Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - newsense

#61
We've all been there once ;-)
#62
25.1, 25.4 Series / Re: Changelog fetch times out
April 07, 2025, 12:34:44 AM
Leave unbound running and make sure the time is correct on the machine.
#63
Need to press q to exit the changelog and allow the upgrade process to start.
#64
24.7, 24.10 Legacy Series / Re: New setup DEC 750
April 07, 2025, 12:26:03 AM
I would try first connecting with the serial cable, boot to single mode choosing option 2, press Enter whan asked about the shell to use, then run these commands:


/sbin/mount -u /

/sbin/zfs mount -a

rm -f /conf/config.xml

reboot

These steps would bring you the initial configuration wizard - however anything else you may have installed is still on the disk albeit with no configuration present.

If the above fails - i.e. you have other problems - then get the 24.10 ISO and image it to a stick, then do a fresh install.
#65
Quote from: Patrick M. Hausen on April 04, 2025, 12:59:18 PM
Quote from: newsense on April 02, 2025, 05:28:42 AMReminder - the appliance automatically powers off once the update process reaches 100%

Ouch! That's bad if the unit is in a remote data centre.

True, but you'd need remote hands anyway to plug in the USB stick...don't think you can present the needed file structure over KVM with a USB cable plugged in instead to be used when booting the appliance and choosing boot medium in EFI boot manager.
#66
Quote from: DEC670airp414user on April 04, 2025, 12:21:18 PMi guess this means my old reliable dec670 1gb is end of life if its no longer receiving bios updates?



That's a false assumption imo. I would assume EoL products are labeled as such.
#67
Quote from: Kets_One on April 03, 2025, 10:48:00 PMThanks!
Will DEC800, DEC3800 & DEC4000 series also get an update soon?
Last update was mid-2024...

Fairly sure it will, but it all depends on teh manufacturer of the BIOS afaik.

QuoteCurrent bios of dec3860 (with EPYC Embedded 3101) only seems to suport C2 as highest C-state as per sysctl.
Would like to have C3 enabled if possible to fursther lower power consumption.
Can this be enabled by an updated bios?

I would try it first, and then you might be able to have a tunable for it. I remember enabling C3 on APU boards without entering the BIOS.
#68
A new BIOS is available for DEC 700 and 2700 series. It was created in February 2025 and the available information simply states CVE Update.

Reminder - the appliance automatically powers off once the update process reaches 100%

QuoteDEC700 and DEC2700 series

02-2025 Version 32

Download



          Insyde H2OFFT (Flash Firmware Tool) Version (SEG) 200.02.00.06
         Copyright (C) 2022 Insyde Software Corp. All Rights Reserved.


                      Loading New BIOS Image File: ..Done

                  Current BIOS Model Name: NetBoard-A10_Gen.3
                  New     BIOS Model Name: NetBoard-A10_Gen.3
                  Current BIOS Version: 05.38.09.0023-A10.30
                  New     BIOS Version: 05.38.26.0025-A10.32


                           Updating Block at FFFFF000h
          0%          25%         50%          75%         100%
           **************************************************     100%

BIOS Version : 05.38.26.0025-A10.32
BIOS Build Date : 02/08/2025
   

SHA256 Checksum 1fc2efa0f16e3630bbdedcce5e6626c45378cce2e8c6739b19b436d957066903

CVE Update


BIOS updates page
#69
Crowdsec running ? Try killall crowdsec. If not check if you're not out of space with df -h
#70
Quote from: IsaacFL on March 28, 2025, 06:32:30 PM# opnsense-update -zkr 25.1.3-fixlog had fixed it prior

It is expected that an update will revert to the latest released kernel - so when running a custom version with a particular patch you need to either confirm the new one has the fix included or get in the GUI and lock the kernel before the updates.

The good news here is that the patched kernel is still available and you can simply run the command and reboot
#71
Disable OR fix IPv6 and it will work fine.
#72
Great so Suricata is fine, this was just collateral damage. 25.1.4_1 was this patch

https://forum.opnsense.org/index.php?action=post;quote=233338;topic=46556
#73
Does it work as expected if you revert it ?

opnsense-revert -r 25.1.3 suricata
#74
Either you switch to OPNsense Business Edition or you keep up with the upgrade cycle on OPNsense CE.

OPNsense BE 25.4 will likely be based off of 25.1.4 which is supposed to arrive in a few days.

Holding off arbitrarily on older versions is not a secure option. If you have an actual issue report it here or on Github so it will be addressed one way or another, but don't expect things to magically start working whenever you feel like doing another upgrade. _Actual_ OPNsense bugs in core are extremely rare and far between if you care to look on Github, more often than not are "upstream" issues or misconfigurations that create the most noise. And those actual bugs are usually dealt with and a fix is provided in under 24h - from my observations, most often than not even if the report came in during a weekend.
#75
If all goes well I'd expect a dnsmasq update as soon as next week.

https://www.freshports.org/dns/dnsmasq

version 2.91
    Fix spurious "resource limit exceeded messages". Thanks to
    Dominik Derigs for the bug report.

    Fix out-of-bounds heap read in order_qsort().
    We only need to order two server records on the ->serial field.
    Literal address records are smaller and don't have
    this field and don't need to be ordered on it.
    To actually provoke this bug seems to need the same server-literal
    to be repeated twice, e.g., --address=/a/1.1.1.1 --address-/a/1.1.1.1
    which is clearly rare in the wild, but if it did exist it could
    provoke a SIGSEGV. Thanks to Daniel Rhea for fuzzing this one.

