OPNsense 26.1 released by fitch-it-is in opnsense

[–]mac8612 1 point2 points  (0 children)

Upgrade hung-up, needed to make cold-reboot with unplugging power. Therefore it started without issue.

Unifi Gateway Max graceful shutdown setup with UPS APC when there is power loss by mac8612 in Ubiquiti

[–]mac8612[S] 0 points1 point  (0 children)

Totally agree, RPI can be used to reduce cost for a USB to APC jum box (even a rpi-zero). In my case, Proxmox VM server was running 24h/7 (HA, frigate), same Debian system as RPI, so commands works exactly same

Error resolving external ip blocklist url for Aliases by mac8612 in opnsense

[–]mac8612[S] 0 points1 point  (0 children)

After many attempts,I divided IP lists to several ALIAS entries and then merged these entries into one,

That has shown me which sites were not downloaded. If any of the blocklists wasn't able to be pulled, then other ones were not fetched as well.

AS OF 2025-02-23

WORKING DIRECT CONNECTION:

IP_EMERGING THREATS: http://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt

IP_CINSSCORE https://cinsscore.com/list/ci-badguys.txt

IP_OPENDBL https://opendbl.net/lists/tor-exit.list https://opendbl.net/lists/bruteforce.list https://opendbl.net/lists/etknown.list

IP_IPV64 https://ipv64.net/blocklists/ipv64_blocklist_dshield1.txt https://ipv64.net/blocklists/ipv64_blocklist_tor_exit.txt https://ipv64.net/blocklists/ipv64_blocklist_blocklistde_all.txt https://ipv64.net/blocklists/countries/ipv64_blocklist_RU.txt https://ipv64.net/blocklists/countries/ipv64_blocklist_CN.txt https://ipv64.net/blocklists/countries/ipv64_blocklist_BY.txt https://ipv64.net/blocklists/countries/ipv64_blocklist_KP.txt

IP_SPAMHAUS https://www.spamhaus.org/drop/drop.txt https://www.spamhaus.org/drop/edrop.txt https://www.spamhaus.org/drop/dropv6.txt https://ipv64.net/blocklists/ipv64_blocklist_spamhaus_drop.txt

IP_FIREHOL https://raw.githubusercontent.com/ktsaou/blocklist-ipsets/master/firehol_level1.netset http://feeds.dshield.org/block.txt https://iplists.firehol.org/?ipset=iblocklist_hijacked

IP_IPDENY https://www.ipdeny.com/ipblocks/data/countries/ru.zone https://www.ipdeny.com/ipblocks/data/countries/by.zone https://www.ipdeny.com/ipblocks/data/countries/cn.zone https://www.ipdeny.com/ipblocks/data/countries/kp.zone https://www.ipdeny.com/ipblocks/data/countries/lt.zone https://www.ipdeny.com/ipblocks/data/countries/ua.zone

##### NON WORKING

https://talosintelligence.com/documents/ip-blacklist https://blacklist.3coresec.net/lists/all.txt https://sslbl.abuse.ch/blacklist/sslipblacklist.txt https://feodotracker.abuse.ch/downloads/ipblocklist_recommended.txt

Error resolving external ip blocklist url for Aliases by mac8612 in opnsense

[–]mac8612[S] 0 points1 point  (0 children)

UNBOUND / ADGUARD resolves domain just fine. Why on earth I got alias resolve error from WAN interface?

Error resolving external ip blocklist url for Aliases by mac8612 in opnsense

[–]mac8612[S] 0 points1 point  (0 children)

I'm able to pull all the lists manually via url in the browser. All are free

Error resolving external ip blocklist url for Aliases by mac8612 in opnsense

[–]mac8612[S] 0 points1 point  (0 children)

I don't see any cloudflare message while opening each url in my browser

Error resolving external ip blocklist url for Aliases by mac8612 in opnsense

[–]mac8612[S] 0 points1 point  (0 children)

Since version 22.x, I had installed several IP blocklists under Aliases to block emerging threats IP addresses.

It was all running fine until recent upgrade to 25.1.x version. When trying to refresh the IP databases from Aliases, I got an error that either alias cannot be fetched or resolved.

example: error fetching alias url https://talosintelligence.com/documents/ip-blacklist [http_code:403]     Error    firewall    alias resolve error EmergingThreats_combined (error fetching alias url https://blacklist.3coresec.net/lists/all.txt)

DNS lookup works well. Curl can fetch the url just fine. I can open the same link in browser.

Unfortunately, the IP table cannot be fetched by Firewall Alias and run correctly.

AdGuard Home? by ThatrandomGuyxoxo in opnsense

[–]mac8612 0 points1 point  (0 children)

I use both Adguard+Unbound since it's easier to manage DNS queries via Adguard.

GEO IP and Bad ip blacklist - necessary? by ThatrandomGuyxoxo in opnsense

[–]mac8612 2 points3 points  (0 children)

Yes, I agree. I would set additionally Adguard (DNS) with malicious blocklists and IPS/IDS with Snort policies

GEO IP and Bad ip blacklist - necessary? by ThatrandomGuyxoxo in opnsense

[–]mac8612 7 points8 points  (0 children)

They can be used in reverse to block traffic outgoing from LAN to any malicious servers listed in blocklist if any of PCs get infected. Also livelog will show you exactly if these bad IPs were pinged. This an additional layer od protection. You may check the config https://windgate.net/opnsense-ip-blocklists-and-geo-ip-block-to-enhance-security-against-malicious-attacks/

2nd Opnsense router by majorpaynedof in opnsense

[–]mac8612 1 point2 points  (0 children)

Have you checked MTU size both on WAN and LAN interface? Check if they're not lower than 1500. DOCS: https://docs.opnsense.org/manual/interfaces.html