Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Installed latest snap, now can't login to GUI

    Scheduled Pinned Locked Moved 2.0-RC Snapshot Feedback and Problems - RETIRED
    25 Posts 8 Posters 7.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M Offline
      merc
      last edited by

      I wasted a lot of precious time trying to figure out what the hell all of a sudden happened, and why I couldn't access the firewall.  If this is going to be left on by default, then the notice must give the administrator ways to get around it and how to manage it in the future.  I have absolutely no use for this feature at all, as I don't allow remote access to the UI.

      1 Reply Last reply Reply Quote 0
      • jimpJ Offline
        jimp Rebel Alliance Developer Netgate
        last edited by

        It has nothing to do with you enabling remote access - DNS rebinding attacks are a way that someone remotely could get access to your router even when you have explicitly denied it. That's why it's a security risk.

        The error message could probably be clearer, though. But it's still a beta so there's plenty of time to get a simple fix like that in.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • E Offline
          Efonnes
          last edited by

          Would there be anything wrong with having the message suggest to try accessing it by IP address instead and where to go to configure an exception for the host name?

          1 Reply Last reply Reply Quote 0
          • K Offline
            kpa
            last edited by

            Another way to protect the system from DNS rebinding attacks is to filter out all private address space addresses from the DNS replies that come from upstream forwarders. It's not going to work in every case though because not everyone uses the DNS forwarder that is included in pfSense.

            Edit: 2.0 BETA already seems to do this with dnsmasq –stop-dns-rebind option, the other protection methods seem a bit excessive in that case…

            1 Reply Last reply Reply Quote 0
            • C Offline
              cmb
              last edited by

              @kpa:

              Edit: 2.0 BETA already seems to do this with dnsmasq –stop-dns-rebind option, the other protection methods seem a bit excessive in that case…

              Yes that's already done, no it's not excessive - that only helps if you're using the DNS forwarder, lots of people don't.

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.