Sorry, I thought admin had root privy, it did not. Had to su to root and then run the command
USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS
root caddy 10534 9 tcp46 *:443 *:*
root caddy 10534 11 tcp46 *:80 *:*
root lighttpd 17298 4 tcp4 127.0.0.1:43580 *:*
unbound unbound 64805 6 tcp4 192.168.100.1:53 *:*
unbound unbound 64805 8 tcp4 192.168.200.1:53 *:*
unbound unbound 64805 10 tcp4 192.168.123.1:53 *:*
unbound unbound 64805 12 tcp6 2600:4040:7e0d:a500:227c:14ff:fea2:12f9:53 *:*
unbound unbound 64805 14 tcp6 fe80::227c:14ff:fea2:12f9%igb1:53 *:*
unbound unbound 64805 16 tcp4 127.0.0.1:53 *:*
unbound unbound 64805 18 tcp6 ::1:53 *:*
unbound unbound 64805 20 tcp6 fe80::1%lo0:53 *:*
unbound unbound 64805 22 tcp4 192.168.100.1:53 *:*
unbound unbound 64805 24 tcp4 192.168.200.1:53 *:*
unbound unbound 64805 26 tcp4 192.168.123.1:53 *:*
unbound unbound 64805 28 tcp6 2600:4040:7e0d:a500:227c:14ff:fea2:12f9:53 *:*
unbound unbound 64805 30 tcp6 fe80::227c:14ff:fea2:12f9%igb1:53 *:*
unbound unbound 64805 32 tcp4 127.0.0.1:53 *:*
unbound unbound 64805 34 tcp6 ::1:53 *:*
unbound unbound 64805 36 tcp6 fe80::1%lo0:53 *:*
unbound unbound 64805 38 tcp4 192.168.100.1:53 *:*
unbound unbound 64805 40 tcp4 192.168.200.1:53 *:*
unbound unbound 64805 42 tcp4 192.168.123.1:53 *:*
unbound unbound 64805 44 tcp6 2600:4040:7e0d:a500:227c:14ff:fea2:12f9:53 *:*
unbound unbound 64805 46 tcp6 fe80::227c:14ff:fea2:12f9%igb1:53 *:*
unbound unbound 64805 48 tcp4 127.0.0.1:53 *:*
unbound unbound 64805 50 tcp6 ::1:53 *:*
unbound unbound 64805 52 tcp6 fe80::1%lo0:53 *:*
unbound unbound 64805 54 tcp4 192.168.100.1:53 *:*
unbound unbound 64805 56 tcp4 192.168.200.1:53 *:*
unbound unbound 64805 58 tcp4 192.168.123.1:53 *:*
unbound unbound 64805 60 tcp6 2600:4040:7e0d:a500:227c:14ff:fea2:12f9:53 *:*
unbound unbound 64805 62 tcp6 fe80::227c:14ff:fea2:12f9%igb1:53 *:*
unbound unbound 64805 64 tcp4 127.0.0.1:53 *:*
unbound unbound 64805 66 tcp6 ::1:53 *:*
unbound unbound 64805 68 tcp6 fe80::1%lo0:53 *:*
unbound unbound 64805 69 tcp4 127.0.0.1:953 *:*
root lighttpd 32960 7 tcp4 127.0.0.1:8443 *:*
root lighttpd 32960 8 tcp6 ::1:8443 *:*
root lighttpd 32960 9 tcp6 fe80::1%lo0:8443 *:*
root lighttpd 32960 10 tcp4 192.168.123.1:8443 *:*
root lighttpd 32960 11 tcp6 2600:4040:7e0d:a500:227c:14ff:fea2:12f9:8443 *:*
root lighttpd 32960 12 tcp6 fe80::227c:14ff:fea2:12f9%igb1:8443 *:*
root sshd 24867 3 tcp6 fe80::1%lo0:22 *:*
root sshd 24867 4 tcp6 ::1:22 *:*
root sshd 24867 5 tcp4 127.0.0.1:22 *:*
root sshd 24867 6 tcp6 fe80::227c:14ff:fea2:12f9%igb1:22 *:*
root sshd 24867 7 tcp6 2600:4040:7e0d:a500:227c:14ff:fea2:12f9:22 *:*
root sshd 24867 8 tcp4 192.168.123.1:22 *:*
and tcpdump
root@OPNsense:/home/admin # tcpdump -i igb0 port 80 or port 443
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on igb0, link-type EN10MB (Ethernet), capture size 262144 bytes
