-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Unbound] OpenVPN-Interface not adding OpenVPN-Subnet to Internal Access List #1872
Comments
|
@alpha197 thank you, please ping me again when I'm being lazy 👍 |
|
@fichtner ping :) Just stumbled over the same problem. VPN network is 10.99.0.0/24, but Best regards |
|
This thing has a couple of flaws... what are your access-control entries in /var/unbound/unbound.conf? |
|
Just checked, my ACL entries in In my previous post, I falsely claimed an auto ACL for 10.0.0.0/24, but forgot that I have a VLAN interface on 10.0.0.1/24. Therefore, in my case the OpenVPN subnet was simply not covered by an automatism which should have added it to the ACL. Best regards |
|
I'm not sure if we can derive this for OpenVPN clients at all, what does @mimugmail think? |
|
The feature was reworked, we will need to find a better way for OpenVPN if requested, but making it fully manual like IPsec is better for now. See #2472 |
When adding an OpenVPN-Interface as "Listen Interface" for Unbound the (automatically generated) Internal Access List restricts to the interface adress with 32-metrics (e.g. 10.0.8.1/32). OpenVPN-Clients won´t get access to Unbound unless adding the OpenVPN subnet as a manual access list (eg. 10.0.8.1/24).
See screenshots from here:
https://forum.opnsense.org/index.php?topic=5764.0
The text was updated successfully, but these errors were encountered: