PF Sense
pfsense.orgWidely used, open source firewall/router.
- Homepage: pfsense.org
- GitHub: github.com/pfsense/pfsense
- Privacy: tosdr.org/en/service/6291
- Web info: web-check.xyz/results/pfsense.org
PF Sense Privacy Policy
Privacy Policy Summary
- The service is provided 'as is' and to be used at your sole risk
- Instead of asking directly, this Service will assume your consent merely from your usage.
Documents
- Terms of ServiceCreated 08 Jan 22, Last modified 2 years ago
- Privacy PolicyCreated 08 Jan 22, Last modified 2 years ago
About the Data
This data is kindly provided by tosdr.org. Read full report at: #6291
PF Sense Source Code
Author
Description
Main repository for pfSense
Homepage
http://www.pfsense.orgLicense
Apache-2.0
Created
12 May 11
Last Updated
30 Nov 24
Latest version
Primary Language
PHP
Size
404,669 KB
Stars
4,951
Forks
1,482
Watchers
4,951
Language Usage
Star History
Top Contributors
- @rbgarga (5041)
- @jim-p (3950)
- @sbeaver-netgate (2786)
- @vktg (954)
- @smos (717)
- @NOYB (454)
- @efonne (421)
- @marcos-ng (406)
- @SjonHortensius (311)
- @loos-br (294)
- @doktornotor (215)
- @rcmcdonald91 (209)
- @jdillard (198)
- @PiBa-NL (181)
- @sullrich (176)
- @k-paulius (161)
- @stilez (154)
- @heper (138)
- @bcyrill (136)
- @dse (119)
- @NewEraCracker (110)
- @leprecha1 (87)
- @CharlieMarshall (59)
- @luckman212 (54)
- @ermal (52)
- @SanderVanLeeuwen (52)
- @billm (48)
- @Augustin-FL (45)
- @peterberbec (44)
- @vcoque (43)
Recent Commits
- Marcos Mendoza (29 Nov 24)
Ignore queue status interface. Fix #15885 Return the previous condition; $altqstats['interface'] is not required.
- Marcos Mendoza (27 Nov 24)
Don't separate the last array key in config access paths
- Marcos Mendoza (27 Nov 24)
Config access regression in L2TP. Fix #15882
- Luiz Souza (27 Nov 24)
Pass the correct option for pfSense-upgrade to detect when a new version is available. To be able to find new releases, pfSense-upgrade needs to look at all the repositories and that is done with '-C'. Ticket: #15880
- Luiz Souza (27 Nov 24)
Quote the shell variables as necessary. No functional changes.
- Marcos Mendoza (27 Nov 24)
Limit RDNSS addresses to 3. Fix #15876
- Luiz Souza (27 Nov 24)
Remove the call to update_repos() in the pkg metadata update cronjob. This is not necessary anymore as it is now handled by pfSense-upgrade.
- Marcos Mendoza (26 Nov 24)
Merge pull request #4717 from Self-Hosting-Group/igd-pcp-finalisation https://redmine.pfsense.org/issues/15864 Followup to: 7961830d30b89605b26732350335f5a9498ff5ba 9bc580f00f691b2c3de5f029c8f381205eb99e07
- jim-p (26 Nov 24)
Avoid potential name collision in CSRF
- Self-Hosting-Group (25 Nov 24)
UPnP IGD & PCP: No need to enter STUN port and update example servers (#4717)
- Self-Hosting-Group (25 Nov 24)
UPnP IGD & PCP: Simplify UI and finalise wording and descriptions update (#4717)
- Marcos Mendoza (21 Nov 24)
Merge pull request #4645 from pypckompsite/master
- Marcos Mendoza (21 Nov 24)
Add some function descriptions
- Marcos Mendoza (21 Nov 24)
Support IPv6 requests for any DDNS service. Implement #11177 Introduce get_dyndns_source_address() to find the source address to be used when sending a DDNS request. It supports both IPv4 and IPv6 - determined by the configured gateway and addresses on the interface. Update dyndnsCheckIP() to use get_dyndns_source_address() for IPv6 support. Also update the IP pattern to improve matching potential. Update the DDNS class to use the new code for IPv6 requests.
