Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - eponymous

#1
I'm glad I could help!

Just to check: this isn't a critical problem and I'm good to continue as is? I didn't understand the full impact of this file being missing.

The 7209fe0 commit - will that make it into tomorrow's release?

Cheers.
#2
And with this, I'm confused even more! https://github.com/opnsense/core/issues/5841
#3
25.1, 25.4 Series / /var/run/booting no such file
July 22, 2025, 02:52:02 PM
I get this in the startup log on 25.1.12:

chown /var/run/booting .. no such file or directory
I'm on an SG-2440 and this is new since updating to 25.1.12

Anything to be concerned about?
#4
25.7 Series / Re: 25.7 upgrade issue
July 22, 2025, 02:32:03 PM
Just too excited and can't wait I guess :)

Thanks for confirming.
#5
25.7 Series / 25.7 upgrade issue
July 22, 2025, 02:03:28 PM
Hi

I've just upgraded to 25.1.12 today.

I was presented with a major upgrade release of 25.7 on the console updater.

However doing this results in:

Fetching packages-25.7-amd64.tar: ..[fetch https://pkg.opnsense.org/FreeBSD:14:amd64/25.1/sets/packages-25.7-amd64.tar.sig: Not found] Failed, no signature found
This seems like a reasonable message given the URL isn't valid - notice the 25.1 in the URL.

Is this expected behaviour at the moment?

If so I'll just remain on 25.1.12 for now.

Thanks.
#6
General Discussion / Chrony plug-in ports
November 01, 2024, 07:36:01 PM
Having been reading up on Chrony I find it a bit confusing that the default port for the plugin I.e the "port" directive for the chrony.conf is UDP/323. This is supposed to be UDP/123 by default as it's the port for NTP requests. I understand it has been set like this to prevent a conflict with NTPd if run together.

According to the Chrony documentation, UDP/323 is used for the monitoring/command port which is a completely separate thing. (See section: "Command and monitoring access" -> cmdport)

I think it's going to cause confusion in the long run and looking at some posts on this forum and elsewhere it already has...

For me personally I'm trying to allow NTP requests only across the network and am trying to see if the command port is locked down by default.

#7
Hi

I'm planning migrating my current config running on a Netgate SG-2440 to a Deciso appliance (not sure which one yet).

I suspect the hardware is different enough that it would make sense to try and work out what I have configured and set the new device up manually. To that end, is there a recommended way of extracting the "non-default" settings i.e. what I've actually set in a config to make it easier to prompt me what needs setting in the new device?

Or is it possible to just import the current config on the new device after changing the hardware NIC references?

I did have a look through Dustin's excellent write up here: https://homenetworkguy.com/how-to/migrate-opnsense-to-new-hardware/

Just looking for any thoughts on this.
#8
23.7 Legacy Series / /nonexistent
January 04, 2024, 01:14:29 PM
Hi

Forgive me if this is a silly question but should /nonexistent (as used as a home directory for various service accounts) actually exist or not?

I removed a stale user account and it prompted me to remove /nonexistent which I just said yes to but now I can't recall if that directory had actually existed as a dummy home or not.

Thanks.
#9
Hardware and Performance / Deciso and coreboot
December 15, 2023, 08:13:04 PM
Is there any reason Deciso seem to have moved away from coreboot/SeaBIOS and instead have shifted to Insyde H2O UEFI for their appliances?

Are there any inherent advantages from a security standpoint?
#10
I think I've found out how to do this. You can override any of the events that are listed in apccontrol with your own scripts which need to exit with a status of 99

What's odd is the killpower event has its actions commented out by default yet I'm sure the UPS went into hibernate.

Either way I just need to override the killpower event to do a —poweroff

Hope this helps others.
#11
Hi

Is there any way to get APCUPSd to inform the UPS to power off and stay off, even when utility power returns?

I don't want my router to automatically power back up again after the UPS has switched off which seems to happen now.

E.
#12
Quote from: schnipp on April 27, 2023, 10:49:12 PM
Quote from: meyergru on April 27, 2023, 08:10:42 PM
How would you do this when an automatically generated rule exists for WAN which essentially "lets out anything from firewall host itself" and which is put before any manually created rules?

Create a floating rule which has a higher priority than interface rules.

That seems like a solution however, shouldn't the toggle for blocking RFC1918 operate on both IN and OUT? I suspect this could be classed as a bug if it's only working on IN.
#13
Quote from: pmhausen on April 28, 2023, 09:46:47 AM
If you are using TCP with syslog, no information will be leaked, because the initial 3-way handshake always fails. UDP datagrams on the other hand might leak logged information to your ISP.

Good point.

Quote from: meyergru on April 28, 2023, 09:28:23 AM
I had that toggle active. However, after I created a floating rule with logging enabled, I found some leaking IPs because of remnants of old configurations. The WAN interface usually has the default route, so that is really no surprise.

The toggles handle only incoming RFC1918 traffic, not outgoing. You can see that in the automatic interface rule that handles only "in" packets for private/bogon IPs.


In terms of blocking all RFC1918 traffic out of the WAN then - what is the solution?
#14
Quote from: bartjsmit on April 28, 2023, 07:48:12 AM
Do you have block private networks ticked on your WAN interface?

I specifically ensured this was set along with block bogons when I first set up the firewall.

However I thought that only blocked inbound as in from the Internet in my case?
#15
Quote from: bartjsmit on April 27, 2023, 11:38:54 AM
Quote from: eponymous on April 27, 2023, 11:35:36 AM
So does that imply the logs are actually going out of the interface onto the public Internet? If so isn't that a security flaw?
No, the ISP will drop the packet since it is not internet routable

Would it be advisable to add a rule to the OUT side of the WAN interface to block this in my case? For me, no packets with a destination of RFC1918 should need go out that interface. In fact, the WAN interface is ultimately a PPPoE connection.