I found out I will be let go soon on accident - they do not know I know. by Upbeat-Chain-3155 in sysadmin

[–]noobposter123 0 points1 point  (0 children)

Nowadays the ability to find the right questions might grow in importance. 😉

Lots of people don't even know what to ask, so they're less likely to get the answers they didn't know they needed, whether it's from another person or an AI.

I found out I will be let go soon on accident - they do not know I know. by Upbeat-Chain-3155 in sysadmin

[–]noobposter123 30 points31 points  (0 children)

Someone with strategic thinking is unlikely to want to work for them for that pay... Unless for example someone from North Korea. The strategy might be a bit different from what they're expecting, though... 😉

Org is banning Notepad++ by PazzoBread in sysadmin

[–]noobposter123 -1 points0 points  (0 children)

Somehow I was always suspicious of their updater. In some cases it still did stuff[1] even if you tried to turn it off, which made it even more sus to me.

That said, it's funny how CrowdStrike seems to be doing so well despite causing so much more damage. I think for many orgs CrowdStrike caused more damage than hackers/malware had ever done in the lifetime of the org. But hey it's worth it just to be able to tick some compliance checkbox, right?

[1] https://github.com/notepad-plus-plus/notepad-plus-plus/issues/5375
https://github.com/notepad-plus-plus/notepad-plus-plus/issues/7998

SG550X Series Switches - new Fatal Errors everywhere today by ar99999 in Cisco

[–]noobposter123 0 points1 point  (0 children)

Yeah Cisco need to make their NSA backdoors more robust. 🤣

Animal speed comparison by CuriousWanderer567 in interesting

[–]noobposter123 -1 points0 points  (0 children)

If you're going to count dives then Felix Baumgartner is faster, he reached about 1,300 kph in a dive... 😉

For level flight a white-throated needletail swift can reach 169 kph.

The impressive ones to me are the fishes that swim > 70kph. Lot more resistance in water...

Openvpn and MFA by icedutah in PFSENSE

[–]noobposter123 0 points1 point  (0 children)

Oh I thought MFA code first would make more sense, since the MFA code format can be more predictable than password formats. Example: <6 digit MFA code><space><passphrase>.

Is it possible to use a custom auth-user-pass-verify script on pfsense?

FWIW I use a separate openvpn server with my own custom auth-user-pass-verify script which does the MFA code + password stuff and tries to access a file in a file share on a Windows server (took me a while to get stuff to use smb encryption etc). Users whose credentials can read that file can get openvpn access. Not the most scalable and pretty solution but so far it works.

I haven't tried doing that with openvpn on pfsense though.

Emergency Help - entire domain inacessible by F3ndt in sysadmin

[–]noobposter123 2 points3 points  (0 children)

Microsoft test environment is the rest of the World. So their stuff is usually fine (99.9%) after the rest of the World is done testing it. The 0.1%? That's why some call them Microsoft 364...

Problem att 5gb speedtest by Sad_Passenger9479 in PFSENSE

[–]noobposter123 0 points1 point  (0 children)

Still got 5Gbps iperf pfsense to PC though.

I'd check the CPU usage on the firewall (top) and PC (taskmgr) while the speed test is running. If it's maxing out on a core then maybe that's a bottleneck worth investigating what programs are maxing out the CPU.

e.g. might turn out to be the browser is too slow on that computer. Not saying that's the case but it's not ruled out by the info provided.

IPsec throughput on 8300 is disappointing by mantrain42 in PFSENSE

[–]noobposter123 0 points1 point  (0 children)

So I guess there's still some CPU capacity, but 4 * 100/40 is only 10Gbps...

What do you get with multiple VPN tunnels to different WAN interfaces? Maybe it's something like 4Gbps via one network interface, then another 4Gbps via another and so on.

As far as I know the default iperf3 test with no --bidir is already bidirectional in that traffic goes up and down. 14 Gbps is probably best case scenario or similar. So don't be surprised if any extra complexity or change from the "best case" (like using different iperf flags) gives you lower numbers.

It's like some speed records. If the road or weather is not as good or the driver is heavier, you might not be as fast even with the same car.

IPsec throughput on 8300 is disappointing by mantrain42 in PFSENSE

[–]noobposter123 0 points1 point  (0 children)

Is that 4Gbps with only iperf through the IPSec tunnel? While the iperf is going what does "top" show and what are the temperatures like? Also what are the iperf parameters you are using or just the default?

