OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • Profile of Bytechanger »
  • Show Posts »
  • Messages
  • Profile Info
    • Summary
    • Show Stats
    • Show Posts...
      • Messages
      • Topics
      • Attachments

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

  • Messages
  • Topics
  • Attachments

Messages - Bytechanger

Pages: 1 ... 7 8 [9] 10 11 ... 16
121
20.1 Legacy Series / Error "bug" report every day?
« on: June 02, 2020, 07:38:34 am »
Hello,

my opnsense worked fine, but now I get every day a  System:Firmware:Reporter->Bugreport?


Code: [Select]
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
FreeBSD 11.2-RELEASE-p20-HBSD  07ef86ce9ca(stable/20.1) amd64
OPNsense 20.1.7 bb116282f
Plugins os-acme-client-1.32 os-api-backup-1.0 os-bind-1.13 os-debug-1.3 os-dmidecode-1.1 os-dnscrypt-proxy-1.7_1 os-dyndns-1.20 os-etpro-telemetry-1.4_1 os-freeradius-1.9.6 os-google-cloud-sdk-1.0 os-haproxy-2.22 os-intrusion-detection-content-et-pro-1.0.1 os-intrusion-detection-content-pt-open-1.0 os-iperf-1.0 os-mail-backup-1.1 os-netdata-1.0 os-ntopng-1.2 os-smart-2.1 os-theme-rebellion-1.8.3 os-unbound-plus-1.1_1 os-upnp-1.4 os-wireguard-1.1 os-wol-2.3
Time Tue, 02 Jun 2020 07:34:52 +0200
OpenSSL 1.1.1g  21 Apr 2020
PHP 7.3.18
Code: [Select]
[29-May-2020 00:00:00 Europe/Berlin] PHP Warning:  "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /usr/local/opnsense/scripts/OPNsense/AcmeClient/certhelper.php on line 1421
[29-May-2020 00:00:00 Europe/Berlin] PHP Warning:  "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /usr/local/opnsense/scripts/OPNsense/AcmeClient/certhelper.php on line 1428
[30-May-2020 00:00:00 Europe/Berlin] PHP Warning:  "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /usr/local/opnsense/scripts/OPNsense/AcmeClient/certhelper.php on line 1421
[30-May-2020 00:00:00 Europe/Berlin] PHP Warning:  "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /usr/local/opnsense/scripts/OPNsense/AcmeClient/certhelper.php on line 1428
[31-May-2020 00:00:00 Europe/Berlin] PHP Warning:  "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /usr/local/opnsense/scripts/OPNsense/AcmeClient/certhelper.php on line 1421
[31-May-2020 00:00:00 Europe/Berlin] PHP Warning:  "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /usr/local/opnsense/scripts/OPNsense/AcmeClient/certhelper.php on line 1428
[01-Jun-2020 00:00:00 Europe/Berlin] PHP Warning:  "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /usr/local/opnsense/scripts/OPNsense/AcmeClient/certhelper.php on line 1421
[01-Jun-2020 00:00:00 Europe/Berlin] PHP Warning:  "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /usr/local/opnsense/scripts/OPNsense/AcmeClient/certhelper.php on line 1428
[02-Jun-2020 00:00:00 Europe/Berlin] PHP Warning:  "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /usr/local/opnsense/scripts/OPNsense/AcmeClient/certhelper.php on line 1421
[02-Jun-2020 00:00:00 Europe/Berlin] PHP Warning:  "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /usr/local/opnsense/scripts/OPNsense/AcmeClient/certhelper.php on line 1428

