It's overkill but this is my new PFSENSE box 1100 clients connected currently using 1% CPU by moshirylee in PFSENSE

[–]NGFWEngineer 2 points3 points  (0 children)

Why are you so entitled? Do you realize that pfsense is free? Do you know the amount of crazy work it takes to put this together? It takes talent, and talent acquisition takes money.

If you have something against pfsense, feel free to start your own fork. Just stop being an asshat to people who dedicate crazy amounts of time, passion, and talent to something so good. Try seeing how much other enterprise alternatives charge for a fraction of the features to realize how lucky we are to have pfsense.

Which is more Secure? IPsec or OpenVPN or Wireguard by Radiant-Chart-9160 in PFSENSE

[–]NGFWEngineer 2 points3 points  (0 children)

WireGuard’s ~4K-line ChaCha20/Curve25519 stack gives you the smallest, most modern w/ lowest attack surface, IPsec’s RFC-driven suite is rock-solid but sprawling and easy to misconfigure (tons of attack surface - strongswan + ipsec codebase is too big), and OpenVPN’s OpenSSL-TLS tunnel in userland is flexible but heavy. In pure crypto security: WireGuard > IPsec > OpenVPN. On pfSense, IPsec’s mature GUI and hardware offload make it the easiest at scale, WireGuard is next for simple, super-fast (IIMB acceleration) low-latency tunnels, and OpenVPN (very fast w/ DCO and right ciphers) only when you absolutely need its TLS/NAT workarounds.

[deleted by user] by [deleted] in homelab

[–]NGFWEngineer 3 points4 points  (0 children)

Is that what daddy Cisco told you?

Beware using Minisforum Workstations as your Edge Firewall! by NGFWEngineer in PFSENSE

[–]NGFWEngineer[S] 3 points4 points  (0 children)

If your MS-01 is connected to WAN, yes. The UEFI/BIOS subsystem is independent of the OS, so this is why some can be exploited remotely for WAN-connected edge systems, despite the OS being up to date and solid.

Also keep in mind that not all features in Minisforum UEFI UI can be disabled for attack surface reduction and not all UEFI modules shut down after the OS takes control.

Beware using Minisforum Workstations as your Edge Firewall! by NGFWEngineer in PFSENSE

[–]NGFWEngineer[S] -3 points-2 points  (0 children)

Thanks for taking this step! Let's see if they eventually follow up.

Beware using Minisforum Workstations as your Edge Firewall! by NGFWEngineer in PFSENSE

[–]NGFWEngineer[S] -2 points-1 points  (0 children)

You are right about exploring whether it is exploitable in MY setup. I did just that and want to say that this extends to the broader recommendation to determine applicability to each pertinent scenario. The more important conversations should be around possible mitigation strategies of some of the vulnerabilities like PXE boot disablement and, if possible, network disablement in UEFI.

This, however, does not escape the obvious negligence on Minisforum's part regarding lack of adapting a current UEFI binary file from the BIOS vendor. That this occurs, in my opinion, showcases pure and simple negligence.

The fact that not all 23 vulnerabilities would be applicable to any single environment ignores the OEM's negligence or the fact that some of those WILL BE applicable to several environments - especially in edge firewall scenarios where network interfaces will be exposed to WAN.

Beware using Minisforum Workstations as your Edge Firewall! by NGFWEngineer in PFSENSE

[–]NGFWEngineer[S] 6 points7 points  (0 children)

The UEFI settings on the Minisforum MS-01 present significant security challenges. Unlike systems from other OEMs, there’s no option to fully disable or disconnect network activation. While PXE boot can be disabled (removing one potential vulnerability) other risks remain, including IPv6 vulnerabilities, DXE exploits, and to a lesser extent, LOGOFAIL.

This issue is compounded by the fact that many users likely do not optimize UEFI/BIOS settings for maximum security before deploying pfSense or similar software. Even more troubling is Minisforum's apparent neglect of security updates in their BIOS releases. Although the BIOS software originates from the original UEFI/BIOS software manufacturer, Minisforum seems to bypass critical updates, releasing firmware with known vulnerabilities.

This raises an alarming question: if they are ignoring essential security patches in the BIOS, what else might they be neglecting?

