OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • Profile of anomaly0617 »
  • Show Posts »
  • Messages
  • Profile Info
    • Summary
    • Show Stats
    • Show Posts...
      • Messages
      • Topics
      • Attachments

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

  • Messages
  • Topics
  • Attachments

Messages - anomaly0617

Pages: [1] 2 3
1
General Discussion / Re: Upgrading from the stone age to current?
« on: November 13, 2022, 06:59:38 pm »
Quote from: yourfriendarmando on November 13, 2022, 02:16:58 am
The quick easy to find out is try it.

The upgrade functions could offer the next necessary intermediate version. If not, it could be dangerous.

In either case, take a dd capture if the disk, or keep an older iso and backup config handy.

I'm not certain how to try it out. When you run option 12 from the UI in the console or SSH, it will offer you the next major version (if you're on 19.1, it will likely offer you 19.7 - but not 22.7 or 22.10). So if it's possible, I'm not sure how to kick start it into the latest major version. the dd backup is a good plan, though, regardless. I tend to rely on the XML backup config files more though.

2
General Discussion / Upgrading from the stone age to current?
« on: November 12, 2022, 11:17:24 pm »
Let's say I stumble upon an OPNsense firewall that was installed in 2020, but not updated with the major versions since then.

22.10 is presently out.

Is there a way to upgrade from, say, 20.1 to 22.10 in one command at the console or SSH interface? Or do I have to do the upgrades in order until I make it to the latest version?

3
Virtual private networks / IPSec VPN + SIP Phones Advice
« on: November 07, 2022, 06:14:35 pm »
Hi all,

I'm looking for some advice. I've got two locations, a main location and a remote one, connected via an IPSec VPN tunnel. The remote location has about 6 SIP phone handsets, which should be communicating back to the PBX at the main location over the VPN tunnel. It also happens to be where the calls come into for customer support, so the phones NOT working is really noticeable.

Once a month on the 1st Sunday, I reboot both OPNSense firewalls, do firmware updates, etc. The following Monday (today in this case), some of the phones come up in the SIP Status interface of the phone server as being "unavailable." This appears to be due to SIP QUALIFY and SIP OPTIONS traffic not flowing between the two locations appropriately. So I've been chasing this for about 4 months now and I'm banging my head against a wall. I'm wondering if you all would look at my IPSec VPN configuration and see if you see something I'm doing incorrectly...

Phase 1
SettingLocalRemote
Phase11
DisabledUncheckedUnchecked
Connection MethodStart ImmediateStart Immediate
Key Exchange VersionV2V2
Internet ProtocolIPv4IPv4
InterfaceWANWAN
Remote gateway(Remote Bldg IP)(Main Bldg IP)
Dynamic GatewayUncheckedUnchecked
DescriptionRemote BldgMain Bldg
Phase 1 Auth MethodMutual PSKMutual PSK
My identifierMy IP AddressMy IP Address
Peer identifierPeer IP AddressPeer IP Address
Pre-Shared Key(The Key - They Match)(The Key - They Match)
Encryption AlgorithmAES-256AES-256
Hash AlgoritmSHA1SHA1
DH Key Group5 (1536 bits)5 (1536 bits)
Lifetime8640086400
Install PolicyCheckedChecked
Disable RekeyUncheckedUnchecked
Disable ReauthUncheckedUnchecked
Tunnel IsolationUncheckedUnchecked
SHA256 96 Bit TruncationUncheckedUnchecked
NAT TraversalEnableEnable
Disable MOBIKEUncheckedUnchecked
Close ActionNoneNone
Dead Peer DetectionUncheckedUnchecked
Inactivity Timeout(Blank)(Blank)
Keyingtries(Blank)(Blank)
Margintime300300
Rekeyfuzz5050

Phase 2
DisabledUncheckedUnchecked
ModeTunnel IPv4Tunnel IPv4
DescriptionLocal to RemoteRemote to Local
Local LAN TypeLAN SubnetLAN Subnet
Local LAN Address(Blank)(Blank)
Remote LAN TypeNetworkNetwork
Remote LAN Address192.168.20.0/24192.168.1.0/24
ProtocolESPESP
Encryption AlgorithmAES256AES256
Hash AlgorithmsSHA1SHA1
PFS key groupoffoff
Lifetime36003600
Automatically ping host192.168.20.1192.168.1.1
Manual SPD entries(Blank)(Blank)

Under Firewall >> Rules >> IPSec on both firewalls I have an Allow IPv4 Any-Any-Any rule with a description of "Allow IPSec Traffic."

Under Firewall >> Settings >> Advanced I have the Firewall Optimization set to Conservative

Can anyone see something I'm doing wrong here? In talking with the PBX vendor, they advised that I needed to turn off DPD on my Phase 1, which I did. This did resolve some problems, but not all of them.

Thanks in advance for any advice!

4
Virtual private networks / Phase 1 Key Lifetime setting for mobile connections
« on: March 04, 2022, 03:20:05 am »
I've set up hundreds of PPTP, IPSec, L2TP, and OpenVPN connections over the years, so I wouldn't consider myself a NEWB on this topic. But this is the first time I've set one up where the internet has the potential to be this spotty.

I need a "site-to-site" connection between a stationary, physical location with fiber and (get this) a charter bus.

The charter bus has two cellular routers, one each from the leading carriers. Those come into a micro-firewall running OpnSense. And the charter bus is on the highway more often than not, so it's almost always near at least 1 or more cellular towers. But that's where the stability ends. The cellular providers both have agreed (for more money) to give us an APN that doesn't use C-NAT (Carrier-based NAT), so the IP address we see in each router is the IP address that OpnSense sees. This is a big deal because without this change, C-NAT is the default on cellular, and the cellular router has an IP address that google's "What Is My IP" does not confirm. They also firewall off the traffic to the cellular router directly, so the IP address that you see on the cellular router isn't accessible.... which means Dynamic DNS is worthless.

So, here's my question: Assuming I need bidirectional communication as much as possible, what are everyone's thoughts on setting the P1 Key Lifetime very low, like 30-600 seconds kind of low?

The present issue is that if I set that P1 key lifetime to anything normal (say, 3600-28800) and the bus goes through an area with no cellular signal, the VPN tunnel won't reconnect when it acquires cellular service again without me having to remote into both firewalls, disable the VPN tunnels on each one and Apply, then re-enable each one and Apply again. At 2 in the morning, this is really, really annoying.

Is there a precedent for this with strongswan and OpnSense?

Thanks, in advance!

5
21.1 Legacy Series / OpenVPN No Client Export Option - The Solution You're Probably Looking For...
« on: June 29, 2021, 09:52:30 pm »
See https://forum.opnsense.org/index.php?topic=13354.0. You cannot reply to archived threads, so I'm creating a new thread here.

Every once in awhile I have this problem as well, and figuring it out is a pain in the butt, because not everyone does OpenVPN the same. In our case, we use Active Directory as the back end authentication mechanism. When the "Client Export" page has no link at the bottom, you start to pull your hair out trying to figure out what you did wrong... so here's the answer...

Look at the certificate you linked to in your OpenVPN Server configuration. Grab it's name and then go to System > Trust > Certificates. Is it Self-Signed? If so, that's your issue.

Make sure you have a Certificate Authority for your firewall. Add one under Trust > Authorities > Add. It can be Self-Signed, because it's a Certificate Authority (ie: Something that can create and issue certificates).

Next, create a new Certificate under System > Trust> Certificates.
Create an Internal Certificate.
For Certificate Authority, choose the Certificate Authority you created above.
Under Type, make sure you select Server Certificate.
I usually set the Lifetime of this certificate to something like 3650 (10 Years). You likely don't want to have to reissue VPN profiles to users that often.
Fill in all the information. Under Common Name, give it something unique, like SSLVPN Certificate or something similar.
Save it, and let's go back to OpenVPN Servers.

