[pfSense] routing between subnets at same Interface - configuration not working on 2.4.1

2018-01-30 Thread Fabian Bosch

Hello,

I cannot switch from Version 2.3.3 to 2.4.1 because of the routing at 
the same interface.
I transfered the backup.xml from machine A (2.3.3) to machine B (2.4.1) 
and everything worked fine but the routing between Subnets assigned at 
LAN-Interface.
There are multiple subnets set up via VirtualIPs and there are static 
routes to each of the subnets via the native LAN-Gateway Adress e.g 
route 192.168.110.0/24 via GW_LAN(192.168.100.1) and assigned VirtualIP 
in this case 192.168.110.1
Since this configuration runs well on 2.3.3 I wanted to ask whether 
there are major changes in default handling of traffic at the same 
interface. In 2.3.3 you don't need firewall-rules to allow traffic 
between subnets at the same interface - did this change in 2.4.1?


Thanks!

Fabian
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


Re: [pfSense] routing between subnets at same Interface - configuration not working on 2.4.1

2018-01-30 Thread Jason Hellenthal
Have you tried 2.4.2 ?

-- 

The fact that there's a highway to Hell but only a stairway to Heaven says a 
lot about anticipated traffic volume.





> On Jan 30, 2018, at 02:57, Fabian Bosch  wrote:
> 
> Hello,
> 
> I cannot switch from Version 2.3.3 to 2.4.1 because of the routing at the 
> same interface.
> I transfered the backup.xml from machine A (2.3.3) to machine B (2.4.1) and 
> everything worked fine but the routing between Subnets assigned at 
> LAN-Interface.
> There are multiple subnets set up via VirtualIPs and there are static routes 
> to each of the subnets via the native LAN-Gateway Adress e.g route 
> 192.168.110.0/24 via GW_LAN(192.168.100.1) and assigned VirtualIP in this 
> case 192.168.110.1
> Since this configuration runs well on 2.3.3 I wanted to ask whether there are 
> major changes in default handling of traffic at the same interface. In 2.3.3 
> you don't need firewall-rules to allow traffic between subnets at the same 
> interface - did this change in 2.4.1?
> 
> Thanks!
> 
> Fabian
> ___
> pfSense mailing list
> https://lists.pfsense.org/mailman/listinfo/list
> Support the project with Gold! https://pfsense.org/gold

___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


[pfSense] Force CA certificate installation as tsueted root CA on WiFi clients

2018-01-30 Thread Roberto Carna
Dear, I have pfSEnse + Squid in transparent mode.

I have to filter web sites and content in HTTPS with Squidguard, so
I've created a CA self-signed certificate and a server certificate
(signed by the CA) in pfSense. After that I defined the CA certificate
in the Squid configuration tab from pfSense.

In order to let navigate the WiFi clients in a good way through the
Squid transparent proxy, filtering everything we want with Squidguard,
I have to force the installation of the CA certificate on them.

How can I automatically force the CA certificate installation as a
trusted Root CA on WiFi clients, taking into account they can be
Windows, Linux, Android, Iphone, etc. ???

Thanks in advance.

ROBERT
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


Re: [pfSense] Force CA certificate installation as tsueted root CA on WiFi clients

2018-01-30 Thread Edwin Pers
I'm assuming you're talking about devices you own/control. 
Windows is easy, just push it out using AD
Linux you'd have to script something to push it out to each device with ssh or 
similar
IOS & Android you might have luck with apple & google's enterprise management 
systems, but I'm not sure they support pushing out certs

If they're not devices you own/control then you can't do it, that's not how SSL 
works.

Ed


-Original Message-
From: List [mailto:list-boun...@lists.pfsense.org] On Behalf Of Roberto Carna
Sent: Tuesday, January 30, 2018 11:57 AM
To: pfSense Support and Discussion Mailing List 
Subject: [pfSense] Force CA certificate installation as tsueted root CA on WiFi 
clients

Dear, I have pfSEnse + Squid in transparent mode.

