Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - Lumpy

#1
Würde die Anleitung für TV7 nicht auch auf MagentaTV zutreffen? Ich hab's selbst noch nicht getestet...

https://forum.opnsense.org/index.php?topic=17865.msg81028#msg81028
#2
That is one of the many reasons we canceled all our landline telephony contracts with Telekom. Internet connection, great, this works just fine and stable as expected. But after the shutdown of ISDN we decided to switch our telephony away from Telekom. So far, we don't regret the decision at all.

I'm still convinced that Telekom isn't able to provide VoIP 100% standard compliant to its customers... Or they make it at least really complicated to use ones own hardware. I've gained experience with Sipgate, Easybell, Telekom, 1&1, QSC over the years and none of the others was as complicated or error-prone as Telekom.

This doesn't help you at all but maybe you should think about changing your telephony provider in the future.
#3
I'm not sure how to achieve this without any known DNS entries from Telekom. But you are a business customer, shouldn't they tell you which DNS servers to use? I'm pretty sure that we received a list of at least three nameservers for our CompanyConnect line at work. Have you asked Telekom business support about that? Maybe "Telekom hilft!" social media team can get you the information that is needed in this case...

Other than that I'm a bit at a loss now.
#4
If I'm correct you are a Telekom Deutschland customer? If that's the case you don't need their DNS servers (or do you use SIP-Trunk etc.?) at all. I'm currently using a SVDSL connection from Telekom and I've configured the Cloudflare DNS servers as the only DNS without provider override.

IIRC all you need is to configure your VoIP settings with a real username and a password. I think it's called "MyLogin" in the Telekom customer center.

€dit: You have to disable the automatic login for your VDSL connection, but I think that's the case already. What device do you use as modem for the VDSL connection?

After disabling the automatic login, you can't use "anonymous@t-online.de" for VoIP anymore. You have to specify your login credentials in your VoIP device and you are good to go. I'll take a look at my configuration when I'm back home.

Bottom line is, I can't think of a scenario where Telekom DNS servers are manadtory for VoIP...
#5
At least I can confirm this behavior, even if I don't have a solution. My workaround for now is IPv6 via Tunnelbroker from Hurricane Electric. This works just fine. I can recommend this if you are in desperate need for an IPv6 connection. :)
#6
Du könntest dir die Implementierung von Softether anschauen, die spricht viele Protokolle: https://www.softether.org/

Oder testweise mal den VPN-Client von Securepoint probieren, der basiert aber zu Teilen auch auf OpenVPN: https://www.securepoint.de/produkte/utm-firewalls/vpn-client.html
#7
So bug is acknowledged but will be fixed at a later date?
#8
Since the Upgrade to 18.1 I've got a strange issue with my openvpn server configuration. The GUI has issues to connect to the daemon, see screenshot and logfile

