O.k. making sense. Didn't see/try this yet. Will try.
Thx so far, will report.
Thx so far, will report.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuoteupdated from 25.1 to 25.1.12
Quoterequest the syncing of the declared plugins, which will need to be downloaded and setup according to that config
Quote from: Greelan on January 14, 2022, 07:45:00 AM
I just ran a test with https://www.spamhaus.org/drop/drop.txt and it seems to work fine
You can check the alias under firewall/diagnostics/aliases
QuoteFor long-term users of the DROP files in text format, we recommend you update your configuration with the above JSON files as soon as your cycles allow. If you require continued long-term use of a text file, the jq command can always be used to convert the JSON.
N.B. The text files are still being populated however, in time, these will be deprecated; users will be notified with ample notice before deprecation takes place.
Quote from: stefan21 on February 22, 2024, 12:37:49 AM
OPNsense is up-to-date -->
OPNsense 24.1.2_1-amd64
FreeBSD 13.2-RELEASE-p10
OpenSSL 3.0.13
Firefox: 121.0 (64-bit), archlinux (doesn't matter, latest update on windows brings up the same issue)
DEFAULT in FF: security.ssl.enable_ocsp_stapling = true
--> leads to no access on any pages with certs following the tutorial. At least if pages are secured to local access only. I assume, same error for public access.
Changing the default in FF to false gives access back.