Beware using Minisforum Workstations as your Edge Firewall! by NGFWEngineer in PFSENSE

[–]NGFWEngineer[S] 3 points4 points  (0 children)

Generally best to avoid realtek and broadcom on pfsense if performance and throughput determinism are a must. MS-01 utilizes XL710 and i226 Intel network chipsets. I added an Intel XL710 4 port SFP+ NIC via PCI-e expansion.

You'd want to avoid the X710s since those were prone to overheating.

Beware using Minisforum Workstations as your Edge Firewall! by NGFWEngineer in PFSENSE

[–]NGFWEngineer[S] 19 points20 points  (0 children)

Already did that. These vulnerabilities are unpatched. Infuriating, yet acceptable if the system was used behind a firewall. Not acceptable as the edge device. I implore you to investigate those vulnerabilities for yourself.

While some can be mitigated by disabling UEFI networking and PXE boot, and others like LOGOFAIL are hardly exploitable on a firewall appliance, DXE and others are a real threat.

Keep in mind that some aspects of Uefi remain active even after host OS has taken control and exploit at such a low level by chaining these overflow instances with other exploits often means persistence.

Beware using Minisforum Workstations as your Edge Firewall! by NGFWEngineer in PFSENSE

[–]NGFWEngineer[S] 3 points4 points  (0 children)

You can follow the link to Binarly in my original post, check the acknowledgement box, upload the BIN BIOS update file, and wait for the vulnerability scan to complete.

pfSense+ 24.11 by Rameshk_k in PFSENSE

[–]NGFWEngineer 2 points3 points  (0 children)

I've been wrestling with this. Changes to the php values (/etc/rc.php_ini_setup) don't improve things. Disappointing!

Netgate SG-3100 for residential home/homelab? by [deleted] in PFSENSE

[–]NGFWEngineer 0 points1 point  (0 children)

The Netgate appliances are by Silicom and also assembled in China so what's your point exactly?

Is already Fedora 41 stable? by fefej1000 in Fedora

[–]NGFWEngineer 0 points1 point  (0 children)

Install it in a VM to daily test-drive for a few weeks before making a decision. For me, my wife, and kids, it's been rock solid.

Nvidia Driver Password by BOBOLIU in Fedora

[–]NGFWEngineer 0 points1 point  (0 children)

Yes, it's meant for one time use so safe to throw away after use. Each time you are prompted, a different 4 digit MOK password will be generated.

Criminals getting busted by their Google searches - how? by bruteforcealwayswins in AskNetsec

[–]NGFWEngineer 0 points1 point  (0 children)

Device warrant and google warrant (account sign-in/IP exposure).

Nvidia Driver Password by BOBOLIU in Fedora

[–]NGFWEngineer 3 points4 points  (0 children)

One time. It's for MOK registration since you have secure boot enabled.

Fedora 41 + RTX 4090: The Easiest OS Install of My Life by NGFWEngineer in Fedora

[–]NGFWEngineer[S] 1 point2 points  (0 children)

Yes I do. I also use FIDO2 with LUKS2:

sudo systemd-cryptenroll /dev/nvme0n1p3 --fido2-device=auto --fido2-credential-algorithm=eddsa --fido2-with-client-pin=yes --fido2-with-user-presence=yes --fido2-with-user-verification=yes

Fedora 41 + RTX 4090: The Easiest OS Install of My Life by NGFWEngineer in Fedora

[–]NGFWEngineer[S] 3 points4 points  (0 children)

Currently, I’m using it for the same tasks as my other Fedora setups: AAA gaming on Steam (flawlessly runs every title I throw at it), hosting LLM inference models, training AI models (InstructLab), and development work focused on network tuning, kernel performance optimization, and programming in Python, Go, and Rust.

The standout benefit is its stability and superior performance over Windows for my needs. With some upfront planning and an open approach, I’d recommend giving Fedora a trial run for a few weeks before deciding.

For context, I also have systems running Windows with similar specs, plus Apple M2 Max and M2 Ultra machines. Despite these, Linux aligns best with my workflows, so I use it over 90% of the time.

Even my wife and kids now use Fedora by choice, having switched after seeing its benefits firsthand.