I have to filter web sites and content in HTTPS with Squidguard, so I've 
created a CA self-signed certificate and a server certificate (signed by the 
CA) in pfSense. After that I defined the CA certificate in the Squid 
configuration tab from pfSense.

In order to let navigate the WiFi clients in a good way through the Squid 
transparent proxy, filtering everything we want with Squidguard, I have to 
force the installation of the CA certificate on them.

How can I automatically force the CA certificate installation as a trusted Root 
CA on WiFi clients, taking into account they can be Windows, Linux, Android, 
Iphone, etc. ???

Thanks in advance.

ROBERT
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


Re: [pfSense] Force CA certificate installation as tsueted root CA on WiFi clients

2018-01-30 Thread Izaac
On Tue, Jan 30, 2018 at 01:56:34PM -0300, Roberto Carna wrote:
> How can I automatically force the CA certificate installation as a
> trusted Root CA on WiFi clients, taking into account they can be
> Windows, Linux, Android, Iphone, etc. ???

So, I'm going to re-word this in a way that may make it more obvious why
the answer is what it is"

Q: How can I automatically undermine the basis of the SSL PKI by forcing my
CA (which, by design, generates certificates for arbitrary sites and
thereby main-in-the-middles all communications) onto third parties that
happen to be traversing my network?  

A: You can not -- at least not legally or ethically.

-- 
. ___ ___  .   .  ___
.  \/  |\  |\ \
.  _\_ /__ |-\ |-\ \__
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


Re: [pfSense] Force CA certificate installation as tsueted root CA on WiFi clients

2018-01-30 Thread Izaac
On Tue, Jan 30, 2018 at 12:22:50PM -0500, Izaac wrote:
> main-in-the-middles

man-in-the-middle

-- 
. ___ ___  .   .  ___
.  \/  |\  |\ \
.  _\_ /__ |-\ |-\ \__
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


Re: [pfSense] Force CA certificate installation as tsueted root CA on WiFi clients

2018-01-30 Thread Chris Bagnall

On 30/1/18 5:22 pm, Izaac wrote:

Q: How can I automatically undermine the basis of the SSL PKI by forcing my
CA (which, by design, generates certificates for arbitrary sites and
thereby main-in-the-middles all communications) onto third parties that
happen to be traversing my network?
A: You can not -- at least not legally or ethically.


This is a good - and often overlooked - point. Ask yourself why you are 
trying to do this.


You are undermining the basis of secure communications, and opening up 
your users to considerable risks whenever they access online banking, or 
indeed any other service that expects a secure connection to transfer 
sensitive data.


Is it really worth it just to block a few undesirable websites?

Assuming you're in a corporate environment, might not a simple 
'IT/Internet Policy' addendum to employees' contracts cover this far 
more effectively?


Kind regards,

Chris
--
This email is made from 100% recycled electrons
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


Re: [pfSense] routing between subnets at same Interface - configuration not working on 2.4.1

2018-01-30 Thread PiBa

Hi Fabian,

Have you set?:
System/Advanced/Firewall & NAT: "Static route filtering, Bypass firewall 
rules for traffic on the same interface"


As for your 'static routes', i'm not sure what purpose they serve.. 
Routing between subnets known on a pfSense interface is 'automatic'.


Regards,
PiBa-NL

Op 30-1-2018 om 9:57 schreef Fabian Bosch:

Hello,

I cannot switch from Version 2.3.3 to 2.4.1 because of the routing at 
the same interface.
I transfered the backup.xml from machine A (2.3.3) to machine B 
(2.4.1) and everything worked fine but the routing between Subnets 
assigned at LAN-Interface.
There are multiple subnets set up via VirtualIPs and there are static 
routes to each of the subnets via the native LAN-Gateway Adress e.g 
route 192.168.110.0/24 via GW_LAN(192.168.100.1) and assigned 
VirtualIP in this case 192.168.110.1
Since this configuration runs well on 2.3.3 I wanted to ask whether 
there are major changes in default handling of traffic at the same 
interface. In 2.3.3 you don't need firewall-rules to allow traffic 
between subnets at the same interface - did this change in 2.4.1?


Thanks!

Fabian
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold



___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold