this post was submitted on 15 Nov 2023
3 points (100.0% liked)

Homelab

22 readers
1 users here now

Rules

founded 1 year ago
MODERATORS
 

So I've been using OPNsense for a few years. I have an extensive config inclduing vlans, plugins, policies, suricata, VPN, routes, gateways, HAProxy, etc.

Over the past few months, I've noticed certain bugs, weirdness, and slowness within OPNsense. I recently watched Tom Lawrence's video on the licensing changes and he touched on the openssl vulnerability that OPNsense has yet to remediate.

The Plus license cost (per year) which entitles you to some limited support options is also appealing. Every time I get stuck figuring out something complex in OPNsense, I have to hope someone else has tried to do the same thing and posted about it so I can troubleshoot.

I also don't like having to constantly update. A more "stable"/enterprise focused cycle like pfSense has seems like my pace. It broke on me last year with one of the upgrades and I had to clean install.

Don't get me wrong, I love the UI (mostly), plugins, etc. in OPNsense, but these past few months have got me thinking.

I've also heard that people don't like Netgate as a company, so that could definitely factor into not switching.

What are everyone's thoughts?

top 35 comments
sorted by: hot top controversial new old
[–] ajpri@alien.top 1 points 11 months ago (1 children)

Ive been using pfSense CE for 4 years now. I’ve thought about it a couple times, but I have a few reasons I’m staying on pfSense:

  1. No config migration tool. Yea, I could spend an afternoon redoing my config. But it’s not really worth it imo.
  2. It’s been rock solid for the last few years.
  3. BSD has finally been updated! Allowing drivers and whatnot.
  4. I believe Netgate to be a good contributor for BSD. They’ve added many drivers. Such as the i225/226. Yea, it takes awhile.
  5. The changes are aggravating, but I’m still running CE. The only feature I feel I’m missing is the boot environments support.
[–] 6nairod@alien.top 1 points 11 months ago

For the first point, I believe that not long ago I've seen here that someone made a website where you upload your config file (or something like that) and it generates a config file for opnsense. I don't have the link to that post, but I guess you could manage to find it

[–] CanadianButthole@alien.top 1 points 11 months ago (1 children)

Yes

Edit: pfSense shill bots in the comments? Something is super sus here

[–] praetorthesysadmin@alien.top 1 points 11 months ago

Most of the comments are just shitting on OPNsense, without even given a valid reason why they don't use it or they moved away from it.

Very sus indeed.

[–] nuked24@alien.top 1 points 11 months ago

I went from pfsense to opnsense about a year ago after an attempted settings change completely broke my pfsense install (again). I've been debating going back because I cannot get load balancing to work on opnsense, no matter what I do. Currently it's just using a single gateway, and if that goes down then everyone is SOL until it comes back up or I manually switch it.

[–] Own_Career_7388@alien.top 1 points 11 months ago

pfSense is what happens when you take OPNsense and put a chick in it and make her gay and lame. Always go with open source.

[–] djgizmo@alien.top 1 points 11 months ago

Running suricata and HAProxy will be the cause of your slowness / wierdness.

[–] techw1z@alien.top 1 points 11 months ago

yes. netgate is evil and less reliable than opnsense if you make use of fancy stuff

[–] diffraa@alien.top 1 points 11 months ago

opnsense seems to be made by people who don't hate me, so I use that.

[–] barndoor101@alien.top 1 points 11 months ago
[–] Frozen_Gecko@alien.top 1 points 11 months ago

I actually switched from pfsense to opnsense last week. The licensing debacle and the stand Netgate took against the community was enough for me to switch. It took a bit of time getting used to the UI, but I'm starting to enjoy using opnsense more than pfsense. First thing that made me happy was the automatic backups to nextcloud haha

[–] DellR610@alien.top 1 points 11 months ago

If you have a home lab, offshore what you can from your firewall. The less it does the more secure it is. Once you've watered it down to maybe DHCP and suricata then there's almost no difference in pfsense and opn.

[–] veehexx@alien.top 1 points 11 months ago

Used both, from pf to opn maybe 15months ago. Never had issues with either but I've had issues with how pf is managed and just seems to get another reason to dislike every so often.

Depends on your issues but go raise bug report with opn. If opn started to cause me issues then I'd be more likely to goto openwrt I think,rather than pf.

[–] ______-_-_________@alien.top 1 points 11 months ago (1 children)

I use pfsense CE. I am a bit worried that Netgate will be less interested in maintaining the community edition now, but it just works. I don't need a lot of bells and whistles. So I'm staying put until I see a decent reason to switch.

[–] djgizmo@alien.top 1 points 11 months ago

IMO, no. I don’t use pfsense on a daily basis (MikroTik FTW), but netgate will use CE as a testing ground. They’ll keep putting out updates; but advanced functionality will be paywalled.

[–] Godort@lemm.ee 1 points 11 months ago

OPNSense is far more willing to add "experimental" features and as a result you get a firewall that has more features out of the box, but is less stable.

pfSense is very slow to add new functionality, but the platform is rock solid as a result.

It all comes down to what you want. Do you want to play around with an appliance that has all the knobs, but also some eccentricities, or do you want an appliance that may not have bleeding edge features, but is far less prone to error.

[–] AdderallBuyersClub2@alien.top 1 points 11 months ago

Do it. OPNSense is starting to not make sense anymore. I had the same conflicts as you. But PFSense has more support and features.

