Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - kyferez

#1
Quote from: Fright on July 10, 2021, 07:19:46 PM
@kyferez
what OPN version and browser?
copy\paste (browser depended) added in 21.1.5 afaik
https://github.com/opnsense/changelog/blob/8432aa1d2fd2092a2c80cd343402fe61c97db415/community/21.1/21.1.5#L34
Oops I read my version as 21.1 but was 20.1. I upgraded to the latest version and the Copy option does work. However the remainder of the items still exist, though I can at least more easily work around it by using the copy option.
1.   It's impossible to organize (without copy, manual organize, paste)
2.   It prevents editing the IP (or any item) once it becomes 'blocked'

I'd still like to request the ability to disable the "blocking" of the alias item.
#2
Quote from: Fright on July 10, 2021, 04:16:08 PM
hi
could you please describe the problem in more detail? (with screenshots it would be even more convenient)
See image. I've got a bunch of IPs in an Alias. Each IP is in a blueish gray box.

These boxes prevents editing them as text meaning I cannot easily organize them (without full delete and re-adding them) and they do not self-organize by octet.

You cannot edit an IP easily. You have to delete the entire IP address and reenter it. This is tedious for many IPs.

I can't copy the full list of IPs out of the field. Copy and paste do not work. Can we please have an option to simply leave them as text?

Thanks!
#3
I had same issue. Couldn't access it at all. Had to validate all interface MAC addresses and some had moved around and were attached in the wrong order. Had to fix it via console.
#4
I need to copy out all the IPs in an alias. Is there any way to alter how it displays the IPs? I really, really dislike the auto-blocking format used because:

  • It's impossible to organize
  • It's impossible to copy
  • It's impossible to see all the items
  • It prevents editing the IP (or any item) once it becomes 'blocked'

Can we at least have an option to disable the auto-blocking and maybe use a CSV or 1 entry per line format?
Also in the interim, is there any way to copy all the IPs it has in it now from the config?
#5
Every few days I have to manually restart SQUID. It comes right back up, but why is it stopping and not automatically restarting? It's incredibly fustrating!

How do I determine why that is happening?
Can we get an auto-heal feature for all services?

If this auto-heal of services already exists, then either

1) How do I set it up ?

OR

2) If service restart is automatically there, how can i determine why my manual restart of SQUID works when auto doesn't?

Edit: Upgrading but highly doubt that will fix as this has been ongoing since version 17.
#6
Quote from: hbc on May 29, 2020, 11:53:42 PM
I see you are the pro. On our next network meeting I will forward your suggestion to abandon the existing B- and C-Class net blocks in favor for NAT-bottlenecks.
That's hysterical you make me laugh. I'm not saying abandon them. I'm saying using them as internal is no longer commonly done, and NAT is only a bottleneck if your design is poor. Give me a break. Plenty of companies have 10000+ users on a corporate network where NAT is not a problem. I manage devices where there's that many internal users and also easily that many users hitting NAT Inbound from external. Issues like port exhaustion only occurs in extreme cases, and there's easy methods to prevent that in enterprise gear.
#7
Quote from: hbc on May 27, 2020, 10:03:12 PM
Before ip4 address became close, public ips where the common away to build networks. Most universities don't use any RFC1918 addresses till today, even printer, access points, etc. have public ips. NAT and RFC1918 addresses are more home user style and got popular due to lack of ip4 addresses.
That was true, not any longer. These days almost all corporations, even many very large international coprorations use RFC1918 IPs for internal. Are there still some that use their public IP blocks wastefully? Yes. But they are in the extreme minority.

As for IPv6, it would still be best to exclude the link local and special purpose IP ranges from Public Internet IPs.

Did not know what they used for feature requests; the forums seemed likely though.
#8
Right, but that's a company using Public IPs for private IPs and would have to consider that. It honestly would affect an extremely small subset of customers. The advantages are more significant such that I think the argument is silly.