    Fix buffer overflow when configured lease-change script name
    is too long.
    Thanks to Daniel Rhea for finding this one.

    Improve behaviour in the face of non-responsive upstream TCP DNS
    servers. Without shorter timeouts, clients are blocked for too long
    and fail with their own timeouts.

    Set --fast-dns-retries by default when doing DNSSEC. A single
    downstream query can trigger many upstream queries. On an
    unreliable network, there may not be enough downstream retries
    to ensure that all these queries complete.

    Improve behaviour in the face of truncated answers to queries
    for DNSSEC records. Getting these answers by TCP doesn't now
    involve a faked truncated answer to the downstream client to
    force it to move to TCP. This improves performance and robustness
    in the face of broken clients which can't fall back to TCP.

    No longer remove data from truncated upstream answers. If an
    upstream replies with a truncated answer, but the answer has some
    RRs included, return those RRs, rather than returning and
    empty answer.

    Fix handling of EDNS0 UDP packet sizes.
    When talking upstream we always add a pseudo header, and set the
        UDP packet size to --edns-packet-max. Answering queries from
    downstream, we get the answer (either from upstream or local
    data) If local data won't fit the advertised size (or 512 if
    there's not an EDNS0 header) return truncated. If upstream
        returns truncated, do likewise. If upstream is OK, but the
    answer is too big for downstream, truncate the answer.

    Modify the behaviour of --synth-domain for IPv6.
    When deriving a domain name from an IPv6 address, an address
    such as 1234:: would become 1234--.example.com, which is
    not legal in IDNA2008. Stop using the :: compression method,
    so 1234:: becomes
    1234-0000-0000-0000-0000-0000-0000-0000.example.com

    Fix broken dhcp-relay on *BSD. Thanks to Harold for finding
    this problem.

    Add --dhcp-option-pxe config. This acts almost exactly like
    --dhcp-option except that the defined option is only sent when
    replying to PXE clients. More importantly, these options are sent
    in reply PXE clients when dnsmasq in acting in PXE proxy mode. In
    PXE proxy mode, the set of options sent is defined by the PXE standard
    and the normal set of options is not sent. This config allows arbitrary
    options in PXE-proxy replies. A typical use-case is to send option
    175 to iPXE. Thanks to Jason Berry for finding the requirement for
    this.

    Support PXE proxy-DHCP and DHCP-relay at the same time.
        When using PXE proxy-DHCP, dnsmasq supplies PXE information to
        the client, which also talks to another "normal" DHCP server
        for address allocation and similar. The normal DHCP server may
        be on the local network, but it may also be remote, and accessed via
        a DHCP relay. This change allows dnsmasq to act as both a
        PXE proxy-DHCP server AND a DHCP relay for the same network.

    Fix erroneous "DNSSEC validated" state with non-DNSSEC
    upstream servers.  Thanks to Dominik Derigs for the bug report.

    Handle queries with EDNS client subnet fields better. If dnsmasq
    is configured to add an EDNS client subnet to a query, it is careful
    to suppress use of the cache, since a cached answer may not be valid
    for a query with a different client subnet. Extend this behaviour
    to queries which arrive a dnsmasq already carrying an EDNS client
    subnet.

    Handle DS queries to auth zones. When dnsmasq is configured to
    act as an authoritative server and has an authoritative zone
    configured, and receives a query for that zone _as_forwarder_
    it answers the query directly rather than forwarding it. This
    doesn't affect the answer, but it saves dnsmasq forwarding the
    query to the recursor upstream, which then bounces it back to dnsmasq
    in auth mode. The exception should be when the query is for the root
    of zone, for a DS RR. The answer to that has to come from the parent,
    via the recursor, and will typically be a proof-of-non-existence
    since dnsmasq doesn't support signed zones. This patch suppresses
    local answers and forces forwarding to the upstream recursor for such
    queries. It stops breakage when a DNSSEC validating client makes
    queries to dnsmasq acting as forwarder for a zone for which it is
    authoritative.

    Implement "DNS-0x20 encoding", for extra protection against
    reply-spoof attacks. Since DNS queries are case-insensitive,
    it's possible to randomly flip the case of letters in a query
    and still get the correct answer back.
    This adds an extra dimension for a cache-poisoning attacker
    to guess when sending replies in-the-blind since it's expected
    that the legitimate answer will have the same  pattern of upper
    and lower case as the query, so any replies which don't can be
    ignored as malicious. The amount of extra entropy clearly depends
    on the number of a-z and A-Z characters in the query, and this
    implementation puts a hard limit of 32 bits to make resource
    allocation easy. This about doubles entropy over the standard
    random ID and random port combination. This technique can interact
    badly with rare broken DNS servers which don't preserve the case
    of the query in their reply. The first time a reply is returned
    which matches the query in all respects except case, a warning
    will be logged. In this release, 0x020-encoding is default-off
    and must be explicitly enabled with --do-0x20-encoding. In future
    releases it may default on. You can avoid a future release
    changing the behaviour of an installation with --no-x20-encode.
   
    Fix a long-standing problem when two queries which are identical
    in every repect _except_ case, get combined by dnsmasq. If
    dnsmasq gets eg, two queries for example.com and Example.com
    in quick succession it will get the answer for example.com from
    upstream and send that answer to both requestors. This means that
    the query for Example.com will get an answer for example.com, and
    in the modern DNS, that answer may not be accepted.