PF Sense
pfsense.org
Widely used, open source firewall/router.
- Homepage: pfsense.org
- GitHub: github.com/pfsense/pfsense
- Privacy: pfsense.org/privacy.html
- Web info: web-check.xyz/results/pfsense.org
PF Sense Privacy Policy
Privacy Policy Summary
- The service is provided 'as is' and to be used at your sole risk
- Instead of asking directly, this Service will assume your consent merely from your usage.
Documents
- Terms of ServiceCreated 08 Jan 22, Last modified 2 years ago
- Privacy PolicyCreated 08 Jan 22, Last modified 2 years ago
About the Data
This data is kindly provided by tosdr.org. Read full report at: #6291
PF Sense Source Code
Author
Description
Main repository for pfSense
Homepage
http://www.pfsense.orgLicense
Apache-2.0
Created
12 May 11
Last Updated
28 Mar 24
Latest version
Primary Language
PHP
Size
403,319 KB
Stars
4,600
Forks
1,411
Watchers
4,600
Language Usage
Star History
Top Contributors
-
@rbgarga (5039)
-
@jim-p (3926)
-
@sbeaver-netgate (2786)
-
@vktg (953)
-
@smos (717)
-
@NOYB (454)
-
@efonne (421)
-
@SjonHortensius (311)
-
@loos-br (284)
-
@doktornotor (215)
-
@jdillard (198)
-
@marcos-ng (187)
-
@rcmcdonald91 (182)
-
@PiBa-NL (181)
-
@sullrich (176)
-
@k-paulius (161)
-
@stilez (154)
-
@heper (138)
-
@bcyrill (136)
-
@dse (119)
-
@NewEraCracker (110)
-
@leprecha1 (87)
-
@CharlieMarshall (59)
-
@luckman212 (54)
-
@ermal (52)
-
@SanderVanLeeuwen (52)
-
@billm (48)
-
@Augustin-FL (45)
-
@peterberbec (44)
-
@vcoque (43)
Recent Commits
-
Luiz Otavio O Souza (28 Mar 24)
Improve the messaging used when the upgrade system is busy. Replace the generic 'error' message by a correct and more clear message.
-
R. Christian McDonald (25 Mar 24)
register_all_installed_packages: introduce option
-
jim-p (25 Mar 24)
Reflect config value of ddnsreverse for DHCPv6. Fixes #15118
-
jim-p (25 Mar 24)
Disallow hostnames in Kea NTP. Fixes #14991 * If they are in the config.xml data already, do not write them into the Kea configuration. * Do not allow the user to enter them in the GUI
-
jim-p (25 Mar 24)
Fix order of Kea boot files. Fixes #15032
-
jim-p (25 Mar 24)
Fix variable typo. Fixes #14996
-
jim-p (25 Mar 24)
Fix an radvd service status edge case. Fixes #14936
-
Luiz Otavio O Souza (21 Mar 24)
Update the code for consistency. No functional changes.
-
Luiz Otavio O Souza (21 Mar 24)
Run the pfSense-repoc with the new file names style.
-
Luiz Otavio O Souza (20 Mar 24)
Instrument the upgrade JSON data with more information about errors and failures. Now, with the proper return code, instead of presenting no data to the user when the pfSense-upgrade is busy (running in background), explain properly what is happening.
-
Luiz Otavio O Souza (20 Mar 24)
Add the support to the new pfSense-repoc repository files style. Keeps the support to the old style, so both versions of pfSense-repoc are supported.
-
jim-p (20 Mar 24)
Catch/handle some HTTP errors. Implements #15322 * Catch 50x errors, even from PHP FPM, so users don't end up with a blank white screen if an error happens too early in processing. * Catch 404 errros. * Handle both with static pages since PHP-FPM may have an issue of its own, so don't loop back there.
-
jim-p (19 Mar 24)
Correct empty resolver alias handling. Fixes #14942
-
jim-p (19 Mar 24)
Adjust unbound host alias validation. Fixes #14942
-
R. Christian McDonald (17 Mar 24)
pfSense-boot: now just a distribution package, eliminate post-install script
-
jim-p (15 Mar 24)
Add self-service user pw mgr to menu/tab. Issue #15266 No need to hide this since it's convenient and works well. While here, make all tab arrays in the user manager consistent.
-
jim-p (15 Mar 24)
Fix FW log multiple instance bug. Fixes #15339 Move the mdiff function into pfsense-utils.inc and also rename it so its purpose is more clear.
-
jim-p (14 Mar 24)
Add password check mode to usermgrpasswd. Issue #15266
-
jim-p (14 Mar 24)
Console password reset changes. Issue #15266 * Correct menu description as this is the admin user manager account and it is not specific to the GUI. * Clean up code and fix various strings/formatting * Use the password change script instead of setting a default value so the user is prompted to set a new password.