10:21:10.935444 IP pool-72-94-151-69.phlapa.fios.verizon.net.18843 > 151.101.46.110.https: Flags [.], ack 1243659511, win 2048, length 0
10:21:10.942022 IP 151.101.46.110.https > pool-72-94-151-69.phlapa.fios.verizon.net.18843: Flags [.], ack 1, win 424, options [nop,nop,TS val 1019892262 ecr 1897038619], length 0
10:21:11.301507 IP pool-72-94-151-69.phlapa.fios.verizon.net.18534 > 52.159.126.152.https: Flags [P.], seq 2430299025:2430299130, ack 3975323061, win 1027, length 105
10:21:11.327150 IP 52.159.126.152.https > pool-72-94-151-69.phlapa.fios.verizon.net.18534: Flags [P.], seq 1:176, ack 105, win 7247, length 175
10:21:11.507675 IP pool-72-94-151-69.phlapa.fios.verizon.net.18534 > 52.159.126.152.https: Flags [.], ack 176, win 1026, length 0
10:21:11.894597 IP6 2600:4040:7e0d:a500::1f71.55581 > lga34s34-in-x03.1e100.net.https: Flags [P.], seq 1454702368:1454702467, ack 2950211151, win 2048, options [nop,nop,TS val 2023390983 ecr 1913298263], length 99
10:21:11.903520 IP6 lga34s34-in-x03.1e100.net.https > 2600:4040:7e0d:a500::1f71.55581: Flags [.], ack 99, win 279, options [nop,nop,TS val 1913305918 ecr 2023390983], length 0
10:21:11.916342 IP6 lga34s34-in-x03.1e100.net.https > 2600:4040:7e0d:a500::1f71.55581: Flags [P.], seq 1:73, ack 99, win 279, options [nop,nop,TS val 1913305931 ecr 2023390983], length 72
10:21:11.916348 IP6 lga34s34-in-x03.1e100.net.https > 2600:4040:7e0d:a500::1f71.55581: Flags [P.], seq 73:147, ack 99, win 279, options [nop,nop,TS val 1913305931 ecr 2023390983], length 74
10:21:11.917046 IP6 lga34s34-in-x03.1e100.net.https > 2600:4040:7e0d:a500::1f71.55581: Flags [P.], seq 147:178, ack 99, win 279, options [nop,nop,TS val 1913305931 ecr 2023390983], length 31
10:21:11.917052 IP6 lga34s34-in-x03.1e100.net.https > 2600:4040:7e0d:a500::1f71.55581: Flags [P.], seq 178:217, ack 99, win 279, options [nop,nop,TS val 1913305931 ecr 2023390983], length 39
10:21:11.918914 IP6 2600:4040:7e0d:a500::1f71.55581 > lga34s34-in-x03.1e100.net.https: Flags [.], ack 217, win 2044, options [nop,nop,TS val 2023391014 ecr 1913305931], length 0
10:21:11.921281 IP6 2600:4040:7e0d:a500::1f71.55581 > lga34s34-in-x03.1e100.net.https: Flags [P.], seq 99:134, ack 217, win 2048, options [nop,nop,TS val 2023391016 ecr 1913305931], length 35
10:21:11.921287 IP6 2600:4040:7e0d:a500::1f71.55581 > lga34s34-in-x03.1e100.net.https: Flags [P.], seq 134:173, ack 217, win 2048, options [nop,nop,TS val 2023391016 ecr 1913305931], length 39
10:21:11.926336 IP6 lga34s34-in-x03.1e100.net.https > 2600:4040:7e0d:a500::1f71.55581: Flags [.], ack 173, win 279, options [nop,nop,TS val 1913305940 ecr 2023391016], length 0
10:21:12.369916 IP6 2600:4040:7e0d:a500::1fbf.62621 > usewr1-vip-bx-007.aaplimg.com.https: Flags [P.], seq 125338578:125338617, ack 2137683347, win 38, options [nop,nop,TS val 1835490916 ecr 1951133077], length 39
