Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - cloudz

#1
This tutorial is 100% spot on and works as advertised, love it!

Did you ever try this with IPv6? I would like to use Destination routing instead of based on source.
It works well for IPv4 but nowadays a ton of sites do have AAAA records too.

I've tried adding the IP address that you get in the .conf to the Interface/Peer but I run into the unknown with the gateways.
You can only add one gateway to an instance .. which makes this hard. Should I make an IPv6 only instance?
#2
Awesome, that worked! Thanks @Franco!
#3
I have an expired certificate in the Trust section that doesn't want to renew (CA key missing) and cannot be deleted because it is in use by NTOPNG, but that isn't installed. Any suggestions on how to get rid of this one?
#4
You just need to turn off 'proxying' in Cloudflare.
#5
For this to work you need to point your ha / pikvm DNS records to the IP address of the Caddy proxy. This can either be your internal FW ip or if you have turned on hairpinning you can use your external IP address.

I'm using it in the exact same fashion as what you are trying to achieve.

I'm using a DDNS record for my router at Bunny and CNAME all the internal domains I want accessible to that DDNS record. This way I can use hairpinning to the services on my DMZ to which I proxy.
#6
Have a look at this topic :

https://forum.opnsense.org/index.php?topic=42632.0

See if reverting your kernel to the non_sa version makes life better. I still got a ton of blocked icmp ipv6 issues with the 24.7.x kernel before this.
#7
Are these also known to -hog- a device like the DEC740? I really saw lag spikes / interrupt spikes when it was turned on.
#8
Quote from: meyergru on September 06, 2024, 10:13:04 AM
You can easily check if the SA is the culprit by trying the kernel with the SA completely removed via

opnsense-update -zkr 24.7.3-no_sa

and reboot, see this.

With that kernel and the logging set to various errors, the issue is gone. I do get a lot of


<13>1 2024-09-06T15:34:20+02:00 opn.x100.be kernel - - [meta sequenceId="68"] pf: dropping packet with ip options
<13>1 2024-09-06T15:34:21+02:00 opn.x100.be kernel - - [meta sequenceId="69"] pf: dropping packet with ip options
#9
The underlying cause is indeed not solved -- but changing the logging level stopped it from creating the entries in my log files. Removed the [solved] tag for now.

Turning the logging lower also stopped my latency spikes.
#10
Firewall > Settings > Advanced : Debug - Generate debug messages for various errors

This was the culprit. Still means there is something wrong in the ND/PF story. Might this be worth looking at, @Franco?
#11
I've done a tcpdump on the internal interface (LAN) and it's a 100% match with the ND process NS/NA on that interface.
#12
At this moment, my logs are flooded with the "pf: ICMP error message too short (ip6)" message.
Grepping & counting the latest.log gives me 53k entries and it spams at a rate of 10/s.

Does anyone know/understand where this comes from and what I need to do to stop it?

Going back a few days gives me numbers of up to 350k/day.
#13
I saw a lot more power being consumed with the IPv6 issues & the health reporting hogging the CPU.
Fixed with the -nd kernel.
#14
There is an issue being tracked : https://github.com/opnsense/src/issues/218

Useful to follow that one.
#15
I tried to roll back the kernel and unbound wasn't planning to start anymore. Back @ 24.7.2 with IPv6 turned off. Hope you can find the reason, @franco.