Upgrading package manager from version '2.5.1' to '2.3.1_1' zu sagen?***GOT REQUEST TO CHECK FOR UPDATES***
Currently running OPNsense 26.1.5 (amd64) at Wed Apr 1 10:40:09 CEST 2026
Fetching changelog information, please wait... done
Updating OPNsense repository catalogue...
Fetching meta.conf: . done
Fetching data: .......... done
Processing entries: .......... done
OPNsense repository update completed. 929 packages processed.
Updating SunnyValley repository catalogue...
Fetching meta.conf: . done
Fetching data: ........ done
Processing entries: .. done
SunnyValley repository update completed. 15 packages processed.
Updating ntop repository catalogue...
Fetching meta.conf: . done
Fetching data: . done
Processing entries: . done
ntop repository update completed. 6 packages processed.
All repositories are up to date.
Child process pid=93975 terminated abnormally: Segmentation fault
Upgrading package manager from version '2.5.1' to '2.3.1_1'
Updating OPNsense repository catalogue...
OPNsense repository is up to date.
OPNsense is up to date.
Checking integrity... done (0 conflicting)
Your packages are up to date.
Child process pid=3736 terminated abnormally: Segmentation fault
Checking for upgrades (229 candidates): .......... done
Processing candidates (229 candidates): . done
Checking integrity... done (0 conflicting)
Your packages are up to date.
***DONE***Quote from: hakuna on Today at 10:21:19 AM1. it went into halt mode and stayed there
Quote from: hakuna on Today at 10:21:19 AM2. UPS power was recycled so it killed everything, including OPNSense itself which was in halt mode, it never fully shutdown.
Quote from: Patrick M. Hausen on Today at 09:55:38 AM1. "/usr/local/etc/rc.halt" does call "shutdown -p now":#!/bin/sh
# shutdown syshook / plugin scripts
/usr/local/etc/rc.syshook stop
/sbin/shutdown -op now
while :; do sleep 1; done
2. The hardwired killpower flag might call for a feature request to make it configurable.
I haven't noticed because here my OPNsense is the master NUT server and all other servers shut down first. I think the firewall killing the Internet connection should go down last.
HTH,
Patrick
Quote from: Stormscape on Today at 09:59:09 AMAvoids NUT nonsense
#!/usr/bin/env bash
set -Eeuo pipefail
OPNSENSE_HOSTS=("https://opnsense.example.com") # add more for HA
API_KEY="<API KEY HERE>"
API_SECRET="<API SECRET HERE>"
ENDPOINT="/api/core/firmware/poweroff"
CONNECT_TIMEOUT=3
MAX_TIME=10
RETRIES=3
RETRY_DELAY=2
log(){ logger -t ppb-opnsense -- "$*"; echo "[$(date -Is)] $*"; }
call_shutdown() {
local url="${1%/}${ENDPOINT}"
local args=(
--silent --show-error
--header "Content-Type: application/json"
--user "${API_KEY}:${API_SECRET}"
--data '{}'
--connect-timeout "$CONNECT_TIMEOUT"
--max-time "$MAX_TIME"
--write-out "HTTP_CODE=%{http_code}\n"
--output /dev/null
)
# With LE, system trust store is fine; no -k used.
local out rc code
for ((i=1;i<=RETRIES;i++)); do
set +e
out=$(curl -X POST "${args[@]}" "$url" 2>&1); rc=$?
set -e
code=""; [[ "$out" =~ HTTP_CODE=([0-9]{3}) ]] && code="${BASH_REMATCH[1]}"
if [[ "$code" =~ ^2..$ || "$code" == "000" ]]; then
log "Accepted by $url (HTTP:${code:-none})."
return 0
fi
log "Attempt $i failed (rc:$rc HTTP:${code:-none}). Out: $out"
(( i < RETRIES )) && sleep "$RETRY_DELAY"
done
return 1
}
main(){
command -v curl >/dev/null || { log "ERROR: curl not found"; exit 2; }
local fail=0
for h in "${OPNSENSE_HOSTS[@]}"; do
log "Requesting shutdown: $h"
call_shutdown "$h" || { log "ERROR: $h did not acknowledge"; ((fail++)); }
done
(( fail==0 )) && { log "All shutdown calls issued."; exit 0; } || exit 1
}
main "$@"
#!/bin/sh
# shutdown syshook / plugin scripts
/usr/local/etc/rc.syshook stop
/sbin/shutdown -op now
while :; do sleep 1; done
Quote from: Spylive on March 13, 2026, 03:28:33 PMДобрый день, подскажите пожалуйста, после установки и xray и tun запущены ошибок нет , пинг до впн есть, валидация конфига работает, и на сотовом конфиг проверен, но тест соединения выводит ошибку "✗ Could not connect — xray-core may be stopped or port unreachable". Если проверять из консоли командой то код ответа 000. В логе xray следующее содержимое2026/03/13 14:25:45.243584 [Info] [1046434210] proxy/socks: TCP Connect request to tcp:1.1.1.1:443Заранее спасибо за помощь.
2026/03/13 14:25:45.243593 from tcp:127.0.0.1:54616 accepted tcp:1.1.1.1:443 [socks-in >> proxy]
2026/03/13 14:25:45.243604 [Info] [1046434210] app/dispatcher: default route for tcp:1.1.1.1:443
2026/03/13 14:25:45.243630 [Info] [1046434210] transport/internet/tcp: dialing TCP to tcp:IP_МОЕГО_VPN:443
2026/03/13 14:25:45.243637 [Debug] [1046434210] transport/internet: dialing to tcp:IP_МОЕГО_VPN:443
2026/03/13 14:25:45.464433 [Info] [1046434210] proxy/vless/outbound: tunneling request to tcp:1.1.1.1:443 via IP_МОЕГО_VPN:443
2026/03/13 14:25:45.464556 [Debug] [1046434210] proxy: XtlsFilterTls found tls client hello! 517
2026/03/13 14:25:45.464586 [Debug] [1046434210] proxy: XtlsPadding 517 798 0
Xray 26.3.27 (Xray, Penetrates Everything.) d2758a0 (go1.26.1 freebsd/amd64)
A unified platform for anti-censorship.
2026/04/01 10:25:15.725096 [Info] infra/conf/serial: Reading config: &{Name:/usr/local/etc/xray-core/config-38d0f80c-f39b-4b64-9f09-8f2037f90c2c.json Format:json}
2026/04/01 10:25:15.739766 [Warning] core: Xray 26.3.27 started
{"level":"info","ts":1775028316.4993405,"caller":"engine/engine.go:237","msg":"[STACK] tun://proxytun2socks0 <-> socks5://127.0.0.1:10808"}
2026/04/01 10:25:20.460365 from tcp:127.0.0.1:14560 accepted tcp:1.1.1.1:443 [socks-in >> proxy]
2026/04/01 10:40:27.525360 from tcp:127.0.0.1:27483 accepted tcp:1.1.1.1:443 [socks-in >> proxy]OPNsense 26.1.5-amd64
FreeBSD 14.3-RELEASE-p9
OpenSSL 3.0.19