I dont know such person. I try fight this threat on my own. Partially solved by blocking outgoing trafic to port 53 from WAN. But what if malware use dns over https instead raw dns on port 53?
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: meyergru on September 24, 2025, 07:11:11 PMQuote from: Siarap on September 24, 2025, 06:45:20 PMThis connecions was made from WAN ip adress not from lan.
Are you sure about that? When your internal clients use DNS via port 53 to a specific DNS server, then obviously those requests go via the WAN IP via NAT. It seems ~10x more likely that some client has been infected than OpnSense...
Quote from: meyergru on May 04, 2025, 09:48:47 AMSo much wrong there:
1. It is not OS/hardware-related at all.
2. Linux does not suck. It can handle VLANs, I gave you the pointers on how to do it if need be.
3. That being said, you should not use VLANs on any client, because that is not how this is supposed to work. We explained that multiple times.
I give up here.