Secure Your OPNsense Network with Zenarmor NGFW!

Поділитися
Вставка
  • Опубліковано 7 лют 2025

КОМЕНТАРІ • 95

  • @UnderEu
    @UnderEu Рік тому +16

    Can't wait for the IPv6-mostly OPNsense video - This is my primary goal for my new home network

    • @l0gic23
      @l0gic23 Рік тому +1

      Why may I ask? Serious question... I don't know what I don't know... I have not run out of IPs on my primary subnet... thx

    • @UnderEu
      @UnderEu Рік тому +3

      @@l0gic23 1. Because I’m an early enthusiast of the current protocol;
      2. I want my network to be simple yet powerful, versatile and in line with what the Internet intended to be (no NATs, no design limitations - other than the project size itself - nor any shenanigans imposed to fix problems that existed on the Jurassic stack); and
      3. To test my gear against the actual Internet standard and improve/fix it by providing feedback to the manufacturers or replacing them altogether with stuff manufacturers ACTUALLY care about.

    • @l0gic23
      @l0gic23 Рік тому +2

      @@UnderEu I better rewatch this channels video on why IP6 in the home/lab. Thanks!

  • @TheUkeloser
    @TheUkeloser Рік тому +14

    I work on one particular brand of NGFW in my day job and while the TLS inspection stuff is impressive in what it can do, you're right that it does cause a lot of problems in practice.

    • @apalrdsadventures
      @apalrdsadventures  Рік тому +4

      A lot of modern apps either distribute a trust list on their own (especially if they are containerized / some library is trying to be OS-agnostic), and as a developer it makes a ton of sense to be cert pinning to the CA that issues your certs, but it means it's a nightmare for users behind TLS inspectors.

    • @TheUkeloser
      @TheUkeloser Рік тому +2

      exactly. Admins can install a trusted CA cert to the workstations and re-sign all their inspected traffic with a subordinate CA signed by the same root, so browsers "mostly" work (Aside from HSTS sites) but standalone apps that just happen to use TCP 443 and TLS are harder.

    • @apalrdsadventures
      @apalrdsadventures  Рік тому +7

      The authors of TLS and related specs are very concerned with MITM / privacy attacks and don't care to reduce the level of security they provide to make TLS inspection easier.
      Sites *should* be deploying HSTS, apps using TLS *should* be validating their certs, asking them to do less so you can MITM their traffic isn't something they are interested in 'fixing'. The end result is the end users perpetually think IT has 'broken' something because the program tells them they are being attacked.

    • @nezu_cc
      @nezu_cc Рік тому +2

      Nothing against you in particular, but I absolutely hate people who are trying to MITM TLS traffic. Thank god encrypted SNI is already on the horizon so you people can stop trying to filter the last clear text thing you have left.

    • @apalrdsadventures
      @apalrdsadventures  Рік тому +1

      eSNI (and it's successor ECH) has some issues with key distribution. It's a great concept but SNI is unencrypted for a reason.
      Unencrypted SNI (and ALPN) is a thing is so the server can identify which certificate it should use (to properly deal with multi-tenant servers / CDNs / virtual hosts / ...). ECH needs to encrypt the ClientHello using the edge server's key, not the origin's key, so the client needs to know which CDN / server it's accessing and get the key for that server. CF's eSNI would publish their key (their one key, for all of CF) via DNS TXT records, which doesn't work if you aren't using a single CDN for all of your traffic, so it was rejected as a standard.
      The current ECH version relies on DNS HTTPS records which are basically similar to an SRV. A single domain can have multiple HTTPS records, each of which points to an edge server, proto (http 1.1/2/3), and the edge server's key. But they still aren't widely deployed and supported.

  • @martyb3783
    @martyb3783 26 днів тому

    This is a great video! Thanks for making it. I just paid for Zenarmor and will try it for a year and see where it goes.

  • @mithubopensourcelab482
    @mithubopensourcelab482 Рік тому +22

    Everyone should hate TLS inspection. No point in breaking sites / application. You were right in identifying this. This applies even in work places as well.

  • @Glasairmell
    @Glasairmell 11 місяців тому

    Thank you so much. I am a small Homelab and will not be using this like you even though it looks fantastic for larger institutions. Great professional presentation on this video.

