Does it work like this for everyone? It defaults to 7 and miscounts the pages on two different CPU's and does so on a fresh install. It seems to work at blocking what its supposed to, so I can't complain really. But odd...
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts Menuroot@owlhouse:/usr # ping google.com
PING google.com (172.217.5.14): 56 data bytes
64 bytes from 172.217.5.14: icmp_seq=0 ttl=119 time=15.542 ms
64 bytes from 172.217.5.14: icmp_seq=1 ttl=119 time=15.475 ms
64 bytes from 172.217.5.14: icmp_seq=2 ttl=119 time=15.842 ms
^C
--- google.com ping statistics ---
3 packets transmitted, 3 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 15.475/15.620/15.842/0.160 ms
root@owlhouse:/usr # /usr/local/etc/rc.d/wireguard restart
[#] rm -f /var/run/wireguard/wg0.sock
[#] resolvconf -d wg0
wg-quick: `wg1' is not a WireGuard interface
[#] ifconfig wg create name wg0
[!] Missing WireGuard kernel support (ifconfig: SIOCIFCREATE2: Invalid argument). Falling back to slow userspace implementation.
[#] wireguard-go wg0
┌──────────────────────────────────────────────────────┐
│ │
│ Running wireguard-go is not required because this │
│ kernel has first class support for WireGuard. For │
│ information on installing the kernel module, │
│ please visit: │
│ https://www.wireguard.com/install/ │
│ │
└──────────────────────────────────────────────────────┘
[#] wg setconf wg0 /dev/stdin
[#] ifconfig wg0 inet 192.168.12.1/24 alias
[#] ifconfig wg0 mtu 1420
[#] ifconfig wg0 up
[#] resolvconf -a wg0 -x
[#] route -q -n add -inet 192.168.12.12/32 -interface wg0
[#] route -q -n add -inet 192.168.12.11/32 -interface wg0
[#] route -q -n add -inet 192.168.12.10/32 -interface wg0
[+] Backgrounding route monitor
[#] ifconfig wg create name wg1
[!] Missing WireGuard kernel support (ifconfig: SIOCIFCREATE2: Invalid argument). Falling back to slow userspace implementation.
[#] wireguard-go wg1
┌──────────────────────────────────────────────────────┐
│ │
│ Running wireguard-go is not required because this │
│ kernel has first class support for WireGuard. For │
│ information on installing the kernel module, │
│ please visit: │
│ https://www.wireguard.com/install/ │
│ │
└──────────────────────────────────────────────────────┘
[#] wg setconf wg1 /dev/stdin
Name does not resolve: `vaaa.bbb.ccc:51820'
Configuration parsing error
[#] rm -f /var/run/wireguard/wg1.sock
root@owlhouse:/usr # ping google.com
ping: cannot resolve google.com: Host name lookup failure
root@owlhouse:/usr #
<unbound>
<enable>1</enable>
<custom_options>#server:
#tls-cert-bundle: "/etc/ssl/cert.pem"
forward-zone:
name: "."
forward-tls-upstream: yes
forward-addr: 1.1.1.1@853
forward-addr: 1.0.0.1@853</custom_options>
<dnssec>1</dnssec>
<noreglladdr6>1</noreglladdr6>
<acls>
<aclname>VPN</aclname>
<aclaction>allow</aclaction>
<description/>
<row>
<acl_network>192.168.1.0</acl_network>
<mask>24</mask>
<description/>
</row>
</acls>
<acls>
<aclname>WGaccess</aclname>
<aclaction>allow</aclaction>
<description/>
<row>
<acl_network>192.168.12.0</acl_network>
<mask>24</mask>
<description/>
</row>
<row>
<acl_network>10.11.14.0</acl_network>
<mask>24</mask>
<description/>
</row>
</acls>
</unbound>
Quote from: franco on February 01, 2021, 09:05:37 AM
I don't know what you are talking about and honestly it's difficult to help with external ntop repository usage. We talked to them and noted that their build settings are not 100% compatible so some bouncing back and forth is the least problematic issue going forward...
But anyway, these are our versions as per FreeBSD ports:
https://pkg.opnsense.org/FreeBSD:12:amd64/21.1/MINT/21.1/LibreSSL/All/
ntopng-4.2.d20201228,1.txz 2021-01-26 15:38 7.2M
ndpi-3.4.d20201222,1.txz 2021-01-26 15:38 524K
Assuming "downgraded my ntopng from 4.0 to 3.4" actually meaning ndpi would make a bit more sense.
For major updates - and this was requested by many - we cleanly reinstall all our packages from our mirror... Meaning I cannot see a bug here other than ntop shipping duplicate packages and not adhering to our build parameters.
Cheers,
Franco
ntopng Community v.3.4.0
ntopng-4.2.d20210122,1
Feb 14 22:21:55 home lighttpd[81368]: (gw_backend.c.315) gw-server re-enabled: unix:/tmp/php-fastcgi.socket-1 0 /tmp/php-fastcgi.socket
Feb 14 22:21:55 home lighttpd[81368]: (gw_backend.c.315) gw-server re-enabled: unix:/tmp/php-fastcgi.socket-0 0 /tmp/php-fastcgi.socket
Feb 14 22:21:56 home lighttpd[81368]: (gw_backend.c.238) establishing connection failed: socket: unix:/tmp/php-fastcgi.socket-1: Connection refused
Feb 14 22:21:56 home lighttpd[81368]: (gw_backend.c.238) establishing connection failed: socket: unix:/tmp/php-fastcgi.socket-0: Connection refused
Feb 14 22:21:56 home lighttpd[81368]: (gw_backend.c.970) all handlers for /widgets/widgets/ntp_status.widget.php?updateme=yes on .php are down.
Feb 14 22:21:52 home lighttpd[81368]: (gw_backend.c.315) gw-server re-enabled: unix:/tmp/php-fastcgi.socket-1 0 /tmp/php-fastcgi.socket
Feb 14 22:21:52 home lighttpd[81368]: (gw_backend.c.315) gw-server re-enabled: unix:/tmp/php-fastcgi.socket-0 0 /tmp/php-fastcgi.socket
Feb 14 22:21:53 home lighttpd[81368]: (gw_backend.c.238) establishing connection failed: socket: unix:/tmp/php-fastcgi.socket-1: Connection refused
Feb 14 22:21:53 home lighttpd[81368]: (gw_backend.c.238) establishing connection failed: socket: unix:/tmp/php-fastcgi.socket-0: Connection refused
Feb 14 22:21:53 home lighttpd[81368]: (gw_backend.c.970) all handlers for /api/api.php?limit=100 on .php are down.
[14-Feb-2021 22:01:30] NOTICE: fpm is running, pid 41964
[14-Feb-2021 22:01:30] NOTICE: ready to handle connections
Error reconfiguring IDS
Error (1)