VPN > OpenVPN > Servers
Edit Your Server.
Under the Cryptographic Settings section, look at Server Certificate and select the one you just created.
Go to the bottom and click Save.

Go to VPN > OpenVPN > Client Export. You should now have a link to select.
I'm a fan of "File Only" because it bundles everything up into one nice file for OpenVPN to import.
I also change the Hostname to a DNS resolvable name. This makes life easier when you change ISPs.

Hope this helps!



6
General Discussion / GEOM Mirror Widget?
« on: May 20, 2021, 06:03:23 pm »
This seems funny to me, but in all the conversions I've done from that other *Sense product to OpnSense, I never noticed that there's no GEOM Mirror Widget. Here's what it used to look like:

GEOM Mirror Status Widget

How hard would it be to create one and make it an optional add-on to OpnSense? I know it's some derivative of the "gmirror status" command.

Thanks, in advance, for all you do!
Paul

7
General Discussion / 1:1 NAT Forwarding/Masquerading
« on: May 18, 2021, 04:37:51 pm »
Hi all,

I've done this before, but it's been years and I'm hoping someone can just give me a quick refresher on it.

I have a vendor (gotta love vendors) who has set up an internal network around their manufacturing solution wherein they are utilizing a 192.168.0.0/22, or in more human readable terms, a network where the start address is 192.168.0.0 and the end address is 192.168.3.255.

My boss wants us to connect to this network and pull stats from the manufacturing solution. There's software to do this, and we've purchased it. But the issue is that we already have networks that are on the 192.168.1.0, 192.168.2.0, and 192.168.3.0 networks. Thus, I've set up an opnsense firewall on another VLAN'ed network, which is the 192.168.20.0 network, dedicated to the various manufacturing machines.

So, my "WAN" interface on this firewall looks like this: 192.168.20.254/24
And, my "LAN" interface on this firewall looks like this: 192.168.1.254/22

I've used nmap to scan the entire network for this manufacturing solution, and I find 27 IP addresses between 192.168.0.0 and 192.168.3.255.

What I'd like to do is set up some virtual IPs on the opnSense firewall like this:

WAN 192.168.20.230 = LAN 192.168.1.10
WAN 192.168.20.231 = LAN 192.168.1.15
...

And this way we can ping and communicate with the devices on the manufacturing network using 192.168.20.x network addresses instead of their native 192.168.[0-3].x addresses.

It seems like this was possible and relatively easy once I got the hang of it. But by "getting the hang of it" I mean I did it once about 4 years ago.

Can someone refresh my memory on how to make this work?

Thanks, in advance!
Paul

8
General Discussion / Re: NUT - Client, but not Server?
« on: March 18, 2021, 03:51:21 pm »
Awesome, got it working! Thanks!

9
General Discussion / NUT - Client, but not Server?
« on: March 18, 2021, 03:07:14 pm »
Hi all,

Am I correct in saying that NUT (Network UPS Tools) can be a client on OpnSense, but OpnSense cannot act as a NUT server/daemon for other machines to connect to?

10
20.7 Legacy Series / Re: Reporting security vulnerabilities
« on: November 17, 2020, 05:35:27 pm »
Found the GPG key, encrypted it and sent it to you for review.

Thanks, Franco!

11
20.7 Legacy Series / Re: Reporting security vulnerabilities
« on: November 17, 2020, 04:55:11 pm »
Hi Franco,

A PGP key would be appreciated. Thanks!

12
20.7 Legacy Series / Reporting security vulnerabilities
« on: November 17, 2020, 04:34:12 pm »
Hypothetically, let's say we find a security vulnerability in OPNSense that we want to (privately!) bring to the attention of developers to get it resolved quickly and quietly. Who should we send this data to, and how should we send it?

Thanks!
-Anomaly0617

13
General Discussion / ZeroTier as a replacement for IPSec: Your Opinions, Please?
« on: May 05, 2020, 05:18:21 pm »
Hi all,

We maintain a number of multi-site locations where we've used IPSec and fully-meshed the networks (ie: every location can talk to every other location). The obvious issue with this is the upkeep. Doing the math, if I have 11 locations, that means that every firewall has 10 IPSec tunnels. (Locations * (Locations -1)). So, in the instance of 11 locations, I'm maintaining 110 individual tunnels.

