| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
package contents may live there, factory default configs live there.
|
|
|
|
|
|
| |
Tell users that this is possible in DNS Resolver and how to achieve it. The code in unbound.inc already supports it and works.
I had asked for this in Redmine feature request #4350 and when I went to look at coding to implement it I found code that already did it.
So IMHO it is worth telling users.
|
| |
|
| |
|
| |
|
|
|
|
| |
VGA redirection is enabled
|
| |
|
|
|
|
| |
shuffling configuration around.
|
|
|
|
| |
necessary or desirable, but Amazon VPC VPNs use that as their tunnel subnet with BGP setups.
|
|
|
|
| |
used, otherwise you're restoring a probably old backup file. Ticket #4531
|
| |
|
| |
|
|
|
|
|
|
| |
Note that advertise is spelt with an "s" in other places in the GUI, so
making it consistent in services_ntpd - but maybe Americans do spell it
"advertize" these days?
|
|
|
|
| |
this helps pick a free port for services using sockets bound to localhost, and helps determine if the service has at least started and bound the port without needing to go through all 'connected' sockets as well
|
| |
|
|
|
|
| |
a config setting to disable, rather than enable, this functionality since it's enabled by default so the tag isn't necessary in the default config. Remove now unnecessary config upgrade code.
|
| |
|
|
|
|
| |
obsoletedfiles
|
| |
|
|
|
|
| |
appropriate ruleset is generated and problem scenarios that would otherwise break here are prevented by other input validation.
|
| |
|
| |
|
| |
|
|
|
|
| |
lan from ipsec. Ticket #4504
|
| |
|
| |
|
|
|
|
| |
traffic sent to lan ip to go to the ipsec tunnel
|
| |
|
| |
|
| |
|
|
|
|
| |
to logs.
|
| |
|
| |
|
| |
|
|
|
|
| |
When generating policy-routing rules there was no check if a gateway had force-down set, so gateway with force_down set would still get policy-routing rules written for it, even if skip_rules_gw_down was enabled.
|
| |
|
|
|
|
| |
daemon not running or has a problem!" when IPsec isn't enabled.
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
wlandev in FreeBSD 10.x at the moment. Ticket #4406
|
| |
|
|
|
|
| |
it doesn't fall through to the default (1).
|
|
|
|
|
|
|
|
|
|
|
|
| |
https://forum.pfsense.org/index.php?topic=91168.msg505273#msg505273
$config['voucher'][$cpzone]['msgnoaccess']
and
$config['voucher'][$cpzone]['msgexpired']
do not exist.
These should be
$config['voucher'][$cpzone]['descrmsgnoaccess']
and
$config['voucher'][$cpzone]['descrmsgexpired']
|
|
|
|
|
| |
The other tabs of Status:RRD Graphs put the friendly description of each interface into the drop-down list for selection.
This change makes the Custom tab do that also.
|
|
|
|
|
|
|
|
|
|
|
|
| |
when forwarding mode is on.
The General Setup setting "Allow DNS server list to be overridden by DHCP/PPP on WAN" has always been used in dnsmasq to ADD DHCP/PPP provided DNS servers to the list, while also keeping the DNS servers specified in General Setup. That behavior is needed if:
1) WAN1 static IP with upstream DNS server/s specified in General Setup and selecting the WAN1 gateway. WAN2 uses DHCP, DNS server received by DHCP from upstream. The user needs to tick "Allow DNS server list to be overridden by DHCP/PPP on WAN" to get the WAN2 DNS server to be used, but also wants the DNS server from General Setup to also be used.
2) WAN1 static IP, DNS server/s specified in General Setup. For whatever reason the user has also ticked "Allow DNS server list to be overridden by DHCP/PPP on WAN". In actual fact there are no WAN-style interfaces set to DHCP, so "allowing to be overridden" should not come into effect anyway - the DNS servers in General Setup should be used.
3) WAN1 DHCP, but the upstream DHCP does not give out any DNS server/s. "Allow DNS server list to be overridden by DHCP/PPP on WAN" is ticked. Again there are no DNS servers received via DHCP, so any "override" should not be invoked.
In all cases, it turns out that actually we want any General Setup DNS servers to be included in the DNS forwarder/resolver conf in addition to whatever (if any) DNS servers happen to be provided from a DHPC-WAN.
This change makes unbound behave that way - the same as dnsmasq already does.
|
|
|
|
|
|
|
|
| |
I was on a test system and had an upstream DNS server IP specified in System-General Setup. WAN was setup with a static IP and a gateway to that upstream device. All good.
Then I also checked "Allow DNS server list to be overridden by DHCP/PPP on WAN" and changed WAN to be DHCP. It received by DHCP the same DNS server IP that already happened to be in General Setup (and the same gateway IP - not the issue here).
/var/etc/resolv.conf had the name server line twice with the same IP address - once from the DHCP acquired data, and once from the General Setup data.
I don't think it broke anything, but it does look odd.
This change makes sure that DNS servers from General Setup are only added to resolv.conf when they are not already there.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Note: We can let the code pass "never" (or any other unexpected stuff)
to adjust_gmt()
adjust_gmt() should anyway handle the case when strtotime() cannot
understand the input string and thus returns false. In that case we
return the input string as-is so it will be displayed as the time. That
way the user will see it and can report easily whatever other unexpected
char data was in the leases file.
It also prevents "false" (zero) being converted to the date-time string
and thus becoming the Unix epoch 1 Jan 1970 on the display.
Latest forum report of this kind of thing:
https://forum.pfsense.org/index.php?topic=90083.0
|