a prefix the communication on the WAN interface will be over link-local so return the link-local address of the interface in this case rather than nothing.
-
02:45 PM Revision d5707d33: When using DHCPv6 and only requesting a prefix the communication on the WAN interface will be over link-local so return the link-local address of the interface in this case rather than nothing.
-
02:35 PM Revision 912e3f6f: Optimize a bit to try and convrt back to friendly interface only when needed
-
02:35 PM Revision ebcbc110: Optimize a bit to try and convrt back to friendly interface only when needed
-
02:34 PM Revision 45c07f16: Resolves #2627. When WANv4 is PPP and v6 is DHCP but the option get v6 info from v4 is ticked the real interface is different. For WANv4 is pppXX and for v6 is the real underlying interface. Take this into consideration during interface_bring_down to properly cleanup things
-
02:33 PM Revision 90af1b8b: Resolves #2627. When WANv4 is PPP and v6 is DHCP but the option get v6 info from v4 is ticked the real interface is different. For WANv4 is pppXX and for v6 is the real underlying interface. Take this into consideration during interface_bring_down to properly cleanup things
-
02:33 PM Bug #3150 (Resolved): Ping, Traceroute, and related pages need fixes to ensure IPv6 addresses are scoped properly.
- To ensure proper routing/function with IPv6, when working with IPv6 IPs on some pages we need to make sure to add the...
-
02:11 PM Revision 8b257982: Correctly remove IPv6 addresses from the interface rather than just erroring out. The same trick that works for IPv4 of not specifying address does not work with v6
-
02:11 PM Revision c289c48a: Correctly remove IPv6 addresses from the interface rather than just erroring out. The same trick that works for IPv4 of not specifying address does not work with v6
-
01:38 PM Revision a55dd537: Even if called with wrong parameters try to do something rather than return here.
-
01:37 PM Revision 2391780c: Even if called with wrong parameters try to do something rather than return here.
-
12:30 PM Todo #3148 (Rejected): SMART status widget always displays error with SCSI drives
- Duplicated by #3149
-
10:27 AM Todo #3148 (Rejected): SMART status widget always displays error with SCSI drives
- (As of 2.1-RC1 (i386) built on Wed Aug 14 14:47:17 EDT 2013 FreeBSD 8.3-RELEASE-p9)
The SMART widget always displa... -
10:42 AM Revision 329acfb2: Reduce diff with master
-
10:40 AM Revision b77d19c7: Add the check even here when dealing with ipv6 addreses
-
10:39 AM Revision 93d38614: Handle link local addresses with embedded interface scope on is_ipaddrv6 and also on dnsmasq which is not yet there for these addresses
-
10:33 AM Revision 55909a9a: Handle link local addresses with embedded interface scope on is_ipaddrv6 and also on dnsmasq which is not yet there for these addresses
-
09:40 AM Bug #2627: Old delegated prefixes are not removed from the LAN interface
- Applied in changeset commit:45c07f167399a5fc900e54ea97d346a05cf23573.
-
09:40 AM Bug #2627 (Feedback): Old delegated prefixes are not removed from the LAN interface
- Applied in changeset commit:90af1b8bee63ceabb5e1e11e2eb02b3b7b20f5ad.
-
08:27 AM Bug #1399 (Feedback): rrdtool respawning too fast
- This should have been minimized now with the latest fixes in apinger.
Also there is no killing of apinger being done...
08/15/2013
-
11:32 PM Bug #3140 (Feedback): pfblocker 2.1 error (Cannot allocate memory) with builds after "Aug 1 19:39:40"
- Yes, this was fixed by commit:8b226290 / commit:c6868a8f it just wasn't noted here in the ticket.
-
08:51 PM Bug #3140: pfblocker 2.1 error (Cannot allocate memory) with builds after "Aug 1 19:39:40"
- Update:
This seems to have been fixed in today's build: Thu Aug 15 16:30:12 EDT 2013
I just installed it and t... -
07:31 PM Revision 8b226290: Unbreak limitrules and probably pfblocker errors. Spotted-by: Jim
-
07:30 PM Revision c6868a8f: Unbreak limitrules and probably pfblocker errors. Spotted-by: Jim
- 07:17 PM Revision bc317d1e: Merge pull request #776 from CharlieMarshall/helper
- improve the look of the pop up helper widget
- 07:17 PM Revision f59c7ae0: Merge pull request #772 from CharlieMarshall/jQueryWidgets
- convert dashboard progress bars to jqueryUI
-
07:07 PM Bug #2882: 6RD not working in latest snapshots
- Hi guys,
I just updated my pfsense test vm to the Thu Aug 15 build and now I don't even get an ipv6 address on my ... - 06:17 PM Revision 5ef8ec88: fix swap & temp
-
06:01 PM Bug #2674 (Resolved): MTU setting hardcoded 1280 for gif interfaces and in RADVD config
- The "strange fragmentation problems" are a separate issue entirely (current PF has issues w/v6 frags).
