Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - keeka

#1
Quote from: meyergru on December 01, 2025, 04:09:48 PMAnd that may also be circumvented by using the IP on itself, since AG Home is never asked.

My thoughts also. When I attempted to block DoH, I went looking for an IP list rather than a domain blocklist, assuming at least some clients will attempt to reach a DoH server directly without first resolving a hostname.
#2
The default monitor address (derived from the gateway) may fail, or be slow, to respond to ICMP requests. Try changing the monitor IP in the gateway settings.
The delay also looks rather large IMO. If you disable the 'loss' series in that graph, you will get a finer grained view of the delay (RTT). I expect that will also improve if you change the monitor IP.
Of course none of this will improve your connection but it may give a better indication of the real state of the link.
#3
25.7, 25.10 Series / Re: memory leak?
October 14, 2025, 03:49:02 PM
If you're referring to the memory use reported by Proxmox and you've recently upgraded to PVE9, this may be due to the change in the way PVE9 gathers memory stats vs what the FreeBSD qemu-agent provides.
VM Memory Consumption Shown is Higher
I've seen this after upgrading to PVE9 and now rely on telegraf stats to monitor opnsense memory use.
#4
Seems this is not possible without modifying suricata.yaml or the jinja template, to have a nested include in vars.address-groups.
Yaml config does not support overlays. I want to avoid modifying package files :-(
#5
If I wish to change say, vars.address-groups.SMTP_SERVERS, what syntax to use in /usr/local/opnsense/service/templates/OPNsense/IDS/custom.yaml without having to re-declare the entire vars.address-groups?
Many thanks.
#6
Quote from: Patrick M. Hausen on October 01, 2025, 08:51:16 AMSo floating filter - interface NAT - interface filter ...

I'm putting that on a sticky note above my monitor!
#7
Quote from: narubby_star on September 26, 2025, 10:59:44 AMDo I need a floating rule for this tagging case, or is it sufficient to use a plain OUT interface rule on WAN with the same rule content: block on "Match local tag = NO_WAN_EGRESS"?
I have a similar match-tag and drop rule defined as a floating rule. I tested it ages ago, and it worked. It does seem a foolproof approach to preventing VPN leaks and it is independent of any NAT addressing.
Looking at my floating rules, few if any of them would seem vulnerable to unintended outcome due to a misunderstanding on my part regarding when NAT occurs WRT rules.
I was not familiar with the option to define out rules on interface prior to coming to opnsense. Therefore, I've stuck with defining them in floating only.
I think I will revisit floating rules having come across this thread.
Thanks.
#8
General Discussion / Re: UI - firewall rules
September 19, 2025, 01:33:15 PM
Thanks. Just a matter of interest on what was planned for the new mvc based rules management. It looks promising and I'm looking forward to trying it some time soon.
#9
General Discussion / Re: UI - firewall rules
September 19, 2025, 12:13:40 PM
I was thinking of fw rules that are created when 'filter rule association' is enabled in a port-forward rule. The corresponding rules can be manually reordered whilst their association with the port forward rule (as shown in the UI/config) remains intact.

I formed the impression the new firewall management would ultimately supersede the existing method, much like how OpenVPN has been modernised. I also formed the impression that the new automation was not intended solely to expose the rules via the API but aimed to offer improved fw rule management generally. I was not worried the existing method was suddenly going to disappear though :-)

#10
General Discussion / Re: UI - firewall rules
September 18, 2025, 09:21:19 PM
Thanks.
When automation rules eventually supersede firewall rules, will port-forward rules create their corresponding firewall rule under automation rules? Will that functionality remain available?
#11
25.1, 25.4 Series / Re: [SOLVED]Recent VOIP disconnections
September 18, 2025, 08:34:04 PM
After several weeks on and off troubleshooting the problem, it turned out to be nothing to do with opnsense or my pbx. The issues were with the other end's fttp/voip setup! Consider the above a red herring.
#12
General Discussion / Re: UI - firewall rules
September 18, 2025, 10:39:27 AM
I think the OP is referring to layout and colors within a rule definition rather than the organisation of a list rules.

Regarding migrating existing conventional rule definitions to the new MVC based rules. If I were to do it piecemeal, say convert floating rules, then later rules for one interface, is there a possibility of unexpected consequences with, for example, rule ordering?
#13
General Discussion / Re: Visibility of aliases
September 17, 2025, 09:04:00 PM
Thanks franco. Appreciate the information. 25.7 is running well for me.
#14
Virtual private networks / Re: ovpn_status.py 100% cpu
September 17, 2025, 08:47:58 PM
ovpn_status.py should, when called, return the specified instances json and exit. For me, it generally completes successfully other than the odd time when using the api to restart and check an instance. I never see the issue otherwise. Does your setup involve restarting openvpn instance(s) on the hour?
#15
General Discussion / Re: Visibility of aliases
September 16, 2025, 12:18:31 PM
I was thinking solely of the visibility of the firewall interface address aliases. But I see the scope for problems.
Thanks for the comprehensive answer.