Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - hedberg

#1
Thanks for your hint about writing the image from Linux. Rember to invoke the installer during boot - It timeouts in a few seconds.
#2
I could not get any machine to boot the new OPNsense 17.1. Today (inspired from another post in this forum) I tried to write the USB using a Linux machine instead of my normal Windows machine and it worked - my machine booted up the 17.1 installation.

#3
17.1 Legacy Series / 17.1 images will not boot
January 31, 2017, 10:21:44 PM
I would like to test 17.1 at a fairly new J1900 based machine with 4 intel nics.

This is the machine type:
https://www.amazon.co.uk/Celeron-Firewall-Fanless-Desktop-Computer-x/dp/B01IG5O95W

Tried both VGA versions from a USB stick and both CD-ROM versions with no success. Same machine booted one of the 16.7 versions just fine and I just installed a FreeBSD 11 on it to verify it wasnt the FreeBSD 11 that was at fault.

The CD-ROM load some small files and then dies. The USB version doesnt even boot.

Any ideas? 
#4
General Discussion / Default NTP server settings
January 21, 2017, 09:37:57 PM
Hi,

I just installed a secondary OpnSense the other day and noticed that the default NTP server in the installation was nl.pool.ntp.org.

The Pool NTP project requests vendors (also open source vendors) to create a vendor zone, so the default  should be e.g. [0-3].opnsense.pool.ntp.org

http://www.pool.ntp.org/en/vendors.html#vendor-zone

There is no cost for Open Source projects.

Br,
Thomas

#5
16.7 Legacy Series / Re: 100.000+ NTP queries a second
January 07, 2017, 10:48:42 PM
Thanks for your help.

I have added a request at Github - I hope that is the correct way.
#6
16.7 Legacy Series / Re: 100.000+ NTP queries a second
January 06, 2017, 08:40:48 PM
Quote from: will on January 06, 2017, 08:05:14 PM
Question: Why are you even putting this device behind NAT, a firewall is one thing but NAT should not be used here in my frank opinion.

I do not have any other option. This is installed in a private home and the Internet connections that is payable doesnt offer the possibility for multiple IPs.

Quote from: will on January 06, 2017, 08:05:14 PM
Anyway, really what you are going to care about here is how fast your box can forward traffic in packets per-second (PPS), not bit/s because as you have discovered the actual throughput is very low.  Also small sized packets, which will be more taxing on the CPU.

A useful tool to hammer your box with here is something like Cisco TRex (https://trex-tgn.cisco.com).

Here are a few pointers though:

1) Run the OPNsense box on bare metal, or if you must use a VM then at least use some form of direct-io to attach the NICs directly.

2) OPNsense is a software router, performance is CPU and memory bound, get the fastest you can in both cases - the Atoms are great boxes but if outright pps is what you are chasing then an E3 or E5 Xeon is what you should be going for, look for the "frequency optimised" chips perhaps, more GHz less cores.

3) Set the firewall to expire state entries aggressively - Firewall > Settings > Advanced "Firewall Optimization - Aggressive"

I'll definitely try bare-metal. I configured the Firewall Optimization option to aggressive and will monitor if it gives me problems. Xeon will probably be a little to expensive - power is unfortunately quite expensive here and most of the models seems quite expensive - but I'll see how much performance I can get from the existing box.

Thanks for the pointers.
#7
16.7 Legacy Series / Re: 100.000+ NTP queries a second
January 06, 2017, 08:17:22 PM
Quote from: s4rs on January 06, 2017, 04:35:00 PM
Just curious if you ran iperf through the firewall for a baseline? I have a dual core 1.7GHz celeron that I can get 400Mb/s with tcp iperf (17.1.b). I would expect udp to perform better. This is running Opnsense under Fedora 25 Server as a KVM guest. BTW in my testing 17.1.b performs much better under a VM than does 16.7.11

I have done any systematic testing on it. I just did some basic speed tests. However it can easily move much more data when it is larger packets. Using FTP it very easily transfers 500Mbit from the Internet to an internal VM on the same host and place it on a SMB share on a Synology box. I did a test on a smaller box with the same type of nics. A J1900 using ntttcp It could quite easily move 1Gbit between interfaces - but again larger packets.