dmesg
Code: [Select]
Copyright (c) 2013-2018 The HardenedBSD Project.
Copyright (c) 1992-2018 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD is a registered trademark of The FreeBSD Foundation.
FreeBSD 11.2-RELEASE-p20-HBSD  07ef86ce9ca(stable/20.1) amd64
FreeBSD clang version 6.0.0 (tags/RELEASE_600/final 326565) (based on LLVM 6.0.0)
VT(vga): resolution 640x480
HardenedBSD: initialize and check features (__HardenedBSD_version 1100056 __FreeBSD_version 1102000).
CPU: Intel(R) Celeron(R) N4100 CPU @ 1.10GHz (1094.45-MHz K8-class CPU)
  Origin="GenuineIntel"  Id=0x706a1  Family=0x6  Model=0x7a  Stepping=1
  Features=0xbfebfbff
  Features2=0x4ff8ebbf
  AMD Features=0x2c100800
  AMD Features2=0x101
  Structured Extended Features=0x2294e287
  Structured Extended Features2=0x40400004
  Structured Extended Features3=0x2c000000
  XSAVE Features=0xf
  IA32_ARCH_CAPS=0x2
  VT-x: PAT,HLT,MTF,PAUSE,EPT,UG,VPID,VID,PostIntr
  TSC: P-state invariant, performance statistics
real memory  = 8589934592 (8192 MB)
avail memory = 8045690880 (7672 MB)
Event timer "LAPIC" quality 600
ACPI APIC Table:
WARNING: L1 data cache covers less APIC IDs than a core
0 < 1
FreeBSD/SMP: Multiprocessor System Detected: 4 CPUs
FreeBSD/SMP: 1 package(s) x 4 core(s)
ioapic0  irqs 0-119 on motherboard
SMP: AP CPU #3 Launched!
SMP: AP CPU #1 Launched!
SMP: AP CPU #2 Launched!
Timecounter "TSC" frequency 1094451367 Hz quality 1000
wlan: mac acl policy registered
random: entropy device external interface
000.000016 [4213] netmap_init               netmap: loaded module
module_register_init: MOD_LOAD (vesa, 0xffffffff8114aef0, 0) error 19
random: registering fast source Intel Secure Key RNG
random: fast provider: "Intel Secure Key RNG"
kbd1 at kbdmux0
nexus0
cryptosoft0:  on motherboard
acpi0:  on motherboard
unknown: I/O range not supported
cpu0:  on acpi0
cpu1:  on acpi0
cpu2:  on acpi0
cpu3:  on acpi0
attimer0:  port 0x40-0x43,0x50-0x53 irq 0 on acpi0
Timecounter "i8254" frequency 1193182 Hz quality 0
Event timer "i8254" frequency 1193182 Hz quality 100
atrtc0:  port 0x70-0x77 on acpi0
atrtc0: Warning: Couldn't map I/O.
atrtc0: registered as a time-of-day clock, resolution 1.000000s
Event timer "RTC" frequency 32768 Hz quality 0
hpet0:  iomem 0xfed00000-0xfed003ff irq 8 on acpi0
Timecounter "HPET" frequency 19200000 Hz quality 950
Event timer "HPET" frequency 19200000 Hz quality 550
Event timer "HPET1" frequency 19200000 Hz quality 440
Event timer "HPET2" frequency 19200000 Hz quality 440
Event timer "HPET3" frequency 19200000 Hz quality 440
Event timer "HPET4" frequency 19200000 Hz quality 440
Timecounter "ACPI-fast" frequency 3579545 Hz quality 900
acpi_timer0: <32-bit timer at 3.579545MHz> port 0x408-0x40b on acpi0
pcib0:  port 0xcf8-0xcff on acpi0
pcib0: Length mismatch for 3 range: 1 vs 1000000010000
pci0:  on pcib0
pcib0: no PRT entry for 0.0.INTA
vgapci0:  port 0xf000-0xf03f mem 0xa0000000-0xa0ffffff,0x90000000-0x9fffffff at device 2.0 on pci0
vgapci0: Boot video device
pci0:  at device 12.0 (no driver attached)
hdac0:  mem 0xa1310000-0xa1313fff,0xa1000000-0xa10fffff irq 25 at device 14.0 on pci0
pci0:  at device 15.0 (no driver attached)
ahci0:  port 0xf090-0xf097,0xf080-0xf083,0xf060-0xf07f mem 0xa1318000-0xa1319fff,0xa1334000-0xa13340ff,0xa1333000-0xa13337ff at device 18.0 on pci0
ahci0: AHCI v1.31 with 2 6Gbps ports, Port Multiplier supported
ahcich0:  at channel 0 on ahci0
ahcich1:  at channel 1 on ahci0
pcib1:  at device 19.0 on pci0
pci1:  on pcib1
re0:  port 0xe000-0xe0ff mem 0xa1204000-0xa1204fff,0xa1200000-0xa1203fff at device 0.0 on pci1
re0: Using Memory Mapping!
re0: Using 1 MSI-X message
re0: ASPM disabled
re0: version:1.95.00
re0: Ethernet address: 00:01:2e:92:85:83

This product is covered by one or more of the following patents:           
US6,570,884, US6,115,776, and US6,327,625.
re0: Ethernet address: 00:01:2e:92:85:83
pcib2:  at device 19.2 on pci0
pci2:  on pcib2
re1:  port 0xd000-0xd0ff mem 0xa1104000-0xa1104fff,0xa1100000-0xa1103fff at device 0.0 on pci2
re1: Using Memory Mapping!
re1: Using 1 MSI-X message
re1: ASPM disabled
re1: version:1.95.00
re1: Ethernet address: 00:01:2e:92:85:84

This product is covered by one or more of the following patents:           
US6,570,884, US6,115,776, and US6,327,625.
re1: Ethernet address: 00:01:2e:92:85:84
xhci0:  mem 0xa1300000-0xa130ffff irq 17 at device 21.0 on pci0
xhci0: 32 bytes context size, 64-bit DMA
usbus0 on xhci0
usbus0: 5.0Gbps Super Speed USB v3.0
sdhci_pci0:  mem 0xa131c000-0xa131cfff,0xa131b000-0xa131bfff irq 42 at device 30.0 on pci0
sdhci_pci0: 1 slot(s) allocated
mmc0:  on sdhci_pci0
isab0:  at device 31.0 on pci0
isa0:  on isab0
acpi_button0:  on acpi0
acpi_tz0:  on acpi0
atkbdc0:  port 0x60,0x64 irq 1 on acpi0
atkbd0:  irq 1 on atkbdc0
kbd0 at atkbd0
atkbd0: [GIANT-LOCKED]
uart0: <16550 or compatible> port 0x3f8-0x3ff irq 4 flags 0x10 on acpi0
uart0: console (115200,n,8,1)
ppc0: cannot reserve I/O port range
est0:  on cpu0
est1:  on cpu1
est2:  on cpu2
est3:  on cpu3
Timecounters tick every 1.000 msec
hdacc0:  at cad 0 on hdac0
hdaa0:  at nid 1 on hdacc0
pcm0:  at nid 20 and 24 on hdaa0
hdacc1:  at cad 2 on hdac0
hdaa1:  at nid 1 on hdacc1
pcm1:  at nid 3 on hdaa1
ada0 at ahcich0 bus 0 scbus0 target 0 lun 0
ugen0.1: <0x8086 XHCI root HUB> at usbus0
ada0:  ACS-2 ATA SATA 3.x device
mmc0: ada0: Serial Number E801220144
ada0: 600.000MB/s transfers (SATA 3.x, UDMA6, PIO 1024bytes)
ada0: Command Queueing enabled
ada0: 30533MB (62533296 512 byte sectors)
No compatible cards found on bus
random: unblocking device.
Trying to mount root from ufs:/dev/gpt/rootfs [rw,noatime]...
uhub0: <0x8086 XHCI root HUB, class 9/0, rev 3.00/1.00, addr 1> on usbus0
uhub0: 16 ports with 16 removable, self powered

Some idea ?

