Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - buga

#2
is not work i try it
#3
default

how mask?
#4
There is:
-LAN 192.168.100.39      opened port 25
-OPNsense 192.168.100.1 client opvn 10.8.0.2, Port forwarding 10.8.0.2:25 to 192.168.100.39:25
-VPS 91.91.91.91,      server opvn 10.8.0.1, iptables -t nat -A PREROUTING -p tcp --dport 25 -j DNAT --to-destination 10.8.0.2:25
-WAN Client diferent IP

Clients from the Internet with any IP who should be able to connect to 192.168.100.39:25
through:
Internet clietnt WAN->    VPS 91.91.91.91:25->    10.8.0.1:25->    10.8.0.2:25->    192.168.100.39:25
But at the moment it does not work, it seems like you need to configure outbound. But I can't.


According to TCPDUMP 192.168.100.39, he sends a directly response to the to the client to the client, which I think not correctly.
The answer does not go further than the Router Opnsense
#5
Quote from: buga on November 28, 2024, 06:32:06 PM
Quote from: dseven on November 27, 2024, 02:42:22 PM
Unfortunately it appears that GoFile doesn't provide any easy way to get the raw file directly, hence things like this exist: https://github.com/ltsdw/gofile-downloader
https://file.io/3t6N3yErnCYP
yes
#6
Quote from: dseven on November 27, 2024, 02:42:22 PM
Unfortunately it appears that GoFile doesn't provide any easy way to get the raw file directly, hence things like this exist: https://github.com/ltsdw/gofile-downloader
https://file.io/3t6N3yErnCYP
#7
Quote from: dseven on November 27, 2024, 02:42:22 PM
Unfortunately it appears that GoFile doesn't provide any easy way to get the raw file directly, hence things like this exist: https://github.com/ltsdw/gofile-downloader
https://file.io/3t6N3yErnCYP
#9
this file with ip range txt https://gofile.io/d/wWXdSE
for sample
103.147.170.0/23
103.152.16.0/23
103.152.174.0/23
103.155.126.0/23
2.56.24.0/23
...
11.000 lines



Help
#10
How to set right proxmox ip6 gateway for linux bridge opnsense fe80::be24:11ff:fe8e:c11c

Client
ping -6 fe80::be24:11ff:fe8e:c11c
no reach

opnsense restart (in PROXMOX VM)
ping -6 fe80::be24:11ff:fe8e:c11c
fe80::be24:11ff:fe8e:c11c: time<1ms
fe80::be24:11ff:fe8e:c11c: time<1ms

Client reboot
ping -6 fe80::be24:11ff:fe8e:c11c


i have two interfaces

gif0: flags=1008051<UP,POINTOPOINT,RUNNING,MULTICAST,LOWER_UP> metric 0 mtu 1280
......
        inet6 fe80::be24:11ff:fe8e:c11c%gif0 prefixlen 64 scopeid 0x9
      
      
vtnet0: flags=1008843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST,LOWER_UP> metric 0 mtu ......
        inet6 fe80::be24:11ff:fe8e:c11c%vtnet0 prefixlen 64 scopeid 0x1      
no reach

That is, I need to reboot both the computer and the router so that IP6 works. Why is this and how can I fix it?

#11
i see custom options field only in

    VPN: OpenVPN: Clients [legacy]

but i can use only VPN: OpenVPN: Instances

need add  current --script-security
#12
Client legasy

Trust (auth&cert)



111.311.115.122 SEVER IP
222.239.212.126 CLIENT IP OpnSene (is client)


CLIENT CONFIG generated by script https://raw.githubusercontent.com/angristan/openvpn-install/master/openvpn-install.sh
client
proto udp
explicit-exit-notify
remote 111.311.115.122 49973
dev tun
resolv-retry infinite
nobind
persist-key
persist-tun
remote-cert-tls server
verify-x509-name server_ve4XMxxxxxnkhHWL1 name
auth SHA256
auth-nocache
cipher AES-128-GCM
tls-client
tls-version-min 1.2
tls-cipher TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
ignore-unknown-option block-outside-dns
setenv opt block-outside-dns # Prevent Windows 10 DNS leak
verb 3
<ca>
-----BEGIN CERTIFICATE-----
xxxxxxxxxxxxx
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
xxxxxxxxxxxxx
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
xxxxxxxxxxxxx
-----END PRIVATE KEY-----
</key>
<tls-crypt>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
xxxxxxxxxxxxx
-----END OpenVPN Static key V1-----
</tls-crypt>





