Compare commits

...

35 Commits

Author SHA1 Message Date
System Administrator
a8e4be1124 /diag_backup.php machte Änderungen @ 2025-02-07T22:28:05.076300 (root@192.168.50.82) 2025-02-07 22:28:05 +01:00
System Administrator
6dfd57455e /api/unbound/settings/set machte Änderungen @ 2025-02-07T22:23:06.729600 (root@192.168.50.82) 2025-02-07 22:23:07 +01:00
System Administrator
0bf6786c27 /api/unbound/settings/set machte Änderungen @ 2025-02-07T22:22:22.664200 (root@192.168.50.82) 2025-02-07 22:22:23 +01:00
System Administrator
dbaf2a917d /api/adguardhome/general/set machte Änderungen @ 2025-02-07T22:22:13.883300 (root@192.168.50.82) 2025-02-07 22:22:14 +01:00
System Administrator
c259eed845 /diag_backup.php machte Änderungen @ 2025-02-07T22:12:52.462000 (root@192.168.50.82) 2025-02-07 22:12:52 +01:00
System Administrator
b32aa72784 Changed backup revision count @ 2025-02-07T22:11:13.592200 (root@192.168.50.82) 2025-02-07 22:11:14 +01:00
System Administrator
0dc3535c0c /diag_backup.php machte Änderungen @ 2025-02-07T22:09:16.637300 (root@192.168.50.82) 2025-02-07 22:09:16 +01:00
System Administrator
403f1b725e /diag_backup.php machte Änderungen @ 2025-02-07T22:08:26.400600 (root@192.168.50.82) 2025-02-07 22:08:26 +01:00
System Administrator
079681041e /api/adguardhome/general/set machte Änderungen @ 2025-02-07T21:48:42.852500 (root@192.168.50.82) 2025-02-07 21:48:43 +01:00
(system)
a5f247b40d /usr/local/opnsense/scripts/firmware/register.php made changes @ 2025-02-07T21:48:26.488600 ((system)) 2025-02-07 21:48:27 +01:00
System Administrator
0b147f21e0 /api/unbound/settings/set machte Änderungen @ 2025-02-07T21:48:03.849300 (root@192.168.50.82) 2025-02-07 21:48:04 +01:00
(system)
a32cda4cfc /usr/local/opnsense/scripts/firmware/register.php made changes @ 2025-02-07T21:44:16.384400 ((system)) 2025-02-07 21:44:16 +01:00
System Administrator
5c0da44162 /api/adguardhome/general/set machte Änderungen @ 2025-02-07T21:43:55.208000 (root@192.168.50.82) 2025-02-07 21:43:55 +01:00
System Administrator
ce7773b36e /api/unbound/settings/set machte Änderungen @ 2025-02-07T21:41:18.422500 (root@192.168.50.82) 2025-02-07 21:41:19 +01:00
System Administrator
96a4206801 /api/adguardhome/general/set machte Änderungen @ 2025-02-07T21:41:06.390300 (root@192.168.50.82) 2025-02-07 21:41:06 +01:00
System Administrator
27fa6b7461 /api/unbound/settings/set machte Änderungen @ 2025-02-07T21:35:41.557500 (root@192.168.50.82) 2025-02-07 21:35:42 +01:00
System Administrator
e1bcd7d94d /api/adguardhome/general/set machte Änderungen @ 2025-02-07T21:30:11.140200 (root@192.168.50.82) 2025-02-07 21:30:11 +01:00
(system)
54a9fdd740 /usr/local/opnsense/scripts/firmware/register.php made changes @ 2025-02-07T21:29:55.263100 ((system)) 2025-02-07 21:29:55 +01:00
(system)
84368a565f /usr/local/opnsense/scripts/firmware/register.php made changes @ 2025-02-07T21:29:20.307400 ((system)) 2025-02-07 21:29:20 +01:00
System Administrator
24d802f095 /api/unbound/settings/set machte Änderungen @ 2025-02-07T21:28:47.189300 (root@192.168.50.82) 2025-02-07 21:28:47 +01:00
System Administrator
1c89cb35cb /api/adguardhome/general/set machte Änderungen @ 2025-02-07T21:28:36.657000 (root@192.168.50.82) 2025-02-07 21:28:37 +01:00
System Administrator
d16d55bb28 /api/unbound/settings/set machte Änderungen @ 2025-02-07T21:27:03.304700 (root@192.168.50.82) 2025-02-07 21:27:03 +01:00
System Administrator
efc466d01f /api/adguardhome/general/set machte Änderungen @ 2025-02-07T21:26:49.232900 (root@192.168.50.82) 2025-02-07 21:26:49 +01:00
System Administrator
320d85db63 /api/adguardhome/general/set machte Änderungen @ 2025-02-07T21:21:28.731800 (root@192.168.50.82) 2025-02-07 21:21:29 +01:00
System Administrator
c870486fac /api/unbound/settings/set machte Änderungen @ 2025-02-07T21:21:01.791900 (root@192.168.50.82) 2025-02-07 21:21:02 +01:00