I realize it sounds like I am complaining - I am not - I just find it fascinating and would like to optimize it as much as possible.

#8
16.7 Legacy Series / Re: 100.000+ NTP queries a second
January 06, 2017, 07:56:37 PM
Quote from: fabian on January 06, 2017, 11:59:11 AM
Just an idea: Can you try to turn off state tracking for this service (advanced firewall settings) - note that you will need to pass the reverse channel too when state tracking is disabled.

Is that for the firewall rule itself or for the entire firewall?

Quote from: fabian on January 06, 2017, 11:59:11 AM
Another idea is changing the state timeout of UDP to something less so it will also free the state tracking entry earlier.

I can't seem to find that option. Is is a command line thing I need to add?
#9
16.7 Legacy Series / Re: 100.000+ NTP queries a second
January 06, 2017, 10:42:49 AM
Currently it is configured to route it to an internal Linux server on an internal IP (NAT) and I would like it to do the same with the new appliance box (LeoNTP).

Yesterday it was made a part of the Chinese pool of NTP server together with other volunteers and the traffic went through the roof – or so I thought anyway. In reality it was only 5-10Mbit, but it sure made the firewall work. The number of states went to aproxx. 300.000 with only 5-10Mbit of traffic, so I am happy I added more memory a couple of hours before (8Gb) and 2 CPU's extra. With 8Gb the default number of states is is around 800-900.000 and it made good use of it.

Is it because it is NAT that it keep a state for a UDP packet?

Currently I am considering to re-install the firewall, so OpnSense isnt installed in a VM, but gets all the hardware to play with, but it still seems (to me) that it would fail if I actually recieved just 15Mbit of NTP traffic. 
#10
16.7 Legacy Series / 100.000+ NTP queries a second
January 04, 2017, 02:44:00 PM
I have purchased a new NTP server that is able to handle 100.000 NTP queries a second. It is going to be a part of the pool.ntp.org project and I expect quite a bit of load on it.

I was warned by the manufacturer that a lot of network equipment and firewalls might have problems handling 100.000+ requests a second or about 100Mbit traffic of very small packets. I assume it is because most modern firewalls have statefull inspection and it probably require a lot of memory to server that many small packets.

Currently I have OpnSense installed on VMware on an Atom 2750 based motherboard. It has 32GB of memory with 2GB allocated to OpnSense at the moment together with 2 of 8 cores. It has 4Gbit Intel interfaces and the internet connection is 500/500Mbit. For the ones who might be interested in the NTP server it is a LeoNTP.

Has anybody tried this on OpnSense with a similar hardware platform? I would be grateful for any suggestions or concerns you might have.

(This is installed in a private home, so there is nobody else being affected if the firewall can't cope with it).




#11
It is a good suggestion, but to my undestanding it wont work.

I often find that I need to specify wildcards to the domain name and this function need to know the fully qualified domain name.

One example is windows updates. Ín order to get either that or WSUS to work you need to provide access to something like *.update.microsoft.com plus a couple of other domains because the host name is changed constantly.

#12
Donated 20€
#13
I used it a lot before changing to OPNsense. As a minimum I always used it for all my isolated zones where eg. a server only had reason to talt a a limited amount of domains for e.g. updates and no other reason to initiate traffic to the internet.

I always try to lock things down as much as possible and prefer whitelists to blacklists. Thanks for not dismissing it - I am crossing my fingers :)

#14
Have you considered making the proxy's blacklist function more flexible, so one could "turn it on it's head" and forbid everything except categories that was checked/allowed - a whitelist.

EDIT: A shame that the whitetrash project (http://whitetrash.sourceforge.net) is abandoned. Looks interesting.
#15
What settings have you configured have for the VPN connection?