• ssh vscode

    12
    0 Votes
    12 Posts
    1k Views
    Cloudless Smart HomeC
    @stephenw10 the one in the picture above
  • MTU on GIF interface

    16
    0 Votes
    16 Posts
    2k Views
    A
    I GOT IT ! enabled MSS clamping to 1440. So settings for Wemag, if anyone is reading this post : WAN: -> DHCPv6 -> MTU 1492 -> prefix /64 LAN: leave untouched (...well, apart from the ipv6 setting - tracking WAN and so on- ) GIF: MTU 1472 MSS clamping: 1440 now everything seems to work as it should. tbc. Thank u @JKnott and @stephenw10
  • Full Internet routing table - Memory needed

    6
    0 Votes
    6 Posts
    883 Views
    M
    @stephenw10 put in a request for 1541 base. I think that should do it.
  • Solved: Two factor authentication for admin login

    33
    2 Votes
    33 Posts
    32k Views
    JeGrJ
    @aaronssh said in Solved: Two factor authentication for admin login: And as a Windows admin I have no way to retrieve a user's password, they are encrypted using non-reversible encryption How? Is there any change in Windows itself about that? Because there were multiple ways to actually hack into/"retrieve" a user PW from AD as they are not encrypted but hashed and the hashing wasn't that good the last few times a MS patch came up. But perhaps they are safer now. @aaronssh said in Solved: Two factor authentication for admin login: So if an admin did reset a password, it would immediately show up in the logs. CMMC requires that all logs are required to be centrally stored in a repository designed to store logs in a way that they can't be edited or modified by anyone. It would be possible to reset another Windows admin's password but would be easily traceable and alerts would go off. Ah so there would be logs about the PW reset and thus a breadcrumb to an admin to follow. Understandable. @aaronssh said in Solved: Two factor authentication for admin login: I agree with your premise that a sophisticated admin attacker could probably find a way somehow, my opinion is it just shouldn't be THAT incredibly easy and obvious. But if a hacker could (very) probably find a way to it, WHY should you place security by obscurity and obfuscate the key? Again, every TOTP solution ever has the key saved in an easy to recover way. The only way they perhaps "protect" it better is by encrypting their configuration. But at the end, e.g. a phone app for TOTP stores the TOTP key in plain sight as it is needed to generate the token. Yes you can protect the app. But pfSense is a firewall so only admins have access - and in normal situations that is a "key to the castle" scenario. As root/admin you already have deepest levels of access. Compared with AD which is LDAP, Radius seems limited to the way it is - PAP to use TOTP. And other then Windows Logins - or pfSense local logins for that matter that are also encrypted via bcrypt - Radius needs various things in clear text to hand it over to services via PAP. So as far as my understanding of the service goes, that's not a pfSense problem per se but a limitation of Radius (protocol) and handling things - @jimp may correct me if I assume wrong. but having some type of effort required to break in is sometimes enough If you know that Radius needs things in clear text, and that is easy to check on, you can easily assume, that things are most likely not hashed but encrypted somehow and thus the code to do so would be in the open e.g. in the Radius or pfSense files. So the point would be a simple matter of reverse engineering, reading code and using the same decode part that pfSense/radius would be using and thus be rather pointless I assume. @aaronssh said in Solved: Two factor authentication for admin login: Many people who would never break glass to steal something will walk in an open door to steal something; it's just an uncomfortable part of human nature that we all have to deal with at some level. I get the intention, but the comparison is bad. A storefront would also be in plain sight of others that would see it. And at night, at least there would be an alarm etc. added to the closed door. But implementing pointless encryption, that anyone can reverse with a few clicks (or build a tool to do it automatically) would be more like having already keys to the shop. It's not "a hacker" that can do the stuff, it's "the owners/workers that also tend the register". And yeah, those people could also take things from the register and simply go. That's why they're normally trusted. But yes, I get your point, perhaps there are other measures that can be applied but in that case I think Radius + TOTP aren't the tools that match the use case to be covered. Cheers :)
  • 3100 tries to configure WAN before fiber modem has uplink

    3
    0 Votes
    3 Posts
    525 Views
    B
    Thanks! I added a delay to /boot/loader.conf.local, seems like that should take care of it. Appreciate the issue link.
  • php shell help please?