System Administrator
8a712aff15 /api/adguardhome/general/set machte Änderungen @ 2025-02-07T21:20:50.800900 (root@192.168.50.82) 2025-02-07 21:20:51 +01:00
System Administrator
8085cbaa96 /api/unbound/settings/set machte Änderungen @ 2025-02-07T21:16:17.764500 (root@192.168.50.82) 2025-02-07 21:16:18 +01:00
System Administrator
227f8b499e /api/adguardhome/general/set machte Änderungen @ 2025-02-07T21:11:13.293900 (root@192.168.50.82) 2025-02-07 21:11:13 +01:00
(system)
3ab47e01a4 /usr/local/opnsense/scripts/firmware/register.php made changes @ 2025-02-07T21:09:31.539600 ((system)) 2025-02-07 21:09:32 +01:00
(system)
569357b3c6 /usr/local/opnsense/mvc/script/run_migrations.php made changes @ 2025-02-07T21:09:31.157700 ((system)) 2025-02-07 21:09:32 +01:00
System Administrator
65846c976e /system_advanced_admin.php made changes @ 2025-02-07T12:44:43.715000 (root@192.168.10.103) 2025-02-07 12:44:44 +01:00
(root)
6da11d7591 Updated plugin interface configuration @ 2025-02-07T12:31:55.572600 ((root)) 2025-02-07 12:44:44 +01:00
(system)
abcf528284 /usr/local/opnsense/mvc/script/run_migrations.php made changes @ 2025-02-07T12:31:55.441500 ((system)) 2025-02-07 12:44:44 +01:00
System Administrator
bbcbb48cbf /system_advanced_admin.php made changes @ 2025-02-07T12:15:23.556800 (root@192.168.10.103) 2025-02-07 12:15:24 +01:00
System Administrator
b8a9f89356 /system_advanced_admin.php made changes @ 2025-02-07T12:10:04.253400 (root@192.168.10.103) 2025-02-07 12:10:04 +01:00

View File

@ -1,203 +1,203 @@
<?xml version="1.0"?>
<opnsense>
<theme>opnsense</theme>
<sysctl>
<item>
<descr>Increase UFS read-ahead speeds to match the state of hard drives and NCQ.</descr>
<sysctl version="1.0.0">
<item uuid="3e6aaa97-52d5-4c00-abaf-9c571b1c128a">
<tunable>vfs.read_max</tunable>
<value>default</value>
<descr>Increase UFS read-ahead speeds to match the state of hard drives and NCQ.</descr>
</item>
<item>
<descr>Set the ephemeral port range to be lower.</descr>
<item uuid="ae8d1d50-dc6d-49ce-9772-219a08816731">
<tunable>net.inet.ip.portrange.first</tunable>
<value>default</value>
<descr>Set the ephemeral port range to be lower.</descr>
</item>
<item>
<descr>Drop packets to closed TCP ports without returning a RST</descr>
<item uuid="e0cb18b9-4029-41d0-a327-2e12ea7e02d8">
<tunable>net.inet.tcp.blackhole</tunable>
<value>default</value>
<descr>Drop packets to closed TCP ports without returning a RST</descr>
</item>
<item>
<descr>Do not send ICMP port unreachable messages for closed UDP ports</descr>
<item uuid="56718c77-8222-46c7-97aa-216cfe68a73b">
<tunable>net.inet.udp.blackhole</tunable>
<value>default</value>
<descr>Do not send ICMP port unreachable messages for closed UDP ports</descr>
</item>
<item>
<descr>Randomize the ID field in IP packets</descr>
<item uuid="1de7ad00-090f-4ce2-81ff-0650b0857a5d">
<tunable>net.inet.ip.random_id</tunable>
<value>default</value>
<descr>Randomize the ID field in IP packets</descr>
</item>
<item>
<descr>
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
</descr>
<item uuid="79ce9844-d41c-4dff-adb5-f8ae3a0bcbdc">
<tunable>net.inet.ip.sourceroute</tunable>
<value>default</value>
</item>
<item>
<descr>
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
</descr>
</item>
<item uuid="7c341be1-a50b-4fb3-9321-cbfee546c372">
<tunable>net.inet.ip.accept_sourceroute</tunable>
<value>default</value>
<descr>
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
</descr>
</item>
<item>
<item uuid="7bfbc692-e8b4-46fa-96f5-eb21883e7297">
<tunable>net.inet.icmp.log_redirect</tunable>
<value>default</value>
<descr>
This option turns off the logging of redirect packets because there is no limit and this could fill
up your logs consuming your whole hard drive.