But bigger question: Why are my other questions getting ignored?
#9
Quote from: hbc on May 23, 2020, 10:10:39 AM
To 1.:
Beside of this: what is internet? For you as private user with one isp assigned public IP, everything not RFC1918 and multi/broadcast is internet. For companies that own public network blocks, things look different.
Basically all internet route-able addresses. Just because a company owns IP blocks and uses them as internal IPs doesn't mean it's not Internet Routeable. IMO it's foolish and wasteful, but that's neither here nor there. They are still Internet routeable and a company like that would have to be aware that an Internet Alias would include those IPs. I don't think it's unreasonable to provide an InternetIPv4 and InternetIPv6 alias built-in. It's pretty ubiquitous and other companies provide it for ease of management.

Quote from: hbc on May 23, 2020, 10:10:39 AM
To 2.:

Of course you can only nest aliases of same type. You can group aliases of type network, but cannot add ones of type port. Logic.
Not for us autistic types. We question basic logic because it is usually not clearly defined logic that takes into account all possible variables. For example: can a group be nested with a type of URL and a type of Network? It's reasonable to conclude they can, but it's not defined if it will work. Make sense?

What about #3 questions?
#10
Yes, I'm on the latest 20.1.7.

1. This doesn't really work as I would want Not RFC1918 and Not Multicast and Not Loopback and NOT SpecialPurpose and NOT Broadcast and NOT etc. I guess since #2 actually exists I can manually create this, but it would certainly be better if it was just built-in!

2. Really? That's great news! The drop-down didn't mention using Alias' as an option, and since the drop-down was specific, I didn't expect anything but what was specified as the option in the drop-down to work, but I see in description it says they can be nested which I don't remember from before. By the way, which drop-down Type option would be correct for nesting? Should it match the Parent Alias type?

3. Also great news! That said, which Drop-Down would I use for this? Also the "Type" could seriously use some help in the "Help" area for this and #2! What is External? What is URL and URL Table and Network Group?

4. Of all these items, this is a "most wanted"

5. Thanks, I think I can make that work.

Thanks!
#11
Multiple Alias based and firewall rule based feature requests:

1. Built-in Aliases for InternetIPv4 addresses and InternetIPv6 addresses. This would basically make it easier to specify all Internet IP ranges in a rule which would automatically exclude all other address types such as RFC1918, multicast, etc.

2. Alias Groups. This is an Alias which contains multiple other Alias names. Useful when you want to create multiple hosts like GoogleDNS1 GoogleDNS2 Level3DNS1 Level3DNS2, then create a group PublicDNS which would contain those 4 alias' names. This also applies to services, such as a "HTTP" group for ports 80 and 8080, and "HTTPS" group for ports 443 and 4443, so a Service Group Alias would contain both "HTTP" and "HTTPS" as entries in the Alias Service Group.

3. DNS Alias' and DNS Groups. If a DNS name can be an alias that the firewall resolves, this would be very helpful for making rules to internet applications, and would need to also account for the fact that some FQDNs resolve to multiple IPs. Then a DNS Group would be an Alias with multiple FQDNs.

4. Rules to allow multiple Sources, Destinations, and Services. This makes rules much easier to manage. If I can create one rule like below examples it's much more concise, less error prone, and easier to manage. I'd otherwise have to create multiple Alias' and multiple rules or both which quickly becomes confusing for an environment with many VLANs and many restrictions.

Example:
Source: Host1 or Host2 or AliasGroup1
DST: AliasGroup2 or AliasGroup3
Services: WebBrowsing or SSH

Another example:
Source: AliasGroup
DST: InternetIPv6 or InternetIPv4
Services: WebBrowsing

5. Ability to reverse priority of Floating rules and interface specific rules. I like to use the Floating rules as General Purpose Allow rules which apply to most of my network, and the specific interface rules for more specific denials or allows which I want to override the floating rules. This helps keep the Floating rules limited to smaller numbers of rules which makes management easier and less error prone, as the alternative is to create Floating deny rules above the general purpose allow which gets messy fast. Thus if I could have the Interface rules have priority over the Floating rules, this would work much better for this sort of design.

Thanks!
#12
Well, after that blew up the OPNsense UI, I couldn't even ssh into it. I ended up having to reboot the VM, but all is working now. Thanks.
#13
Well that completely blew up OPNsense. UI Totally stopped responding.
#14
Ah that makes a massive difference in whether I do so or not! The Support tab should have said such!
#15
No, because I have quite a bit of config - it's used on 6 different VLANs.