Security
Token
There is no security token.
Firewall
main
Name
Security enabled
Stateless
Configuration
Key | Value |
---|---|
provider | security.user.provider.concrete.app_user_provider |
context | main |
entry_point | App\Security\KbinAuthenticator |
user_checker | App\Security\UserChecker |
access_denied_handler | (none) |
access_denied_url | (none) |
authenticators | [ "two_factor" "remember_me" "App\Security\KbinAuthenticator" "App\Security\FacebookAuthenticator" "App\Security\GoogleAuthenticator" "App\Security\GithubAuthenticator" "App\Security\KeycloakAuthenticator" ] |
Listeners
Listener | Duration | Response |
---|---|---|
Symfony\Component\Security\Http\Firewall\ChannelListener {#723 -map: Symfony\Component\Security\Http\AccessMap {#722 …} -logger: Monolog\Logger {#783 …} -httpPort: 80 -httpsPort: 443 } |
0.00 ms | (none) |
Symfony\Component\Security\Http\Firewall\ContextListener {#706 -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage {#1017 …} -sessionKey: "_security_main" -logger: Monolog\Logger {#783 …} -userProviders: Symfony\Component\DependencyInjection\Argument\RewindableGenerator {#705 …} -dispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …} -registered: false -trustResolver: Scheb\TwoFactorBundle\Security\Authentication\AuthenticationTrustResolver {#780 …} -sessionTrackerEnabler: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage::enableUsageTracking(): void {#703 …} } |
5.85 ms | (none) |
Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener {#584 -authenticatorManager: Symfony\Component\Security\Http\Authentication\AuthenticatorManager {#595 …} } |
0.00 ms | (none) |
Scheb\TwoFactorBundle\Security\Http\Firewall\TwoFactorAccessListener {#582 -twoFactorFirewallConfig: Scheb\TwoFactorBundle\Security\TwoFactor\TwoFactorFirewallConfig {#842 …} -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …} -twoFactorAccessDecider: Scheb\TwoFactorBundle\Security\Authorization\TwoFactorAccessDecider {#581 …} } |
0.05 ms | (none) |
Symfony\Component\Security\Http\Firewall\AccessListener {#579 -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …} -accessDecisionManager: Symfony\Component\Security\Core\Authorization\TraceableAccessDecisionManager {#937 …} -map: Symfony\Component\Security\Http\AccessMap {#722 …} } |
0.00 ms | (none) |
Symfony\Component\Security\Http\Firewall\LogoutListener {#786 -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …} -options: [ "csrf_parameter" => "_csrf_token" "csrf_token_id" => "logout" "logout_path" => "app_logout" ] -httpUtils: Symfony\Component\Security\Http\HttpUtils {#841 …} -csrfTokenManager: Symfony\Component\Security\Csrf\CsrfTokenManager {#1015 …} -eventDispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …} } |
0.00 ms | (none) |
Authenticators
No authenticators have been recorded. Check previous profiles on your authentication endpoint.