</descr>
<tunable>net.inet.icmp.log_redirect</tunable>
<value>default</value>
</item>
<item>
<descr>Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)</descr>
<item uuid="14a58970-1cfc-43f3-a7f8-c2ce13fdb617">
<tunable>net.inet.tcp.drop_synfin</tunable>
<value>default</value>
<descr>Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)</descr>
</item>
<item>
<descr>Enable sending IPv6 redirects</descr>
<item uuid="189b1f7b-6097-4e25-9976-c8d3a65ff489">
<tunable>net.inet6.ip6.redirect</tunable>
<value>default</value>
<descr>Enable sending IPv6 redirects</descr>
</item>
<item>
<descr>Enable privacy settings for IPv6 (RFC 4941)</descr>
<item uuid="c3a10277-b4ec-4b75-9550-a0378c4d2bb4">
<tunable>net.inet6.ip6.use_tempaddr</tunable>
<value>default</value>
<descr>Enable privacy settings for IPv6 (RFC 4941)</descr>
</item>
<item>
<descr>Prefer privacy addresses and use them over the normal addresses</descr>
<item uuid="799d08de-e567-413b-abb0-42cecf7fa784">
<tunable>net.inet6.ip6.prefer_tempaddr</tunable>
<value>default</value>
<descr>Prefer privacy addresses and use them over the normal addresses</descr>
</item>
<item>
<descr>Generate SYN cookies for outbound SYN-ACK packets</descr>
<item uuid="34c2769b-287a-4ca0-9ffd-4f33718a45b7">
<tunable>net.inet.tcp.syncookies</tunable>
<value>default</value>
<descr>Generate SYN cookies for outbound SYN-ACK packets</descr>
</item>
<item>
<descr>Maximum incoming/outgoing TCP datagram size (receive)</descr>
<item uuid="b11f856f-ef08-4a2a-a00e-9ade0b8f6046">
<tunable>net.inet.tcp.recvspace</tunable>
<value>default</value>
<descr>Maximum incoming/outgoing TCP datagram size (receive)</descr>
</item>
<item>
<descr>Maximum incoming/outgoing TCP datagram size (send)</descr>
<item uuid="63523e71-e760-4bff-93d1-342e255eb199">
<tunable>net.inet.tcp.sendspace</tunable>
<value>default</value>
<descr>Maximum incoming/outgoing TCP datagram size (send)</descr>
</item>
<item>
<descr>Do not delay ACK to try and piggyback it onto a data packet</descr>
<item uuid="8346d8e1-f503-4051-8a6a-434690856edc">
<tunable>net.inet.tcp.delayed_ack</tunable>
<value>default</value>
<descr>Do not delay ACK to try and piggyback it onto a data packet</descr>
</item>
<item>
<descr>Maximum outgoing UDP datagram size</descr>
<item uuid="66722d67-259b-40e2-93cb-61ced4cf79cb">
<tunable>net.inet.udp.maxdgram</tunable>
<value>default</value>
<descr>Maximum outgoing UDP datagram size</descr>
</item>
<item>
<descr>Handling of non-IP packets which are not passed to pfil (see if_bridge(4))</descr>
<item uuid="7ae77c54-1693-45dd-82ac-9a5d9bf6e515">
<tunable>net.link.bridge.pfil_onlyip</tunable>
<value>default</value>
<descr>Handling of non-IP packets which are not passed to pfil (see if_bridge(4))</descr>
</item>
<item>
<descr>Set to 1 to additionally filter on the physical interface for locally destined packets</descr>
<item uuid="91a783d4-817b-4ace-9700-65356a82072b">
<tunable>net.link.bridge.pfil_local_phys</tunable>
<value>default</value>
<descr>Set to 1 to additionally filter on the physical interface for locally destined packets</descr>
</item>
<item>
<descr>Set to 0 to disable filtering on the incoming and outgoing member interfaces.</descr>
<item uuid="1fc3262a-960b-4f49-b201-edd77a1e2b31">
<tunable>net.link.bridge.pfil_member</tunable>
<value>default</value>
<descr>Set to 0 to disable filtering on the incoming and outgoing member interfaces.</descr>
</item>
<item>
<descr>Set to 1 to enable filtering on the bridge interface</descr>
<item uuid="174014af-fc1f-4688-8bcb-13225678595e">