  • @bbekkaa365
    @bbekkaa365 Рік тому +12

    Unfortunately, the free version is very limited in functionality

  • @vaughnbay
    @vaughnbay 11 місяців тому

    Great Vid! Your graphics (while explaining) are helpful as well. Good job!

  • @Iomiami
    @Iomiami 8 місяців тому +1

    Great video, very detailed and super specific, thanks a lot mister.

  • @zyghom
    @zyghom Рік тому +7

    I tried and did no feel any need for it at home, and pricing is not ok either

  • @mithubopensourcelab482
    @mithubopensourcelab482 Рік тому

    Excellent Video sir..... 10 out of 10

  • @davidreddick3016
    @davidreddick3016 Рік тому +3

    Has someone tried the blocking of DNS over HTTPS wirh this? This seems to be a big unsolved issue in the industry with more and more browsers and devices using it to hide from traditional DNS. Unlike DNS over TLS is also uses the same port 433 so you can't even block it at a port level.

  • @Wingnut353
    @Wingnut353 9 місяців тому +15

    Zenarmor is just way too expensive. I mean why would I spend $500+ on subscription services for a $500 Firewall... if this were like a $100 a year subscription we might spring for it.

    • @renehoehle
      @renehoehle 6 місяців тому

      Absolutely. I use Sophos XGS on some customers and that is expensive and i use an alternative. But that product is twice that price. So when you really what that features then i can use Sophos XGS. Otherwise i have to use OPNSense without that features.

    • @Milhouz
      @Milhouz 4 місяці тому

      Zenarmor is $100 a year for the home version.

    • @renehoehle
      @renehoehle 4 місяці тому

      @@Milhouz yes ok but this doesn't sound like that he can use the home version.

    • @jameshendry3571
      @jameshendry3571 4 місяці тому

      I’ve been on the free version for a while and just moved to the paid version. Even in Australian pesos $100USD is reasonable for the featureset. For a business firewall I think their subs are very reasonable

    • @renehoehle
      @renehoehle 4 місяці тому

      @@jameshendry3571 The problem is that depends on devices behind the firewall and for a mid business it's easy to come over 100 devices and then it starts to get expensive.

  • @Headh0t549
    @Headh0t549 10 місяців тому +2

    Could you make a video on how to do a basic OPNSense setup with a UDR?
    I basically only want to use the UDR as a wifi and protect controller

    • @bro_nobro
      @bro_nobro 10 місяців тому

      I would also like to see a video on how to do this most efficiently!

  • @renehoehle
    @renehoehle 6 місяців тому +1

    The problem is i've looked for that yesterday. I think it's nice but in the end much more expensive then the High-End Firewall solutions. So in my Mid-Business Setup i have 120 Devices. So i can't get the Small license i have to pay 1,5 times for the licese (2 Firewalls). So i have 337$ per Month thats too much. So in the end it's much more expensive then the Sophos XGS what i'm using at some customers. So for 3 years it's 12150$. So the problem is i don't need most of the features but i have to use them because i have over 100 devices and then you have to use the Business.

  • @chrisslaunwhite9097
    @chrisslaunwhite9097 Рік тому +1

    Okay, fine.... Ill subscribe. i like this content

  • @El_Bartto
    @El_Bartto 11 місяців тому

    Thank you very much! any tips on how to minimize the RAM used by zenarmor?

  • @mithubopensourcelab482
    @mithubopensourcelab482 Рік тому +3

    With Zenarmor OPNsense becomes NGFW [ as per Sunny Valley ] How it is comparable with other NGFW like Sophos / Fortigate ?

    • @legendaryz_ch
      @legendaryz_ch 9 місяців тому

      More control, less user friendly. Thats opnsense. On sophos youve got your beautiful insights and easy configuration whereas opnsense requires more expertise but has similar - if not better results and is free

    • @orno6621
      @orno6621 9 місяців тому

      The support and hardware, and every vendor has its own Theat İntelligence platform. Plus enterprises are moving to ZTNA

    • @renehoehle
      @renehoehle 6 місяців тому

      With Sophos you don't need that because that features are included in most high end firewalls like Sophos XGS. And for Business it's really expensive so twice as the price of Sophos XGS.

  • @royalcanadianbearforce9841
    @royalcanadianbearforce9841 Рік тому +1

    Is it possible to restrict ZenArmor to a specific VLAN? I ask because while I would be happy to use this for work devices, I cant help but agree that the TLS inspection could cause alot more work than I'm ultimately willing to put into it if I had to deploy this across my entire home network. Thanks for the great content!

