Quote from: alexandre.dulche on December 16, 2024, 08:44:55 PMIt's been running good so far.
Nice! I see you're using DAC cables (which I couldn't), did you try any single SFP+ modules (no DAC) ?!?!
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: alexandre.dulche on December 16, 2024, 08:44:55 PMIt's been running good so far.
Quote from: Greg_E on December 18, 2024, 03:43:22 PMCould conditional forwarders bet setup in Unbound and the DC so that domain clients can use the firewall as DNS unless they are looking for a service from the DC? It's hacky and backwards, but would this work?
QuoteAnd that said, can Unbound use conditional forwarders? Is that the domain override tab? Setting these Windows to Windows is trivial but I'm not sure about Unbound or any of the other DNS server available in OPN.
Quote
NON-working OPNSense:
...
carp: MASTER vhid 3 advbase 1 advskew 0
peer 224.0.0.18 peer6 ff02::12
...
Quote from: Mindflayer on December 05, 2024, 06:46:21 PM
And now my question is: Does it have any downsides, from a security perspective, if I dont assign/create an Interface for the igb4 (step 1) AND the VLAN (step 2)?
Quote from: alexandre.dulche on December 03, 2024, 03:03:21 AM
Any Qotom Q20331G9 owners who may share their experience with this unit ?
Quote from: Mindflayer on December 04, 2024, 10:32:11 PM
From a security perspective: Is it important to leave one Interface assignment (in your case WAN_1) on the physical and untagged network interface (in your case igb4). Maybe to block untagged traffic or so?!
Or could you also reassign your [WAN] Interface to the pppoe device?
Quote from: meyergru on November 21, 2024, 05:00:12 PM
There is a sequence number, correct, but since you can "smoke ping" and there is no foreseeable sequence in which packets get transmitted, you cannot decide based on the sequence number (or, in other words: even if you used something akin to a "catch range", it would be just as good as an abitrary time range).
Quote from: meyergru on November 21, 2024, 03:57:44 PM
With ICMP, this is different. There is no port, only an ICMP subtype. Other than that, there are only (src_ip, dst_ip). Thus, you can only decide based on "soft" factors ("related"), like if within the last few seconds, you saw ICMP traffic between both parties that might explain why another ICMP packet is seen (and being passed).
Quote from: brunoc68 on November 20, 2024, 06:27:55 PM
I read on the different posts that with OPNSense it is actually default behaviour that when B is authorized to A, A can reply to B, and I could test it works well.
Quote
However, my issue is the following when one does step by step :
1. first, A pings B : there is no answer - correct
2. second, B pings A : it works - correct
3. but now, if A pings B, A gets replies - NOT CORRECT
Actually what happens is obviously the following :
- step 1 : there is no rule to accept traffic from A to B so there is no reply
- step 2 : there is a rule to accept traffic from B to A, so as default OPNSense tracks the state of the connexion and replies from A are accepted back to B
- step 3 : when, at that point, A initiates traffic to B, OPNSense uses the previous state of the connexion at step 2 and it accepts the traffic !
Quote
So, in case there is regular communication from B to A, an attacker could suddenly usurpate the IP address of A to attack B through the firewall.
How can one definitely block traffic from A to B that is initiated by A ?
Quote from: shor0814 on September 20, 2024, 07:03:23 PM
It just feels "wrong" that my UDMP works with this module but OPNsense doesn't.
igc0 igc2 ix3 ix1
igc4 igc1 igc3 ix2 ix0
Quote
Is there any additional tests I can do? Any additional settings I can try? Maybe I am not waiting long enough for a connection?
ifconfig -v "interface name"
ix0: flags=1008843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST,LOWER_UP> metric 0 mtu 9216
options=4803828<VLAN_MTU,JUMBO_MTU,WOL_UCAST,WOL_MCAST,WOL_MAGIC,HWSTATS,MEXTPG>
ether a1:b2:c3:d4:e5:f6
media: Ethernet autoselect (10Gbase-SR <full-duplex,rxpause,txpause>)
status: active
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
drivername: ix0
plugged: SFP/SFP+/SFP28 10G Base-SR (LC)
vendor: Intel Corp PN: ABC123 SN: XYZ789 DATE: yyyy-mm-dd
module temperature: 0 C voltage: 0 Volts
lane 1: RX power: 0.00 mW (-0.00 dBm) TX bias: 0.00 mA
Quote from: ethan1013 on September 11, 2024, 04:20:47 PM
I was able to upgrade to version 24.7 now, and still unable to ping or traceroute.
Quote from: ethan1013 on September 10, 2024, 10:35:54 PM
what other settings might I need to allow this?
Quote from: NeopegasusZeo on September 06, 2024, 09:45:36 PM
I finally have everything working as it should but one thing i cant find on the forum and in the docs is how to tel one device in my network to use always use one gateway or interface, so not using the gateway group.
Quote from: doktornotor on September 06, 2024, 08:50:34 PM
Yeah, it is not helping since that clearly does not work. There are other ACME mechanisms that work. HTTP-01 is not one of them.
Quote from: doktornotor on September 06, 2024, 01:39:56 PM
For HTTP-01 to work, you MUST NOT be redirecting the well-known URL to HTTPS.
Our recommendation is that all servers meant for general web use should offer both HTTP on port 80 and HTTPS on port 443. They should also send redirects for all port 80 requests, and possibly an HSTS header (on port 443 requests).
Quote
Exactly. It will only be queried via HTTP, not HTTPS (obviously, otherwise the first verification would never work, since you do not have a certificate then).
Our implementation of the HTTP-01 challenge follows redirects, up to 10 redirects deep. It only accepts redirects to "http:" or "https:", and only to ports 80 or 443. It does not accept redirects to IP addresses. When redirected to an HTTPS URL, it does not validate certificates (since this challenge is intended to bootstrap valid certificates, it may encounter self-signed or expired certificates along the way).