Greets
Byte

122
20.1 Legacy Series / Re: haproxy for ipv4 and ipv6 to ipv4; ipv6 doesnt work?
« on: May 28, 2020, 12:42:15 pm »
I test it, on OPNSense -e doesn´t show MACs, only ipv6 adresses....
On pcap file also??

Code: [Select]
sudo tcpdump -eni pppoe0 'tcp port 56561'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on pppoe0, link-type NULL (BSD loopback), capture size 262144 bytes
12:30:50.888384 AF IPv6 (28), length 84: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [S], seq 459488888, win 64800, options [mss 1440,sackOK,TS val 3410368836 ecr 0,nop,wscale 6], length 0
12:30:50.888496 AF IPv6 (28), length 84: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [S.], seq 2539208736, ack 459488889, win 65228, options [mss 1432,nop,wscale 9,sackOK,TS val 2303200564 ecr 3410368836], length 0
12:30:50.906850 AF IPv6 (28), length 76: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [.], ack 1, win 1013, options [nop,nop,TS val 3410368854 ecr 2303200564], length 0
12:30:50.907048 AF IPv6 (28), length 117: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [P.], seq 1:42, ack 1, win 1013, options [nop,nop,TS val 3410368855 ecr 2303200564], length 41
12:30:50.907064 AF IPv6 (28), length 76: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [.], ack 42, win 128, options [nop,nop,TS val 2303200583 ecr 3410368855], length 0
12:30:50.920355 AF IPv6 (28), length 133: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 1:58, ack 42, win 128, options [nop,nop,TS val 2303200596 ecr 3410368855], length 57
12:30:50.938217 AF IPv6 (28), length 76: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [.], ack 58, win 1013, options [nop,nop,TS val 3410368886 ecr 2303200596], length 0
12:30:50.938242 AF IPv6 (28), length 1132: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 58:1114, ack 42, win 128, options [nop,nop,TS val 2303200614 ecr 3410368886], length 1056
12:30:50.938759 AF IPv6 (28), length 1436: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [P.], seq 42:1402, ack 58, win 1013, options [nop,nop,TS val 3410368886 ecr 2303200596], length 1360
12:30:50.938778 AF IPv6 (28), length 76: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [.], ack 1402, win 126, options [nop,nop,TS val 2303200614 ecr 3410368886], length 0
12:30:50.959396 AF IPv6 (28), length 124: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [P.], seq 1402:1450, ack 1114, win 1002, options [nop,nop,TS val 3410368907 ecr 2303200614], length 48
12:30:50.959418 AF IPv6 (28), length 76: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [.], ack 1450, win 128, options [nop,nop,TS val 2303200635 ecr 3410368907], length 0
12:30:50.967390 AF IPv6 (28), length 584: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 1114:1622, ack 1450, win 128, options [nop,nop,TS val 2303200643 ecr 3410368907], length 508
12:30:50.989428 AF IPv6 (28), length 92: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [P.], seq 1450:1466, ack 1622, win 1002, options [nop,nop,TS val 3410368937 ecr 2303200643], length 16
12:30:50.989449 AF IPv6 (28), length 76: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [.], ack 1466, win 128, options [nop,nop,TS val 2303200665 ecr 3410368937], length 0
12:30:51.007402 AF IPv6 (28), length 120: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [P.], seq 1466:1510, ack 1622, win 1002, options [nop,nop,TS val 3410368955 ecr 2303200665], length 44
12:30:51.007444 AF IPv6 (28), length 76: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [.], ack 1510, win 128, options [nop,nop,TS val 2303200683 ecr 3410368955], length 0
12:30:51.007523 AF IPv6 (28), length 120: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 1622:1666, ack 1510, win 128, options [nop,nop,TS val 2303200683 ecr 3410368955], length 44
12:30:51.025398 AF IPv6 (28), length 144: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [P.], seq 1510:1578, ack 1666, win 1002, options [nop,nop,TS val 3410368973 ecr 2303200683], length 68
12:30:51.025441 AF IPv6 (28), length 76: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [.], ack 1578, win 128, options [nop,nop,TS val 2303200701 ecr 3410368973], length 0
12:30:51.030829 AF IPv6 (28), length 120: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 1666:1710, ack 1578, win 128, options [nop,nop,TS val 2303200707 ecr 3410368973], length 44
12:30:51.048840 AF IPv6 (28), length 216: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [P.], seq 1578:1718, ack 1710, win 1002, options [nop,nop,TS val 3410368997 ecr 2303200707], length 140
12:30:51.048861 AF IPv6 (28), length 76: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [.], ack 1718, win 128, options [nop,nop,TS val 2303200725 ecr 3410368997], length 0
12:30:51.049712 AF IPv6 (28), length 176: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 1710:1810, ack 1718, win 128, options [nop,nop,TS val 2303200725 ecr 3410368997], length 100
12:30:51.069546 AF IPv6 (28), length 304: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [P.], seq 1718:1946, ack 1810, win 1002, options [nop,nop,TS val 3410369017 ecr 2303200725], length 228
12:30:51.069566 AF IPv6 (28), length 76: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [.], ack 1946, win 128, options [nop,nop,TS val 2303200745 ecr 3410369017], length 0
12:30:51.075459 AF IPv6 (28), length 104: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 1810:1838, ack 1946, win 128, options [nop,nop,TS val 2303200751 ecr 3410369017], length 28
12:30:51.093479 AF IPv6 (28), length 188: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [P.], seq 1946:2058, ack 1838, win 1002, options [nop,nop,TS val 3410369041 ecr 2303200751], length 112
12:30:51.093550 AF IPv6 (28), length 872: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 1838:2634, ack 2058, win 128, options [nop,nop,TS val 2303200769 ecr 3410369041], length 796
12:30:51.155121 AF IPv6 (28), length 76: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [.], ack 2634, win 1002, options [nop,nop,TS val 3410369103 ecr 2303200769], length 0
12:30:51.155143 AF IPv6 (28), length 120: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 2634:2678, ack 2058, win 128, options [nop,nop,TS val 2303200831 ecr 3410369103], length 44
12:30:51.173341 AF IPv6 (28), length 76: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [.], ack 2678, win 1002, options [nop,nop,TS val 3410369121 ecr 2303200831], length 0
12:30:51.173376 AF IPv6 (28), length 520: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [P.], seq 2058:2502, ack 2678, win 1002, options [nop,nop,TS val 3410369121 ecr 2303200831], length 444
12:30:51.173390 AF IPv6 (28), length 76: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [.], ack 2502, win 127, options [nop,nop,TS val 2303200849 ecr 3410369121], length 0
12:30:51.175004 AF IPv6 (28), length 184: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 2678:2786, ack 2502, win 128, options [nop,nop,TS val 2303200850 ecr 3410369121], length 108
12:30:51.175154 AF IPv6 (28), length 176: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 2786:2886, ack 2502, win 128, options [nop,nop,TS val 2303200850 ecr 3410369121], length 100
12:30:51.175294 AF IPv6 (28), length 440: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 2886:3250, ack 2502, win 128, options [nop,nop,TS val 2303200851 ecr 3410369121], length 364
12:30:51.175348 AF IPv6 (28), length 360: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 3250:3534, ack 2502, win 128, options [nop,nop,TS val 2303200851 ecr 3410369121], length 284
12:30:51.182243 AF IPv6 (28), length 112: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 3534:3570, ack 2502, win 128, options [nop,nop,TS val 2303200858 ecr 3410369121], length 36
12:30:51.193282 AF IPv6 (28), length 76: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [.], ack 2886, win 1002, options [nop,nop,TS val 3410369141 ecr 2303200850], length 0
12:30:51.193733 AF IPv6 (28), length 76: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [.], ack 3534, win 1002, options [nop,nop,TS val 3410369142 ecr 2303200851], length 0
12:30:51.242917 AF IPv6 (28), length 76: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [.], ack 3570, win 1002, options [nop,nop,TS val 3410369191 ecr 2303200858], length 0
12:31:08.458459 AF IPv6 (28), length 112: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [P.], seq 2502:2538, ack 3570, win 1002, options [nop,nop,TS val 3410386406 ecr 2303200858], length 36
12:31:08.458506 AF IPv6 (28), length 76: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [.], ack 2538, win 128, options [nop,nop,TS val 2303218134 ecr 3410386406], length 0
12:31:08.458883 AF IPv6 (28), length 112: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 3570:3606, ack 2538, win 128, options [nop,nop,TS val 2303218134 ecr 3410386406], length 36
12:31:08.458978 AF IPv6 (28), length 112: 2003:(IP of WAN OPNSense).56561 > 2001:(IP of InternetServer).49268: Flags [P.], seq 3606:3642, ack 2538, win 128, options [nop,nop,TS val 2303218134 ecr 3410386406], length 36
12:31:08.476409 AF IPv6 (28), length 76: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [.], ack 3606, win 1002, options [nop,nop,TS val 3410386424 ecr 2303218134], length 0
12:31:08.476645 AF IPv6 (28), length 76: 2001:(IP of InternetServer).49268 > 2003:(IP of WAN OPNSense).56561: Flags [.], ack 3642, win 1002, options [nop,nop,TS val 3410386424 ecr 2303218134], length 0