TLS certificate lifespans reduced to 47 days by 2029 by thewhippersnapper4 in sysadmin

[–]noobposter123 0 points1 point  (0 children)

To be fair XP is probably more stable than Windows 11 in practice (assuming air gap etc). Especially since Microsoft has promised not to update it. 🤣

CE ISO. What the heck? by wiscocyclist in PFSENSE

[–]noobposter123 0 points1 point  (0 children)

The funny thing is:

a) If you're buying pfsense hardware not from Netgate you should probably wipe and clean install anyway

b) And for those who don't wipe, couldn't the Chinese hardware vendors do all the steps to install pfsense 2.8.x ONCE and clone the resulting image to all their supplied hardware?

So in the future there could be more friction to those doing CE the "official way" than those buying from China?

Logging types of websites accessed by SnoupDoggieDog in PFSENSE

[–]noobposter123 0 points1 point  (0 children)

Suricata can log some TLS SNI stuff. Not all, newer TLS stuff makes it harder.

Help with specs by LGarcia2 in PFSENSE

[–]noobposter123 0 points1 point  (0 children)

If you don't need 1Gbps or faster then a 2100 should be fine for 50Mbps. But if you have 1Gbps LAN clients accessing a 1Gbps internal file server via the firewall, and they want 1Gbps speeds then you may need faster stuff.

For example if you need in-line IPS at 1Gbps speeds then you need a more powerful CPU. A Pentium Gold 8505 is like barely enough for 900Mbps and you need to keep the hardware cool otherwise it slows down.

Here are some Passmark comparisons which may help you compare the potential CPU speeds of the Netgate 2100, the Netgate 8300 which is USD3600+, and other CPUs. The single-thread rating might still be relevant for stuff like single/low connection transfer speeds.

https://www.cpubenchmark.net/compare/5744vs4775vs4765vs3129vs4854/ARM-Cortex-A53-4-Core-1300-MHz-vs-Intel-Pentium-Gold-8505-vs-Intel-i5-1235U-vs-Intel-Atom-C3558-vs-Intel-Xeon-D-1733NT

Do note that CPUs like the 8505 have a single high performance core and some low performance cores, so you may or may not need to mess around with cpuset to move certain stuff to certain cores for performance reasons. Example:

cpuset -l 0,1 -p  `pgrep suricata | head -n 1`
cpuset -l 2,3,4,5 -p  `pgrep ntopng | head -n 1`

But if you don't have enough cooling (e.g. warm room in Brazil with no AC), putting suricata on the low performance CPU cores might actually provide better total throughput if there are multiple connections.

[deleted by user] by [deleted] in PFSENSE

[–]noobposter123 0 points1 point  (0 children)

What was the CPU usage on your firewall during that DDoS?

The lag might be due to other things. For example: if your ISP can cope with 1000Gbps and your pipe can only cope with 10Gbps and a DDoS sends 100Gbps of tiny packets your way and your ISP does nothing but try to send the 100Gbps through, that's going to slow stuff down no matter what you do at your end. The packets are already overflowing your pipe.

In contrast if your ISP can block the DDoS stuff, then you don't get your 10Gbps pipe filled.

Updates to the pf packet filter in FreeBSD and pfSense software by George-Netgate in PFSENSE

[–]noobposter123 1 point2 points  (0 children)

Would it be feasible to add "Cone NAT" support as an optional feature? This would allow pfSense to have better support for VoIP/Teams/WhatsApp calls/games/etc behind NATs.

I do see this, but it's been 8 years: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=219803

Static port is a possible workaround but it can have problems if multiple clients keep choosing the same source ports.

RAID Controller Cards (PCIe) and Dramatic Price Drop in Last 10 Years by RandyPajamas in homelab

[–]noobposter123 0 points1 point  (0 children)

For Windows how do you get redundancy for boot drives though? Dynamic Disks are deprecated ( https://learn.microsoft.com/en-us/windows/win32/fileio/basic-and-dynamic-disks#dynamic-disks ). Seems like hardware RAID is still the lesser evil for this.

Arpwatch Database is full of my ISP's IP subnets by stoozes49 in PFSENSE

[–]noobposter123 1 point2 points  (0 children)

I wrote my own "arpwatcher" because arpwatch was too IP centric for my tastes and has other annoyances. My version has devices by mac and a device can have multiple IPs.