Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - tmontney

#1
Solution

tls-cert-bundle turned out to be important, no surprise there. Appended tls-cert-bundle: "/usr/local/etc/ssl/cert.pem" to the top of the file.

Also, I had originally added two entries in the GUI under "DNS over TLS". I assumed my config would override them; however, looks like it was in addition to. Once those were disabled and a service restart, started seeing traffic logs in Cloudflare pretty quickly. Firewall rules are working, too.


Original

I've configured my Opnsense instance per this tutorial: https://homenetworkguy.com/how-to/configure-dns-over-tls-unbound-opnsense/

  • 1.1.1.1/help shows I'm using DoT (and not DoH)
  • I can see traffic going over 853 to the intended Cloudflare IPs from the correct source IP
  • DNS resolution is working*

From all the resources I've found, they all cover public resolvers. In my case, I'm using Cloudflare One, where I am given a specific DoT endpoint and restrict it to my static IP CIDR. I've got a firewall rule to block various categories; however, those are not blocked (using https://developers.cloudflare.com/cloudflare-one/traffic-policies/dns-policies/test-dns-filtering/#test-a-security-or-content-category) and I see no traffic in the logs (over the past few days).

Did come across this: https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/dns/dns-over-tls/#2-configure-your-dot-client I added what it suggested (minus the tls-cert-bundle) to /usr/local/etc/unbound.opnsense.d/cf-one.conf and rebooted. Unfortunately, that didn't seem to do anything. (Config seemed to be automatically copied to /var/unbound/etc and the GUI notes there's a custom override, so at least Unbound is aware of it.)
#2
Quote from: cookiemonster on February 05, 2025, 01:13:36 PM/var/logs is the right place. Unfortunately to my knowledge freeBSD's dmesg doesn't have the ability like linux to include the timestamps. Those are helpful when diagnosing.
Perhaps you are also using a service that is not part of the OS, maybe also has logs?

It's been running well for close to a year. No custom services that I'm aware of.
#3
Quote from: meyergru on February 05, 2025, 01:19:39 PMWhat type of system? Some NICs are known to have problems when ASPM is enabled.

Custom

  • AsRock Rack B550D4ID-2L2T
  • Intel X520-DA2 10GTek

Been running well for close to a year. However, I did recently update to 24.7 (can't recall from what but it was a major update for sure).
#4
I just had a strange outage. DHCP devices suddenly couldn't renew their leases, static assigned devices couldn't reach the Internet. LAN/WAN interfaces on the firewall were link up. The firewall itself could ping WAN addresses. Reloading services from the console didn't help, only a full reboot did. Didn't change anything about the network or firewall today. Running  24.7.11_2.

I've reviewed the logs from the UI, even poked around at logs in /var/logs. Is there anywhere else I can look to determine what happened? (I know the exact time my devices suddenly went down.)
#5
Edit: I have tried changing the virtual IP to "Proxy ARP". No effect.

Recently migrated from PFSense to OPNSense, and am struggling with this. OPNSense is on latest, 23.7.11. My configuration is below, but curl to ifconfig.me doesn't change (from my default WAN address).

1.2.3.4 is my (fake) WAN address, and 192.168.1.100 is my (fake) internal address. I want 192.168.1.100's outbound traffic to use 1.2.3.4 (as opposed to, say, 1.2.3.5).

Virtual IPs

  • Mode: IP Alias
  • Interface: WAN
  • Network/Address: 1.2.3.4/29

Firewall: NAT: Outbound

  • Mode: Hybrid
  • Interface: WAN
  • TCP/IP Version: IPv4
  • Protocol: any
  • Source address: 192.168.1.100/32
  • Source port: any
  • Destination address: any
  • Destination port: any
  • Translation/target: 1.2.3.4