10:21:12.369922 IP6 2600:4040:7e0d:a500::1fbf.62621 > usewr1-vip-bx-007.aaplimg.com.https: Flags [P.], seq 39:63, ack 1, win 38, options [nop,nop,TS val 1835490916 ecr 1951133077], length 24
10:21:12.370031 IP6 2600:4040:7e0d:a500::1fbf.62621 > usewr1-vip-bx-007.aaplimg.com.https: Flags [F.], seq 63, ack 1, win 38, options [nop,nop,TS val 1835490918 ecr 1951133077], length 0
10:21:12.370036 IP6 2600:4040:7e0d:a500::1fbf.62621 > usewr1-vip-bx-007.aaplimg.com.https: Flags [FP.], seq 0:63, ack 1, win 38, options [nop,nop,TS val 1835491147 ecr 1951133077], length 63
10:21:12.370044 IP pool-72-94-151-69.phlapa.fios.verizon.net.62778 > ec2-54-163-77-158.compute-1.amazonaws.com.https: Flags [P.], seq 2202613278:2202613317, ack 3849003946, win 68, options [nop,nop,TS val 804264124 ecr 2448380695], length 39
10:21:12.370051 IP pool-72-94-151-69.phlapa.fios.verizon.net.62778 > ec2-54-163-77-158.compute-1.amazonaws.com.https: Flags [P.], seq 39:63, ack 1, win 68, options [nop,nop,TS val 804264126 ecr 2448380695], length 24
10:21:12.370059 IP pool-72-94-151-69.phlapa.fios.verizon.net.62778 > ec2-54-163-77-158.compute-1.amazonaws.com.https: Flags [F.], seq 63, ack 1, win 68, options [nop,nop,TS val 804264130 ecr 2448380695], length 0
10:21:12.370066 IP pool-72-94-151-69.phlapa.fios.verizon.net.62778 > ec2-54-163-77-158.compute-1.amazonaws.com.https: Flags [FP.], seq 0:63, ack 1, win 68, options [nop,nop,TS val 804264354 ecr 2448380695], length 63
10:21:12.371453 IP pool-72-94-151-69.phlapa.fios.verizon.net.40227 > resolver1.opendns.com.https: UDP, length 196
10:21:12.371459 IP pool-72-94-151-69.phlapa.fios.verizon.net.17628 > resolver1.opendns.com.https: UDP, length 196
10:21:12.371469 IP pool-72-94-151-69.phlapa.fios.verizon.net.1237 > ec2-54-67-119-89.us-west-1.compute.amazonaws.com.https: Flags [P.], seq 3448494010:3448494120, ack 350991542, win 2048, options [nop,nop,TS val 206188646 ecr 515387430], length 110
10:21:12.371479 IP pool-72-94-151-69.phlapa.fios.verizon.net.1237 > ec2-54-67-119-89.us-west-1.compute.amazonaws.com.https: Flags [.], seq 110:1558, ack 1, win 2048, options [nop,nop,TS val 206188646 ecr 515387430], length 1448
10:21:12.371487 IP pool-72-94-151-69.phlapa.fios.verizon.net.1237 > ec2-54-67-119-89.us-west-1.compute.amazonaws.com.https: Flags [P.], seq 1558:1762, ack 1, win 2048, options [nop,nop,TS val 206188646 ecr 515387430], length 204
10:21:12.371496 IP pool-72-94-151-69.phlapa.fios.verizon.net.1237 > ec2-54-67-119-89.us-west-1.compute.amazonaws.com.https: Flags [.], seq 1762:3210, ack 1, win 2048, options [nop,nop,TS val 206188646 ecr 515387430], length 1448
10:21:12.371508 IP pool-72-94-151-69.phlapa.fios.verizon.net.1237 > ec2-54-67-119-89.us-west-1.compute.amazonaws.com.https: Flags [P.], seq 3210:4199, ack 1, win 2048, options [nop,nop,TS val 206188646 ecr 515387430], length 989