Access Decision
affirmative
Strategy
Access decision log
# | Result | Attributes | Object | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | DENIED | ROLE_USER | null |
||||||||||||||||||||||||
|
|||||||||||||||||||||||||||
2 | DENIED | moderate | App\Entity\Entry {#1563 +user: App\Entity\User {#263 …} +magazine: Proxies\__CG__\App\Entity\Magazine {#1719 …} +image: null +domain: Proxies\__CG__\App\Entity\Domain {#1629 …} +slug: "VPN-to-home-network-options" +title: "VPN to home network options" +url: null +body: """ I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n \n I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way? """ +type: "article" +lang: "en" +isOc: false +hasEmbed: false +commentCount: 22 +favouriteCount: 10 +score: 0 +isAdult: false +sticky: false +lastActive: DateTime @1705642568 {#1550 : 2024-01-19 06:36:08.0 +01:00 } +ip: null +adaAmount: 0 +tags: null +mentions: null +comments: Doctrine\ORM\PersistentCollection {#1628 …} +votes: Doctrine\ORM\PersistentCollection {#1599 …} +reports: Doctrine\ORM\PersistentCollection {#1597 …} +favourites: Doctrine\ORM\PersistentCollection {#2447 …} +notifications: Doctrine\ORM\PersistentCollection {#2464 …} +badges: Doctrine\ORM\PersistentCollection {#2468 …} +children: [] -id: 31321 -titleTs: "'home':3 'network':4 'option':5 'vpn':1" -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106" +cross: false +upVotes: 0 +downVotes: 0 +ranking: 1705613475 +visibility: "visible " +apId: "https://lemmy.ml/post/10682638" +editedAt: null +createdAt: DateTimeImmutable @1705527075 {#1411 : 2024-01-17 22:31:15.0 +01:00 } } |
||||||||||||||||||||||||
|
|||||||||||||||||||||||||||
3 | DENIED | edit | App\Entity\Entry {#1563 +user: App\Entity\User {#263 …} +magazine: Proxies\__CG__\App\Entity\Magazine {#1719 …} +image: null +domain: Proxies\__CG__\App\Entity\Domain {#1629 …} +slug: "VPN-to-home-network-options" +title: "VPN to home network options" +url: null +body: """ I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n \n I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way? """ +type: "article" +lang: "en" +isOc: false +hasEmbed: false +commentCount: 22 +favouriteCount: 10 +score: 0 +isAdult: false +sticky: false +lastActive: DateTime @1705642568 {#1550 : 2024-01-19 06:36:08.0 +01:00 } +ip: null +adaAmount: 0 +tags: null +mentions: null +comments: Doctrine\ORM\PersistentCollection {#1628 …} +votes: Doctrine\ORM\PersistentCollection {#1599 …} +reports: Doctrine\ORM\PersistentCollection {#1597 …} +favourites: Doctrine\ORM\PersistentCollection {#2447 …} +notifications: Doctrine\ORM\PersistentCollection {#2464 …} +badges: Doctrine\ORM\PersistentCollection {#2468 …} +children: [] -id: 31321 -titleTs: "'home':3 'network':4 'option':5 'vpn':1" -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106" +cross: false +upVotes: 0 +downVotes: 0 +ranking: 1705613475 +visibility: "visible " +apId: "https://lemmy.ml/post/10682638" +editedAt: null +createdAt: DateTimeImmutable @1705527075 {#1411 : 2024-01-17 22:31:15.0 +01:00 } } |
||||||||||||||||||||||||
|
|||||||||||||||||||||||||||
4 | DENIED | moderate | App\Entity\Entry {#1563 +user: App\Entity\User {#263 …} +magazine: Proxies\__CG__\App\Entity\Magazine {#1719 …} +image: null +domain: Proxies\__CG__\App\Entity\Domain {#1629 …} +slug: "VPN-to-home-network-options" +title: "VPN to home network options" +url: null +body: """ I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n \n I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way? """ +type: "article" +lang: "en" +isOc: false +hasEmbed: false +commentCount: 22 +favouriteCount: 10 +score: 0 +isAdult: false +sticky: false +lastActive: DateTime @1705642568 {#1550 : 2024-01-19 06:36:08.0 +01:00 } +ip: null +adaAmount: 0 +tags: null +mentions: null +comments: Doctrine\ORM\PersistentCollection {#1628 …} +votes: Doctrine\ORM\PersistentCollection {#1599 …} +reports: Doctrine\ORM\PersistentCollection {#1597 …} +favourites: Doctrine\ORM\PersistentCollection {#2447 …} +notifications: Doctrine\ORM\PersistentCollection {#2464 …} +badges: Doctrine\ORM\PersistentCollection {#2468 …} +children: [] -id: 31321 -titleTs: "'home':3 'network':4 'option':5 'vpn':1" -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106" +cross: false +upVotes: 0 +downVotes: 0 +ranking: 1705613475 +visibility: "visible " +apId: "https://lemmy.ml/post/10682638" +editedAt: null +createdAt: DateTimeImmutable @1705527075 {#1411 : 2024-01-17 22:31:15.0 +01:00 } } |
||||||||||||||||||||||||
|