Right, just worked that out. For some reason, that didn't run so I just did it manually and I don't need the UI stuff anyway so removed it.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: meyergru on February 26, 2025, 08:02:21 PMThere is a plugin os-speedtest-community in the mimugmail repository which includes the CLI version.
# pkg info -lx os-speedtest-community
os-speedtest-community-0.9_6:
/usr/local/opnsense/mvc/app/controllers/OPNsense/Speedtest/Api/DownloadController.php
/usr/local/opnsense/mvc/app/controllers/OPNsense/Speedtest/Api/ServiceController.php
/usr/local/opnsense/mvc/app/controllers/OPNsense/Speedtest/IndexController.php
/usr/local/opnsense/mvc/app/models/OPNsense/Speedtest/ACL/ACL.xml
/usr/local/opnsense/mvc/app/models/OPNsense/Speedtest/Menu/Menu.xml
/usr/local/opnsense/mvc/app/models/OPNsense/Speedtest/Speedtest.php
/usr/local/opnsense/mvc/app/models/OPNsense/Speedtest/Speedtest.xml
/usr/local/opnsense/mvc/app/views/OPNsense/Speedtest/index.volt
/usr/local/opnsense/scripts/OPNsense/speedtest/install_speedtest.sh
/usr/local/opnsense/scripts/OPNsense/speedtest/opn_speedtest.py
/usr/local/opnsense/service/conf/actions.d/actions_speedtest.conf
/usr/local/opnsense/version/speedtest-community
/usr/local/opnsense/www/js/widgets/Metadata/Speedtest.xml
/usr/local/opnsense/www/js/widgets/Speedtest.js
/usr/local/www/widgets/include/speedtest.inc
/usr/local/www/widgets/widgets/speedtest.widget.php
Quote from: pfry on June 17, 2025, 05:11:58 PMYou wouldn't happen to have synproxy enabled on the pass rule for these sessions?
TNET 2025-06-17T08:42:25 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:42:17 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:42:09 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:42:05 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:42:01 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:41:59 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:41:57 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:41:56 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:41:55 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:41:54 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
WAN 2025-06-17T08:41:54 45.76.130.220:14043 91.2.119.28:80 tcp let out anything from firewall host itself (force gw)
14[ENC1] <the uuid|1> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
14[NET1] <the uuid|1> sending packet: from 203.0.113.158[500] to 109.104.97.188[500] (336 bytes)
03[NET2] sending packet: from 203.0.113.158[500] to 198.51.100.188[500]
02[NET2] received packet: from 198.51.100.188[500] to 203.0.113.158[500]
02[NET2] waiting for data on sockets
12[NET1] <the uuid|1> received packet: from 198.51.100.188[500] to 149.106.180.158[500] (446 bytes)
12[ENC1] <the uuid|1> parsed IKE_SA_INIT response 0 [ SA KE No V V N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) V ]
12[IKE1] <the uuid|1> received Cisco Delete Reason vendor ID
12[IKE1] <the uuid|1> received Cisco Copyright (c) 2009 vendor ID
12[IKE1] <the uuid|1> received FRAGMENTATION vendor ID
12[IKE2] <the uuid|1> received FRAGMENTATION_SUPPORTED notify
12[CFG1] <the uuid|1> selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
12[IKE1] <the uuid|1> local host is behind NAT, sending keep alives
12[IKE2] <the uuid|1> reinitiating already active tasks
12[IKE2] <the uuid|1> IKE_CERT_PRE task
12[IKE2] <the uuid|1> IKE_AUTH task
12[IKE1] <the uuid|1> authentication of '203.0.113.158' (myself) with pre-shared key
12[IKE2] <the uuid|1> successfully created shared key MAC
12[IKE0] <the uuid|1> establishing CHILD_SA c942748f-a0ff-403f-8539-5a2fc2ba54f2{2}
12[ENC1] <the uuid|1> generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH N(ESP_TFC_PAD_N) SA TSi TSr N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
12[NET1] <the uuid|1> sending packet: from 203.0.113.158[4500] to 109.104.97.188[4500] (268 bytes)
03[NET2] sending packet: from 203.0.113.158[4500] to 198.51.100.188[4500]
02[NET2] received packet: from 198.51.100.188[4500] to 203.0.113.158[4500]