    • @apalrdsadventures
      @apalrdsadventures  Рік тому +5

      Zenarmor doesn't intercept TLS, it only looks at the unencrypted headers.
      But you choose as a global setting which interfaces to operate on, and beyond that you can choose which interfaces apply to a policy.

    • @royalcanadianbearforce9841
      @royalcanadianbearforce9841 Рік тому +1

      Thank you very much for the quick reply! Looking forward to deploying this next week!

  • @saifemran4528
    @saifemran4528 10 місяців тому

    Great video! What physical host do you use for opnsense?

  • @JasonsLabVideos
    @JasonsLabVideos Рік тому

    Good video sir ! Keep them coming !!

  • @irreel1
    @irreel1 7 місяців тому

    Thank you for your video's, it is very interesting. However I am very disappointed in this one because as other's mentioned the free version is very limited. You suggest you can do almost the same as in your video without subscription but that is not the case. I will rollback OPNsense before Zenarmor. For the rest keep up the good work!

  • @thestreamreader
    @thestreamreader Рік тому +1

    Is there a point in running this and crowdsec at the same time?

    • @apalrdsadventures
      @apalrdsadventures  Рік тому +3

      They both really different things and are used to protect different things. This is primarily focused on the destination of traffic (going out to the internet, from a client), Crowdsec is focused on incoming traffic to a server and sharing blocklists of simple attackers similar to fail2ban on a larger scale.

  • @AVB-v1z
    @AVB-v1z 6 місяців тому

    What kind of robotics coach? First or Vex? I am the robotics coach for our high school first robotics team!

    • @apalrdsadventures
      @apalrdsadventures  6 місяців тому

      I've done both over the years (and was a student on both over a decade ago), but now I just mentor VEX and VEX IQ.

  • @muhammadhassansiddiqui9129
    @muhammadhassansiddiqui9129 6 місяців тому

    Hi,
    After configuring Zenarmor, my bandwidth has significantly decreased. Previously, Speedtest showed over 250 Mbps, but now it's dropping to as low as 3 Mbps. What could be causing this issue?

    • @apalrdsadventures
      @apalrdsadventures  6 місяців тому

      Uh what CPU are you running on? It sounds like it's not able to run that sort of packet inspection at full speed.

    • @muhammadhassansiddiqui9129
      @muhammadhassansiddiqui9129 6 місяців тому

      Thanks for your prompt response. it's working fine now. Can we do a TLS inspection in the free version?

  • @TheFuzzyAmerican
    @TheFuzzyAmerican Рік тому

    I like the video but did not get a tab for devices, I don't know what I missed here

    • @Maxio_
      @Maxio_ Рік тому

      Yeah me too

    • @keviin1314
      @keviin1314 11 місяців тому

      u need the home version for it (can use the free 15 day trial)

  • @geobopeter
    @geobopeter 9 місяців тому

    Are you telling me that OPNsense's IDP/IPS is "just" check marks if ZenArmor is not installed? - and I will be better of keeping my well administrated VyOS with a PiHole runing?

    • @apalrdsadventures
      @apalrdsadventures  9 місяців тому

      OPNsense's 'native' IDS/IPS solution uses Suricata.
      Zenarmor gives you curated feeds for a fee vs administering all of the feeds and rulesets manually for Suricata. Both options can be used (potentially at the same time, on different interfaces) in OPNsense.

  • @coreyman00
    @coreyman00 10 місяців тому +4

    can you use Devices on free version? i dont see that tab

  • @FourCorners-im3jg
    @FourCorners-im3jg 8 місяців тому

    Okay, unrelated question. What browser are you using in the video? It doesn't look familiar and I couldn't find anything like it.

  • @BGraves
    @BGraves Рік тому

    So it relies on TLS headers to categorize encrypted traffic? How else?
    Btw i think w11 has random MaC address as a built in security feature that you can enable

    • @apalrdsadventures
      @apalrdsadventures  Рік тому +2

      Apple-everything is both randomizing the MAC per-network and also no longer sending the hostname via DHCP, so tracking Apple devices is a challenge. They still respond to mdns if queried, but don't immediately advertise it. Zenarmor has caused me to raise eyebrows at some traffic and then spend 10+ minutes identifying the unknown client, only for it to be a sus mobile game on a modern iphone which is doing a good job at hiding its identity.
      But also, some things can be detected by their known protocol headers (i.e. VPNs), TLS has to send at least SNI and ALPN unencrypted (since the server needs to know the SNI to present the right cert), and more traditional IP-based ranges can also be used as well.