OK, with sudo tcpdump -w test3.pcap
I get a looooot of data and don´t know, what to do...


Greets

Byte

123
20.1 Legacy Series / Re: haproxy for ipv4 and ipv6 to ipv4; ipv6 doesnt work?
« on: May 28, 2020, 09:53:01 am »
OK, can you tell me the command for this please?

with
sudo tcpdump -eni pppoe0 'tcp port 56561'
on OPNSense, I see only ipv6 no mac?!

124
20.1 Legacy Series / Re: haproxy for ipv4 and ipv6 to ipv4; ipv6 doesnt work?
« on: May 28, 2020, 06:10:45 am »
Thanks,
but what/how exactly should I do?

Greets

Byte

125
German - Deutsch / Re: IPv6 auf WAN nicht erreichbar
« on: May 27, 2020, 04:14:44 pm »
Hallo,

ich habe auch mal das automatisch erstelle Gateway deaktiviert und prompt komme ich drauf.
Da stimmt doch etwas mit OPNSense nicht.

Gateway->Single->WAN_DHCP6
  WAN_DHCP6    WAN    IPv6    254    fe80::f6b5:2fff:fef0:a2eb

Gruß

Byte

126
20.1 Legacy Series / Re: haproxy for ipv4 and ipv6 to ipv4; ipv6 doesnt work?
« on: May 27, 2020, 04:08:00 pm »
OK, It seems, there is something special crazy?!

When I disable automatic created Gateway in

Gateway->Single->WAN_DHCP6
  WAN_DHCP6    WAN    IPv6    254    fe80::f6b5:2fff:fef0:a2eb

(crazyly it has a link-local address)

it works, I can acces ssh from outside!!
So I think, there is something wrong with opnsense ?!?!


Greets

Byte

127
20.1 Legacy Series / Re: haproxy for ipv4 and ipv6 to ipv4; ipv6 doesnt work?
« on: May 27, 2020, 03:56:09 pm »
Thanks,

seems it could be the same problem.
I´m also telekom. But robgnu writes on pfsense it works.
So is it possible, it´s a opnsense bug?

