Sehe ich das richtig, dass noch immer kein WLAN AC unterstützt wird? Sollte das zugrunde liegende hardened BSD das nicht bereits können? Mein externe AP nervt u.U.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: JeGr on July 20, 2020, 04:49:03 PM
Warum blockst du überhaupt ausgehend TFTP, SNMP und Syslog? Warum sollte das rausgehen? Wovon? Warum sollte es dann da schon reingelassen werden?
QuoteTrivial File Transfer Protocol - TFTP (UDP/69) When an attacker exploits a system, the first thing he does is go looking for some way to move his toolkit onto the system. TFTP is the tool of choice since it permits the attacker to transfer the file without any interactive prompting. Not only should you block outbound access to TFTP, but you should also alert on this traffic pattern since it is usually an indication that an internal system has already been compromised. As a bonus feature, blocking TFTP will prevent the transfer of the toolkit, thus making system recovery that much easier.
Quote from: JeGr on July 20, 2020, 04:49:03 PM
Wie das Regelwerk abgewarbeitet wird, steht eigentlich klar in den Docs drin. Regeln mit Quick (Blitz) sind first match - also top down die erste gewinnt. Ohne quick ist es "last one matches" außer es gibt vorher eine Regel die quick ist. Daher mixt man die nur höchst ungern.
Quote from: JeGr on July 20, 2020, 04:49:03 PM
Ich sehe tatsächlich recht wenig Sinn in WAN Egress Filtering bis auf einige wenige Ausnahmen. RFC1918 outbound bspw. - das hat upstream nix zu suchen und wird spätestens dort eh verworfen, muss aber gern nicht erst dahinkommen. Alles andere: Warum soll ich es "out" blocken wenn ich es "in" gar nicht reinlasse? Macht für mich wenig Sinn :)
/usr/ports/graphics/qr-code-generator
sudo make install
===> qr-code-generator-1.6.0 depends on package: gmake>=4.3 - found
usage: install [-bCcpSsUv] [-f flags] [-g group] [-m mode] [-o owner]
[-M log] [-D dest] [-h hash] [-T tags]
[-B suffix] [-l linkflags] [-N dbdir]
file1 file2
install [-bCcpSsUv] [-f flags] [-g group] [-m mode] [-o owner]
[-M log] [-D dest] [-h hash] [-T tags]
[-B suffix] [-l linkflags] [-N dbdir]
file1 ... fileN directory
install -dU [-vU] [-g group] [-m mode] [-N dbdir] [-o owner]
[-M log] [-D dest] [-h hash] [-T tags]
directory ...
*** Error code 64
Stop.
make: stopped in /usr/ports/graphics/qr-code-generator
echo "Foo Bar" | qrencode -t ANSIUTF8
sudo nmap -p22,53,80,443 xxxx.ddns.net
Starting Nmap 7.80 ( https://nmap.org ) at 2020-07-13 19:48 CEST
Nmap scan report for xxxx.ddns.net (AA.BB.CC.DD)
Host is up (0.00048s latency).
rDNS record for AA.BB.CC.DD: cool-aa-bb-cc-dd.provider.de
PORT STATE SERVICE
22/tcp filtered ssh
53/tcp open domain
80/tcp filtered http
443/tcp filtered https
Nmap done: 1 IP address (1 host up) scanned in 1.37 seconds
Internet
|
|
Provider IP
|
Cable Modem (Web API 192.168.0.1)
| |
| +-- 192.168.0.10 pfsense (old Setup, to be replaced)
|
+-- 192.168.0.111 (WAN)
OPNsense (current setup)
admin@OPNsense:~ % sudo sockstat -l | egrep '(clamav|icap|squid)'
c_icap c-icap 35415 5 tcp6 *:1344 *:*
c_icap c-icap 28209 5 tcp6 *:1344 *:*
c_icap c-icap 57726 5 tcp6 *:1344 *:*
c_icap c-icap 3990 5 tcp6 *:1344 *:*
clamav clamd 78715 4 tcp4 127.0.0.1:3310 *:*
clamav clamd 78715 5 stream /var/run/clamav/clamd.sock
squid squid 68856 11 udp46 *:25886 *:*
squid squid 68856 20 udp4 *:58766 *:*
squid squid 68856 47 tcp4 127.0.0.1:3128 *:*
squid squid 68856 48 tcp6 ::1:3128 *:*
squid squid 68856 49 tcp4 127.0.0.1:3129 *:*
squid squid 68856 50 tcp6 ::1:3129 *:*
squid squid 68856 51 tcp4 192.168.20.1:3128 *:*
squid squid 68856 52 tcp4 192.168.1.1:3128 *:*
squid squid 88504 9 dgram (not connected)
admin@OPNsense:~ % cat /usr/local/etc/squid/squid.conf
http_port 127.0.0.1:3128 intercept ssl-bump cert=/var/squid/ssl/ca.pem dynamic_cert_mem_cache_size=10MB generate-host-certificates=on
http_port [::1]:3128 intercept ssl-bump cert=/var/squid/ssl/ca.pem dynamic_cert_mem_cache_size=10MB generate-host-certificates=on
https_port 127.0.0.1:3129 intercept ssl-bump cert=/var/squid/ssl/ca.pem dynamic_cert_mem_cache_size=10MB generate-host-certificates=on
https_port [::1]:3129 intercept ssl-bump cert=/var/squid/ssl/ca.pem dynamic_cert_mem_cache_size=10MB generate-host-certificates=on
http_port 192.168.20.1:3128 ssl-bump cert=/var/squid/ssl/ca.pem dynamic_cert_mem_cache_size=10MB generate-host-certificates=on
http_port 192.168.1.1:3128 ssl-bump cert=/var/squid/ssl/ca.pem dynamic_cert_mem_cache_size=10MB generate-host-certificates=on
sslcrtd_program /usr/local/libexec/squid/security_file_certgen -s /var/squid/ssl_crtd -M 4MB
sslcrtd_children 5