-
03:14 PM Bug #2674: MTU setting hardcoded 1280 for gif interfaces and in RADVD config
- As of {2.1-RC1 (amd64) built on Tue Aug 13 14:23:15 EDT 2013 FreeBSD 8.3-RELEASE-p9}, GIF tunnels still default to 12...
-
05:51 PM Revision b8131408: When renaming or deleting a virtual server, clean up the old relayd anchor name. Otherwise the rules are still there and valid, and will cause problems as they will override the new VS settings. Also clear out the anchors when stopping relayd or starting fresh that way no old settings could conflict.
-
05:46 PM Revision 108e868d: When renaming or deleting a virtual server, clean up the old relayd anchor name. Otherwise the rules are still there and valid, and will cause problems as they will override the new VS settings. Also clear out the anchors when stopping relayd or starting fresh that way no old settings could conflict.
- 11:40 AM Revision 1702a838: Improve sh syntax using ${} for all variables
- 11:39 AM Revision c0fc63d1: Improve sh syntax using ${} for all variables
-
09:02 AM Revision 174a331e: Also take dhcpv6 into consideration even here.
-
09:02 AM Revision 4529f07d: Also take dhcpv6 into consideration even here.
-
09:01 AM Revision a38b4bfb: Synchronize dhcpv6 as well if dhcp sync setting is on. Reported-by: http://forum.pfsense.org/index.php/topic,65487.0.html
-
09:01 AM Revision 5c4fdda3: Synchronize dhcpv6 as well if dhcp sync setting is on. Reported-by: http://forum.pfsense.org/index.php/topic,65487.0.html
08/14/2013
-
11:16 PM Revision f7496377: Cleanup some code that is not needed anymore
-
11:16 PM Revision 2c3924a1: Cleanup some code that is not needed anymore
-
11:05 PM Revision ce14e37b: Use pfSense module functions for finding interface v6 addresses. The addresses will be not in friendly format as returned by getnameinfo
-
11:05 PM Revision ed7edf07: Use pfSense module functions for finding interface v6 addresses. The addresses will be not in friendly format as returned by getnameinfo
- 09:12 PM Revision 1a6c12ca: improve the look of the pop up helper widget
-
07:19 PM Revision 55f2ca66: Merge pull request #775 from phil-davis/master
- Display pfSense interface name on status interfaces
- 06:54 PM Revision e2ddbda7: Display pfSense interface name on status interfaces
- Sometimes it is a bit difficult to work out which interface descriptive name is which pfSense internal interface name...
- 05:43 PM Revision 5a1c54f0: Merge pull request #774 from phil-davis/RELENG_2_1
- Relax advanced options firewall rules tests (2.1)
-
05:38 PM Bug #3147 (Resolved): Adding new interface can cause issues
- When adding a new interface on the (assign) page, it defaults to the first interface that hasn't been assigned. This ...
-
05:37 PM Revision 0caaa810: Merge pull request #773 from phil-davis/master
- Relax advanced options firewall rules tests
- 05:18 PM Revision ff6e6929: Relax advanced options firewall rules tests
- Various advanced options are now possible for any protocol since https://github.com/pfsense/pfsense/commit/653bde345e...
- 05:15 PM Revision e2ad288e: Relax advanced options firewall rules tests
- Various advanced options are now possible for any protocol since https://github.com/pfsense/pfsense/commit/653bde345e...
-
04:39 PM Bug #3140: pfblocker 2.1 error (Cannot allocate memory) with builds after "Aug 1 19:39:40"
- Update, this gets fixed by:
jimp:
Try reverting this commit via the system patches package:
https://github.com/p... - 02:56 PM Revision 9a478340: reduce height of progress bars
- 02:09 PM Revision bc0a344b: convert dashboard progress bars to jqueryUI
-
01:46 PM Bug #3146 (Feedback): Apinger still putting spaces after gateway names, leading to failing commands
- After Ermal's last commits to the apinger patches this appears to be working OK again. Failover is working, the comma...
