[ scratch that. I should not post out of frustration especially when I am unable to gather more info to help troubleshoot. ]
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: OPNenthu on December 14, 2025, 05:51:21 AMI have no evidence of this, but I am guessing business and residential accounts all go thru the same support structure. We just get a different modem and our techs wear shirts and drive trucks that say Comcast Business. We also had AT&T's different broadband offerings going back to DSL in the 90s and we had similar experiences there as well. None of them had a way for technically savvy customers to help them troubleshoot. DSL Reports forums were a lifeline back then.Quote from: allan on December 13, 2025, 12:45:57 AMIPv6-PD is not commonly used and it is not actively monitored-at least by Tier 1 support since they told me their diagnostics all show green.If that's the case for business accounts... then the fact that IPv6-PD works at all for my home connection is something of a miracle and I'm on my own.
Great.
Quote from: really_lost on December 05, 2025, 04:47:29 AMIf you are affected by this, you'll want to get a ticket opened and request a firmware rollback.
Quote from: Monviech (Cedrik) on December 11, 2025, 04:33:15 PMOPNsense can also do GPS, but I know of nobody using that.
remote refid st t when poll reach delay offset jitter
==============================================================================
o127.127.20.0 .GPS. 0 l 10 16 377 0.000 -0.168 0.260
0.opnsense.pool .POOL. 16 p - 64 0 0.000 +0.000 0.000
1.opnsense.pool .POOL. 16 p - 64 0 0.000 +0.000 0.000
2.opnsense.pool .POOL. 16 p - 64 0 0.000 +0.000 0.000
3.opnsense.pool .POOL. 16 p - 64 0 0.000 +0.000 0.000
+2603:3018:143b: .PPS. 1 u 9 16 377 0.563 +0.159 0.085
+192.168.1.124 192.168.1.10 2 s 8 16 377 0.262 +0.155 0.033
-23.150.40.242 204.9.54.119 2 u 37 64 377 37.326 +3.317 4.652
-2603:c020:0:836 132.163.97.4 2 u 15 64 377 68.738 +3.902 1.751
-158.51.99.19 204.9.54.119 2 u 27 64 377 33.253 +8.254 1.336
-2606:82c0:23::e 216.239.35.0 2 u 37 64 377 34.156 +4.076 2.105
-15.204.246.57 94.0.219.24 2 u 10 64 377 36.513 +3.360 1.836
+144.202.0.197 207.66.79.103 2 u 25 64 377 34.933 +3.891 1.411
QuoteThis will remove ALL certificates, private keys, CSRs from ACME Client and reset all certificate and account states. However, existing certificates will remain in OPNsense trust storage. The ACME Client will automatically regenerate everything on its next scheduled run. This is most useful when importing a config backup to a new firewall. Continue?
Quote from: Fabian Wenk on July 22, 2025, 05:18:10 PMOn OPNsense and other BSD systems (including macOS) it is much simpler to use like this:
% date -r 1752053171
Wed Jul 9 11:26:11 CEST 2025
As far as I know this does not work on Linux systems.
$ date -d @1752053171
Wed Jul 9 04:26:11 AM CDT 2025
Quote from: milkywaygoodfellas on May 12, 2025, 08:51:17 PMI'm not going to run two DNS services just to be able to resolve internal host names. This whole deprecation of ISC has been a mess. ISC+Unbound is exceedingly simple and functional, Kea and dnsmasq are both half-baked.The devs are caught in the middle with the ISC deprecation. Running EOL software is not an option in certain environments and Kea does not offer the same options. This gives users two paths with supported options depending on what their priority is. ISC is still there if EOL is fine. These additional choices bring extra support complexity so I think the devs would prefer not adding dnsmasq. Personally, I would prefer not running 2 DNS servers as well but hostname registration is important to me.
Quote from: milkywaygoodfellas on May 12, 2025, 07:02:19 PMStill no support for registering DHCP leases from anything other than ISC DHCP?Dnsmasq can handle hostname registration. Unbound is the primary resolver and forwards internal zone requests to Dnsmasq. This is covered in the documentation and walks you through the setup. I recommend someone create a sticky with a link to this doc since there are a lot of questions and discussions right now.
Alert (Level: Fatal, Description: Protocol Version)Quote from: guyp2k on August 28, 2024, 06:27:42 PM
Finally reaching out for some help after following this thread and applying both patches Franco released the other day, and I am still struggling with IPSEC tunnels dropping. I am terminating between a Sonicwall 2650 and OPNSense, prior to 24.7.2 no issues, now having issues w/ P2 dropping. Below is the issue I think and I have validated that proposals match:
2024-08-28T10:25:58-05:00 Informational charon 06[IKE] no acceptable proposal found
2024-08-28T10:25:58-05:00 Informational charon 06[CFG] configured proposals: ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ, ESP:AES_GCM_16_256/MODP_2048/NO_EXT_SEQ
2024-08-28T10:25:58-05:00 Informational charon 06[CFG] received proposals: ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ
2024-08-28T10:25:58-05:00 Informational charon 06[ENC] parsed CREATE_CHILD_SA request 31 [ SA No TSi TSr ]