Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - Patrick M. Hausen

#1
Quote from: OPNenthu on Today at 12:05:20 AMI'm still clueless.  Where can I go to also learn?

I was just taking his statement verbatim. If whoever is behind IPfire is problematic, so be it. I am not really interested in digging deeper. "Difficult" project leads in open source are not uncommon. Case closed for me.
#2
The GeoIP databases are updated automatically. To check go to

Firewall: Aliases: GeoIP settings

and look at the "Last updated" timestamp.
#3
General Discussion / Re: Port OPNsense to Linux?
April 01, 2026, 11:45:40 PM
Quote from: MrWizard on April 01, 2026, 10:03:02 PMThe reason IPFire is being unrecommended, is the guys behind.

So I learned, thank you.

Quote from: MrWizard on April 01, 2026, 10:03:02 PMSo there will likely be users for a Linux router with an OPNsense like user interface and decent support. The Linux user base is growing.

But there must be a dozen different firewall appliance distributions based on Linux given how the Linux community and ecosystem ticks? There ...

* insert Annakin and Padme meme *

Seriously, no takers? OpenWRT for sure. And they have an optional more capable UI IIRC?

Then again - you need hardware anyway. And Mikrotik Router OS while closed source is not that bad. I use it for everything Layer 2 here.
#4
When you create the alias you define how frequently the source is pulled for updates.

I use 6 hours for most.

#5
Quote from: Monviech (Cedrik) on April 01, 2026, 04:26:47 PMBut it's another module, though since I went the "I only support cloudflare in caddy" it looks attractive.

I also know who WeidiDeng is.

Sounds awesome!
#6
OK. How about being able to select more than one "Caddy internal access list" as a compromise? So one gets at least manageable objects for IPv4, IPv6, Cloudflare, other CDNs, ...

Also: what's with all the other fields in the access lists? Are any of them relevant for trusted proxies or just the address content?
#7
Hi all, but specifically Cedric (@monviech):

I just added Cloudflare's egress IP addresses to Caddy as trusted proxies in one of our installations so client IP addresses get passed properly down the chain. Works as designed. But feels a little clumsy:

- You can only select a single "Caddy access list" - I originally created two, one for IPv4, one for IPv6, because "of course" only to find I needed to combine them into one.
- Although Cloudflare last changed the lists in 2023 they provide them under a static URL in text CIDR format, so they could be trivially pulled into a firewall alias with the existing mechanisms.

I will happily create a feature request on Github, but wanted to discuss if that would be feasible, first.

Kind regards,
Patrick
#8
Quote from: JamesFrisch on April 01, 2026, 03:18:28 PMSo in your case, it will continue to use your local DNS server which does not know about your home network names.

And possibly stops to be reachable at all, if it's not on a directly connected LAN and you direct all your traffic (0.0.0.0/0, ::/0) into the WireGuard Tunnel.
#9
Quote from: Monviech (Cedrik) on April 01, 2026, 11:37:59 AMPlease note what I'm saying is highly simplified, I have no insight into the governance of freebsd, nor met any of their team members yet.

See you in Brussels, possibly?
#10
Kleine Falle im "Router hinter Router" Szenario: "block private networks" auf WAN und die Tatsache, dass "reply-to" per default an ist. Firewall: Settings: Advanced, dort "disable reply-to" aktivieren, wenn WAN ein Broadcastnetzwerk (aka Ethernet) ist.

Außerdem helfen Uwes wirklich großartige Einführungsbeiträge:

https://forum.opnsense.org/index.php?topic=42985.0
https://forum.opnsense.org/index.php?topic=39556.0
#11
Quote from: hakuna on April 01, 2026, 10:21:19 AM1. it went into halt mode and stayed there

Does your device support ACPI power off? Some embedded systems don't.

Quote from: hakuna on April 01, 2026, 10:21:19 AM2. UPS power was recycled so it killed everything, including OPNSense itself which was in halt mode, it never fully shutdown.

But power cycling when halted does not hurt.

And I already agreed hard wired shutting down the UPS is probably a bad idea - please raise a feature request on Github.
#12
1. "/usr/local/etc/rc.halt" does call "shutdown -p now":

#!/bin/sh

# shutdown syshook / plugin scripts
/usr/local/etc/rc.syshook stop

/sbin/shutdown -op now

while :; do sleep 1; done

2. The hardwired killpower flag might call for a feature request to make it configurable.

I haven't noticed because here my OPNsense is the master NUT server and all other servers shut down first. I think the firewall killing the Internet connection should go down last.

HTH,
Patrick
#13
I would use HAproxy only for acquis, not for bouncing. Bouncing can be done at the network layer, i.e. pf. But that's me. :-)
#14
Das geht, dazu musst du eigentlich nur die HAproxy collection mit cscli nachinstallieren und in acquis.d irgend was passendes an YAML ablegen.
#15
Quote from: NorbertK on March 31, 2026, 09:22:22 AMI conclude that I can delete all entries in the OLD lists then ? This would help too.

That should be the last step in the migration assistant. Weren't you offered that option?