    2
    0 Votes
    2 Posts
    249 Views
    No one has replied
  • All connections being directed to single IP address over OpenVPN

    5
    0 Votes
    5 Posts
    591 Views
    B
    @stephenw10 Hey Steve! That worked. I honestly don't remember setting that up. I thought it came through with the OpenVPN wizard. Thanks for all the pointers. I clearly have lots to learn.
  • pFsense + 22.05 keeps crashing

    16
    0 Votes
    16 Posts
    2k Views
    G
    @adriftatlas Thanks! I will try that over the weekend. (powerD is disabled) Keep you posted...
  • Disable CLICOLOR in terminal

    3
    0 Votes
    3 Posts
    570 Views
    A
    @jimp said in Disable CLICOLOR in terminal: unsetenv CLICOLOR Thank you for clarifying!
  • How enter a “Y” in shell command field?

    3
    0 Votes
    3 Posts
    548 Views
    J
    @stephenw10 The -y is what I was looking for.
  • Convert /tmp/config.cache to config.xml

    2
    0 Votes
    2 Posts
    407 Views
    S
    UPDATE: FIXED I got to mount only the zroot/ROOT/default dataset manually on another mountpoint, and BINGO, everything was there.
  • Can't access pfsense GUI due to "disable all packet filtering...'

    4
    0 Votes
    4 Posts
    503 Views
    I
    Closed: I manged to restore the last working configuration file. Thank you to all that took time to at least read my post. Have a great day. Glen
  • pfSense Plus can't work Google LDAP with Squid Proxy Server

    10
    0 Votes
    10 Posts
    1k Views
    M
    @stephenw10 This works in a MS Active Directory, via LDAP. My goal is connect to our Google Workspace LDAP. The pfSense Authentication and Captive Portal works, but Squid, not. I have a change "Squid Authentication Method" to Local and doesn't autenticate.
  • Synology NAS Share on pfSense

    3
    0 Votes
    3 Posts
    552 Views
    stephenw10S
    You are probably seeing an asymmetric routing issue with a multi-homed host like that. https://docs.netgate.com/pfsense/en/latest/troubleshooting/asymmetric-routing.html Check the firewall logs for blocked entries. But, yeah, connecting to https://10.108.1.99:5001 from hosts in that same subnet doesn't go through the firewall. Steve
  • Remote play for the ps5

    10
    0 Votes
    10 Posts
    2k Views
    johnpozJ
    @coffeeman007 Oh my bad - plex on the brain I guess.. Sorry!! doh!!
  • strange wget error behind pfsense

    7
    0 Votes
    7 Posts
    1k Views
    stephenw10S
    And / or your test client is not respecting the HSTS policy maybe?
  • Natgate 6100 Problem

    4
    0 Votes
    4 Posts
    612 Views
    stephenw10S
    @safia said in Natgate 6100 Problem: I do not see the windows the below window What do you see at the serial console then?
  • Will there be a build on FreeBSD 12.4?

    freebsd
    3
    0 Votes
    3 Posts
    731 Views
    stephenw10S
    Very unlikely. As mentioned all the current work is on FreeBSD main builds. Currently that's 14. Steve
  • default gateway packet loss - no system logs

    18
    0 Votes
    18 Posts
    1k Views
    stephenw10S
    Longer route, more hops. Generally more chances to lose packets. 1.1.1.1 is an anycast address so you see replies from whatever is logically closest to you. Steve
  • HP-eprint secure?

    2
    0 Votes
    2 Posts
    330 Views
    stephenw10S
    The printer will be establishing a connection to the server outbound that is then used to send printjobs to it. It's as secure as any IoT device. You would hope more so because HP is running it, but.... The risk is that the printer connects to something that isn't HP's server and that connection allows back in more than just printjobs. That should be difficult to impossible if HP have done a good job. As always it comes down to security vs convenience. Steve
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.