10:21:12.371515 IP pool-72-94-151-69.phlapa.fios.verizon.net.1237 > ec2-54-67-119-89.us-west-1.compute.amazonaws.com.https: Flags [.], seq 4199:5647, ack 1, win 2048, options [nop,nop,TS val 206188936 ecr 515387430], length 1448
10:21:12.375015 IP6 usewr1-vip-bx-007.aaplimg.com.https > 2600:4040:7e0d:a500::1fbf.62621: Flags [R], seq 2137683347, win 0, length 0
10:21:12.375022 IP6 usewr1-vip-bx-007.aaplimg.com.https > 2600:4040:7e0d:a500::1fbf.62621: Flags [R], seq 2137683347, win 0, length 0
10:21:12.375027 IP6 usewr1-vip-bx-007.aaplimg.com.https > 2600:4040:7e0d:a500::1fbf.62621: Flags [R], seq 2137683347, win 0, length 0
10:21:12.376470 IP6 usewr1-vip-bx-007.aaplimg.com.https > 2600:4040:7e0d:a500::1fbf.62621: Flags [R], seq 2137683347, win 0, length 0
10:21:12.378479 IP resolver1.opendns.com.https > pool-72-94-151-69.phlapa.fios.verizon.net.17628: UDP, length 304
10:21:12.378859 IP ec2-54-163-77-158.compute-1.amazonaws.com.https > pool-72-94-151-69.phlapa.fios.verizon.net.62778: Flags [R.], seq 1, ack 39, win 68, length 0
10:21:12.378867 IP ec2-54-163-77-158.compute-1.amazonaws.com.https > pool-72-94-151-69.phlapa.fios.verizon.net.62778: Flags [R.], seq 1, ack 63, win 68, length 0
10:21:12.379235 IP ec2-54-163-77-158.compute-1.amazonaws.com.https > pool-72-94-151-69.phlapa.fios.verizon.net.62778: Flags [R.], seq 1, ack 63, win 68, length 0
10:21:12.379242 IP ec2-54-163-77-158.compute-1.amazonaws.com.https > pool-72-94-151-69.phlapa.fios.verizon.net.62778: Flags [R.], seq 1, ack 63, win 68, length 0
10:21:12.379553 IP resolver1.opendns.com.https > pool-72-94-151-69.phlapa.fios.verizon.net.40227: UDP, length 412
10:21:12.420252 IP pool-72-94-151-69.phlapa.fios.verizon.net.40046 > 93.243.107.34.bc.googleusercontent.com.https: Flags [P.], seq 348910020:348910059, ack 1828170203, win 2048, options [nop,nop,TS val 518536765 ecr 4003933940], length 39
10:21:12.420256 IP pool-72-94-151-69.phlapa.fios.verizon.net.46878 > 209.100.149.34.bc.googleusercontent.com.https: Flags [P.], seq 2476380618:2476380664, ack 902894078, win 2048, options [nop,nop,TS val 1537442676 ecr 4276236553], length 46
10:21:12.423119 IP pool-72-94-151-69.phlapa.fios.verizon.net.1237 > ec2-54-67-119-89.us-west-1.compute.amazonaws.com.https: Flags [P.], seq 5647:5975, ack 1, win 2048, options [nop,nop,TS val 206188989 ecr 515387430], length 328
10:21:12.425505 IP 209.100.149.34.bc.googleusercontent.com.https > pool-72-94-151-69.phlapa.fios.verizon.net.46878: Flags [R], seq 902894078, win 0, length 0
10:21:12.425868 IP pool-72-94-151-69.phlapa.fios.verizon.net.30847 > ec2-34-204-109-226.compute-1.amazonaws.com.https: Flags [F.], seq 2094567151, ack 48487688, win 2048, options [nop,nop,TS val 3331341400 ecr 2335747501], length 0
10:21:12.426500 IP 93.243.107.34.bc.googleusercontent.com.https > pool-72-94-151-69.phlapa.fios.verizon.net.40046: Flags [R], seq 1828170203, win 0, length 0
The only IPs I see in the log are internal