Greets

Byte

128
German - Deutsch / Re: IPv6 auf WAN nicht erreichbar
« on: May 27, 2020, 03:54:53 pm »
Hallo,

ich glaube, ich habe das gleiche Problem.
Ich bin aktuell bei der Telekom und versuche über ipv6 von Außen auf die OPNSense zu kommen.

Zuerst glaubte ich an ein Problem von haproxy, zwischenzeitlich weiß ich, ich komme gar nicht per ipv6 auf die OPNSense....
https://forum.opnsense.org/index.php?topic=17316.new;topicseen#new

IPv4 funktioniert einwandfrei. Leider bekomme ich bei ipv6 ein Timeout.
Ob dies irgendwie an der Telekom liegt?
Wurde das Problem zwischenzeitlich analysiert/behoben?

robgnu:
Quote
"Mit pfSense hatte ich an dieser Stelle nie Ärger"
bedeutet, bei gleicher Leitung und ISP (Telekom) funktionierte es?

Dann wäre es kein Telekom-Problem, sondern ggf. ein Config oder OPNSense bug??



Gruß

Byte

129
20.1 Legacy Series / Re: haproxy for ipv4 and ipv6 to ipv4; ipv6 doesnt work?
« on: May 27, 2020, 08:15:18 am »
OK, you are right.

It seems to be an problem with opnsense/pppoe, not haproxy.

On InternetServer I can reach ipv6
Code: [Select]
[b]dig AAAA +short www.heise.de[/b]
2a02:2e0:3fe:1001:7777:772e:2:85

[b]wget --no-check-certificate https://[2a02:2e0:3fe:1001:7777:772e:2:85][/b]
--2020-05-27 05:48:12--  https://[2a02:2e0:3fe:1001:7777:772e:2:85]/
Connecting to [2a02:2e0:3fe:1001:7777:772e:2:85]:443... connected.
    WARNING: certificate common name ‘www.heise.de’ doesn't match requested host name ‘2a02:2e0:3fe:1001:7777:772e:2:85’.
HTTP request sent, awaiting response... 200 OK
Length: 76 [text/plain]
Saving to: ‘index.html.6’

index.html.6                  100%[===============================================>]      76  --.-KB/s    in 0s

2020-05-27 05:48:13 (10.8 MB/s) - ‘index.html.6’ saved [76/76]

[b]works fine[/b]

SSH to OPNSense over PPPOE works over ipv4 but also not over ipv6:
Code: [Select]
ssh -i /home/blabla/.ssh/homekey -p 56561 -vvv testuser@2003:(WAN address)
OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n  7 Dec 2017
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: Applying options for *
debug2: resolving "2003:(WAN address)" port 56561
debug2: ssh_connect_direct: needpriv 0
debug1: Connecting to 2003:xxx [2003:(WAN address)] port 56561.

nothing....

on client, try to connect
Code: [Select]
sudo tcpdump -ni ens192 'tcp port 56561'
[sudo] password for blabla:
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens192, link-type EN10MB (Ethernet), capture size 262144 bytes
05:54:19.387975 IP6 2001:(IP Client).54516 > 2003:(WAN Firewall).56561: Flags [S], seq 1051216040, win 64800, options [mss 1440,sackOK,TS val 2362155641 ecr 0,nop,wscale 6], length 0
05:54:20.396577 IP6 2001:(IP Client).54516 > 2003:(WAN Firewall).56561: Flags [S], seq 1051216040, win 64800, options [mss 1440,sackOK,TS val 2362156649 ecr 0,nop,wscale 6], length 0
05:54:22.412581 IP6 2001:(IP Client).54516 > 2003:(WAN Firewall).56561: Flags [S], seq 1051216040, win 64800, options [mss 1440,sackOK,TS val 2362158665 ecr 0,nop,wscale 6], length 0
05:54:26.604603 IP6 2001:(IP Client).54516 > 2003:(WAN Firewall).56561: Flags [S], seq 1051216040, win 64800, options [mss 1440,sackOK,TS val 2362162857 ecr 0,nop,wscale 6], length 0
05:54:34.796572 IP6 2001:(IP Client).54516 > 2003:(WAN Firewall).56561: Flags [S], seq 1051216040, win 64800, options [mss 1440,sackOK,TS val 2362171049 ecr 0,nop,wscale 6], length 0

---------------------------
sudo tcpdump -vv -ni ens192 'tcp port 56561'
tcpdump: listening on ens192, link-type EN10MB (Ethernet), capture size 262144 bytes
06:27:20.701131 IP6 (flowlabel 0xd3867, hlim 64, next-header TCP (6) payload length: 40) 2001:xxx.54520 > 2003:xxx.56561: Flags [S], cksum 0xcbfd (incorrect -> 0xc709), seq 1683830560, win 64800, options [mss 1440,sackOK,TS val 2364136905 ecr 0,nop,wscale 6], length 0
06:27:21.708591 IP6 (flowlabel 0xf0fdf, hlim 64, next-header TCP (6) payload length: 40) 2001:xxx.54520 > 2003:xxx.56561: Flags [S], cksum 0xcbfd (incorrect -> 0xc31a), seq 1683830560, win 64800, options [mss 1440,sackOK,TS val 2364137912 ecr 0,nop,wscale 6], length 0