<tunable>net.link.bridge.pfil_bridge</tunable>
<value>default</value>
<descr>Set to 1 to enable filtering on the bridge interface</descr>
</item>
<item>
<descr>Allow unprivileged access to tap(4) device nodes</descr>
<item uuid="154c3822-97de-424c-beb0-fd4245d9a6c2">
<tunable>net.link.tap.user_open</tunable>
<value>default</value>
<descr>Allow unprivileged access to tap(4) device nodes</descr>
</item>
<item>
<descr>Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())</descr>
<item uuid="e5bddcc7-0035-4a1d-b460-d2eba1a95452">
<tunable>kern.randompid</tunable>
<value>default</value>
<descr>Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())</descr>
</item>
<item>
<descr>Disable CTRL+ALT+Delete reboot from keyboard.</descr>
<item uuid="5661389c-894a-4fd4-a679-fbbbc0de2b31">
<tunable>hw.syscons.kbd_reboot</tunable>
<value>default</value>
<descr>Disable CTRL+ALT+Delete reboot from keyboard.</descr>
</item>
<item>
<descr>Enable TCP extended debugging</descr>
<item uuid="b30dfecf-6bcb-42ff-8083-f57ee708007f">
<tunable>net.inet.tcp.log_debug</tunable>
<value>default</value>
<descr>Enable TCP extended debugging</descr>
</item>
<item>
<descr>Set ICMP Limits</descr>
<item uuid="f9354f0f-0a41-4b18-b555-e8a21340f18f">
<tunable>net.inet.icmp.icmplim</tunable>
<value>default</value>
<descr>Set ICMP Limits</descr>
</item>
<item>
<descr>TCP Offload Engine</descr>
<item uuid="abd3bf28-643c-4461-a79f-da011acd5b0f">
<tunable>net.inet.tcp.tso</tunable>
<value>default</value>
<descr>TCP Offload Engine</descr>
</item>
<item>
<descr>UDP Checksums</descr>
<item uuid="e76f5d08-35ee-4419-89f1-7ff2c05f59c5">
<tunable>net.inet.udp.checksum</tunable>
<value>default</value>
<descr>UDP Checksums</descr>
</item>
<item>
<descr>Maximum socket buffer size</descr>
<item uuid="2db68529-e007-464f-91bf-c83630e777d4">
<tunable>kern.ipc.maxsockbuf</tunable>
<value>default</value>
<descr>Maximum socket buffer size</descr>
</item>
<item>
<descr>Page Table Isolation (Meltdown mitigation, requires reboot.)</descr>
<item uuid="ea141674-53d8-4ec1-a579-6a787047e744">
<tunable>vm.pmap.pti</tunable>
<value>default</value>
<descr>Page Table Isolation (Meltdown mitigation, requires reboot.)</descr>
</item>
<item>
<descr>Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation)</descr>
<item uuid="e8fcbef7-703d-4b40-9caf-f4fb9297e4fe">
<tunable>hw.ibrs_disable</tunable>
<value>default</value>
<descr>Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation)</descr>
</item>
<item>
<descr>Hide processes running as other groups</descr>
<item uuid="8d9f827c-1873-4b1d-b243-4d68b70377ca">
<tunable>security.bsd.see_other_gids</tunable>
<value>default</value>
<descr>Hide processes running as other groups</descr>
</item>
<item>
<descr>Hide processes running as other users</descr>
<item uuid="231d927d-5270-4752-bb23-bfe9d7f9f978">
<tunable>security.bsd.see_other_uids</tunable>
<value>default</value>
<descr>Hide processes running as other users</descr>
</item>
<item>
<item uuid="128fb208-8e18-4c7d-8647-dbb14e6874ee">
<tunable>net.inet.ip.redirect</tunable>
<value>default</value>
<descr>Enable/disable sending of ICMP redirects in response to IP packets for which a better,
and for the sender directly reachable, route and next hop is known.
</descr>
<tunable>net.inet.ip.redirect</tunable>
<value>default</value>
</item>
<item>
<item uuid="1d872b5b-26ba-48d4-ba7b-13ab223555cf">
<tunable>net.inet.icmp.drop_redirect</tunable>
<value>1</value>
<descr>
Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
packets without returning a response.
