doktornotor
doktornotor
Snort v3 rules definitely do NOT work. What's exactly the issue here? You want the default bumped to 29200, or? I mean, it's user configurable after all.
Hmmm? ``` # pkg install btop Updating OPNsense repository catalogue... OPNsense repository is up to date. Updating mimugmail repository catalogue... mimugmail repository is up to date. All repositories are up...
> @schreibubi The part I don't understand in this is, if Android contacts the dns server provided, why should it trust the certificate it received? On Android, it works just...
HTTPS == encrypted browser traffic. DoT == encrypted DNS traffic. There's nothing else those certificates have **ever** ensured, DoT is no less secure than the unencrypted DNS over 53, if...
Well, all I can say is that this patch works perfectly fine with DoT-capable clients - as long as the certificate can be validated by the client's OS resolver. That...
Well, all I can say is that this patch works perfectly fine with DoT-capable clients - as long as the certificate can be validated by the client's OS resolver. That...
See https://github.com/opnsense/plugins/issues/3609
Found [another forum thread](https://forum.opnsense.org/index.php?topic=35081.0) requesting this feature back. Here's an idea - how about shipping some (disabled by default) [Monit service test / service](https://docs.opnsense.org/manual/monit.html) which can be enabled by people...
> What would be the reason to remove the option for this!? Multiple issues with that implementation mentioned in https://github.com/opnsense/core/issues/5045 - such as breaking Unbound DNS (https://github.com/opnsense/core/issues/5367) and causing other...
You are filing this issue for a wrong repository. As you can read from the error message, this applies to any rules download, in your case the URL is `rules.emergingthreats.net`....