tls_outgoing_options options=NO_TLSv1 cipher=HIGH:MEDIUM:!RC4:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS
acl bump_step1 at_step SslBump1
acl bump_step2 at_step SslBump2
acl bump_step3 at_step SslBump3
acl bump_nobumpsites ssl::server_name "/usr/local/etc/squid/nobumpsites.acl"
ssl_bump peek bump_step1 all
ssl_bump splice all
ssl_bump peek bump_step2 all
ssl_bump splice bump_step3 all
ssl_bump bump
sslproxy_cert_error deny all
acl ftp proto FTP
http_access allow ftp
acl localnet src 192.168.20.0/24 # Possible internal network (interfaces v4)
acl localnet src 192.168.1.0/24 # Possible internal network (interfaces v4)
acl localnet src fc00::/7 # RFC 4193 local private network range
acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines
acl remoteblacklist_Shallalist.de dstdomain "/usr/local/etc/squid/acl/Shallalist.de"
acl SSL_ports port 443 # https
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535 # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl CONNECT method CONNECT
icap_enable on
icap_default_options_ttl 60
adaptation_send_client_ip on
adaptation_send_username off
icap_client_username_encode off
icap_client_username_header X-Username
icap_preview_enable on
icap_preview_size 1024
icap_service response_mod respmod_precache icap://[::1]:1344/avscan
icap_service request_mod reqmod_precache icap://[::1]:1344/avscan
include /usr/local/etc/squid/pre-auth/*.conf
adaptation_access response_mod deny remoteblacklist_Shallalist.de
adaptation_access request_mod deny remoteblacklist_Shallalist.de
http_access deny remoteblacklist_Shallalist.de
adaptation_access response_mod deny !Safe_ports
adaptation_access request_mod deny !Safe_ports
http_access deny !Safe_ports
adaptation_access response_mod deny CONNECT !SSL_ports
adaptation_access request_mod deny CONNECT !SSL_ports
http_access deny CONNECT !SSL_ports
adaptation_access response_mod allow localhost manager
adaptation_access request_mod allow localhost manager
adaptation_access response_mod deny manager
adaptation_access request_mod deny manager
http_access allow localhost manager
http_access deny manager
adaptation_access response_mod deny to_localhost
adaptation_access request_mod deny to_localhost
http_access deny to_localhost
include /usr/local/etc/squid/auth/*.conf
adaptation_access response_mod allow localnet
adaptation_access request_mod allow localnet
http_access allow localnet
adaptation_access response_mod allow localhost
adaptation_access request_mod allow localhost
http_access allow localhost
adaptation_access response_mod deny all
adaptation_access request_mod deny all
http_access deny all
include /usr/local/etc/squid/post-auth/*.conf
cache_mem 256 MB
cache_dir ufs /var/squid/cache 100 16 256
coredump_dir /var/squid/cache
refresh_pattern pkg\.tar\.xz$ 0 20% 4320 refresh-ims
refresh_pattern d?rpm$ 0 20% 4320 refresh-ims
refresh_pattern deb$ 0 20% 4320 refresh-ims
refresh_pattern udeb$ 0 20% 4320 refresh-ims
refresh_pattern Packages\.bz2$ 0 20% 4320 refresh-ims
refresh_pattern Sources\.bz2$ 0 20% 4320 refresh-ims
refresh_pattern Release\.gpg$ 0 20% 4320 refresh-ims
refresh_pattern Release$ 0 20% 4320 refresh-ims
refresh_pattern -i microsoft.com/.*\.(cab|exe|ms[i|u|f]|[ap]sf|wm[v|a]|dat|zip|esd) 4320 80% 129600 reload-into-ims
refresh_pattern -i windowsupdate.com/.*\.(cab|exe|ms[i|u|f]|[ap]sf|wm[v|a]|dat|zip|esd) 4320 80% 129600 reload-into-ims
refresh_pattern -i windows.com/.*\.(cab|exe|ms[i|u|f]|[ap]sf|wm[v|a]|dat|zip|esd) 4320 80% 129600 reload-into-ims
refresh_pattern ^ftp: 1440 20% 10080
refresh_pattern ^gopher: 1440 0% 1440
refresh_pattern -i (/cgi-bin/|\?) 0 0% 0
refresh_pattern . 0 20% 4320
dns_v4_first on
access_log stdio:/var/log/squid/access.log squid
cache_store_log stdio:/var/log/squid/store.log
httpd_suppress_version_string on
uri_whitespace strip
forwarded_for on
logfile_rotate 0
cache_mgr root@home.lan
error_directory /usr/local/etc/squid/errors/en-us
Quote from: JeGr on July 10, 2020, 10:49:14 AM
Sind die 30 Tage (was viele nutzen) nicht nur wenn sich die IP nicht ändert? Ansonsten würde ich wirklich mal drüber nachdenken, mir irgendeine simple kleine Domain zu suchen. Wenns keine abgefahrene Endung sein muss sondern nur billig findet man sicher was mit .de oder bspw. .xyz oder ähnlichem, die wirklich billig sind. Billig im Sinne von 3-8€ im Jahr(!). Und die dann bspw. bei Cloudflare o.ä. als DNS aufzulegen und schwupp die volle API Möglichkeit in der Sense zu haben, das wäre der Spaß schon wert :)
Quote from: micneu on July 09, 2020, 05:35:15 PM
Dyndns ist selbst erklärend, ganz simpel. Da braucht man keine Anleitung für