Quote from: AdSchellevis on September 04, 2016, 08:23:11 pm@Strykar fail2ban like functionality for the webgui and ssh is enabled by default in OPNsense (https://github.com/opnsense/sshlockout_pf).After 15 retries it locks the ip address using two aliases (sshlockout, webConfiguratorlockout).Nice! Any chance this could be made port/application agnostic and configurable via the web interface? It could then be used for slowing down brute force attempts of any network facing services.
@Strykar fail2ban like functionality for the webgui and ssh is enabled by default in OPNsense (https://github.com/opnsense/sshlockout_pf).After 15 retries it locks the ip address using two aliases (sshlockout, webConfiguratorlockout).
Add RADIUS support for IPsec authentication and accounting.Currently IPsec supports just PSK and RSA, since we currently already support adding external RADIUS servers, let strongSwan forward authentication and accounting traffic to the same RADIUS server if selected.FreeRADIUS and Microsoft NPS are tested as working by strongSwan and shouldn't be too much effort to integrate.This would require strongswan be compiled with '--enable-eap-radius'. Specify the RADIUS server IP + auth and accounting port in '/usr/local/etc/strongswan.d/eap-radius.conf' and set 'rightauth=eap-radius'.strongSwan also supports DAE with RADIUS.'The Dynamic Authorization Extension allows a RADIUS backend to actively terminate a session using a Disconnect-Request, or change the timeout of a session using a Session-Timeout attribute in a CoA-Request. The extension is enabled using a dae section in the eap-radius configuration.'See https://wiki.strongswan.org/projects/strongswan/wiki/EAPRAdius
- Asterisk / VoIP / SIP gateway in GUI or as a good addon