-
jim-p (14 Mar 24)
More accurate priv check for warning. Issue #15266
-
jim-p (13 Mar 24)
Improve user password warning boxes. Issue #15266 - Show warnings for user accounts as well as admin - Try to send the user to the self-service password manager page if they have access - Move the test/error generation to a function so it is simple to reuse. - Do not print warnings if the user does not have enough access to do anything to fix it.
-
jim-p (12 Mar 24)
Use pw validation function in wizard. Issue #15266
-
jim-p (12 Mar 24)
Centralize password hints. Issue #15266 Reduces repetition and makes it easier to maintain.
-
jim-p (12 Mar 24)
Fix local auth type match. Issue #15266
-
jim-p (12 Mar 24)
User Manager shell scripts. Issue #15266 * usermgrwhoami prints info about the current user from the user manager database. * usermgrpasswd allows root/admin to change passwords for user manager entries from the shell/console.
-
jim-p (11 Mar 24)
Set a stricter nginx header timeout.
-
jim-p (08 Mar 24)
Password validation for user manager. Issue #15266
-
jim-p (08 Mar 24)
Log widget fast update changes. Fixes #12673 Submitted-By: LouisAtGH @ GitHub
-
R. Christian McDonald (08 Mar 24)
status_interfaces.php: make sure "{}" is expanded by PHP and not be sh
-
R. Christian McDonald (07 Mar 24)
pkg_mgr_install.php: ensure pkg_switch_repo reads latest config
PF Sense Website
Website
pfSense® - World's Most Trusted Open Source Firewall
pfSense is a free and open source firewall and router that also features unified threat management, load balancing, multi WAN, and more
Redirects
Does not redirect
Security Checks
All 66 security checks passed
Server Details
- IP Address 208.123.73.68
- Hostname www.pfsense.org
- Location Austin, Texas, United States of America, NA
- ISP zColo
- ASN AS30312
Associated Countries
-
US
Saftey Score
Website marked as safe
100%
Blacklist Check
www.pfsense.org was found on 0 blacklists
- ThreatLog
- OpenPhish
- PhishTank
- Phishing.Database
- PhishStats
- URLhaus
- RPiList Not Serious
- AntiSocial Blacklist
- PhishFeed
- NABP Not Recommended Sites
- Spam404
- CRDF
- Artists Against 419
- CERT Polska
- PetScams
- Suspicious Hosting IP
- Phishunt
- CoinBlockerLists
- MetaMask EthPhishing
- EtherScamDB
- EtherAddressLookup
- ViriBack C2 Tracker
- Bambenek Consulting
- Badbitcoin
- SecureReload Phishing List
- Fake Website Buster
- TweetFeed
- CryptoScamDB
- StopGunScams
- ThreatFox
- PhishFort
Website Preview
PF Sense Reviews
More Self-Hosted Network Security
-
Network-level advertisement and Internet tracker blocking application which acts as a DNS sinkhole. Pi-Hole can significantly speed up your internet, remove ads and block malware. It comes with a nice web interface and a mobile app with monitoring features, it's open source, easy to install and very widely used.
-
Another DNS server for blocking privacy-invasive content at its source. Technitium doesn't require much of a setup, and basically works straight out of the box, it supports a wide range of systems (and can even run as a portable app on Windows). It allows you to do some additional tasks, such as add local DNS addresses and zones with specific DNS records. Compared to Pi-Hole, Technitium is very lightweight, but lacks the deep insights that Pi-Hole provides, and has a significantly smaller community behind it.
-
A hardened, versatile, state-of-the-art open source firewall based on Linux. Its ease of use, high performance and extensibility make it usable for everyone.
-
A simple way to set up a home VPN on any Debian server. Supports OpenVPN and WireGuard with elliptic curve encryption keys up to 512 bit. Supports multiple DNS providers and custom DNS providers - works nicely along-side PiHole.
-
Powerful open source web content filter.
-
Detect if you have a malware-infected computer on your network, and powerful network analysis framework and monitor.
-
Open-source self-hosted VPN and firewall built on WireGuard®.
About the Data: PF Sense
API
You can access PF Sense's data programmatically via our API.
Simply make a GET
request to:
https://api.awesome-privacy.xyz/networking/self-hosted-network-security/pf-sense
The REST API is free, no-auth and CORS-enabled. To learn more, view the Swagger Docs or read the API Usage Guide.
About the Data
Beyond the user-submitted YAML you see above, we also augment each listing with additional data dynamically fetched from several sources. To learn more about where the rest of data included in this page comes from, and how it is computed, see the About the Data section of our About page.
Share PF Sense
Help your friends compare Self-Hosted Network Security, and pick privacy-respecting software and services.
Share PF Sense and Awesome Privacy with your network!