on OPNSense-Firewall
Code: [Select]
sudo tcpdump -ni pppoe0 'tcp port 56561'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on pppoe0, link-type NULL (BSD loopback), capture size 262144 bytes
07:54:19.396907 IP6 2003:(IP Client).54516 > 2003:(FIRST PART of IP OPNSense WAN)                                                                                 e92:8583.56561: Flags [S], seq 1051216040, win 64800, options [mss 1440,sackO                                                                                 K,TS val 2362155641 ecr 0,nop,wscale 6], length 0
07:54:19.396972 IP6 2003:(IP OPNSense WAN).56561 > 2001:(FIRST PART of IP Client)                                                                                 :803c::1.54516: Flags [S.], seq 1796056796, ack 1051216041, win 65228, option                                                                                 s [mss 1432,nop,wscale 9,sackOK,TS val 1751506195 ecr 2362155641], length 0
07:54:20.405540 IP6 2003:(IP Client).54516 > 2003:(FIRST PART of IP OPNSense WAN)                                                                                 e92:8583.56561: Flags [S], seq 1051216040, win 64800, options [mss 1440,sackO                                                                                 K,TS val 2362156649 ecr 0,nop,wscale 6], length 0
07:54:20.405579 IP6 2003:(IP OPNSense WAN).56561 > 2001:(FIRST PART of IP Client)                                                                                 :803c::1.54516: Flags [S.], seq 1796056796, ack 1051216041, win 65228, option                                                                                 s [mss 1432,nop,wscale 9,sackOK,TS val 1751506195 ecr 2362156649], length 0
07:54:22.421526 IP6 2003:(IP Client).54516 > 2003:(FIRST PART of IP OPNSense WAN)                                                                                 e92:8583.56561: Flags [S], seq 1051216040, win 64800, options [mss 1440,sackO                                                                                 K,TS val 2362158665 ecr 0,nop,wscale 6], length 0
07:54:22.421564 IP6 2003:(IP OPNSense WAN).56561 > 2001:(FIRST PART of IP Client)                                                                                 :803c::1.54516: Flags [S.], seq 1796056796, ack 1051216041, win 65228, option                                                                                 s [mss 1432,nop,wscale 9,sackOK,TS val 1751506195 ecr 2362158665], length 0
07:54:25.427714 IP6 2003:(IP OPNSense WAN).56561 > 2001:(FIRST PART of IP Client)                                                                                 :803c::1.54516: Flags [S.], seq 1796056796, ack 1051216041, win 65228, option                                                                                 s [mss 1432,nop,wscale 9,sackOK,TS val 1751506195 ecr 2362158665], length 0
07:54:26.613695 IP6 2003:(IP Client).54516 > 2003:(FIRST PART of IP OPNSense WAN)                                                                                 e92:8583.56561: Flags [S], seq 1051216040, win 64800, options [mss 1440,sackO                                                                                 K,TS val 2362162857 ecr 0,nop,wscale 6], length 0
07:54:26.613735 IP6 2003:(IP OPNSense WAN).56561 > 2001:(FIRST PART of IP Client)                                                                                 :803c::1.54516: Flags [S.], seq 1796056796, ack 1051216041, win 65228, option                                                                                 s [mss 1432,nop,wscale 9,sackOK,TS val 1751506195 ecr 2362162857], length 0
07:54:29.613738 IP6 2003:(IP OPNSense WAN).56561 > 2001:(FIRST PART of IP Client)                                                                                 :803c::1.54516: Flags [S.], seq 1796056796, ack 1051216041, win 65228, option                                                                                 s [mss 1432,nop,wscale 9,sackOK,TS val 1751506195 ecr 2362162857], length 0
07:54:32.867815 IP6 2003:(IP OPNSense WAN).56561 > 2001:(FIRST PART of IP Client)                                                                                 :803c::1.54516: Flags [S.], seq 1796056796, ack 1051216041, win 65228, option                                                                                 s [mss 1432,nop,wscale 9,sackOK,TS val 1751506195 ecr 2362162857], length 0
07:54:34.805559 IP6 2003:(IP Client).54516 > 2003:(FIRST PART of IP OPNSense WAN)                                                                                 e92:8583.56561: Flags [S], seq 1051216040, win 64800, options [mss 1440,sackO                                                                                 K,TS val 2362171049 ecr 0,nop,wscale 6], length 0
07:54:34.805592 IP6 2003:(IP OPNSense WAN).56561 > 2001:(FIRST PART of IP Client)                                                                                 :803c::1.54516: Flags [S.], seq 1796056796, ack 1051216041, win 65228, option                                                                                 s [mss 1432,nop,wscale 9,sackOK,TS val 1751506195 ecr 2362171049], length 0
07:54:37.805475 IP6 2003:(IP OPNSense WAN).56561 > 2001:(FIRST PART of IP Client)                                                                                 :803c::1.54516: Flags [S.], seq 1796056796, ack 1051216041, win 65228, option                                                                                 s [mss 1432,nop,wscale 9,sackOK,TS val 1751506195 ecr 2362171049], length 0
07:54:41.006098 IP6 2003:(IP OPNSense WAN).56561 > 2001:(FIRST PART of IP Client)                                                                                 :803c::1.54516: Flags [S.], seq 1796056796, ack 1051216041, win 65228, option                                                                                 s [mss 1432,nop,wscale 9,sackOK,TS val 1751506195 ecr 2362171049], length 0
07:54:44.205453 IP6 2003:(IP OPNSense WAN).56561 > 2001:(FIRST PART of IP Client)                                                                                 :803c::1.54516: Flags [S.], seq 1796056796, ack 1051216041, win 65228, option                                                                                 s [mss 1432,nop,wscale 9,sackOK,TS val 1751506195 ecr 2362171049], length 0