-
09:11 AM Bug #3146 (Resolved): Apinger still putting spaces after gateway names, leading to failing commands
- Using the latest apinger and check_reload_status (confirmed via re-compiling and checking sha256), watching apinger i...
- 01:34 PM Revision 38546223: ammend css for jquery progressbars
-
12:52 PM Revision 818b5e64: Fix double-click to edit on OpenVPN CSC entries
-
12:52 PM Revision de85521a: Remove prior CSC entry when cleaning up. Fixes #3143
-
12:52 PM Revision f2291484: Declare globals as global before defining them in openvpn.inc
- 12:51 PM Revision a161bfb8: Make sure an alias is not used by a static route before delete, ticket #2941
-
12:51 PM Revision 72745233: Fix double-click to edit on OpenVPN CSC entries
-
12:48 PM Revision 2a666130: Remove prior CSC entry when cleaning up. Fixes #3143
-
12:41 PM Revision 37143833: Declare globals as global before defining them in openvpn.inc
- 11:05 AM Revision 90bc28cc: Fix checkes for nested aliases containing FQDNs on static routes. It fixes #2941
- 11:00 AM Revision 42626418: Do not allow to add nested alias containing FQDNs when current alias is used on a static route, ticket #2941
- 10:57 AM Revision cf96a1a9: Make sure an alias is not used by a static route before delete, ticket #2941
- 10:56 AM Revision c6592f21: Add a parameter, off by default, to expand all alias items, including hostnames
-
10:30 AM pfSense Packages Bug #3145 (Feedback): NRPEv2 problem with created configuration and check_nrpe2 (for example)
- Applied in changeset commit:bb9868cafa6bc1be95bf2a1ae80b0bccc1dfc7fa.
-
07:09 AM pfSense Packages Bug #3145 (Resolved): NRPEv2 problem with created configuration and check_nrpe2 (for example)
- Currently I am experiencing a problem with the configuration of NRPEv2-Plugins.
Everytime the configuration is new... -
07:50 AM Bug #3143: Orphaned OpenVPN Client Specific Overrides
- Applied in changeset commit:de85521ad54e27c2d0c8212c8ef907a3ac6be76d.
-
07:50 AM Bug #3143 (Feedback): Orphaned OpenVPN Client Specific Overrides
- Applied in changeset commit:2a6661305c4f05b312225f42ad931caa9df896b5.
-
01:16 AM Bug #3143 (Resolved): Orphaned OpenVPN Client Specific Overrides
- # Create a OpenVPN tunnel
# Create Client Specific Override
# Verify existence of the override in @/var/etc/openvpn... -
07:19 AM Bug #3142 (Rejected): Traffic graph widget refresh interval not possible to change or save
- Duplicate of #2231
-
01:23 AM Bug #3142: Traffic graph widget refresh interval not possible to change or save
- Does not work in 2.0.3 (i386).
-
06:10 AM Bug #2941 (Feedback): Prohibit adding aliases containing FQDNs in static routes
- Applied in changeset commit:90bc28cc9d75c59efc06a3aa319239bf7aafa259.
-
05:06 AM Bug #2941 (New): Prohibit adding aliases containing FQDNs in static routes
- Nested aliases are still broken, working on it
-
01:52 AM pfSense Packages Feature #3144 (Closed): Package info - Wiki
- Have suggestion to make package info page(which are link in package manager) to be created in wiki
(http://doc.pfsen... -
01:26 AM Bug #2633 (Resolved): Captive Portal timeouts cause users to be stuck in limbo
-
01:23 AM Bug #3008 (Resolved): custom dynamic dns update with https - curl error
-
01:20 AM Bug #3106 (Resolved): NAT forward rule error
-
01:18 AM Feature #3079 (Resolved): No way to individually backup/restore DHCPv6 config
-
01:12 AM Bug #3005 (Resolved): cant delete or edit unknown CAs and certificate (orphan entries)
-
01:11 AM Bug #3117 (Resolved): Services: Dynamic DNS client: leading and trailing spaces in hostname field breaks the DDNS functionality
-
12:15 AM Bug #2202 (Rejected): Firewall rules specifying a gateway does not work for WAN subnet in some cases.
- not a bug
08/13/2013
-
11:24 PM Bug #3142 (Rejected): Traffic graph widget refresh interval not possible to change or save
- The affected version is 2.0.3 (amd64).
It is not possible to change the traffic graph widget refresh interval and ... -
11:06 PM Bug #2202: Firewall rules specifying a gateway does not work for WAN subnet in some cases.
- Well, it works if you specifically specifies it. And I have no problems with that. Please close this one...
