Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - siegfried

#1
Hello, I think since 26.1 the hostname is no longer included in the config backup file name. It's confusing when backing up multiple devices to a central location (nextcloud or so). Before 26.1 it was much easier to find the correct file, the hostname was part of the file name. It's possible to have the old behavior back?

Thanks in advance!
#2
Choosing menu item 11 (restart all services) after updating seems also to works ;) So happy updating 8) Thanks, Franco.

Siegfried
#3
Quote from: franco on July 11, 2024, 04:23:40 PM
PS: "service openssh onerestart" is really not a good way to deal with this

that may be, what would be the better way?
#4
The key is regenerated:

unknown key type dsa
Generating public/private rsa key pair.
Your identification has been saved in /usr/local/etc/ssh/ssh_host_rsa_key
Your public key has been saved in /usr/local/etc/ssh/ssh_host_rsa_key.pub
#5
24.1, 24.4 Legacy Series / update 24.1.10 kills ssh
July 11, 2024, 04:03:42 PM
no ssh connection possible after updating via GUI, disabling and re-eabling via GUI ssh solves the problem. I think starting update by ssh  is this time a bad idea.
At the 2nd box same issue: updating using ssh, logoff and ssh is no longer connecting. Open a shell before logoff and "service openssh onerestart" solves this.
#6
Moin, dein Ansatz ist m.E. korrekt. Wenn dir die Tunnel zwischen den Standorten wegbrechen und nicht neu aufgebaut werden, kontrolliere ob du an den beiden Tunnelendpunkten die gleichen Parameter verwendest. Es kann auch passieren, dass auf einer Seite der Tunnel z.B. durch einen Leitungsaussetzer weg ist und die andere Seite davon nichts mitbekommt. Evtl. hilft dir da DPD/keepalive weiter. Ansonsten funktioniert es recht zuverlässig, daß wenn ein Tunnel aufgrund von Inaktivität abgebaut wird, auch recht zügig wieder (<= 1s) aufgebaut wird, wenn erneut Pakete durch den Tunnel zum anderen Standort sollen.
Hab selbst >10 Standorte per IPSec so verknüppert, nicht alle untereinander, aber zum großen Teil.
#7
Since upgrade to 20.7, if SysDesc.0 is queried, the SNMP agent adds the string "root@sensey64:/usr/obj/usr/src/amd64.amd64/sys/SMP amd64" to output.

Edit: now using the option "Display Version in OID" for checking installed version.
#8
edit: oh I'm a bit confused...there are some old entry for aliases and the field gateway is empty for this entries..

error when I create or want to create a new alias IP or trying change an existing CARP IP:
The following input errors were detected: A valid gateway IP address must be specified. What's wrong?
#9
Problem solved, I updated to 20.1.2 and squid LDAP auth is working normal. Thanks for all who keeps OPNsense up to date!  :)
#10
Hi, since I upgraded to 20.1.1 last week, squid auth against the AD using LDAP no longer works, but the Kerberos authentication works fine. Log messages says that the users are authenticated for squid service by LDAP:

user ....authenticated successfully for squid  [using OPNSense\Auth\Services\Squid\ + OPNSense\Auth\LDAP]

I tried to test with opnsense-login -s squid -u username and the result is OK. But the Browser still asks with a popup for auth data. It seems like that is similat behaviour like here:

https://forum.opnsense.org/index.php?topic=12813.msg59349#msg59349

Any hints? Thanks in advance!

Edit: I added a additional conf file in ./auth with basic_auth_ldap and the users are authenticated against AD and able to surf. It's my workaround. Also if i'm trying to authenticate at the console with valid credentials using /usr/local/libexex/squid/basic_pam-auth -o also returns "OK" as result.
#11
Hi all,

blocking browser or user-agents using a regex is possible using GUI, but i want also to allow individual user-agents accessing the internet without authentication in the same way. The reason is that some applications are unable to authenticate at the proxy and an URL exception is not an option for this case.

Thanks in advance,
Siegfried
#12
19.7 Legacy Series / Solved: Sensei blocks SNMP
August 07, 2019, 03:26:48 PM
It seems that the Sensei plugin blocks some SNMP queries via the LAN interface. At the monitoring host SNMP checks (i.e. bandwith usage checks for network interfaces) don't get answers from the firewall box. If i press "Enter Bypass mode" at the status page for the sensei plugin in Opnsense, the checks works fine. But the strange thing is, other SNMP check (query for OID sysDescr.0) works all the time...
Running system is 19.7.2.
Any ideas/hints?

Update: I figured out that the checks works fine if SNMP v1 is used. SNMP packet size for the check was the problem. After reducing the max packet size in the service check configuration the checks are working again with SNMPv2.
#13
Nachdem ich das Thema zwischendurch habe ruhen lassen, nun ein neuer Versuch mit 19.7.1 auf der einen Büchse. Leider immer noch dasselbe Verhalten. Hab auch schon die gesamte IPSec config geklöscht, die Kiste zurückgesetzt und das config-Backup wieder draufgenagelt und das VPN neu konfiguriert. Hat nix gebracht.
#14
Gerade gefunden: wie es scheint gibt's dazu zwei Tickets.
https://github.com/opnsense/core/issues/2332
https://github.com/opnsense/core/issues/3443
Hab ich also morgen früh im Büro was zu lesen ;-)
#15
Leider nichts, was mich weiterbringt. Was ich da finde ist z.T. mehrere Jahre alt...:-(