Recent posts

#2
Q-Feeds (Threat intelligence) / Re: Q-Feeds Update Interval
Last post by Seimus - Today at 12:56:00 PM
This more like plugin specific issue.

The Plugin, controls the poll rate per the sub you have. With manually defining the alias or the blocklist the poll interval is shifted outside the Plugin.

Regards,
S.
#3
That would be actually cool.

As well, I had more time to play a bit with the new updated TiP, its fantastic. As mentioned above the visibility is superb.
For a T-shooting nerd like me, what you provide in TiP is just a dream.

I would love to have all of this directly in OPN GUI (or selfhost it via docker :D), but I understand its most likely not possible.

Great job guys! Keep it up, looking forward what you have next on the table.

Regards,
S.
#4
I am a weird one.  rather against installing a lot of plugins.

when I subscribed I opened a ticket and got instructions for manually adding an alias(url table IP) and how to add it as a blocklist to unbound.

--I may have gotten the idea from one of Patricks screen shots of his adguard configuration --

I am not having that issue
#5
With Q-feeds, you have more curated list of IoC, blocking more necessary doesn't mean better.
The worth of the Q-feeds feed is the quality & the curation & insight.

With the latest changes on their TiP you can track down why the IP is blocked, and a lot of information.
Additionally, the ease of reporting false positives. You simple open a ticket, they review.

I found very few false positives, lately only one that affected me, within 30min it was removed and in the next poll it reflected on OPN.

This workflow combined with their tooling and the fact all is local is a major plus.

Regards,
S.
#6
Q-Feeds (Threat intelligence) / Re: Q-Feeds Update Interval
Last post by Seimus - Today at 12:26:43 PM
Actually I realized this is affecting everyone.

For example I have a PLUS sub, and my refresh interval instead of 4h is set to 8h.



After removing the the content of /var/db/qfeeds-tables/ and re-triggering the feeds download its back to 4h.



Looks like per the OP example and my, the poll rate interval doubles for some reason :D, kinda funny.

Regards,
S.
#7
Thank you. The answer seems completely obvious in retrospect. Coming from other firewall platforms where you cannot have multiple NAT policies apply to the same packet, I did not think of creating two rules. I have created an outbound rule, and I now have access to the flakey 4G router.
#8
26.1, 26,4 Series / Re: KEA is still a mess IMHO
Last post by Patrick M. Hausen - Today at 11:37:41 AM
Quote from: RES217AIII on Today at 10:38:30 AMApologies for the lack of precision in my phrasing.
The discussion centered on server reachability; a server requires a unique address in order to be located. Therefore, my clarifying question does not pertain to clients, but rather to servers!

Then how does "I use an Apple Mac" come into play here? You are running public services on Mac OS?
#9
26.1, 26,4 Series / Re: KEA is still a mess IMHO
Last post by Monviech (Cedrik) - Today at 11:23:57 AM
How should KEA know about RFC 4941 addresses, it has nothing to do with Router Advertisements, or addresses that clients generate themselves. So there won't be any Dynamic DNS updates for any of those addresses.

The main dissonance here is that the authority of the IPv6 addresses belong to the client, generally the client should decide whatever happens with their addresses. In IPv4, NAT took care of centralizing the identity to the router in most networks that used RFC1918 addresses, for "a comparable" experience in IPv6 you need ULAs and all of the mess they are.
#10
German - Deutsch / OPNCentral enteuschung
Last post by alexebner - Today at 11:23:07 AM
Hallo !

Ich habe jetzt mal versucht mit OPNCentral mehrere Firewalls zu konfigurieren und mir das Leben damit zu erleichtern. Leider stellte sich das als totale Katastrophe heraus.
Die eingesetzten Firewalls sind für unterschiedliche Standorte. Diese haben auch eine unterschiedliche anzahl von Netzen , VLANS und Wireguard verbindungen. Beim durchspielen diverser konfigurationen hat sich volgendes ergeben.

Zentrale verwaltung von Aliase können nur bedingt verwendet werden wenn man von Anfang alles nur über die Zentrale Firewall konfiguriert.
Firewall Regeln und NAT kann man nicht verwenden da entweder alle Regeln gelöscht werden die auf der Verwalteten firewall sind oder wenn man es konfiguriert das nur regeln für bestimmte Schnittstellen synchronisiert werden diese immer bei den Falschen Interfaces landen. Die Zuordnung findet nämlich nur über die Schnitstellen identifikation statt die man aber nicht ändern kann. Somit funktioniert das ganze eigentlich nur zuverlässig wenn alle Standorte 100% gleich sind. Es darf auf keinen Standort ein VPN Zusätzlich geben oder Vieleicht ein VLAN zusätzlich. Nochdazu muss immer überall alles in der gleichen Reihenfolge angelegt werden.

Das Hauptproblem ist das man die Netzwerkkennung nicht ändern kann sondern das dies einfach nur durch Nummeriert wird.

Oder habe ich noch irgend eine Option übersehen wie man das besser regeln kann?

Ich finde es etwas schade das man die Funktion überhaupt Zentrale Verwaltung nennt das dies keine Verwaltung sondern eine sehr dumme 1:N kopie der einstellung ist.