- 08:56 PM Revision 4be0c837: Fix check for existing IP Address in DHCP mapping
- Even the Error message says: "This Hostname, IP or MAC address already exists." the IP Address was not checked if it ...
- 08:53 PM Revision 7a2f4f58: Merge pull request #770 from individual-it/master
- Fix check for existing IP Address in DHCP mapping
-
08:10 PM Revision 9a85884b: Force apinger to write the status file before getting gateway status
-
08:09 PM Revision 2db93ddb: Force apinger to write the status file before getting gateway status
-
06:42 PM Todo #2953 (Rejected): Track down root cause for necessary rc.firmware adjustments for USB flash media
- Please discuss the ideas on forum or mailing lists, which are more appropriate places for technical discussions, and ...
-
05:03 PM Bug #3134: Apinger is not updating monitor IP until it is manually restarted
- Confirm it's working properly.
Also solved : https://redmine.pfsense.org/issues/3138 -
08:15 AM Bug #3134 (Resolved): Apinger is not updating monitor IP until it is manually restarted
-
08:00 AM Bug #3134 (Feedback): Apinger is not updating monitor IP until it is manually restarted
- Should be solved in later snapshots.
- 01:10 PM Revision 1016c546: Merge pull request #768 from CharlieMarshall/dyn
- tiny cosmetic change
-
12:39 PM Bug #3138: Load balancing / multi wan / fail over not working anymore
- Thanks.
I had a strong feeling it was related to apinger. - 11:14 AM Revision ce13cc5f: Fix check for existing IP Address in DHCP mapping
- Even the Error message says: "This Hostname, IP or MAC address already exists." the IP Address was not checked if it ...
-
10:18 AM Revision 7aae1866: Ticket #3139 try to detect if the popen is closed from an error
-
10:18 AM Revision 61ef1385: Ticket #3139 try to detect if the popen is closed from an error
-
08:14 AM Bug #3097 (Resolved): IPv6 over PPPoE is not working
-
08:12 AM Bug #3062 (Resolved): Captive Portal NOT re-using PIPENO
-
12:30 AM Bug #2941: Prohibit adding aliases containing FQDNs in static routes
- Hi,
It seems this fix broke using nested aliases for static routing as system_routes_edit.php line 131-138 assumes...
08/12/2013
- 07:26 PM Revision 0abc8f4a: remove whitespaces
- 07:25 PM Revision f5da0849: change to span all cells
-
06:16 PM Revision 1ca626e7: Prevent assigned vlans from being changed the tag.
-
04:36 PM Revision f8466c36: Fix interface selections on UPnP to show the customized descriptions entered by the user. While here, add an external interface selection knob. Fixes #3141
- Conflicts:
etc/inc/pkg-utils.inc -
04:33 PM Revision afa76eff: Fix interface selections on UPnP to show the customized descriptions entered by the user. While here, add an external interface selection knob. Fixes #3141
-
02:49 PM Bug #3103 (Resolved): GRE port forward problem with changing protocol
-
02:29 PM Bug #3138 (Closed): Load balancing / multi wan / fail over not working anymore
- cause of this is same as #3134 (related to apinger changes in general that we're working on).
-
01:25 PM Bug #3139: pkg-utils function stop_packages causes Syntax error bad fd number with more than one script file.
- Sorry I left out the condition you see the error. Put 2 .sh scripts in the /usr/etc/rc.d directory. Then go to a ser...
-
12:55 PM Bug #3139: pkg-utils function stop_packages causes Syntax error bad fd number with more than one script file.
- I still do not see the issue here!
Does the fwrite terminate execution of the script or something else i am missing? -
01:11 PM Bug #2945: Installation stucks at 36%: /usr/local/bin/cpdup -vvv -I -o /usr /mnt/usr
- just adding a comment for the record:
I found that unplugging devices (in my case an IDE HDD, the adapter to said ... - 12:15 PM Revision 3c249cfa: Remove datetimepicker.js since it's not used anymore
- 12:13 PM Revision f7c908aa: Merge pull request #767 from CharlieMarshall/usermanager-datePicker
- Imrpoves the datePicker on the add/edit userManager page
-
11:40 AM Bug #3141: UPNP Interface selection contains default interface names
- Applied in changeset pfsense:commit:f8466c3637eb87c406f0c3722eba65b843fcf56c.
-
11:40 AM Bug #3141 (Feedback): UPNP Interface selection contains default interface names
- Applied in changeset pfsense:commit:afa76eff3d145d089e11b93d95a06d27f3249efa.
Also available in: Atom