- Marcos Mendoza (02 Nov 24)
Update the Check IP Service IP pattern to improve matching potential
- Marcos Mendoza (20 Nov 24)
Add specialnet flag for VIP aliases only
- Marcos Mendoza (18 Nov 24)
Exclude Tailscale group from specialnets. Implement #15848
- Marcos Mendoza (18 Nov 24)
Clarify the notice given when rules are skipped
- Marcos Mendoza (18 Nov 24)
Config access regression when editing system tunables. Fix NG#18003
- Marcos Mendoza (18 Nov 24)
Exclude WireGuard group from specialnets. Implement #15848
- Marcos Mendoza (15 Nov 24)
List Kea HA TLS certificates without a type. Fix #15842
- Marcos Mendoza (14 Nov 24)
Fix config warning message trace
- Marcos Mendoza (13 Nov 24)
Regression in setup wizard when setting checkbox values. Fix NG#17960 Followup to 5731f17e082d5c0924771a8689303fcfdbd3880f
- R. Christian McDonald (12 Nov 24)
kea: backup and restore lease db when using ramdisks. Fixes #15828
- Marcos Mendoza (11 Nov 24)
Allow removing package menus with different sections. Fix #15834 A package may have multiple menus with the same name but different sections.
- Marcos Mendoza (11 Nov 24)
Config access regression with default check IP service. Fix #15833
- Marcos Mendoza (11 Nov 24)
Work around regression when specifying the DDNS source address. Fix #15832 More details: https://github.com/curl/curl/issues/15553
- Marcos Mendoza (11 Nov 24)
Regression in setup wizard when setting checkbox values. Fix NG#17960
- Reid Linnemann (09 Nov 24)
process_alias_urltable(): create RAM_Disk_Store if needed. Fixes #15830 Several rcscripts using /cf/conf/RAM_Disk_Store will test and create this directory if needed, however the process_alias_urltable() function invoked by saveAlias() does not do this before attempting to write an archive to that directory. This commit corrects that oversight.
- Marcos Mendoza (07 Nov 24)
Introduce helper function for domain:port host address validation Also update related validation functions to force numeric ports.
PF Sense Website
Website
pfSense® - World's Most Trusted Open Source Firewall
pfSense is a free and open source firewall and router that also features unified threat management, load balancing, multi WAN, and more
Redirects
Does not redirect
Security Checks
All 66 security checks passed
Server Details
- IP Address 208.123.73.68
- Hostname www.pfsense.org
- Location Austin, Texas, United States of America, NA
- ISP zColo
- ASN AS30312
Associated Countries
- US
Saftey Score
Website marked as safe
100%
Blacklist Check
www.pfsense.org was found on 0 blacklists
- ThreatLog
- OpenPhish
- PhishTank
- Phishing.Database
- PhishStats
- URLhaus
- RPiList Not Serious
- AntiSocial Blacklist
- PhishFeed
- NABP Not Recommended Sites
- Spam404
- CRDF
- Artists Against 419
- CERT Polska
- PetScams
- Suspicious Hosting IP
- Phishunt
- CoinBlockerLists
- MetaMask EthPhishing
- EtherScamDB
- EtherAddressLookup
- ViriBack C2 Tracker
- Bambenek Consulting
- Badbitcoin
- SecureReload Phishing List
- Fake Website Buster
- TweetFeed
- CryptoScamDB
- StopGunScams
- ThreatFox
- PhishFort
Website Preview
PF Sense Reviews
More Self-Hosted Network Security
-
Network-level advertisement and Internet tracker blocking application which acts as a DNS sinkhole. Pi-Hole can significantly speed up your internet, remove ads and block malware. It comes with a nice web interface and a mobile app with monitoring features, it's open source, easy to install and very widely used.
-
Another DNS server for blocking privacy-invasive content at its source. Technitium doesn't require much of a setup, and basically works straight out of the box, it supports a wide range of systems (and can even run as a portable app on Windows). It allows you to do some additional tasks, such as add local DNS addresses and zones with specific DNS records. Compared to Pi-Hole, Technitium is very lightweight, but lacks the deep insights that Pi-Hole provides, and has a significantly smaller community behind it.
-
A hardened, versatile, state-of-the-art open source firewall based on Linux. Its ease of use, high performance and extensibility make it usable for everyone.
-
A simple way to set up a home VPN on any Debian server. Supports OpenVPN and WireGuard with elliptic curve encryption keys up to 512 bit. Supports multiple DNS providers and custom DNS providers - works nicely along-side PiHole.
-
Powerful open source web content filter.
-
Detect if you have a malware-infected computer on your network, and powerful network analysis framework and monitor.
-
Open-source self-hosted VPN and firewall built on WireGuard®.
About the Data: PF Sense
API
You can access PF Sense's data programmatically via our API.
Simply make a GET
request to:
https://api.awesome-privacy.xyz/networking/self-hosted-network-security/pf-sense
The REST API is free, no-auth and CORS-enabled. To learn more, view the Swagger Docs or read the API Usage Guide.
About the Data
Beyond the user-submitted YAML you see above, we also augment each listing with additional data dynamically fetched from several sources. To learn more about where the rest of data included in this page comes from, and how it is computed, see the About the Data section of our About page.
Share PF Sense
Help your friends compare Self-Hosted Network Security, and pick privacy-respecting software and services.
Share PF Sense and Awesome Privacy with your network!