
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: Q-Feeds on October 17, 2025, 03:13:39 PMQuote from: Lurick on October 17, 2025, 03:09:19 PMDid the feeds get messed up?
At about 8:45am EST QFeeds started blocking EVERYTHING on my network out of nowhere.
I had to disable the firewall rules to regain connectivity.
That's severe! Can you share some logs? Which blocks have been registered?
Quote from: Q-Feeds on October 11, 2025, 03:41:36 PMQuoteI did have to use:
/usr/local/opnsense/scripts/qfeeds/qfeedsctl.py
instead of
/usr/local/opnsense/scripts/qfeedsctl.py
to run the three commands
Aah yes that was my mistake. The commands show the expected behavior.. you've tried a reboot already I guess ?
Or this "service configd restart"
Quote from: Q-Feeds on October 11, 2025, 02:17:42 PMQuote from: Lurick on October 11, 2025, 01:32:33 PMDang, I was hopeful but that still shows the same behavior even on stock theme
For logs I see this in the Web GUI log tab:
(/usr/obj/usr/ports/www/lighttpd/work/lighttpd-1.4.82/src/gw_backend.c.533) connect() /var/lib/php/tmp/php-fastcgi.socket-1: Connection refused
.........
Hmm interesting. Perhaps a reinstall of the plugin does the trick, like Seimus suggested ?
Otherwise could you provide us with the output of the following commands:
/usr/local/opnsense/scripts/qfeedsctl.py fetch_index -v
/usr/local/opnsense/scripts/qfeedsctl.py fetch -v
/usr/local/opnsense/scripts/qfeedsctl.py firewall_load -v
Quoteroot@firewall:/usr/local/opnsense/scripts/qfeeds # ./qfeedsctl.py fetch_index -v
send: b'GET /licenses.php HTTP/1.1\r\nHost: api.qfeeds.com\r\nUser-Agent: Q-Feeds_OPNsense\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nConnection: keep-alive\r\nAuthorization: Basic {redacted}\r\n\r\n'
reply: 'HTTP/1.1 200 OK\r\n'
header: Date: Sat, 11 Oct 2025 13:04:45 GMT
header: Server: Apache/2
header: X-Content-Type-Options: nosniff
header: Strict-Transport-Security: max-age=63072000; includeSubDomains
header: Upgrade: h2,h2c
header: Connection: Upgrade, Keep-Alive
header: Vary: Accept-Encoding,User-Agent
header: Content-Encoding: gzip
header: X-XSS-Protection: 1
header: X-Frame-Options: SAMEORIGIN
header: X-Content-Type-Options: nosniff
header: Referrer-Policy: no-referrer-when-downgrade
header: Feature-Policy: geolocation 'self'; vibrate 'none'
header: X-Download-Options: noopen
header: X-Permitted-Cross-Domain-Policies: master-only
header: X-DNS-Prefetch-Control: on
header: Strict-Transport-Security: max-age=31536000
header: Permissions-Policy: geolocation=*, midi=(), sync-xhr=(self "https://qfeeds.com" "https://www.qfeeds.com"), microphone=(), camera=(), magnetometer=(), gyroscope=(), payment=(), fullscreen=(self "https://qfeeds.com" "https://www.qfeeds.com")
header: Content-Length: 733
header: Keep-Alive: timeout=2, max=100
header: Content-Type: application/json
downloaded index to /var/db/qfeeds-tables/index.json
root@firewall:/usr/local/opnsense/scripts/qfeeds # ./qfeedsctl.py fetch -v
skipped /var/db/qfeeds-tables/malware_ip.txt [2025-10-11T13:00:00Z]
skipped /var/db/qfeeds-tables/malware_domains.txt [2025-10-11T13:00:00Z]
skipped /var/db/qfeeds-tables/phishing_urls.txt [2025-10-11T13:00:00Z]
root@firewall:/usr/local/opnsense/scripts/qfeeds # ./qfeedsctl.py firewall_load -v
load feed malware_ip [no changes.]
root@firewall:/usr/local/opnsense/scripts/qfeeds #
Quote from: Seimus on October 11, 2025, 01:17:38 PMLooks like the plugin didn't load for you properly, did you try to clear cache in the browser?
Regards,
S.
Quote from: Q-Feeds on October 10, 2025, 11:16:15 PMQuote from: Lurick on October 10, 2025, 09:44:48 PMQuote from: Q-Feeds on October 10, 2025, 09:01:48 PM!! Update !!
I have some great news!! We've finally been able to tackle the rate-limit issue. And we've made some major improvements to the plugin.
We've changed the logic the old rate limit works. Now we're introducing a data delay. The community license now has a 7-day data delay, the Plus license a 4-hour delay and the Premium license is still the latest set. That said you can (try to) pull the data as many times (within boundaries) as you want on a day, you will receive the dataset of 7 days / 4 hours ago / 20 minutes respectively. The update mechanism in the plugin automatically handles the right update time.
.....
Events page is empty and doesn't seem to load even though logging is enabled on the alias rules. I also noticed Events is on the menu but not in the tabs, overall though I look forward to testing this version going forward for the changes.
Wel it could take up to 30 seconds to load the actual events. The missing tab is interesting, can't seem to reproduce that. Anyone else experiencing that?
Quote from: Q-Feeds on October 10, 2025, 09:01:48 PM!! Update !!
I have some great news!! We've finally been able to tackle the rate-limit issue. And we've made some major improvements to the plugin.
We've changed the logic the old rate limit works. Now we're introducing a data delay. The community license now has a 7-day data delay, the Plus license a 4-hour delay and the Premium license is still the latest set. That said you can (try to) pull the data as many times (within boundaries) as you want on a day, you will receive the dataset of 7 days / 4 hours ago / 20 minutes respectively. The update mechanism in the plugin automatically handles the right update time.
We also added an event page to the plugin to see the actual activity. This will only work if you've applied logging on the rules where the Alias is bound to.
We've improved the widget with some more data.
And the plugin now moved from 'Services' to 'Security'
The new update scheme is already active. If you want to test the new Plugin functionality you can run the following command:pkg add -f <same URL but with "-0.1_1.pkg" as extension>If you can't get it to work please send us a PM.
Please do not share the URL yet on the forum since we want to keep the testing group under control for now :)
Known issue: the widget on the TIP dashboard only shows the Premium count currently for all users. We will change this in the upcoming (work)days. We might spend some weekend hours on it :)
Once more we want to thank you all for you feedback! And obviously we keep on working on the rest of the list.
Kind regards,
Stefan
Quote from: Monviech (Cedrik) on October 10, 2025, 05:38:10 PMYou do not need additional floating rules.
In the current one, set an Alias as Source (invert it in the rule) in which you add all hosts that should be excluded.
This means, all hosts that are not the ones in the alias will be inspected.
Same can be done with a inverted destination alias.