Why would opnsense try and route traffic destined to 192.168.0.2 through the WAN?
Quote from: eponymous on April 27, 2023, 10:07:50 amWhy would opnsense try and route traffic destined to 192.168.0.2 through the WAN?Because all other interfaces are down at that precise moment. When an interfaces is down, the interface address and all directly connected routes are not present, anymore. So it tries to reach the syslog server via the only interface that is left.
https://github.com/syslog-ng/syslog-ng/issues/3177#issuecomment-599016847
So does that imply the logs are actually going out of the interface onto the public Internet? If so isn’t that a security flaw?
Quote from: eponymous on April 27, 2023, 11:35:36 amSo does that imply the logs are actually going out of the interface onto the public Internet? If so isn’t that a security flaw? No, the ISP will drop the packet since it is not internet routable
Quote from: bartjsmit on April 27, 2023, 11:38:54 amQuote from: eponymous on April 27, 2023, 11:35:36 amSo does that imply the logs are actually going out of the interface onto the public Internet? If so isn’t that a security flaw? No, the ISP will drop the packet since it is not internet routableWould it be advisable to add a rule to the OUT side of the WAN interface to block this in my case? For me, no packets with a destination of RFC1918 should need go out that interface. In fact, the WAN interface is ultimately a PPPoE connection.
Quote from: eponymous on April 27, 2023, 12:04:16 pmWould it be advisable to add a rule to the OUT side of the WAN interface to block this in my case? For me, no packets with a destination of RFC1918 should need go out that interface. In fact, the WAN interface is ultimately a PPPoE connection.Yes, I recommend to do this. The blocking rule prevents that private network packets will leave a public interface when a route goes down for whatever reason. Because of possible data leak, it can be a security issue.
Would it be advisable to add a rule to the OUT side of the WAN interface to block this in my case? For me, no packets with a destination of RFC1918 should need go out that interface. In fact, the WAN interface is ultimately a PPPoE connection.
How would you do this when an automatically generated rule exists for WAN which essentially "lets out anything from firewall host itself" and which is put before any manually created rules?
Do you have block private networks ticked on your WAN interface?