And this is where cloud-meshed VPN solutions (SD-WAN) enters the show. Instead of having to maintain 110 tunnels, I could maintain 11, and the cloud-meshed VPN solution would handle the routing. Or, worst case, I can manage the routes at the centralized console. Point is, the routing becomes easier.

For some of my locations, this is a non-starter. Those locations deal with protected information and an SD-WAN solution leaves too high a possible risk for someone to silently add their own node onto the network and then have time and access to all of the information they can vacuum up without our notice. Yes, I know that these solutions often offer multi-factor authentication at the cloud level. But even multi-factor is being hacked these days.

And this brought us around to ZeroTier. One of my engineers was complaining about what a pain in the rear maintaining all the tunnels was, and how SD-WAN would be so much better a solution. So I decided to give it a try with ZeroTier.

I picked a location that is more or less a "test site" - no issues if that site gets hacked, there's nothing there for them to find. And for the other site (and eventually, sites), I picked a few of our staff's home networks that are in a similar situation - if they get hacked... well, that sucks, but they have firewalls and backups.

I followed this guide and tried to keep the configuration as simple as possible. Get it working reliably first, and then start building rules and filters as necessary. But I didn't get that far.

My experience was that after
  • updating OPNsense to the latest version
  • getting the zerotier plugin installed
  • connecting it to my zerotier portal through VPNs >> ZeroTier and using the API I was given from the ZeroTier portal
  • adding the site and approving it in the portal
  • creating the network interface and assigning it the appropriate IP address from ZeroTier (note: /24, not /32!)
I would see an uptime of about 45 seconds to 2 minutes, after which my network monitoring software would go from "all green" to "all red" pinging the remote hosts.

I tried adding managed route(s) (example: network 192.168.92.0/24 routes through 10.147.17.197).
I tried rebooting firewalls.
My experience did not change.

I read through the ZeroTier manual. No luck.

I not only disabled the IPSec tunnels that were in place before, I deleted them out of a few firewalls and rebooted. No change.

So, I'm now curious if I did something very obviously wrong, or if this experience is relatable to others? I'm open to the idea of an SD-WAN solution if it's stable, but I'm not going to sacrifice stability for convenience.

Opinions/Comments welcome!

14
20.1 Legacy Series / GeoIP Firewall Question, v19 vs v20?
« on: February 26, 2020, 07:41:59 pm »
Hi all,

I was referencing this documentation the other day to get up country-based IP filtering.

The documentation states "In OPNsense, goto Firewall:Aliases and select the GeoIP settings tab. Enter the URL you have created into the URL box and click Apply, and that’s it."

When I go to Firewall:Aliases on an OpnSense v20.1 server, I see this tab. However, on a v19.7.6 firewall, there is no GeoIP tab. On this one, when you create an alias you can choose GeoIP as an alias type, and then from there select the countries you want to block. Then, in theory, you make a block rule in Firewall:Rules:Floating, selecting all of your outside interfaces, and then block anything with a source of the GeoIP Alias.

I see that in v20 I can still do this with the aliases, as type GeoIP.

So, I'm just looking for clarification. Is the Alias method OK to use? Is the GeoIP method the one we're supposed to use? I don't want to assume that the alias method is working to block inbound traffic from undesirable countries and then find out that it doesn't actually work without MaxMind and the GeoIP tab.

Thanks, in advance!

15
20.1 Legacy Series / Re: Likely an Easy fix - vpn_ipsec.php phase 1 background color
« on: February 25, 2020, 01:34:17 am »
Just wanted to bump this thread in case it was overlooked. I've checked on multiple firewalls (20 or so) and the code is in every one of them that has been upgraded to the 20.x version.

Pages: [1] 2 3
OPNsense is an OSS project © Deciso B.V. 2015 - 2023 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2