SERVER CONFIG

port 49973
proto udp
dev tun
user nobody
group nogroup
persist-key
persist-tun
keepalive 10 120
topology subnet
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "dhcp-option DNS 94.140.14.14"
push "dhcp-option DNS 94.140.15.15"
push "redirect-gateway def1 bypass-dhcp"
dh none
ecdh-curve prime256v1
tls-crypt tls-crypt.key
crl-verify crl.pem
ca ca.crt
cert server_ve4XMxxxxxnkhHWL1.crt
key server_ve4XMxxxxxnkhHWL1.key
auth SHA256
cipher AES-128-GCM
ncp-ciphers AES-128-GCM
tls-server
tls-version-min 1.2
tls-cipher TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
client-config-dir /etc/openvpn/ccd
status /var/log/openvpn/status.log
verb 3






SERVER VERSION
# openvpn --version
OpenVPN 2.4.12 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 27 2024
library versions: OpenSSL 1.1.1f  31 Mar 2020, LZO 2.10
Originally developed by James Yonan
Copyright (C) 2002-2018 OpenVPN Inc <sales@openvpn.net>


CLIENT VERSION
openvpn --version
OpenVPN 2.6.12 amd64-portbld-freebsd14.1 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] [DCO]
library versions: OpenSSL 3.0.15 3 Sep 2024, LZO 2.10
DCO version: FreeBSD 14.1-RELEASE-p5 stable/24.7-n267855-304cf693716 SMP
Originally developed by James Yonan
Copyright (C) 2002-2024 OpenVPN Inc <sales@openvpn.net>


CLIENT LOG
2024-11-02T00:03:56 Notice openvpn_client1 UDPv4 link remote: [AF_INET]111.311.115.122:49973
2024-11-02T00:03:56 Notice openvpn_client1 UDPv4 link local: (not bound)
2024-11-02T00:03:56 Notice openvpn_client1 TCP/UDP: Preserving recently used remote address: [AF_INET]111.311.115.122:49973
2024-11-02T00:03:56 Warning openvpn_client1 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-11-02T00:03:56 Notice openvpn_client1 DCO version: FreeBSD 14.1-RELEASE-p5 stable/24.7-n267855-304cf693716 SMP
2024-11-02T00:03:56 Notice openvpn_client1 library versions: OpenSSL 3.0.15 3 Sep 2024, LZO 2.10
2024-11-02T00:03:56 Notice openvpn_client1 OpenVPN 2.6.12 amd64-portbld-freebsd14.1 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] [DCO]


CLIENT INTERFACE
ovpnc1: flags=8010<POINTOPOINT,MULTICAST> metric 0 mtu 1500
        options=80000<LINKSTATE>
        groups: tun openvpn
        nd6 options=23<PERFORMNUD,ACCEPT_RTADV,AUTO_LINKLOCAL>


SERVER ERR LOG

tls-crypt unwrap error: packet authentication failed
TLS Error: tls-crypt unwrapping failed from [AF_INET]222.239.212.126:60982
tls-crypt unwrap error: packet authentication failed
TLS Error: tls-crypt unwrapping failed from [AF_INET]222.239.212.126:60982
tls-crypt unwrap error: packet authentication failed
TLS Error: tls-crypt unwrapping failed from [AF_INET]222.239.212.126:60982
#13
Now i hawe this rules: i think is wrong
#14
https://github.com/borestad/blocklist-abuseipdb

I can do upload url from raw one time.

DB memo:
#4 Recommended usage is the maximum 30 days or less to avoid false positives.
#15
Posted by: Seimus
yes indeed, the rules remain in the list but they become inoperative if the checkbox is checked.
ty

Posted by: chemlud
openAIM