root@OPNsense:/var/log/caddy/access # cat 61f39389-3df9-42de-b6bc-9608b04cc445.log
{"level":"info","ts":1712759218.5605552,"logger":"http.log.access.log0","msg":"handled request","request":{"remote_ip":"192.168.123.166","remote_port":"62710","client_ip":"192.168.123.166","proto":"HTTP/2.0","method":"GET","host":"jelly.castlewolf.net","uri":"/System/Info/Public","headers":{"Sec-Fetch-Dest":["empty"],"Sec-Fetch-Mode":["cors"],"Sec-Fetch-Site":["same-origin"],"Te":["trailers"],"User-Agent":["Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:124.0) Gecko/20100101 Firefox/124.0"],"Accept":["*/*"],"Accept-Language":["en-US,en;q=0.5"],"Accept-Encoding":["gzip, deflate, br"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"jelly.castlewolf.net"}},"bytes_read":0,"user_id":"","duration":0.002209471,"size":213,"status":200,"resp_headers":{"Server":["Caddy","Kestrel"],"Alt-Svc":["h3=\":443\"; ma=2592000"],"Content-Type":["application/json; charset=utf-8"],"Date":["Wed, 10 Apr 2024 14:26:58 GMT"],"X-Response-Time-Ms":["0"]}}
there are some errors in the regular log file that look like this but my IP hasn’t changed and DNS lookups for the domain point to the correct IP.
2024-04-10T10:29:36-04:00 Error caddy "error","ts":"2024-04-10T14:29:36Z","logger":"dynamic_dns","msg":"failed setting DNS record(s) with new IP address(es)","zone":"jelly.castlewolf.net","error":"Invalid http response status, <!DOCTYPE html>\n<html lang=\"en\">\n<head>\n<title>Error</title>\n<style type=\"text/css\">\n\n::selection{ background-color: #E13300; color: white; }\n::moz-selection{ background-color: #E13300; color: white; }\n::webkit-selection{ background-color: #E13300; color: white; }\n\nbody {\n\tbackground-color: #fff;\n\tmargin: 40px;\n\tfont: 13px/20px normal Helvetica, Arial, sans-serif;\n\tcolor: #4F5155;\n}\n\na {\n\tcolor: #003399;\n\tbackground-color: transparent;\n\tfont-weight: normal;\n}\n\nh1 {\n\tcolor: #444;\n\tbackground-color: transparent;\n\tborder-bottom: 1px solid #D0D0D0;\n\tfont-size: 19px;\n\tfont-weight: normal;\n\tmargin: 0 0 14px 0;\n\tpadding: 14px 15px 10px 15px;\n}\n\ncode {\n\tfont-family: Consolas, Monaco, Courier New, Courier, monospace;\n\tfont-size: 12px;\n\tbackground-color: #f9f9f9;\n\tborder: 1px solid #D0D0D0;\n\tcolor: #002166;\n\tdisplay: block;\n\tmargin: 14px 0 14px 0;\n\tpadding: 12px 10px 12px 10px;\n}\n\n#container {\n\tmargin: 10px;\n\tborder: 1px solid #D0D0D0;\n\t-webkit-box-shadow: 0 0 8px #D0D0D0;\n}\n\np {\n\tmargin: 12px 15px 12px 15px;\n}\n\n</style>\n</head>\n\n\n<body>\n\t<div id=\"container\">\n\t\t<h1>An Error Was Encountered</h1>\n\t\t<p>The URI you submitted has disallowed characters.</p>\t\t<p>You can probably find what you're looking for on our <a href=\"/\">homepage</a>.</p>\n\t</div>\n</body>\n</html>\n"}
I’m guessing it’s something stupid or a conflict. But any additional ideas of what to look for would be appreciated. Thanks,