Feb 10 10:27:59 OPNsense openvpn[25551]: OpenVPN 2.4.4 amd64-portbld-freebsd11.1 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jan 22 2018
Feb 10 10:27:59 OPNsense openvpn[25551]: library versions: OpenSSL 1.0.2n  7 Dec 2017, LZO 2.10
Feb 10 10:27:59 OPNsense openvpn[26175]: MANAGEMENT: unix domain socket listening on /var/etc/openvpn/server1.sock
Feb 10 10:27:59 OPNsense openvpn[26175]: WARNING: using --duplicate-cn and --client-config-dir together is probably not what you want
Feb 10 10:27:59 OPNsense openvpn[26175]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 10 10:27:59 OPNsense openvpn[26175]: Diffie-Hellman initialized with 2048 bit key
Feb 10 10:27:59 OPNsense openvpn[26175]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Feb 10 10:27:59 OPNsense openvpn[26175]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Feb 10 10:27:59 OPNsense openvpn[26175]: ROUTE_GATEWAY x.y.z/255.255.255.255 IFACE=pppoe0 HWADDR=00:00:00:00:00:00
Feb 10 10:27:59 OPNsense openvpn[26175]: TUN/TAP device ovpns1 exists previously, keep at program end
Feb 10 10:27:59 OPNsense openvpn[26175]: Cannot open TUN/TAP dev /dev/tun1: Device busy (errno=16)
Feb 10 10:27:59 OPNsense openvpn[26175]: Exiting due to fatal error
Feb 10 10:29:25 OPNsense openvpn[79034]: OpenVPN 2.4.4 amd64-portbld-freebsd11.1 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jan 22 2018
Feb 10 10:29:25 OPNsense openvpn[79034]: library versions: OpenSSL 1.0.2n  7 Dec 2017, LZO 2.10
Feb 10 10:29:25 OPNsense openvpn[79210]: MANAGEMENT: unix domain socket listening on /var/etc/openvpn/server1.sock
Feb 10 10:29:25 OPNsense openvpn[79210]: WARNING: using --duplicate-cn and --client-config-dir together is probably not what you want
Feb 10 10:29:25 OPNsense openvpn[79210]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 10 10:29:25 OPNsense openvpn[79210]: Diffie-Hellman initialized with 2048 bit key
Feb 10 10:29:25 OPNsense openvpn[79210]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Feb 10 10:29:25 OPNsense openvpn[79210]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Feb 10 10:29:25 OPNsense openvpn[79210]: ROUTE_GATEWAY x.y.z/255.255.255.255 IFACE=pppoe0 HWADDR=00:00:00:00:00:00
Feb 10 10:29:25 OPNsense openvpn[79210]: TUN/TAP device ovpns1 exists previously, keep at program end
Feb 10 10:29:25 OPNsense openvpn[79210]: Cannot open TUN/TAP dev /dev/tun1: No such file or directory (errno=2)
Feb 10 10:29:25 OPNsense openvpn[79210]: Exiting due to fatal error
Feb 10 10:34:31 OPNsense openvpn[40849]: OpenVPN 2.4.4 amd64-portbld-freebsd11.1 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jan 22 2018
Feb 10 10:34:31 OPNsense openvpn[40849]: library versions: OpenSSL 1.0.2n  7 Dec 2017, LZO 2.10
Feb 10 10:34:31 OPNsense openvpn[40991]: MANAGEMENT: unix domain socket listening on /var/etc/openvpn/server1.sock
Feb 10 10:34:31 OPNsense openvpn[40991]: WARNING: using --duplicate-cn and --client-config-dir together is probably not what you want
Feb 10 10:34:31 OPNsense openvpn[40991]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 10 10:34:31 OPNsense openvpn[40991]: Diffie-Hellman initialized with 2048 bit key
Feb 10 10:34:31 OPNsense openvpn[40991]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Feb 10 10:34:31 OPNsense openvpn[40991]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Feb 10 10:34:31 OPNsense openvpn[40991]: ROUTE_GATEWAY x.y.z/255.255.255.255 IFACE=pppoe0 HWADDR=00:00:00:00:00:00
Feb 10 10:34:31 OPNsense openvpn[40991]: TUN/TAP device ovpns1 exists previously, keep at program end
Feb 10 10:34:31 OPNsense openvpn[40991]: TUN/TAP device /dev/tun1 opened
Feb 10 10:34:31 OPNsense openvpn[40991]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Feb 10 10:34:31 OPNsense openvpn[40991]: /sbin/ifconfig ovpns1 10.0.8.1 10.0.8.2 mtu 1500 netmask 255.255.255.255 up
Feb 10 10:34:32 OPNsense openvpn[40991]: /usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkup ovpns1 1500 1622 10.0.8.1 10.0.8.2 init
Feb 10 10:34:32 OPNsense openvpn[40991]: /sbin/route add -net 10.0.8.0 10.0.8.2 255.255.255.0
Feb 10 10:34:32 OPNsense openvpn[40991]: Could not determine IPv4/IPv6 protocol. Using AF_INET
Feb 10 10:34:32 OPNsense openvpn[40991]: Socket Buffers: R=[42080->42080] S=[57344->57344]
Feb 10 10:34:32 OPNsense openvpn[40991]: UDPv4 link local (bound): [AF_INET]x.y.z
Feb 10 10:34:32 OPNsense openvpn[40991]: UDPv4 link remote: [AF_UNSPEC]
Feb 10 10:34:32 OPNsense openvpn[40991]: MULTI: multi_init called, r=256 v=256
Feb 10 10:34:32 OPNsense openvpn[40991]: IFCONFIG POOL: base=10.0.8.4 size=62, ipv6=0
Feb 10 10:34:32 OPNsense openvpn[40991]: Initialization Sequence Completed


The connection itself from my client to the server works fine, no errors etc. I'm not sure how to fix that. Any suggestions? Thanks in advance.
#9
And what should be done to upgrade to the neweset revision auf 18.1b? Which command should I use?
#10
Thank you :) Got a bit irritated though because I thought I've blocked the downgrade correctly. I didn't know that it won't work for the webinterafce.
#11
Kernel locked at 18.1.b-amd64, skipping.
Base locked at 18.1.b-amd64, skipping.
Your system is up to date.
#12
I think I've got a problem with understanding what excatly you mean. I used

# opnsense-update -bkgr 18.1.b -n "snapshots\/beta"
# opnsense-update -L
# opnsense-update -t opnsense-devel
# /usr/local/etc/rc.reboot

I'm on "OPNsense 18.1.a_364-amd64" now, if I check for updates via the webinterafce I get two updates (see attachment). Is this the expected behaviour?
#13
Today it's showing 17.7.8 is newer than 18.1_b? Anything I've missed?
#14
Das VMG1312-B30A kann an einem Telekom-Anschluss aber sehr wohl 100/40 mit Vectoring... Ich hatte jetzt mehr oder weniger alle in DE verfügbaren Modems im Einsatz, an MEINEM Anschluss ist das Vigor das schlechteste. Klingt jetzt blöd, aber den Speedport Smart kann man auch als reines Modem verwenden. Der schafft an meinem Anschluss den besten Sync. Getestet habe ich:

VMG1312-B30A
Speedport Smart
Vigor 130
Technicolor DGA4130 (Geheimtipp, gibt's spottbillig aus Italien)

Und der Smart war definitiv am schnellsten.
#15
Nochmal ein bisschen was gelesen und IPv6 unterstützt dieses Packet-Splitting nicht bzw. anders als das noch bei IPv4 der Fall war.

https://de.wikipedia.org/wiki/Path_MTU_Discovery

Irgendwo auf dem Weg werden vll die ICMPv6-Typ-2-Pakete geblockt/verworfen.