All,
I've been using OPN Sense for awhile now without problems. About a week ago, I started seeing security errors when doing an outbound SSH -i mykey myname@myhost.com commands. It was warning me that the new cert didn't match the one in my .ssh/known_hosts file. I tripple checked and it was right... MITM attack...
After going through each computer on my network and doing a bunch of arp -a commands, I found the source of the problem is the OPNSENSE server itself. When I turn this machine off and go through a different route, the problem goes away.
Any ideas on how I can debug this? Is it possible there is a rogue MITM software on my opnsense server? Is there a setting I'm missing on opnsense? I've updated the firmware, but it didn't help.
OPNsense 18.1.7_1-amd64
FreeBSD 11.1-RELEASE-p9
OpenSSL 1.0.2o 27 Mar 2018
Thanks
-John
I've been using OPN Sense for awhile now without problems. About a week ago, I started seeing security errors when doing an outbound SSH -i mykey myname@myhost.com commands. It was warning me that the new cert didn't match the one in my .ssh/known_hosts file. I tripple checked and it was right... MITM attack...
After going through each computer on my network and doing a bunch of arp -a commands, I found the source of the problem is the OPNSENSE server itself. When I turn this machine off and go through a different route, the problem goes away.
Any ideas on how I can debug this? Is it possible there is a rogue MITM software on my opnsense server? Is there a setting I'm missing on opnsense? I've updated the firmware, but it didn't help.
OPNsense 18.1.7_1-amd64
FreeBSD 11.1-RELEASE-p9
OpenSSL 1.0.2o 27 Mar 2018
Thanks
-John