------------
sudo tcpdump -vv -ni pppoe0 'tcp port 56561'
tcpdump: listening on pppoe0, link-type NULL (BSD loopback), capture size 262144 bytes
08:27:20.709034 IP6 (flowlabel 0xd3867, hlim 57, next-header TCP (6) payload length: 40) 2001:xxx.54520 > 2003:xxx.56561: Flags [S], cksum 0xc709 (correct), seq 1683830560, win 64800, options [mss 1440,sackOK,TS val 2364136905 ecr 0,nop,wscale 6], length 0
08:27:20.709120 IP6 (flowlabel 0x3245d, hlim 63, next-header TCP (6) payload length: 40) 2003:xxx.56561 > 2001:xxx.54520: Flags [S.], cksum 0xcbfd (incorrect -> 0xf118), seq 3931317341, ack 1683830561, win 65228, options [mss 1432,nop,wscale 9,sackOK,TS val 472230242 ecr 2364136905], length 0
08:27:21.739742 IP6 (flowlabel 0xf0fdf, hlim 57, next-header TCP (6) payload length: 40) 2001:xxx.54520 > 2003:xxx.56561: Flags [S], cksum 0xc31a (correct), seq 1683830560, win 64800, options [mss 1440,sackOK,TS val 2364137912 ecr 0,nop,wscale 6], length 0
08:27:21.739780 IP6 (flowlabel 0x3245d, hlim 63, next-header TCP (6) payload length: 40) 2003:xxx.56561 > 2001:xxx.54520: Flags [S.], cksum 0xcbfd (incorrect -> 0xed29), seq 3931317341, ack 1683830561, win 65228, options [mss 1432,nop,wscale 9,sackOK,TS val 472230242 ecr 2364137912], length 0



So, I don´t know what´s my problem....
It seems, ipv6 doesn´t work from Internet to WAN (over pppoe), but otherwhise from LAN to Internet works fine.

In dumps there is somthing like checksum incorrect?!

Greets

Byte

130
20.1 Legacy Series / Re: haproxy for ipv4 and ipv6 to ipv4; ipv6 doesnt work?
« on: May 26, 2020, 05:57:23 pm »
I'm trying both.

131
20.1 Legacy Series / Re: haproxy for ipv4 and ipv6 to ipv4; ipv6 doesnt work?
« on: May 26, 2020, 03:21:21 pm »
OK, Sorry

IONOS Server is a vserver on internet with ipv6 and ipv4.
It has only ubuntu bash. I want to set it up for recieve ipv4 and forward it to ipv6 to haproxy at home.

actually my home has ipv4 and ipv6, but soon ISP change and i get a dslite with only ipv6.

Port 56571 on ipv4 WAN runs best. It works fine.
Port 56571 on ipv6 works fine from LAN, WAN not....

here is a dump from IONOS-Internet-Server when I call


Code: [Select]
wget -O --no-check-certificate https://[2003:(WAN Firewall)]:56573

sudo tcpdump -ni ens192 'tcp port 56573'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens192, link-type EN10MB (Ethernet), capture size 262144 bytes
13:08:18.670174 IP6 2001:(IONOS InternetServer).52114 > 2003:(WAN Firewall).56573: Flags [S], seq 3221730538, win 64440, options [mss 1432,sackOK,TS val 2919176013 ecr 0,nop,wscale 6], length 0
13:08:19.698280 IP6 2001:(IONOS InternetServer).52114 > 2003:(WAN Firewall).56573: Flags [S], seq 3221730538, win 64440, options [mss 1432,sackOK,TS val 2919177042 ecr 0,nop,wscale 6], length 0
13:08:21.714260 IP6 2001:(IONOS InternetServer).52114 > 2003:(WAN Firewall).56573: Flags [S], seq 3221730538, win 64440, options [mss 1432,sackOK,TS val 2919179057 ecr 0,nop,wscale 6], length 0
13:08:25.778291 IP6 2001:(IONOS InternetServer).52114 > 2003:(WAN Firewall).56573: Flags [S], seq 3221730538, win 64440, options [mss 1432,sackOK,TS val 2919183121 ecr 0,nop,wscale 6], length 0
13:08:33.970295 IP6 2001:(IONOS InternetServer).52114 > 2003:(WAN Firewall).56573: Flags [S], seq 3221730538, win 64440, options [mss 1432,sackOK,TS val 2919191313 ecr 0,nop,wscale 6], length 0