[–] SirLagz@alien.top 1 points 11 months ago

I use pfSense for the stability of it.

Netgate as a company has certainly done a few things which have had me looking at other router options but at the moment, pfSense CE works, is stable, and I don't need to faff with it, so I'm happy staying put.

[–] cspotme2@alien.top 1 points 11 months ago (1 children)

Your extensive config is probably your issue and not opnsense. You said you've been running it for a few years but seemingly 4 months ago, you couldn't figure out a basic rule to block internet for a single ip.

[–] cjchico@alien.top 1 points 11 months ago (2 children)

My config probably does factor into some of the issues. To be fair, I've never had to block Internet from a single device before, and the rule seemed backwards compared to my thought process.

If I remember correctly, I started using OPNsense in 2020. Since then, my lab and network has evolved tremendously.

[–] djgizmo@alien.top 1 points 11 months ago

‘Sense’ uses interface to base their rules around. You could use the vlan interface or the wan interface for this.

[–] Gutter7676@alien.top 1 points 11 months ago (1 children)

Yes, that is how networking rules work.

Just an FYI, “your way of thinking” doesn’t apply to pretty much anything. Try learning how things actually work and not assume “your way” is the right way.

I can’t believe I have to explain that.

[–] cjchico@alien.top 1 points 11 months ago

Not sure why you're being rude for no reason - maybe you need a cup of coffee. I am learning how things work hence the incorrect thought process. Just because you think you know everything doesn't mean you have to put everyone else down for not.

FYI on Fortigates (that I am used to working with opposed to *Sense), there is an incoming (source) and outgoing (destination) interface for the rules, so that's where that thought process originated.

[–] pizzapunt55@alien.top 1 points 11 months ago

If you like support and stability then going for pf over opn is a choice you can make. I just don't like how netgate has been shitting on the competitor with that ridiculous site.

[–] niceman1212@alien.top 1 points 11 months ago

I use pf CE and if they have plans to discontinue it or whatever I’ll switch. If someone can provide me with a good rational reason I would consider OPNsense though.

[–] lupin-san@alien.top 1 points 11 months ago

I have an extensive config inclduing vlans, plugins, policies, suricata, VPN, routes, gateways, HAProxy, etc.

When you have an extensive config, you should always test the upgrade on a "lab" machine before applying them to your "production" environment. You don't just apply the update blindly and hope nothing breaks.

[–] butthurtpants@alien.top 1 points 11 months ago

I went from pf to openwrt. So far, so good. I'm sure it's not as powerful as a pure firewall device, but it suits my needs.

[–] artequilibrium@alien.top 1 points 11 months ago
[–] EtherMan@alien.top 1 points 11 months ago

If stability is what you're after (both in terms of versioning and in the sense of as few unscheduled reboots as possible), then neither is a good option. Both update quite often and go with an "introduce feature now, worry about stability later" and end up having to constantly patch a bunch of stuff.

If you're comfortable with a CLI, then I'd recommend Vyos and then going with the stable branch. It's had 3 service patches since 1.3.0 released in 2021. The last being in june and before that, you have to go to september last year. Ofc, downside is that you'll miss out on a lot of features. Like I don't think stable has wireguard support yet, and not certain it will be ready for when 1.4 goes stable either (it's currently in 1.4 rolling). You could implement some of it yourself because it's built on Debian, but anything you do like that is tied to your current image. So if you upgrade, you have to do it again so I don't recommend it.

Point is, if you need features, don't, but if it's the most stable you're after, I can highly recommend at least having a look. Though I always recommend getting a proper router above any router os on amd64. You'll get more out of it, cheaper, with less power consumption and lower latency.

[–] xupetas@alien.top 1 points 11 months ago

Nope. I have moved away several years ago from pfsense and could not be happier. I am running production off a 2 node, 24 vlan cluster and it’s rock solid

[–] youmas@alien.top 1 points 11 months ago

First of all, I love Opnsense! I'm saving for Opnsense hardware to support them.

Only thing that is bugging me around lately since 23.7.7. update is getting into my LAN with Tailscale. It's running as an exit node. I do get internet access and everything, but no local services. It worked from the beginning until that update. I hadn't changed anything. I've done all the steps Tailscale describes, but still no LAN access. No blocking rules shows up in the logs. I'm stumped.

[–] HTTP_404_NotFound@alien.top 1 points 11 months ago

I personally, choose to not support companies who are assholes.

And, especially companies who call their open source competition, "Nazis".

Screw netgate.

[–] SamSausages@alien.top 1 points 11 months ago (1 children)

No, I like pfsense because it has less frequent updates and is better documented.

Here is one of the better guides that helps you config much of what you are talking about:

https://nguvu.org/pfsense/pfsense-baseline-setup/

Plus, opensense gets most of their code from the work done by pfsense, and often have to wait on them to push the code. Just look at what happened with TLS 1.3

[–] SamSausages@alien.top 1 points 11 months ago

chuckle, butthurt downvotes but not one comment to dispute anything I said. Enjoy the depreciated OpenSSL without security updates.

[–] reklis@alien.top 1 points 11 months ago

I have an official netgate firewall and it runs pfsense+ However, when it comes time to replace it and upgrade to 2.5GB my next firewall will be running opnsense. I just don’t like the direction netgate has gone with their company decisions and I won’t be buying any more hardware from them. I don’t think you should either.