</descr>
<tunable>net.inet.icmp.drop_redirect</tunable>
<value>1</value>
</item>
<item>
<descr>Maximum outgoing UDP datagram size</descr>
<item uuid="8e0b3bbf-56b2-4a1b-9326-cbd8fa5804ad">
<tunable>net.local.dgram.maxdgram</tunable>
<value>default</value>
<descr>Maximum outgoing UDP datagram size</descr>
</item>
</sysctl>
<system>
@ -205,21 +205,32 @@
<hostname>OPNsense</hostname>
<domain>localdomain</domain>
<dnsallowoverride>1</dnsallowoverride>
<group>
<name>admins</name>
<description>System Administrators</description>
<scope>system</scope>
<group uuid="6638cd79-dba3-41ef-adaf-f71ad552c7ce">
<gid>1999</gid>
<member>0</member>
<priv>page-all</priv>
</group>
<user>
<name>root</name>
<descr>System Administrator</descr>
<name>admins</name>
<scope>system</scope>
<groupname>admins</groupname>
<password>$2y$11$F5yOtLTn8aI21fKZTdsnueJjedH0PXTTPpD89Ha6ps3VfC/Ixgojq</password>
<description>System Administrators</description>
<priv>page-all</priv>
<member>0</member>
</group>
<user uuid="fa6a80c6-0ff6-4b00-9b75-1b2ee49f962f">
<uid>0</uid>
<name>root</name>
<disabled>0</disabled>
<scope>system</scope>
<expires/>
<authorizedkeys/>
<otp_seed/>
<shell/>
<password>$2y$11$F5yOtLTn8aI21fKZTdsnueJjedH0PXTTPpD89Ha6ps3VfC/Ixgojq</password>
<landing_page/>
<comment/>
<email/>
<apikeys/>
<priv/>
<language/>
<descr>System Administrator</descr>
<dashboard/>
</user>
<nextuid>2000</nextuid>
<nextgid>2000</nextgid>
@ -265,7 +276,7 @@
<firmware version="1.0.1">
<mirror/>
<flavour/>
<plugins>os-git-backup</plugins>
<plugins>os-adguardhome-maxit,os-git-backup</plugins>
<type/>
<subscription/>
<reboot/>
@ -1008,7 +1019,7 @@
<revision>
<username>root@192.168.50.82</username>
<description>/diag_backup.php machte &#xC4;nderungen</description>
<time>1738876674.8981</time>
<time>1738963685.0763</time>
</revision>
<OPNsense>
<wireguard>
@ -1296,7 +1307,7 @@
<http_port>8000</http_port>
</general>
</ctrl_agent>
<dhcp4 version="1.0.2">
<dhcp4 version="1.0.3">
<general>
<enabled>0</enabled>
<interfaces/>
@ -1592,20 +1603,20 @@
<port>53</port>
<stats/>
<active_interface/>
<dnssec/>
<dns64/>
<dnssec>0</dnssec>
<dns64>0</dns64>
<dns64prefix/>
<noarecords/>
<regdhcp/>
<noarecords>0</noarecords>
<regdhcp>0</regdhcp>
<regdhcpdomain/>
<regdhcpstatic/>
<noreglladdr6/>
<noregrecords/>
<txtsupport/>
<cacheflush/>
<regdhcpstatic>0</regdhcpstatic>
<noreglladdr6>0</noreglladdr6>
<noregrecords>0</noregrecords>
<txtsupport>0</txtsupport>
<cacheflush>0</cacheflush>
<local_zone_type>transparent</local_zone_type>
<outgoing_interface/>
<enable_wpad/>
<enable_wpad>0</enable_wpad>
</general>
<advanced>
<hideidentity/>
@ -1694,6 +1705,12 @@
<MinProtocol_DTLS/>
</general>
</trust>
<adguardhome>
<general version="0.0.1">
<enabled>0</enabled>
<primarydns>0</primarydns>
</general>
</adguardhome>
</OPNsense>
<openvpn/>
<ifgroups version="1.0.0"/>
@ -1798,13 +1815,14 @@
<descr>Load</descr>
</gateway_group>
</gateways>
<hasync version="1.0.1">
<hasync version="1.0.2">
<disablepreempt>0</disablepreempt>
<disconnectppps>0</disconnectppps>
<pfsyncinterface/>
<pfsyncpeerip/>
<pfsyncversion>1400</pfsyncversion>
<synchronizetoip/>
<verifypeer>0</verifypeer>
<username/>
<password/>
<syncitems/>