1
24.1 Legacy Series / Re: DHCP relay stops working in 24.1.6
« on: May 17, 2024, 11:51:11 am »
I am facing the same issue since 24.1.6
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
That's strange... Do you have OPNsense version 24.1.6 installed?
I have a question about HAproxy SSL performance with large downloads:
Using a NAT port forward to an internal HTTPS nginx server, I get full wire speed i.e. (45 MByte/s) from the outside, but using HAproxy following this tutorial, I am limited to download speeds of ~4-5 MByte/s.
I have tried to use HTTP instead of HTTPs for the backend server connection to no avail.
I suspected that the SSL termination would lead to an interrupt of the streaming flow in that each packet must be acknowledged over the whole chain before the next one can get requested, so I have somewhat optimized my throughput by a factor of 2 via this tuning:Code: [Select]tune.h2.max-frame-size 4048576
tune.pipesize 4048576
tune.h2.initial-window-size 1048576
tune.h2.be.initial-window-size 1048576
tune.h2.fe.initial-window-size 1048576
But it seems that the HTTPS termination within HAproxy itself is the culprit. I found some other source that suggest there might be a problem with only some ISPs showing that behaviour when SSL traffic is terminated by HAproxy.
Does everybody else see this or may my ISP really be the culprit?
Just chiming in here --The main purpose of the tutorial is not to to access the OPN UI, for which your method makes perfect sense, but instead to reverse proxy services that are hosted internally in a LAN.
Thanks very much doing all the work on this How-To, OP, and for keeping it updated, etc.
I successfully implemented it in my modest OPNsense instances/networks, before realizing that for small networks where there may never be more than perhaps 1 to 3 people logging in to a given OPNsense instance, in fact it's far more secure to simply shut off all HTTP listening on external network ports, and instead use SSH tunnels / port redirects, i.e. ssh -L 9450:localhost:80 my.opnsense.host to connect directly to the opnSense instance and access the webgui that way. Then it doesn't matter at all whether HTTPS is active as the entire connection takes place inside the highly-secured SSH network connection. With SSL tunnels there is no need for a webgui process to be listening anywhere except localhost:80.
It avoids the major overhead and ongoing maintenance complexity of getting a public/real SSL certificate issued, emplaced, and dealing with ongoing renewals, etc.
It avoids the major overhead and ongoing maintenance complexity of getting a public/real SSL certificate issued, emplaced, and dealing with ongoing renewals, etc.
I am not sure this was mentioned before but https://desec.io no longer new registrations for DynDNS.
For the German speaking audience I can highly recommend https://ipv64.net/
Many texts on the website are English, but someone not speaking German might have problems understanding everything
Attention!
Hey everyone,
after the upgrade to 24.1, please check your cron job for updating OCSP data.
Since that function is no longer available from the list, mine was set to "Automatic firmware update", which could potentially be *really* bad
@TheHellSite: Thank you for the guide and the ongoing maintenance, much appreciated! (beer is on the way)
@TheHellSite, many thanks and kudos for your tremendous effort, contribution and help!
I try to avoid seeking for help and solve my problems on my own. But after upgrading to 24.1 I stuck in the CRON configuration when it comes to the update HAProxy OCSP Data you mentioned in Part5.4, this feature has disappeared and can no longer be selected. I assume this is needed to get the OCSP must staple extension running.
Is there an alternative way of configuring or what I'm doing wrong or missing.
Thanks loop0
As i know the OCSP update cronjob isn't needed anymore since the OCSP feature was completely revamped with the actual version of haproxy 4.2 which is bundled in opnsense 24.1
I had some errors with the OCSP updates so i opened a issue in the opnsense/plugins github repo.
https://github.com/opnsense/plugins/issues/3755
Hello @TheHellSite
I was using opnsense with HAProxy > 1 year.
Thanks for opffering this free tutorial, it definitely made the world better (at least for me).
The problem with opnsene 24.1 and HAProxy 4.2 hit me as well.
I will be happy when the "strict-sni" update of your guide is released.
Thank you in advance.
EDIT:
HAProxy refuses to start if a self-signed certificate is configured as (default) certificate under the SSL offloading section on a (HTTPS) frontend.
So for now it is best to remove the "INVALID_SNI" certificate as default from the HTTPS frontend.
@TheHellSite
I'm _not_ using your plugin, but I do use HAProxy on other systems with a crt-list, default self-signed cert and ocsp updates. So a shot in the dark, not sure if this "solves" your problem: You might want to declare your "default" certificate with "!*" in a crt-list to prevent errors:
https://www.haproxy.com/documentation/haproxy-configuration-manual/latest/#5.1-crt-list
/etc/haproxy/frontend-crt-list.confCode: [Select]/path/to/default.crt.pem !*
/path/to/fqdn.crt.pem [ocsp-update on alpn h2,http/1.1] foo.bar
/path/to/wildcard.crt.pem [ocsp-update on alpn h2,http/1.1] *.foo.bar
1. Reinstall the HAProxy plugin.
pkg install -f os-haproxy
2. Apply the patch.
opnsense-patch -c plugins 404c19f6e
3. Restart HAProxy from the OPNsense dashboard or reboot OPNsense.
Yes you were, since I was that "anyone" who fixed it for him and many others that contacted me via PM.My post was helpful to you?No, and I wasn't asking you either.
Fine with me.Feel free to click [applaud] to the left underneath my profile.Not for replies like these.
Again, fine with me.Additionally you can consider donatingOnly in your dreams.
Unless you're desperate to earn something, then I can tell you these posts don't work in your advantage.I think you are pretty smart, so if you take a look at the amount of views this guide has versus the number of people that actually donated you would be able to answer this on your own.
But then I think perhaps you're not aware how some other people read your messages, so perhaps this makes you aware. If you want to take my advise, stop posting if you don't want to help (its fine!) but don't be like this.Just so you know your issue and the ones of many others posting here is based on the fact that (you) misread / skipped / oversaw a tiny but very important bit of the configuration.
Am I the only one ?
Hello TheHellSite,
I have recently switched back to using OPNsense and HAProxy and again used your tutorial.
As I mainly use IPv6 today, I had to slightly modify two steps to make it work with my setup:
Part 4 - System preparation
Step 4: To allow IPv4 and IPv6 with the same firewall rule, all I had to do was change "TCP/IP Version" from "IPv4" to "IPv4+IPv6":
Part 5 - HAProxy configuration
Step 10: To make HAProxy listen on ports 80 and 443 on its IPv6 as well as IPv4 addresses, all I had to add here was "[::]:80" and "[::]:443":
After applying these changes, I can now securely access my services behind HAproxy from IPv4 and IPv6 networks.
Do you think you could add these changes to your tutorial? Anyway, thanks for all your work