    • @l0gic23
      @l0gic23 Рік тому

      ​@@apalrdsadventures did you take any next steps related to the sus games?

  • @abdullahX001
    @abdullahX001 Рік тому +3

    Pretty cool.. but I don't want to spend $10 on this for home use haha, maybe small business.

  • @GrishTech
    @GrishTech Рік тому

    What are your thoughts on opnsense being behind on security updates? I know they have a beta with the new openssl, but still, historically looking, it's not the best in response.

    • @apalrdsadventures
      @apalrdsadventures  Рік тому +4

      It depends on the context. In general they are pushing security updates regularly, but large changes to the codebase take time, and OpenSSL continued 1.x security updates through the end of 2023 which OPNsense was including in their releases. AFAIK 24.1 will include OpenSSL 3.x.

  • @eschofield1
    @eschofield1 Рік тому +1

    Me again. How about a video / videos on CLAT addresses, 464XLAT & DHCP Option 108?

    • @apalrdsadventures
      @apalrdsadventures  Рік тому +3

      Doing the NAT64 / Option 108 on OPNsense (mostly v6-only + macos), Linux CLAT comes later.

    • @eschofield1
      @eschofield1 Рік тому +1

      @@apalrdsadventures Looking forward to it. 👍

  • @nickpetrovsky
    @nickpetrovsky Рік тому

    Your t-shirt with cyrillic dog breed name Лайка :), also in russian slang it can be feminine of internet “like”. Thank you for interesting video!

    • @apalrdsadventures
      @apalrdsadventures  Рік тому +4

      Neat! Лайка was the name of the first dog in space, hence the shirt.

  • @NetBandit70
    @NetBandit70 Рік тому +1

    Suricata? Seeing as it's sort of built into OPNsense.

    • @apalrdsadventures
      @apalrdsadventures  Рік тому +3

      Suricata is a very manual solution to manage and curate block lists, and is very prone to false positives (and presumable also missing a lot of things, but you'll never know) if you don't put the work in to manage these block lists.
      That's largely what you get with a Zenarmor subscription, better feeds that they have curated and keep up to date.

    • @travisaugustine7264
      @travisaugustine7264 9 місяців тому

      @@apalrdsadventures not to mention suricata is VERY CPU intensive which can result in massive slowdowns.

  • @daniyalhassan7706
    @daniyalhassan7706 Рік тому

    Great

  • @j_t_eklund
    @j_t_eklund Рік тому

    I still prefer NetBSD with it's npf.
    Way more control to the user/admin.

  • @JonathanSwiftUK
    @JonathanSwiftUK 4 місяці тому

    It doesn't really make sense to not have Windows AD somewhere in your network, for testing purposes alone. You can run an eval copy of Windows server for 180 days, and if you are clever can extend that once for another 180 days. Most corporations are based on Windows, and some have some Linux. Users have a Windows desktop with a Windows logon, and one fun thing is to configure Linux to do AD/LDAP authentication, so a user can log into Linux with their Windows username. Not having Windows limits your content and teaching.

  • @udirt
    @udirt 4 місяці тому

    It's sincerely the only option if you don't want to spend all your time dissing people on forums if they ask for any firewall feature that was created after like 2004.

  • @it-linux-computers-geeky6651
    @it-linux-computers-geeky6651 8 місяців тому +2

    If your looking for a free version don't waste your time with this as everything is locked behind premium subscription so it's practically useless unless you subscribe

  • @NetrunnerAT
    @NetrunnerAT 7 місяців тому +1

    To expansiv

  • @nezu_cc
    @nezu_cc Рік тому +3

    All of this is fun, but I just whip out shadowsocks and laugh at your firewall all day long.

    • @DanL57
      @DanL57 9 місяців тому

      Don't whip it out in public or you will go to jail.

  • @linearburn8838
    @linearburn8838 8 місяців тому

    @30:35 who else was expecting pornhub to be a top traffic driver