Actually this is what https://github.com/opnsense/changelog/blob/a16acafb81b2df83a0c7feb1faa6f29fe2825107/community/19.1/19.1.8#L36 was all about over two years ago. Anyone with access to the OpenVPN configuration pages was basically able to dispatch arbitrary commands on the firewall. We locked editing custom options fields for non-administrators for that reason.This why we also removed the raw file edit and command execution pages almost after our initial release 15.1:https://github.com/opnsense/core/commit/f2a21ac4462https://github.com/opnsense/core/commit/f958a96258dThe clearer issue is direct access through the ACL to those pages, but what if you could write arbitrary commands into the config.xml to gain access to those pages? From a harmless page you could get access to more dangerous pages.
This was also highlighted by the implementation of the read-only privilege which is per definition not allowed to write config changes, but if you have access to the configuration backup page you used to be able to switch to older config.xml backups or even upload a new config.xml:https://github.com/opnsense/changelog/blob/a16acafb81b2df83a0c7feb1faa6f29fe2825107/community/18.7/18.7.7#L27There are still pitfalls such as non-root shell access whereas potentially anyone could read the config.xml even if they have no GUI access at all. Basically we recommend never giving shell access to non-root users, but ultimately this should be fixed in a more sensible way. I think OpenVPN is currently blocking this effort because it wants to read the config.xml in an unprivileged manner.As for *sense having an ACL... it is relatively flexible and was inherited from m0n0wall itself, but has a couple of implementational artefacts. Since it was never shipped with predefined roles I think the user base for this feature is relatively small even today. I know of a commercial m0n0wall fork that actually used this ACL extensively, but it was a special purpose fork aimed at captive portal operation where there were technical and non-technical people required to operate different aspects of it.
I don't know any enterprise products that don't support fine-grained ACLs. If you talk about consumer/prosumer "crap", then yeah, most of them are garbage if you need proper security/privilege separation of some kind (let alone the ability to have audit trails), but they are meant for the market they cater to. Franco responded with far more detail.
Quote from: blblblb on August 04, 2021, 11:15:15 amI don't know any enterprise products that don't support fine-grained ACLs. If you talk about consumer/prosumer "crap", then yeah, most of them are garbage if you need proper security/privilege separation of some kind (let alone the ability to have audit trails), but they are meant for the market they cater to. Franco responded with far more detail.I would not put the Sidewinder firewall or TrueNAS into the "crap" category. But TrueNAS has got only one root account for the web UI, and Sidewinder supports an arbitrary number of individual admin accounts but only with either r/w for everything or r/o for everything.
...just to add: the promised 50.- € donation for the project is out, plus 50.- € donation for general charity (flooging victims, refugees, social service). Mission accomplished, regarding DoT and OPNsense :-D
server: private-domain: "plex.direct"
Is there a reason that the custom config files I create disappear from the folder after I restart unbound?
Quote from: sToRmInG on August 09, 2021, 05:06:19 pmIs there a reason that the custom config files I create disappear from the folder after I restart unbound?Are you creating them in /usr/local/etc/unbound.opnsense.d as documented?
Code: [Select]server: private-domain: "plex.direct"
If now the custom-options Form is removed from the GUI, is there any chance to get the custom-options.conf with the adaptations in the backup / and later on with a fresh install recovered....
Quote from: sToRmInG on August 09, 2021, 05:06:19 pmCode: [Select]server: private-domain: "plex.direct"Private domain is supported, see Services: Unbound DNS: Blocklist.
Quote from: sToRmInG on August 09, 2021, 05:06:19 pmCode: [Select]server: private-domain: "plex.direct"Private domain is supported, see Services: Unbound DNS: Blocklist.Quote from: crissi on August 09, 2021, 05:41:36 pmIf now the custom-options Form is removed from the GUI, is there any chance to get the custom-options.conf with the adaptations in the backup / and later on with a fresh install recovered....The whole point is not making something uncontrollable stick in the configuration in the first place.Cheers,Franco