I think listen ports is shown over sockstat
Code: [Select]
sudo sockstat -6
USER     COMMAND    PID   FD PROTO  LOCAL ADDRESS         FOREIGN ADDRESS
www      haproxy    76403 6  tcp6   *:56574               *:*
www      haproxy    76403 7  tcp6   2003:(WAN Firewall):56574 *:*
www      haproxy    76403 11 tcp6   *:56572               *:*
www      haproxy    76403 12 tcp6   *:32400               *:*
www      haproxy    76403 14 tcp6   *:56560               *:*
www      haproxy    76403 16 tcp6   *:56573               *:*
www      haproxy    76403 17 tcp6   2003:(WAN Firewall):56573 *:*
www      haproxy    76403 19 tcp6   *:56571               *:*
www      haproxy    76403 20 tcp6   ::1:56571             *:*
www      haproxy    76403 21 tcp6   2003:(WAN Firewall):56573 *:*
www      haproxy    76403 23 tcp6   *:56570               *:*
www      haproxy    76403 25 tcp6   *:80                  *:*
www      haproxy    76403 27 tcp6   *:443                 *:*
www      haproxy    76403 29 tcp6   *:56575               *:*
root     lighttpd   70335 7  tcp6   2003:xxx:4444 *:*
root     lighttpd   70335 9  tcp6   ::1:4444              *:*
root     lighttpd   70335 12 tcp6   2003:xxx:80 *:*
root     lighttpd   70335 14 tcp6   ::1:80                *:*
root     ntpd       80961 20 udp6   *:123                 *:*
root     ntpd       80961 22 udp6   fe80::xxx:8584%re1:123 *:*
root     ntpd       80961 25 udp6   2003:xxx:123 *:*
root     ntpd       80961 26 udp6   ::1:123               *:*
root     ntpd       80961 28 udp6   fe80:xxx84%re1_vlan100:123 *:*
root     ntpd       80961 30 udp6   2003:xxx:8584:123 *:*
root     ntpd       80961 31 udp6   fe80::xxx:8584%re1_vlan50:123 *:*
root     ntpd       80961 33 udp6   2003:xxx:8584:123 *:*
root     ntpd       80961 34 udp6   fe80::xxx:8584%re1_vlan77:123 *:*
dhcpd    dhcpd      29434 7  udp6   *:547                 *:*
unbound  unbound    68368 3  udp6   *:53                  *:*
unbound  unbound    68368 4  tcp6   *:53                  *:*
rspamd   rspamd-2.5 20828 9  udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 18 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 21 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 23 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 24 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 25 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 26 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 27 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 28 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 29 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 30 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 31 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 32 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 33 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 34 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 35 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 36 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 37 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 38 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 39 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 40 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 41 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 42 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 43 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 44 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 45 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 46 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 47 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 48 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 49 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 50 udp6   *:*                   *:*
rspamd   rspamd-2.5 20828 51 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 9  udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 17 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 19 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 21 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 22 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 23 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 24 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 25 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 26 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 27 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 28 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 29 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 30 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 31 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 32 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 33 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 34 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 35 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 36 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 37 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 38 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 39 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 40 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 41 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 42 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 43 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 44 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 45 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 46 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 47 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 48 udp6   *:*                   *:*
rspamd   rspamd-2.5 85915 49 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 9  udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 14 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 16 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 18 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 19 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 20 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 21 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 22 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 23 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 24 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 25 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 26 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 27 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 28 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 29 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 30 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 31 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 32 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 33 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 34 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 35 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 36 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 37 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 38 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 39 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 40 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 41 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 42 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 43 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 44 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 45 udp6   *:*                   *:*
rspamd   rspamd-2.5 80404 46 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 9  udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 11 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 13 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 15 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 16 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 17 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 18 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 19 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 20 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 21 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 22 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 23 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 24 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 25 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 26 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 27 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 28 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 29 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 30 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 31 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 32 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 33 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 34 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 35 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 36 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 37 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 38 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 39 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 40 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 41 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 42 udp6   *:*                   *:*
rspamd   rspamd-2.5 38154 43 udp6   *:*                   *:*
redis    redis-serv 29655 7  tcp6   ::1:6379              *:*
root     lighttpd   75648 5  tcp6   ::1:43580             *:*
root     radiusd    95290 12 udp6   *:1812                *:*
root     radiusd    95290 13 udp6   *:1813                *:*
root     radiusd    95290 15 udp6   *:62734               *:*
root     wireguard- 22100 14 udp6   *:56579               *:*
root     dhcp6c     9921  5  udp6   *:546                 *:*
root     charon     87168 11 udp6   *:500                 *:*
root     charon     87168 12 udp6   *:4500                *:*
root     sshd       16372 3  tcp6   ::1:56561             *:*
?        ?          ?     ?  tcp6   ::1:6379              ::1:42573
?        ?          ?     ?  tcp6   ::1:6379              ::1:19843
?        ?          ?     ?  tcp6   ::1:6379              ::1:65383
?        ?          ?     ?  tcp6   ::1:6379              ::1:7437
?        ?          ?     ?  tcp6   ::1:6379              ::1:17283
?        ?          ?     ?  tcp6   ::1:53097             ::1:6379
?        ?          ?     ?  tcp6   ::1:3405              ::1:6379
?        ?          ?     ?  tcp6   ::1:47959             ::1:6379
?        ?          ?     ?  tcp6   ::1:59771             ::1:6379
?        ?          ?     ?  tcp6   ::1:57391             ::1:6379
?        ?          ?     ?  tcp6   ::1:32496             ::1:6379

Greets

Byte

132
20.1 Legacy Series / Re: haproxy for ipv4 and ipv6 to ipv4; ipv6 doesnt work?
« on: May 26, 2020, 02:19:25 pm »
I´m testing. I enter real IPv6 and no DNS-Addresses.
I set IPv6-Address from WAN-Interface (firewall), the device, wich is "real server" on haproxy has no ipv6 address!
So I can only put ONE IPv6 Adress to test (WAN/Firewall).
I could also test with IPv6 of my LAN-Interface, but it´s the same.

I testet to call haproxy with ipv6 WAN Address from my LAN, wich works fine.
Otherwhise, when I call it from outsite to WAN, it passes firewall, after that, nothing....
On ipv4 it works fine.
On this post, you can see, there comes data to firewall (see post https://forum.opnsense.org/index.php?topic=17316.msg78835#msg78835)

Greets

Byte

133
20.1 Legacy Series / Re: haproxy for ipv4 and ipv6 to ipv4; ipv6 doesnt work?
« on: May 26, 2020, 02:02:08 pm »
OK,

when I´m right, you set in Listen Addresses: you WAN IPv6:portnumber. (And its pppoe?)
Firewall open WAN ipv6 portnumber.

Call from outside WAN IPv6 woth portnumber, and it works?
So I don´t know, whats wrong with my setting.

Greets

Byte

134
20.1 Legacy Series / Re: haproxy for ipv4 and ipv6 to ipv4; ipv6 doesnt work?
« on: May 26, 2020, 01:33:22 pm »
Is this the IPv6 Adress of you WAN-Port?

Do you enter the WAN IPv6 Adress on each haProxy-frontend?
On each change of ipv6 (on my ISP often) you have to change all?

This doesn´t work for me. It´s the same, no answer...

Greets

Byte

135
20.1 Legacy Series / Re: haproxy for ipv4 and ipv6 to ipv4; ipv6 doesnt work?
« on: May 26, 2020, 11:34:18 am »
Hi,

can you tell me, how you configured haproxy an opnsense?
[::]:Portnumber ??
MTU-Settings?
etc.

Greets

Byte

Pages: 1 ... 7 8 [9] 10 11 ... 16
OPNsense is an OSS project © Deciso B.V. 2015 - 2024 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2